Free Essay

Ethics in Computing

In:

Submitted By PSUfan
Words 1690
Pages 7
The concerns of ethics and computer is a constant balancing act. Technology will continue to advance and it’s our job to make sure that we always keep ourselves and our neighbors in mind when it comes to ethical behavior and computer technology. In this paper three article that touch on ethical concerns in computing in their own way. One will discuss how the concerns that we all may be very easily find ourselves in on a daily basis. One will look into more specific areas where ethics and computers intertwine, using cell phones to track pedestrians and home monitoring for the elderly. The other will hit on the risk and rewards of cloud computing and the ethics behind law firms and their move into the 21st century.
Ethics surrounding computer technology are currently an ever evolving conversation. As technology advance so must the ethics and rules of how we handle our personal information and how others can and cannot used that information. With this evolution in technology there are many topics of concern that raise red flags and force people to reevaluate what needs to change in order to make sure that the very principals we hold as a country are not bent to meet the demands of changing technologies. Concerns over personal and private data who can see what and at what point is personal data no longer private. Identity theft is another issue as people become more and more willing to use computers to bank and pay bills they are more at risk of another person electronically stealing their information. Ethics surrounding information processing, the information being inputted into database about you may be incorrect and if so, it can have very serious financial or medical ramifications. Now with digital media copyright infringement has a whole new level of concerns amongst artist and protecting their individual works. In the article titled Computing Ethics Surrounded by machine Kenneth D. Pimple lends his unique point of view on the topic of ethics in computing. Information and communication technologies like the internet and cell phones are at the tip of the iceberg when it comes to communication devices and their role in the ethics of computing. What is more concerning than just the technology its self is the increase in use of information and data through these devices and the exposure to personal data that is sometimes unsanctioned. In one study cell phones where used to transmit a signal to update where a person was every few seconds and used that data to understand what mode of transportation would work best for that person. In this situation there are great benefits not only to the people using this information but the environment around them can also benefit. The issues of control and surveillance that need to be address are still a concern. Abuse of this kind of technology can lend information about people, their routines and the way they travel from place to place. Another place where computer technology and ethics converge is in the realm of elderly care there are more and more older people that don’t feel that moving out of their home and into an assisted living environment is necessary. “An increasing number of people want to live in their homes as they age and begin to become less self-reliant due to slowly increasing frailty of various sorts” (Pimple, K. D. 2011) but for the care givers of the elderly assisted living is the best option that allows for around the clock care and supervision. New technology may allow for the elderly to continue to live in their homes but yet not feel invaded by a security or monitoring system. A clock that has motion sensors that in connected by the internet allows for the caregiver to monitor the movement within the home without having to uses cameras. A clock is set up in both the home of the elderly and the home of the care giver. Different light setting on the clock allow for the caregiver to see that whomever is in the other house is moving around and the proximity , after a period of time the caregiver can notice if there is unusual activity based on the light censor and simple call the elderly person to check in. There is no need to have to run by and check in and this gives the elderly person a sense of independence and the care giver a scene of security. A person may still find this technology a little evasive and not want it in their home but where there are benefits there are also concerns. An even bigger concern than machines and technology that are hidden out of view are machines and technology that are build to run themselves and learn while doing the people involved in its development and creation may not want to take responsibility for any actions that may not have been planned. This can happen when too many people are involved in a project involving an autonomous machine. When there are too many hands involved it’s very easy to play the blame game and fin some on else responsible for the problem instead of being accountable as a whole. Outside of individual’s personal privacy another ethical concern comes into play, the protection of one’s personal information. In the North Dakota Law review a case is made that consistent overview of ever changing technology especially when it comes to cloud computing. “Although it is practically impossible for attorneys - and even for the largest firms - to mitigate every security risk associated with storing confidential information and communications electronically” (Askew, A. L. 2012) Lawyers have very stringent code of ethics and part of that is an obligation to their clients to keep all their personal information completely confidential. In the world of cloud computing this means that a lawyer no longer needs to file away all their paper work in to filling cabinets but they can store that information on a secure server and reach it any time by using the cloud. These changes have cut cost for most law firms that have moved to a “paperless” identity. All their documents and information about their clients is sent by the internet to be held until needed. This has also opened the door to online lawyers they save money by not needing a building to run their business all their information is saved to the cloud and they can simply find what they need by searching on there smart phone. Cutting cot by not using paper or having to pay the lease cut cost make some lawyers a little more affordable. The down fall here is that as law offices with large clientele try to make the move from brick and mortar to cloud computing they are at risk because in some cases like in North Dakota the state bar has no code of ethics or regulation for lawyers to follow. In all three sources that were used a common thread was found in all three. This common thread “ computers provided society with new capabilities, and that computer ethics was the study of how to use these powers wisely and fairly both on a micro or personal level and at the macro level of society itself (Stamatellos, 2007).” (Bowles, M.D. 2013) Understanding what technology can do for us as individuals and as a whole from using cell phones to track pedestrians to better understand locomotion to using cloud computing to simplify the way a layer does their job. Their where also similarity in the understanding of the rick of using new technologies. In the example of the cell phone motoring where do you draw the line? And in the elderly person’s home when does technology cross over into invading personal privacy. Lastly lawyers using cloud computing must be able to understand the new technology is terms of their own code of ethics to protect client personal information.
In these articles there were some areas where they differed as well. In Digital Literacy the focus was on some very common ways that ethics can be lost, were in Computing Ethics surrounded by Machines the article focused on some very not so practical ideas where computer ethics could be violated. In Iethics: How Cloud Computing Has Impacted the Rules of Professional Conduct the main focus was on how law firms can protect themselves and continue to use technology while not losing the ethical back bone of their job. There are many different ways where ethics in computing can become a very important part of our daily lives. Some times there’s nothing we can do we place ourselves at the mercy of others and hope that they follow the same set of rules as we do. There are situations in our lives where computer ethics though we may not realize it but are in constant uses, being on your phone and sending picture through the cloud to a friend, for example. Then there are times when other people may benefit from the use of technology but others may see it as an invasion or privacy, placing a monitoring clock in the home of your elderly parent. These are all different uses where figuring out what right and wrong can some time be blurred by owner person wants and gains. This is where the true issues of ethics lie in a field as saturated with personal information and documents as law having forms moving from paper filling to cloud computing open a big door to what can happen if the wrong person gets a hold of personal information that doesn’t belong to them. Ethics need to be at the for-front as we move forward because as technology becomes more advanced the role of individual privacy and protect begins to waiver.

