Skip to Main Content
It looks like you're using Internet Explorer 11 or older. This website works best with modern browsers such as the latest versions of Chrome, Firefox, Safari, and Edge. If you continue with this browser, you may see unexpected results.

Computers & Society

Module 6 Description

Welcome to Computers & Society Module 6!

In this module, we will start our exploration of crime and security related issues in the cyber world. We will discuss the evolution of technology and other factors that contributed to the reasons why our digital life has become so vulnerable. We will also discuss security tools that help protect the digital world and your responsibilities as a citizen of the digital world. When it comes to preventing cyber crimes and security attacks, ignorance Is Not Bliss: Understanding Cybersecurity Is Your Best Defense Against a Cyber Attack. 

We will look at security laws and regulations put in place to help protect our privacy and security. 

This module will also cover computer technology’s impact upon the workforce. There have been many opposing views on how technology has impacted employment and the standard of living in the U.S. and other countries around the world. While jobs building, selling and repairing typewriters have disappeared, many new fields of employment have opened (e.g mobile App developer). Regardless of your position on how computers have impacted today’s work environment, one thing we should all be able to agree on is the fact that the work environment has experienced changing skills and skill levels, elevating many and leaving many others unprepared – creating the “great divide”. 

Last, we will explore several other changes in the work environment, such as telecommuting, flex work environments, impacts of offshoring, increased use of contractors at work and employer tracking of their employees.

Class Readings

Please read the following for Module 6:

Chapter 6.4 from "Computer Science Principles in Java: Cybersecurity"  If you click on the link it will bring up the textbook, the PDF just contains chapter 6.4.

Chapter 9 from "The Ethics of Cybersecurity: Ethical and Unethical Hacking"  If you click on the link it will bring up the full book, the PDF just contains chapter 9.

"Cyber Security and Network Reliability" from the FCC

"The future of work: The augmented workforce" from Deloitte Insights

DQ 11 Reading

Read or listen to this NPR news story and follow the directions on your syllabus:

DQ 12 Reading

Read the following article and follow the directions on your syllabus: