80 likes | 223 Views
Internet Vulnerabilities and the Legal Implications of Monitoring Activity in Cyberspace - Dr. Ciccone. Computer Ethics. Seminar Introduction. Introductions – Dr. Joe Ciccone Tell me about you and why you are here? How is this course relevant to you? Ask any questions you like here?.
E N D
Internet Vulnerabilities and the Legal Implications of Monitoring Activity in Cyberspace - Dr. Ciccone Computer Ethics
Seminar Introduction • Introductions – Dr. Joe Ciccone • Tell me about you and why you are here? • How is this course relevant to you? • Ask any questions you like here?
Computer Ethics & Privacy • Career Options • Professional conduct • Education and training • What do you bring to the table?
Resource and your future • Where do we have the most needs in the Criminal Justice System today? • Police • Courts • Corrections • Sub-units include • Administration and Management • Personnel • IT • Investigations - IAU • Why are all of you here and what do you hope to do with your degree?
Cyber-ethics and Birth of the Web • Overview of chapters and issues • Video on Computer Forensics • Web Field Trip • Video – Birth of the Internet • Ethical Dilemma – what are some? • Code for the Internet and control
Questions & Concerns • What questions to you have of me? • How did we do tonight? • Why? • Email me the following: • Suggestions for ~ • future seminar • Ideas from the field trip • Class Video • Your own interests • Your own research • Thanks, Dr. C