Fall 2010 Ethics in Information Technology On-line Keck TCC Fall 2010 SYLLABUS Ethics in Information Technology (Online) MGT 2993 – 290 – 15279 Begins: August 16th, 2010 Ends: December 12th, 2010

Instructor: Gary L. Keck, B.S., MBA Business & Information Technology Office: NEC, Room 2159 Division Associate Dean: Tom Mancino Phone: 918-595-7479 Office: NE 2372 Email: [email protected] Phone: 595-7441

Internet Instructor's Role

The instructor for your course is a full time faculty member at Tulsa Community College. Your instructor has been involved in the development of this course and is knowledgeable of both the course's process and content. Please rely on your instructor, as a teacher, problem-solver and information provider whenever you believe it is necessary.

Prerequisite

None

Other Suggested Internet Courses

BUS 1053 – Introduction to Business

BUS 2363 – Supervisory Management

MGT 1353 – Management Essentials

MGT 1373 – Human Resources Management

MGT 2363 – Principles of Management

1 Fall 2010 Ethics in Information Technology On-line Keck

GENERAL EDUCATION GOAL STATEMENT The General Education Goals are designed to ensure that graduates of Tulsa Community College have the skills, knowledge, and attitudes to carry them successfully through their work and their personal lives. General Education Goals relevant to this course include Critical Thinking, Effective Communication, Engaged Learning, and Technical Proficiency. CATALOG COURSE DESCRIPTION This course fills the void of practical business information for business managers and IT professionals and will look at issues such as the ethics and ethical decision making, privacy, computer and internet crime, intellectual property, freedom of expression, software development, social networking, computer and network security, computer reliability, and the professional ethics forum that ties them together. Ethical scenarios, cases, and current events items are used to provide a broad practical awareness of the ethical issues. 3 credit hours. No laboratory.

PURPOSE OF THE COURSE Computers and high-speed communication networks are transforming our world at an amazing rate. These technologies have brought us innumerable benefits, but they have also raised many social and ethical concerns. My view is that we should approach every new technology in a thoughtful manner, considering not just its short-term, but also how its long-term use will influence our lives. A solicitous response to information technology requires an understanding of its history, a consciousness of current information-technology-related issues, and the relationship of those critical issues with ethics and ethical concerns. This course is being developed as evidence of the rapid changes in the field of information technology and the ethical implications that are coupled to it, which make it both exciting and very challenging.

Course Objectives

Upon successful completion of this course students will be able to: Define, understand, and know the philosophical approaches to ethical decision-making; weigh the pros and cons of each. Understand a wide variety of issues related to the IT professional and IT users, including licensing, code of ethics, piracy, information sharing, and the inappropriateness of computing resources. How to respond to specific security incidents and how to implement security measures with regard to computer and internet crime

2 Fall 2010 Ethics in Information Technology On-line Keck Understand the creation and exchange of intellectual property, rights, legal safeguards and define fair use, digital rights management, abuses of peer-to-peer networks, and the open source movement Exhibit an ability to understand all matters related to privacy. Demonstrate a proficiency in the management of networked computer vulnerabilities. Exhibit knowledge of computer reliability issues. Understand software development issues that concern product liability, risk analysis, quality assurance and standards Understand the professional codes and the Software Engineering, ACM, AITP, IEEEC and the SANS Codes of Ethics and Professional Practice. Demonstrate an understanding of the wide variety of issues that relate to how information technology has impacted work and health.

Textbook, Software and Supplemental Materials

Required Text:

Title: Ethics in Information Technology Edition: 3rd Edition Author: George W. Reynolds Publisher: Cengage ISBN: 978-0-538-74622-9

**NOTE: Look for the textbook at the campus bookstore or purchase it online at: http://www.cengagebrain.com/tl1/en/US/storefront/ichapters? cmd=catProductDetail&ISBN=9780538746229&cid=APL1. This textbook is also available as an e-Textbook through CourseSmart, where you can save up to 50% off the list price of your print textbooks. Look for a CourseSmart access code at the bookstore, or go to www.coursesmart.com. The following the CourseSmart link for the text:

Reynolds, Ethics in Information Technology, 3rd Edition, http://www.coursesmart.com/givecoursesmartatry? xmlid=9780538746229&__instructor=1142309

It's important you buy this book because:

3 Fall 2010 Ethics in Information Technology On-line Keck  There will be required reading from the book.  Homework assignments will come from the book.  I will test on material from the book.

