Module-7-Discussion-Chapters-22-and-23-
Module-7-Discussion-Chapters-22-and-23-
Hi, all.
Your readings were about copyrights and futures. Now you will explore the relationship between the protection of information and associated values. Do not necessarily get into the broad topic of ethics, but rather direct discussion toward the values of users.
- How are they made to understand the importance of security right down to valuing equipment and the use of resources?
- It is not something that can be accomplished in an email; that’s for sure.
- What policy mechanisms at an organization can help?
Certainly we have mentioned that the youth of today are technically astute but they do not always learn from their teachers. They often “learn” from each other, which is the blind leading the blind, moral-compass-wise! Not only do they not learn the underlying technologies, they totally miss the boat on intellectual property and ownership of information… hence when one goes to college they get a great education and a huge MP3 collection (and software and movie collections)!
It is not the purpose here to argue right or wrong. The purpose is to talk about the values associated with technology and security so that one can make their own — and hopefully proper — decisions.
Discuss and interact regularly with your classmates, bringing the discussion to a close by the end of Week 8.
Refer to the rubric for grading criteria.
