Remember Me
Or use your Academic/Social account:


You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.


Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message


Verify Password:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:

OpenAIRE is about to release its new face with lots of new content and services.
During September, you may notice downtime in services, while some functionalities (e.g. user registration, login, validation, claiming) will be temporarily disabled.
We apologize for the inconvenience, please stay tuned!
For further information please contact helpdesk[at]openaire.eu

fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Bustard, John D. (2017)
Publisher: Springer Netherlands
Languages: English
Types: Article
Subjects: Curriculum development, Cyber security, Psychology, Ethics, Professional, Case studies, Original Paper, Ethics, Curriculum design, Cybersecurity, research,inovation, trust, resilience, translation
In spite of the acknowledged importance of professional ethics, technical students often show little enthusiasm for studying the subject. This paper considers how such engagement might be improved. Four guiding principles for promoting engagement are identified: (1) aligning teaching content with student interests; (2) taking a pragmatic rather than a philosophical approach to issue resolution; (3) addressing the full complexity of real-world case studies; and (4) covering content in a way that students find entertaining. The use of these principles is then discussed with respect to the specific experience of developing and presenting a master’s module in Ethical and Legal Issues in Cyber Security at Queens University Belfast. One significant aspect of the resulting design is that it encourages students to see ethical issues in systemic terms rather than from an individual perspective, with issues emerging from a conflict between different groups with different vested interests. Case studies are used to examine how personal and business priorities create conflicts that can lead to negative press, fines and punitive legal action. The module explores the reasons why organisations may be unaware of the risks associated with their actions and how an inappropriate response to an ethical issue can significantly aggravate a situation. The module has been delivered in three successive years since 2014 and been well received on each occasion. The paper describes the design of the module and the experience of delivering it, concluding with a discussion of the effectiveness of the approach.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • Alinsky, S. (2010). Rules for radicals: A pragmatic primer for realistic radicals. Vintage.
    • Alterio, M, McDrury, J. Learning through storytelling in higher education: Using reflection and experience to improve learning. 2003
    • Bairaktarova, D., & Woodcock, A. (2016). Engineering student’s ethical awareness and behavior: A new motivational model. Science and Engineering Ethics. doi:10.1007/s11948-016-9814-x.
    • Baldini, G., Botterman, M., Neisse, R., & Tallacchini, M. (2016). Ethical design in the internet of things. Science and Engineering Ethics. doi:10.1007/s11948-016-9754-5.
    • BBC News (2016). UK must retaliate against cyber-attacks says chancellor. Article. BBC News. Accessed February 22, 2017, www.bbc.co.uk/news/technology-37821867.
    • Bucciarelli, LL. Ethics and engineering education. European Journal of Engineering Education. 2008; 33 (2): 141-149
    • Bustard, J. D. (2013). Ethical issues surrounding the asymmetric nature of workplace monitoring. In L. Marinos & I. Askoxylakis (Eds.), International conference on human aspects of information security, privacy, and trust (pp. 226–235). Berlin, Heidelberg: Springer.
    • Bustard, JD. The Impact of EU privacy legislation on biometric system deployment: protecting citizens but constraining applications. IEEE Signal Processing Magazine. 2015; 32 (5): 101-108
    • Coldwell, J. (2000). It is possible to teach computer ethics via distance education!. In J. Weckert (Ed.), Selected papers from the second Australian institute conference on computer ethics (pp. 73–80). Canberra: Australian Computer Society, Inc.
    • DC-IoT (2016). Dynamic coalition on the internet of things. Accessed February 22, 2017, http://www.intgovforum.org/cms/documents/igf-meeting/igf-2016/827-dciot-2015-output-document-1/file.
    • District Court (2010). Robbins v. lower Merion school district. Civil Action No. 10-665. District Court, E.D. Pennsylvania.
    • Farrell, C. B., Gray, M. E. & Bartley, M., A. (2012). Google will pay $22.5 million to settle FTC charges it misrepresented privacy assurances to users of Apple’s Safari internet browser. Press Release. Federal Trade Commission. Accessed 22 February, 2017, www.ftc.gov/news-events/press-releases/2012/08/google-will-pay-225-million-settle-ftc-charges-it-misrepresented.
    • FBI (2016). FBI records: The vault. Hillary R. Clinton. report. Federal Bureau of Investigation. Accessed 22 February, 2017, https://vault.fbi.gov/hillary-r.-clinton.
    • Freeman, E. Vulnerability disclosure: The strange case of Bret McDanel. Information Systems Security. 2007; 16 (2): 127-131
    • Gürses, S., Troncoso, C., & Diaz, C. (2011). Engineering privacy by design. Computers, Privacy and Data Protection, 14(3), 1–25.
    • Harris, CE, Pritchard, MS, Rabins, MJ, James, R, Englehardt, E. Engineering ethics: Concepts and cases. 2013
    • Home Affairs Committee (2012). Private investigators. Report, House of Commons, Home Affairs Committee. www.publications.parliament.uk/pa/cm201213/cmselect/cmhaff/100/100.pdf.
    • Hon, K. (2016). GDPR: Potential fines for data security breaches more severe for data controllers than processors, says expert. Article. Pinsent Masons. Accessed February 22, 2017, www.out-law.com/en/articles/2016/may/gdpr-potential-fines-for-data-security-breaches-more-severe-for-data-controllers-than-processors-says-expert/.
    • ICO (2016). TalkTalk gets record £400,000 fine for failing to prevent October 2015 attack. Article. Information Commissioner’s Office. Accessed February 22, 2017, https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2016/10/talktalk-gets-record-400-000-fine-for-failing-to-prevent-october-2015-attack/.
    • ICO GDPR (2016). Overview of the General Data Protection Regulation (GDPR). Article, Information Commissioner’s Office. Accessed February 22, 2017, https://ico.org.uk/for-organisations/data-protection-reform/overview-of-the-gdpr/.
    • Kaplan, D. (2006). Suspicions and spies in Silicon Valley. Article, Newsweek. Accessed February 22, 2017, http://europe.newsweek.com/suspicions-and-spies-silicon-valley-109827.
    • Knappenberger, B. (2014). The internet’s own boy: The story of Aaron Swartz. Documentary. Accessed February 22, 2017, www.imdb.com/title/tt3268458/.
    • Koehler, W. Professional values and ethics as defined by ‘the LIS discipline’. Journal of Education for Library and Information Science. 2003
    • Krebs, B. (2011). HBGary federal hacked by anonymous. Article, Krebs on Security. Accessed February 22, 2017, https://krebsonsecurity.com/2011/02/hbgary-federal-hacked-by-anonymous/.
    • Lacayo, R., & Ripley, A. (2002). Persons of the year 2002: The whistleblowers. Article, Time Magazine. Accessed February 22, 2017, http://content.time.com/time/magazine/article/0,9171,1003998,00.html.
    • Leyden, J. (2008). Critics split over DDoS attacks on scientology. Article, The Register. Accessed February 22, 2017, www.theregister.co.uk/2008/01/25/ddos_scientology_controversy/.
    • Leyden, J. (2015). How a hack on Prince Philip’s prestel account led to UK computer law. Article, The Register. Accessed February 22, 2017, www.theregister.co.uk/2015/03/26/prestel_hack_anniversary_prince_philip_computer_misuse/.
    • Malone, TW, Lepper, MR, Snow, RE, Farr, MJ. Making learning fun: A taxonomy of intrinsic motivations for learning. Aptitude, learning and instruction: Cognitive and affective process analysis. 1987: 223-253
    • Milgram, S. Obedience to authority: An experimental view. 2009
    • Nakashima, E. & Rein, L. (2012). FDA staffers sue agency over surveillance of personal e-mail. The Washington Post. Accessed February 22, 2017, www.washingtonpost.com/world/national-security/fda-staffers-sue-agency-over-surveillance-of-personal-e-mail/2012/01/23/gIQAj34DbQ_story.html.
    • Nyhan, B, Reifler, J. When corrections fail: The persistence of political misperceptions. Political Behavior. 2010; 32 (2): 303-330
    • Ocone, R. Engineering ethics and accreditation. Education for Chemical Engineers. 2013; 8 (3): e113-e118
    • Oxford Living Dictionaries (2017). Oxford University Press. Accessed February 22, 2017, https://en.oxforddictionaries.com.
    • PCAW (2014) New PCAW report and YouGov Survey into the state of Whistleblowing in the UK. Article, public concern at work. Accessed February 22, 2017, www.pcaw.co.uk/latest/blog/new-pcaw-report-and-yougov-survey-into-the-state-of-whistleblowing-in-the-uk.
    • Ratte, S. (1995). Statement concerning the ‘church’ of scientology. Press Release, Cult of the dead cow. Accessed February 22, 2017, www.cultdeadcow.com/news/scientology.txt.
    • Royal Academy of Engineering (2017). Engi neering ethics. Accessed February 22, 2017, www.raeng.org.uk/policy/engineering-ethics/ethics.
    • Schiefele, U. Interest, learning, and motivation. Educational Psychologist. 1991; 26 (3–4): 299-323
    • Senge, PM. The fifth discipline: The art and practice of the learning organization. 2006
    • Sherif, M. The robbers cave experiment: Intergroup conflict and cooperation. 2010
    • Skinner, EA, Belmont, MJ. Motivation in the classroom: Reciprocal effects of teacher behavior and student engagement across the school year. Journal of Educational Psychology. 1993; 85 (4): 571
    • Stanley, J. Managing digital rights management: Effectively protecting intellectual property and consumer rights in the wake of the Sony CD copy protection scandal. Journal of Law and Policy for the Information Society. 2008; 4 (1): 157-202
    • TNS Opinion & Social (2015). Special Eurobarometer 431 Data Protection. Report. Directorate-General Justice and Consumers. Accessed February 22, 2017, http://ec.europa.eu/public_opinion/archives/ebs/ebs_431_en.pdf.
    • Wright, D, De Hert, P. Privacy impact assessment. 2012
    • Wright, D. & Kreissl, R. (2013). European responses to the Snowden revelations: A discussion paper. Technical report, IRISS. Accessed February 22, 2017, http://irissproject.eu/wp-content/uploads/2013/12/IRISS_European-responses-to-the-Snowden-revelations_18-Dec-2013_Final.pdf.
    • Zimbardo, P, Maslach, C, Haney, C, Blass, T. Reflections on the Stanford prison experiment: Genesis, transformations, consequences. Obedience to authority: Current perspectives on the Milgram paradigm. 2000: 193-237
  • No related research data.
  • No similar publications.

Share - Bookmark

Cite this article

Cookies make it easier for us to provide you with our services. With the usage of our services you permit us to use cookies.
More information Ok