 It will help you get a better grade in my course.

Required Software:

You will need to have an appropriate word processing program for this class. Microsoft Office (Word, Excel, PowerPoint) - If you do not have Office, you can download it from Blackboard free.

 Go to the Organization tab  Search for: software  Enroll in the organization  Follow the on-screen instructions

Required email address:

All TCC students receive a designated “MyTCC” email address (ex: [email protected]). All communications to you about TCC and course assignments will be sent to your MyTCC email address; and you must use MyTCC email to send email to, and receive email from, the instructor regarding this course. You access MyTCC at https://portal.tulsacc.edu.

COMPUTER ACCESS It is highly recommended that you have regular (daily) computer access, preferably a home computer with broadband Internet access. This course can be completed using public computers at TCC or other public access areas. However, be aware that using public computers may create a hardship. All course requirements remain the same whether your computer access is public or private (home).

TECHNICAL SKILL REQUIREMENTS You should be comfortable with the following:  using a word processor (changing font, spell check)

4 Fall 2010 Ethics in Information Technology On-line Keck  using email for communication  sending an email attachment  navigating the Internet  downloading appropriate plug-ins  using an Internet search engine

Teaching Methods and Instructional Procedures

The course is totally online. Strategies include: Reading resources linked to the Internet, project and process-oriented individual projects; use of the discussion board; use of the Internet; and e-mails among students and between individual students and the professor. This course is designed to allow the student to progress at a self-determined rate within the parameters of the semester time frame and specified deadlines for assignments and testing. It is the student’s responsibility to read ten (10) chapters and Appendices A – G, complete three (3) exams, submit an Ethical Case Studies Semester Project, and participate in four (4) discussion boards and two (2) online debates. Students may elect to do an optional Internet activity to earn up to 100 bonus points. I have posted a Testing and Assignment Schedule that advises the same due dates for each test, discussion and assignment as posted here in the syllabus. You can find this complete Schedule in the Course Information tab of Blackboard. Completing an Internet course requires self-pacing and commitment. Class begins on August 16th, 2010, determine a schedule that you can live with and then stick to the schedule. The instructor is available through scheduled appointment or by e-mail at [email protected].

Attendance – TIME commitment – Student Expectations Attendance (regular participation in the online classroom) is essential for maintaining the best learning environment. Learning occurs in relationship not only between student and course materials, but, just as importantly, peer to peer, professor to student, and student to professor.

Participation in this course via the Internet is the responsibility of the student. Students receiving benefits from government agencies must adhere to policies stipulated by the specific agency.

You are expected to log on to the course site 2-3 times per week. You are also expected to participate in all assigned activities in the course. Attendance will be measured by completion of course assignments.

This 3 credit hour course is customized to meet an 8-week abbreviated summer schedule. Students who successfully complete the course report that they spend

5 Fall 2010 Ethics in Information Technology On-line Keck an average of 10 hours per week on the course. You may spend more or less, depending on your current level of expertise.

NOTE: This Internet class demands that the student be self-motivated and self disciplined. You are responsible to keep up with the schedule, assignments, and exams. I will be contacting you throughout the semester by email and announcements on Blackboard.

What You Should Understand About Internet Classes

 Be realistic about the amount of time required to do the coursework

 Plan to spend 3 to 5 clock hours per week for every credit hour

 Schedule class time just as if you were attending class on campus

 No late work is accepted! Turn in your work on time.

 On-line is NOT easier!

 Use email and the discussion boards to communicate often with your instructor and other classmates.

 Participate actively in the class.

 Log onto Blackboard frequently (at least 3 times per week), ideally every day if possible. Check for current announcements.

 Do NOT fall behind!

 Ask for help when you need help.

ADMINISTRATIVE WITHDRAWL FOR NON-PARTICIPATION Students who fail to participate in the course during the first week or fail to complete the first essay by the late work due date will be Administratively Withdrawn from the course.

6 Fall 2010 Ethics in Information Technology On-line Keck

EVALUATION TECHNIQUES:

EXAMS – (Required) – (300 points – each exam is worth 100 points):

There will be three exams during the semester. Test questions will be multiple choice and will include chapter information from the text.

You will be allowed a maximum of one and one half (1.5) hours to complete each test. All tests will be completed entirely online.

The Chapter assessment tests will be based on the following assignment areas and will be available to take and completed during the dates indicated:

Exam 1: Chapters 1 – 3 Completed by September 12th, 2010 Exam 2: Chapters 4 – 7 Completed by October 10th, 2010 Exam 3: Chapters 8 – 10 Completed by November 7th, 2010

Absolutely NO Make-Up tests will be allowed for any reason!

Because it is impossible for me to differentiate any one individual’s reason for missing a test (or assignment), no matter the reason, to be fair to all, I WILL NOT ACCOMMODATE ANY REQUEST FOR A MAKE-UP OR EXTEND ANY DUE DATE!

However, that is also the reason I offer the Bonus Project, to make up for missed points!

The last day for testing will be November 7th, 2010. No extensions can/will be given for any reason.

TESTING POLICY

All tests will be administered online. Even though you are taking them online, they are still "real" tests. Following are the testing procedures you are expected to follow while taking these exams.

7 Fall 2010 Ethics in Information Technology On-line Keck  You are to take the test by yourself. No group efforts or help from other people in answering the test questions.  You may use your book. However, the test is timed. You will not have time to look up every question.  You have 90 minutes to complete the 50-question test. A timer appears, and the test continues until you click the submit button. You must submit your test before 90 minutes have elapsed.  The test does not automatically stop at 90 minutes. You have to click "Submit" to end the test and stop the timer.  If you go over the 90-minute time limit, for the first minute over 90 minutes you will lose 2 points. Each part of a minute after 91 minutes will result in the loss of an additional 5 points per minute.  If something happens and your computer freezes, get back into the test as quickly as you can. As soon as you complete the test, send me an email detailing your problem.  If you lose your ability to access the Internet during a test, use your phone to call my office (595-7479) as soon as possible. Leave a voice mail if it is after hours. Do not wait until later. ---- COURSE ASSIGNMENTS (Read information and instructions carefully)

INTERACTIVE DISCUSSION BOARDS (200 possible points) – (four interactive discussions offered by instructor via Black Board Discussion Board, worth 50 points each)

Throughout the Fall semester, each student will participate in a series of four (4) interactive discussions based on previously read material and topical current events in the news. If you are not familiar with the discussion board there are tutorials on the Blackboard login page listed under “Using Discussion Boards” section just to the right of the login. Each student must consider the discussion topic (posed by the instructor) and two subsequent responses by their peers in the class.

The student’s original response to the instructor must be a minimum of 350 words and subsequent responses in discussion to their peers must be a minimum of 200 words.

No simple acquiescence of your answers with that of your peers, you must support your discussion by textual or some other resource basis.

The task in each Discussion Board Assignment will be: 1) To answer any questions that may be posed or implied in the assigned topic. The “What do you think?”; the “Why’s”; the “What about”; “What do others think?”; the “So What!”

8 Fall 2010 Ethics in Information Technology On-line Keck questions. Include your conclusions and opinions. 2) To decide exactly what direction you will pursue to provide a data-based and defensible answer to the discussion question. 3) To research your question response using electronic data bases, library, and Internet resources and do so in a manner that is reflective of both historical and current perspectives on the topic. 4) Again, on the responses to your peers NO SIMPLE ACQUIESCENCE OF ANSWERS (i.e. NO I agrees without defensible support of your answers) . You will be given some latitude on the first discussion board as to your responses. After that I will give you all feedback and you will need to adjust your responses appropriately, as I will grade them more stringently. See schedule below for exact times for posting and due dates:

9 Fall 2010 Ethics in Information Technology On-line Keck INTERACTIVE DISCUSSIONS ON DISCUSSION BOARD:

Discussion #1 posted 08/16/10 all responses due 11:59 p.m. 08/29/10 Discussion #2 posted 08/16/10 all responses due 11:59 p.m. 09/26/10 Discussion #3 posted 08/16/10 all responses due 11:59 p.m. 10/17/10 Discussion #4 posted 08/16/10 all responses due 11:59 p.m. 11/21/10

ONLINE ETHICS DEBATE (200 POINTS) – ETHICS IN IT DEBATES (two (2) Ethics Debates offered by instructor via Blackboard Discussion Board and submission links)

There will be two (2) debates during the term; each debate being worth 100 points apiece. The debate has three parts. A pre-analysis (25 pts.), debate (50 pts.), and post-analysis (25 pts.). All students will be required to participate in each phase of the debate. Point acquisition is all or nothing. That is to say, you MUST have all three components of the debate (Pre-, Post-, and Debate Posts) to garner any points. There will be no partial points given for the debate. The importance of active engagement in this assignment is imperative and therefore speaks directly to my all or nothing policy, but also lends itself to the substantive topic of the course. The debate issue will be provided to the students about four days before the impending online debate. On the fourth day you will be advised (by instructor, via announcements) who will take the pro or affirmative side and who will take the con or negative side of the issue being debated, therefore you will be prepared to take either side.

