Module Code: H8ITGSE
Long Title IT Governance, Security and Ethics
Title IT Governance, Security and Ethics
Module Level: LEVEL 8
EQF Level: 6
EHEA Level: First Cycle
Credits: 5
Module Coordinator:  
Module Author: Alex Courtney
Departments: School of Computing
Specifications of the qualifications and experience required of staff


Master’s degree/PhD  in Law, Governance, Privacy, Ethics, etc.

Learning Outcomes
On successful completion of this module the learner will be able to:
# Learning Outcome Description
LO1 Describe and explain IT and security governance and discuss relevant frameworks.
LO2 Discuss a broad range of core policies, legal aspects in IT and security governance.
LO3 Discuss current models of information and computer ethics, relevant standards and current standardization efforts and evaluate the evolving nature of ethical norms relating to new technologies.
Dependencies
Module Recommendations

This is prior learning (or a practical skill) that is required before enrolment on this module. While the prior learning is expressed as named NCI module(s) it also allows for learning (in another module or modules) which is equivalent to the learning specified in the named module(s).

No recommendations listed
Co-requisite Modules
No Co-requisite modules listed
Entry requirements

Learners should have attained the knowledge, skills and competence gained from stage 3 of the BSc (Hons) in Computing.

 

Module Content & Assessment

Indicative Content
Introduction to IT Governance
Introduction to: . Information Governance. IT Governance. Data Governance . Definitions, Principles, How are they different
IT Governance cont.
Risk Management . Relevant Frameworks/Standards (e.g. COBIT, ISO38500)
Introduction to Ethics
. Ethics for IT workers and users – Professional organisations, codes of ethics, certification. Introduction to Information Technology Ethics . Anticipating and assessing ethical issues in emerging IT . Ethical decision-making online. Regulation of the internet
Information Technology Ethics – Emerging Technologies
Ambient technology – Biometrics – Digital platforms – Health technology – Internet of things – Persuasive technologies – Social networking – Spam – Virtual & augmented reality.  Autonomy and identity – Anonymity, privacy and surveillance – Freedom of expression, censorship and filtering – Security – Justice – Balance of Power – Digital divide. Ethics in software development ( codes of ethics such as the ACM/IEEE-CS Software Engineering Code of Ethics and Professional Practice). Ethics in AI. Current standardization efforts in emerging technologies (e.g. AI). Ethical implications across the area of specializations will be discussed (e.g. ethical hacking, ethics of data, ethics in Digital transformation, etc.).
Legal aspects
This topic discussed how laws and technology intersect in the context of the judicial structures that are present – international, national and local . Law vs Ethics. Compliance efforts include those efforts to conform to laws, regulations, and standards, and to include breach notification requirements by state, national, and international governing authorities . Contract Law, e-Commerce Law. Data Protection Law . Contemporary Legal Issues of Big Data, Virtual Currencies, Blockchain, Cloud Computing, Machine Learning & AI
Security Governance and policy
security policy development cycle, from initial research to implementation and maintenance . Organizational context. Privacy. Law and compliance: Examples of international laws and standards include GDPR and ISO/IEC 27000 et al. . implementation of security governance and policy within global, national, and local laws, regulations and standards; managerial policy (NIST SP 800-12 Rev 1)
Strategy and Planning
Cybersecurity planning. Business Continuity, Disaster Recovery, and Incident Management (review, relevant standards e.g. ISO 22301). Security operations. Other organizational security elements from Security Fundamentals and Development are going to be reviewed and put in the context of governance, security, ethics, compliance
Assessment Breakdown%
Coursework40.00%
End of Module Assessment60.00%

Assessments

Full Time

Coursework
Assessment Type: Formative Assessment % of total: Non-Marked
Assessment Date: n/a Outcome addressed: 1,2,3
Non-Marked: Yes
Assessment Description:
Analysis, discussions in group having as object various real-world examples/case studies.
Assessment Type: Continuous Assessment % of total: 40
Assessment Date: n/a Outcome addressed: 3
Non-Marked: No
Assessment Description:
Students are to analyse the ethical implications of a selected topic, preferably in their area of specialization, and to write a research-style paper that documents these.
End of Module Assessment
Assessment Type: Terminal Exam % of total: 60
Assessment Date: End-of-Semester Outcome addressed: 1,2
Non-Marked: No
Assessment Description:
The end of semester examination will contain questions on the concepts studied, may also contain various scenarios that students should assess, debate, etc. Marks will be awarded based on clarity, structure, relevant examples, depth of topic knowledge.
No Workplace Assessment
Reassessment Requirement
Repeat examination
Reassessment of this module will consist of a repeat examination. It is possible that there will also be a requirement to be reassessed in a coursework element.
Reassessment Description
Repeat examination Reassessment of this module will consist of a repeat examination. The repeat assessment will address all learning outcomes.

NCIRL reserves the right to alter the nature and timings of assessment

 

Module Workload

Module Target Workload Hours 0 Hours
Workload: Full Time
Workload Type Workload Description Hours Frequency Average Weekly Learner Workload
Lecture Classroom & Demonstrations (hours) 24 Per Semester 2.00
Tutorial Other hours (Practical/Tutorial) 12 Per Semester 1.00
Independent Learning Independent learning (hours) 89 Per Semester 7.42
Total Weekly Contact Hours 3.00
 

Module Resources

Recommended Book Resources
  • Robert F. Smallwood. (2014), Information Governance, John Wiley & Sons, p.442, [ISBN: 9781118218303].
  • M. Spremić.. (2017), Governing digital technology - how mature IT governance can help in digital transformation? International Journal of Economics and Management Systems,vol, 1, pp214, 2, no.
  • M Carcary.. (2018), IT GOVERNANCE - Enabling effective, efficient, and acceptable use of IT, http://mural, ie/, maynoothuniversity.
Supplementary Book Resources
  • Robert F. Smallwood. (2014), Information Governance, John Wiley & Sons, p.442, [ISBN: 9781118218303].
  • Article/Paper List.
  • Type.
  • Item.
This module does not have any article/paper resources
This module does not have any other resources
Discussion Note: