This course explores social, ethical, and policy issues of information technology developments by covering concerns that challenge today’s cyber workforce. Selected course topics include: classic theories in ethical studies, privacy and personal information exposure, manifestation of human rights in the information age, intellectual property, computer crime, social responsibilities of modern corporations, and professional ethics for cyber workers.

In this exercise, students use Situation Awareness (SA), Gestalt Principles, design affordances, and CIA-for-HMI to design the Human-Machine Interface (HMI) for a cyber-physical system (one that will brew and serve pots of coffee).

This lab exercise explores Fitts Law, which states that response time will be the smallest when the distance to a target is small, and the size of the target is large.

This lab exercise introduces the concept of quality costs and shows you how to analyze and interpret quality cost data for a hypothetical organization that uses the NIST Cybersecurity Framework for risk management, and has designed its cost accounting system around the structure of the Framework Core.  It applies concepts learned during Lesson 3H in Module 3: Managing Security, Safety,

Cybersecurity requires foundational knowledge from a wide array of topics including: mathematics, coding, networking, web-technologies, operating systems and complex software applications such as database management systems. Clearly, an introductory course cannot cover all these topics.

4 Lessons