Each student will prepare your part of the debate by writing a two (2) page pre-analysis; using as a resource, your text and a minimum of two outside articles. The basis for your pre-analysis will be the questions below:

1. What are the underlying issues being debated? 2. According to supporters, what are some possible advantages in favor of supporting the issue? (Pro) 3. According to those in opposition, what are some possible disadvantages to supporting the issue? (Con) 4. In reference to #2 and #3, this means you must be prepared to take either side so prepare thusly. 5. What fallacies of reasoning might emerge from the debate? 6. What current alternative policy/programs have been proposed or might be developed? 7. What implications does the debate have for companies/people in society now?

Each student will submit their pre-analysis via the submission link in the Assignments Tab.

10 Fall 2010 Ethics in Information Technology On-line Keck Each student then will subsequently argue for their position via the posted Debate Discussion Board. Although I hesitate to put parameters on this type of assignment, so as not to quell the good dialogue for the debate, I must put some constraints as a requirement. Using similar parameters as required in the normal Discussion Boards, each student will be required to state their position and then speak to a minimum of two peers’ postings on the debate, making sure to support their evidence.

Each student will then be required to offer a post-analysis of the debate. In the post-analysis, each student will write a two (2) page minimum analysis/reflection. Again, submitting their analysis via the submission link provided in the Assignments Tab. Each student will prepare their final analysis by using the following questions or any other questions they may have to bring light to their post-analysis:

1. In your discussion of the topic in general, how, if anything did your thinking change or was your thinking reinforced during the assignment? 2. What was learned? 3. Did anything surprise you during your research of the topic? 4. Were there any fallacies of reasoning? Were they the same as in your pre- analysis? 5. What future policy/procedural changes might be needed to solve the issue or at the very least understand the long-term efficacy of the issue? 6. What are the long-term ramifications of this question on companies or employees or people and society in general, in the future?

Debate Reminders:

Students should be mindful that tone can be difficult to communicate in email and in Bb discussion boards. It is not uncommon that remarks intended to be humorous or mildly sarcastic are misread as serious insults. Please be careful when posting content. Likewise, when reading email and discussion boards, don't jump to unfounded conclusions.

Coursework in management includes discussions and debate of ideas. There are important ground rules for academic debate. As members of an academic community, we respect the right of others to disagree with our opinions and beliefs. Taking issue with a position is acceptable; taking issue with a person is not. In short, we debate ideas--not the people.

Debate Timeline:

Debate 1…………………………………………………………………………………………  Info posted: ………………………………………………….. 09/29/10  Pre-Analysis Paper: .……………………………………….. 10/02/10

11 Fall 2010 Ethics in Information Technology On-line Keck  Debate: ……………………………………………………….. 10/02/10 – 10/05/10  Post-Analysis Paper: ………………………………………. 10/06/10

Debate 2…………………………………………………………………………………………  Info posted: ………………………………………………….. 11/10/10  Pre-analysis Paper: ………………………………………… 11/13/10  Debate: ……………………………………………………….. 11/13/10 – 11/16/10  Post-Analysis Paper: ………………………………………. 11/17/10

12 Fall 2010 Ethics in Information Technology On-line Keck SEMESTER PROJECT (300 possible points) – ETHICAL CASE STUDIES PROJECT AND REFLECTION PAPER

At the END of each chapter of your textbook, are three real-world cases that reinforce important ethical principles and IT concepts and show how real companies have addressed ethical issues associated with IT. Questions after each case focus on its key issues and ask you to apply the concepts presented in the chapter.

With that said, your project is to consider the cases at the end of each chapter and answer those discussion questions.

