An Overview of Ethics, Ethics for IT Workers and IT Users: [10 LH]
Ethics, Ethics in the Business World; Corporate Social Responsibility; Fostering Corporate Social Responsibility and Good Business Ethics; Improving Business Ethics; Ethical Considerations in Decision Making; Ethics in Information Technology; Managing IT Worker Relationship; Encouraging Professionalism of IT Workers - Professional Codes of Ethics, Professional Organizations, Certifications and Licensing ; Encouraging Ethical Use of IT Resources among Users
Cyber Attacks, Cybersecurity, and Cyber Law: [12 LH]
Threat Landscape - Computer Incidents, Types of Exploits; CIA Security Triad - Confidentiality, Integrity, Availability, ImplementingCIA at Organizational, Network, Application, and End-User Level; Response to Cyber Attack - Incident Notification Protection of Evidence and Activity Logs Incident Containment Eradication Incident Follow-Up Using an MSSP, and Computer Forensics; Cyber Law; Provision of Cyber Law and Electronic Transaction Act of Nepal
Privacy and Freedom of Expression: [10 LH]
Privacy Protection and the Law - Information Privacy, Privacy Laws, Applications, and Court Rulings; Key Privacy and Anonymity Issues - Consumer Profiling, Electronic Discovery, Workplace Monitoring, Surveillance; First Amendment Rights; Freedom Expressions: Key Issues; Social Networking Ethical Issues
Intellectual Property: [8 LH]
Intellectual Property, Copyright; Patient; Trade Secrets; Intellectual Property Issues: Plagiarism, Reverse Engineering, Open Source Code, Competitive Intelligence, Trademark Infringement, and Cybersquatting
Ethical Decision in Software Development and Ethics of IT Organizations: [8 LH]
Software Quality and its Importance; Strategies for Developing Quality Software; Use of Contingent Workers; H-18 Workers; Outsourcing; Whistle-Blowing; Green Computing.