1. The book has ten (10) chapters, with corresponding cases. 2. To begin, you will choose one (1) case from Chapter 1. That is to say, of the three offered, do one and the corresponding questions. This should be approximately one page. (Total of 1 = 20 pts.) 3. Then, you would proceed with every chapter through Chapter 10 with a case, giving you a total of 10 cases. (Total of 10 = 200 pts.) 4. THE FINAL PORTION OF YOUR SEMESTER PROJECT IS to write a minimum 5-page; maximum 8-page reflection paper on a topic related to professional ethics in computing, drawing on one of the case studies in the book or on personal experience (see also the Topics section below for a source of possible topics). Your reflection should also have some perspective beyond the topical choice, and honing in on what you learned in the process and can take away from and use as well. 5. The reflection paper topic is due at the end of week 5 along with the first three (3) cases; a draft is due at the end of week 10 along with the next four (4) cases; and the final draft is due at the end of week 16 along with the last three (3) cases. See submission due date below. (Total of 100 pts.)

ADDITIONAL INSTRUCTIONS ETHICAL CASES STUDIES PROJECT:

Your PROJECT will be due IN INCREMENTS. That is to say as indicated above, The reflection paper topic is due at the end of week 5 along with the first three (3) cases; a draft is due at the end of week 10 along with the next four (4) cases; and the final draft is due at the end of the semester along with the last three (3) cases.

13 Fall 2010 Ethics in Information Technology On-line Keck This assignment is to be submitted in a portfolio style. In other words, create ultimately, ONE DOCUMENT that is professional and neat, with a header page identifying ownership of work and the class in which it is being submitted, and then your submissions will be progressive. The first submission will have the first three (3) cases and the reflection topic. The second submission to me will have a total of seven (7) cases attached with the topic and draft of your reflection. The last submission to me will have all ten (10) cases and the final reflection of your topic. So that means you must make sure to save your work in a document on a regular basis.

The papers should be sent to the instructor as a Microsoft Word .doc(x), file via the Submission Link provided for you in the Assignment Tab area which is located in the Student Tools area of the course. Each paper will be graded on its review of the content, the correlation to ethics principles, the student's thoughts/opinion, and the grammar, punctuation, spelling, and neatness of the paper.

First submission (Part 1) due September 18th, 2010 …………...(60 pts.) Second submission (Part 2) due October 23rd, 2010 …….……..(80 pts.) Final submission (Part 3) due December 4th, 2010 ……………(160 pts.)

POSSIBLE TOPICS FOR REFLECTION PAPER:

Here a list of possible topics and sources of topics for your REFLECTION paper. You can choose a topic not on the list as well.

 A very good source of topics is the course textbook, Reynolds, Ethics in Information Technology. In particular, each chapter of the book provides a good basis of topical information.  Online Ethics Center. Clicking on several of the menu items just below the page header (Engineering Practice, Diverse Workplace, Computers & Software) brings up a list of items including cases.  The Case Materials page of ComputingCases.org describes several case studies.  Stony Brook Computer Science Professional Ethics  Case Studies in Information and Computer Ethics  Some general topics of interest are: o software piracy, o intellectual property protection, o user privacy, o software reliability, o computerized medicine, o safety critical systems,

14 Fall 2010 Ethics in Information Technology On-line Keck

o cyber-bullying and the controversy surrounding attempts to make it a criminal offense, o sexting by minors and the response of a legal system that is focused on eliminating child pornography o the debate surrounding Google’s plan to scan millions of public domain and copyrighted books and create a searchable index of their contents o the decision by all major music labels to drop digital rights management from songs sold through online music stores o the popularity of The Pirate Bay Website for distributing copyrighted movies, television shows, and music o passage of new legislation to prevent discrimination in the areas of medical benefits and employment o Facebook’s ill-fated Beacon feature, which broadcast information about the online activities of Facebook users o The emergence of new, seemingly impossible-to-eradicate computer worms o The impact of the economic recession on the demand for H-1B visas o And many many more possibilities

OPTIONAL BONUS PROJECT (POSSIBLE 100 POINTS)

The Semester Bonus Project allows you to improve your grade while broadening your learning experience. This project is strictly optional, and you will not incur a penalty for not doing this project. The project must be completed and received by the instructor by 11:59 p.m. on December 11th, 2010 or before. Only one Bonus project may be completed per class. The listed point value is the maximum number of points available for the project. The project is as follows:

 The student will choose five topical articles for their consideration from the following websites: CMSWire.com, ComputerWorld.com, PCMag.com, PCWorld.com or some other IT resource.

 When at these or other websites, the student can choose from a variety of articles and then can pick five (5) different articles from any topic that deals with ethics and information technology.

 After reading the articles, you will develop a concise, one to two (1 – 2) page (double space, 12 point font, 1” margins top, bottom, and each side) well-thought-out discussion on each topic.

15 Fall 2010 Ethics in Information Technology On-line Keck

 Each article discussion is will consist of:

o a heading page with title of article chosen and your name (minimum)

o a heading stating Synopsis and you will write a 2/3-page review of the article and how it relates to ethics and information technology. *Note this is not a book report-type process, it is stating your insights you gleaned from the article and their relation to ethics and IT.

o Then immediately after that create a heading of Opinion and write a minimum 1/3-page of your personal (supported) opinions and conclusions of the article. Do five articles to meet the five-ten page requirements.

 You must cite a minimum of two references to your Ethics and Information Technology text for each topic (cite page number for each reference).  Your discussion should be drawn from these references.

Please submit this paper by 11:59 p.m. on December 11th, 2010 or before. No late work will be accepted for the Bonus Project.

(Clearly title your paper Bonus Project followed by your name. Also, name the file you submit as your last name_your first name_BonusProject.doc Example: Smith_Joe_BonusProject.doc)

The paper should be sent to the instructor as a Microsoft Word .doc, .rtf, or .txt file via the Submission Link provided for you in the Assignment Tab area which is located in the Student Tools area of the course. Each paper will be graded on its review of the site's content, the correlation to management principles, the student's thoughts/opinion, and the grammar, punctuation, spelling, and neatness of the paper.

*Note: any other extra credit work will be subject to instructor discretion and student’s initiative.

16 Fall 2010 Ethics in Information Technology On-line Keck

GRADING SYSTEM: Your final grade will be determined on the basis of 1000 points. (Possible points: Three (3) exams – 300; Four (4) Interactive Discussions – 200; Two (2) Online Debates – 200; One (1) Semester Project – 300.

The grading scale is as follows:

A = 895 – 1000 points B = 795 – 894 points C = 695 – 794 points D = 595 – 694 points F = 0 – 594 points

If you receive bonus points for the optional activity, the points will be counted toward point value within the final grade ranges listed above. AT THE DISCRETION OF THE INSTRUCTOR, NO CURVING OF GRADES WILL BE DONE!

Make-up and Late ASSIGNMENT/Exam POLICY All weekly discussion boards, tests, and assignments are all due by (11:59 pm on date due). All discussion boards have an availability time window of access. If not completed by due date it will be automatically removed from access to Blackboard. There will be no make-up or late tests. All tests will be timed and have penalties if over time limit. The test does not automatically stop at 1 hour and 30 minutes. You have to click "Submit" to end the test and stop the timer.

Assignments may be accepted late, having prior communication and permission with instructor, but are subject to a 20% reduction provided that they are submitted within 5 days following the due date. Any work submitted after the 5-day grace period, will not receive any credit. All work must be completed by due date indicated unless otherwise agreed upon by instructor.

Submitting Assignments All assignments (Debate, Semester Project and Optional Bonus Project) are to be submitted via the submission link provided in the Assignment Tab section of the Blackboard menu. See submission requirements at end of assignment. Your corrected (graded) assignments will be returned to this same location.

17 Fall 2010 Ethics in Information Technology On-line Keck All Discussion Board assignments will be submitted via the Discussion Board thread in Blackboard.

All tests will be completed online via Blackboard Test link as well.

If you are unable to access the Blackboard server to turn in your assignment, please email it to me: [email protected]. I will only accept assignments by email during emergency situations.

Communication with the Instructor

If you are experiencing difficulty with this course, please contact the course instructor through email at [email protected]. You should be patient and realistic when you have questions as to the amount of time it takes for a reply. Please allow a maximum 72 hours for a response to your emails. Many questions are covered via the Announcements section of your course, and students are encouraged to review this area routinely throughout the semester as I often post many things. Turn around time of graded discussion boards, semester/bonus projects, and tests will vary with submission by class. You should receive immediate feedback on your tests as the online test will automatically be graded. Discussion boards and other assignments are usually graded within 48-72 hours after due date.

CLASSROOM ETIQUETTE Students are expected to display tolerance for others’ views on Discussion Board forum and through emails. Comments and language should be respectful and appropriate for a college community.

When posting on the discussion board or sending email you are expected to: 1. Be respectful. 2. Use acceptable grammar and spelling. There are now spell check features in both email and discussion board functions. 3. Use color and font that are easily readable. 4. Use sentence case. Email or discussions posts type in all UPPERCASE is unacceptable. It can be perceived as the equivalent of shouting. You may format your text for emphasis. 5. Use TCC email or the email features available inside of Bb as this will clearly identify you and the class you are enrolled. If these resources are not available, and you must send from an outside account, clearly identify yourself and the class you are enrolled. 6. Keep communication on the discussion board relative to the topic. 7. Converse with others the same way you would in a traditional classroom. Harassment will not be tolerated. Refer to the Student

18 Fall 2010 Ethics in Information Technology On-line Keck Policies and Resources Handbook for general classroom expectations. 8. If an assignment requires you to critique a peer’s work, be positive and respectful. Take your responsibilities seriously and offer meaningful feedback.

Course Completion

This course is to be complete by December 12th, 2010 on finals week during the semester in which you enroll. You may complete all the coursework, except tests, anytime prior to that date. All assessment test scores are final and you are not allowed to retest in an effort to improve your grade. The class is considered completed when you finish the last required assessment test; you have submitted all your discussion boards, assignments; and the written Semester Project assignment. Students not completing this course will be assigned a final grade based on the points the student has earned in relation to the total points for the class prior to the first day of finals week.

PLEASE NOTE: All assignments may be submitted earlier than the due date but no assignment will be accepted after the date on which it is due.

It is important that you establish a study and testing schedule. Because students' schedules vary, you can develop your own assignment schedule (as long as you meet stated deadline dates).You must complete this course within the regular school semester in which it is taken. Please see the Schedule of Activities for specific due dates and deadlines, which can be found in the Course Information tab.

INSTITUTIONAL STATEMENT

Each student is responsible for being aware of the information contained in the TCC Catalog, the TCC Student Policies & Resources Handbook, and semester information listed in the class schedule. All information may be viewed on the TCC website: www.tulsacc.edu

Notice

19 Fall 2010 Ethics in Information Technology On-line Keck It is a violation of the law to create unauthorized duplicates of copyrighted microcomputer software. Tulsa Community College makes every effort to support these copyright agreements and does not support illegal duplication of copyrighted materials.

TRANSFERABILITY Please visit with the TCC Counseling Center or the Counseling Center at the college or university to which you plan to transfer to determine transferability status of this course.

FAILURE TO WITHDRAW POLICY It is the student’s responsibility to withdraw from the class if the student decides not to continue with the class. De-enrollment for failure to pay for the class may not be applicable to all students and may result in the student being charged for the class. Failure to withdraw may result in the student’s receiving a regular grade of “F” at the end of the semester. Additionally, the student should be aware of the dates (see schedule or Registration Office) which allow for a withdrawal with a refund and adhere to those dates if a refund is desired. Students not withdrawing by the prescribed date, November 5th, 2010, will incur the normal tuition, fees, etc. charges for the class.

ADA POLICY STUDENTS WITH SPECIAL NEEDS: Students with documented disabilities are provided academic accommodations through the disabled Student Resource Center (918-595-7115) or Resource Center for the Deaf and Hard of Hearing (918-595-7428/TDD-TTY 918-595-7434). If any student is in need of academic accommodations from either office, it is the student’s responsibility to advise the instructor so an appropriated referral can be made no later than the first week of class. Students may also contact the disabled Student Services Offices directly at the telephone numbers indicated. ACADEMIC ACCOMMODATIONS WILL NOT BE PROVIDED UNLESS APPROPRIATE DOCUMENTATIONS IS PROVIDED TO THE DISABLED STUDENT SERVICES OFFICES TO SUPPORT THE NEED.

LEARNING SUPPORT SERVICES Reading, writing, math, and computer learning support services are available at various campuses to support student learning. At the Northeast Campus, most of these services are available in the FACET Center. For additional information call 595-7592.

ACADEMIC INTEGRITY – PLAGIARISM POLICY The cornerstone for intellectual achievement is academic integrity. Tulsa Community College recognizes that academic honesty is the vital key to a student’s true intellectual growth and ultimate personal satisfaction and success.

20 Fall 2010 Ethics in Information Technology On-line Keck Plagiarism is a specific type of academic dishonesty. It is claiming, indicating, or implying that the ideas, sentences, or words of another are your own; it includes having another person do work claimed to be your own, copying the work of another and presenting it as your own , or following the work of another as a guide to ideas and expressions that are then presented as your own. The student should review the relevant sections of the TCC Student Code of Conduct Policy Handbook. Plagiarism will not be tolerated in this class and events of plagiarism will result in the student’s or students’ grade(s) being decreased as determined by the instructor. Cases of plagiarism in this course will result in the following disciplinary action: the student will complete a substitute assignment the substitute assignment will receive a reduced score – 75% is the highest score possible in cases of extreme plagiarism, the student will receive a zero (0%) and still complete a substitute assignment repeated instances of plagiarism will result in administratively withdrawing the student from the class, or recording a grade of “F” for the student at the end of the semester

ACADEMIC DISHONESTY OR MISCONDUCT Academic dishonesty (cheating) is defined as the deception of others about one’s own work or about the work of another. Academic dishonesty or misconduct is not condoned or tolerated at campuses within the Tulsa Community College system. Tulsa Community College adopts a policy delegating certain forms of authority for disciplinary action to the faculty. Such disciplinary actions delegated to the faculty include, but are not limited to, the dismissal of disrespectful or disorderly students from classes. In the case of academic dishonesty a faculty member may: require the student to redo an assignment or test, or require the student to complete a substitute assignment or test; Record a "zero" for the assignment or test in question; Recommend to the student that the student withdraw from the class, or administratively withdraw the student from the class; Record a grade of "F" for the student at the end of the semester.

Faculty may request that disciplinary action be taken against a student at the administrative level by submitting such request to the Dean of Student Services.

At the instructor’s discretion, a student guilty of deliberate plagiarism may receive a zero for the assignment and an “F” in the course.

COMPUTER SERVICES ACCEPTABLE USE Access to computing resources is a privilege granted to all TCC faculty, staff, and students. Use of TCC computing resources is limited to purposes related to the

21 Fall 2010 Ethics in Information Technology On-line Keck College’s mission of education, research, and community service. Student use of technology is governed by the Computer Services Acceptable Use Statements/Standards found in the TCC Student Policies and Resource Handbook. The handbook may be on the TCC web page at http://www.tulsacc.edu/archive/misc/policies.pdf.

LEARNING SUPPORT SERVICES The following services are available at the designated locations on the TCC college campuses to assist the student in this course: Metro Campus Southeast Campus Distance Learning, MP 200E (595-7282) Microcomputer Lab, SE 4231 (595-7643) Microcomputer Lab, MP 200 (595-7146) Communications Center, SE 1102 (595-7749) Communications/Reading Lab, MC 536 (595-7214) Learning Resources Center, SE 7200 (595- 7701) Writing Lab, MC 306 (595-7240) Math Lab, SE 8150 (595-7751) Math Lab, MC 302 (595-6011) Learning Resources Center, MC 200 (595-7172)

Northeast Campus West Campus Microcomputer Lab, NE A1 (595-7592) Microcomputer Lab, WC I166 (595-8122) Learning Resources Center, NE 1135 (595-7501) Reading & Writing Center, WC I116 (595- 8063) Learning Resources Center, WC I266 (595- 8010)

You can also find Resources for Online Students at Student Support Information https://bb.tulsacc.edu/bbcswebdav/institution/DL/student_support.htm

Computer System Requirements

 Multimedia IBM PC  486 DX-2 or higher processor (Pentium III recommended)  Microsoft Windows 3.1 or higher  Microsoft Word 97 or above. (If you do not have Word, please check the Distance Learning web site for information on downloading a free word processing program called Open Office. (http://www.tulsacc.edu/dl/orientation/index.htm#office)  Netscape 4.0 or higher (Java enabled) or  Microsoft Internet Explorer 4.0 or higher (Java enabled)  Internet service provider or capability to access the Internet  E-mail access  16 MB RAM (minimum)  1 MB hard disk storage  CD-ROM Drive

22 Fall 2010 Ethics in Information Technology On-line Keck  VGA monitor  Sound card and speakers  Modem  Mouse

(NOTE: The time of your screen downloads will vary due to several factors, please realize the better your hardware\software, generally, the faster your screen downloads. Also if your browser is not Java enabled, you will receive gray boxes on your screen or no means of response to questions and other items during the course. Please, upgrade your browser to remedy this problem.)

23