References

Pimple, K. D. (2011). Computing Ethics Surrounded by Machines. Communications Of The ACM, 54(3), 29-31. doi:10.1145/1897852.1897864
Askew, A. L. (2012). IETHICS: HOW CLOUD COMPUTING HAS IMPACTED THE RULES OF PROFESSIONAL CONDUCT. North Dakota Law Review, 88(2), 453-475.
Bowles, M. D. (2013). Introduction to Digital Literacy. Bridgepoint Education, Inc.

Similar Documents

Premium Essay

Ethical Concerns in Computing: Robot Ethics

...Ethical Concerns in Computing: Robot Ethics Ashley Ramos INF 103: Computer Literacy Cathy Johnson November 26, 2013 From a cash register to driverless cars, technology is all around us whether we like it or not, and it is only going to continue to grow. The more technology advances, the more we can do or use it for, and the more concerns it raises. When a computer was first introduced, we weren't thinking about if it could tell right from wrong, we were thrilled that we had a machine that could do somewhat complex calculations. As technology advanced these issues of morals came into play. The first person to look into ethics and the issues that go along with it was James Moor (Bowles, 2013). Since then it has been a highly debated topic that continues to grow. There are many different ethical issues involving information technology, some of which are mentioned in our textbook. Just like with any personal data (Social Security Numbers, bank account information, etc), we expect this information to be kept private and only give it out to who we believe to be trusted people. "Privacy of that data and the importance of ensuring that only authorized people know certain things about other people's lives." (Bowles, 2013). Another issue mentioned in the textbook is the accuracy of our personal information that is entered into the various systems. This information is only as accurate as the human typing it in makes it. Because digital information is so much easier...

Words: 1777 - Pages: 8

Premium Essay

Engaging Undergraduates in Discussions About Ethics in Computing

...Undergraduates in Discussions about Ethics in Computing Brian R. von Konsky Jim Ivins Susan J. Gribble Curtin University of Technology Department of Computing Software Engineering Education Research Group GPO Box U1987, PERTH WA Australia bvk@cs.curtin.edu.au Abstract o Third-year computing students enrolled in a software engineering subject were introduced to the Australian Computer Society (ACS) Code of Ethics in the context of a computing professional’s obligation to manage quality, safety and reliability. Following an introductory lecture, case study scenarios were interactively discussed during class. Immediately afterwards, students were surveyed to assess their self-perceived and actual ability to apply the ACS Code to another similar scenario. Of the 68 students who gave their informed consent to participate in the study, 34% reported being fully comfortable with applying the ACS Code of Ethics, while 63% were somewhat comfortable. In justifying multiple-choice options for dealing with a new case study scenario, 37% provided a good justification for their choice, 48% provided a poor justification, and 15% provided no justification. A further qualitative analysis of the responses suggests the need for formal assessment of ethics in computing education, and highlights the importance of improving the perceived relevance of ethics to students and the need for in-depth treatment of ethical issues. Keywords: Ethics, Teaching and Learning, Engagement ...

Words: 4918 - Pages: 20

Premium Essay

Computer Ethics

...Computer ethics Computer ethics is a branch of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct. The term "computer ethics" was first coined by Walter Maner in the mid-1970s, but only since the 1990s has it started being integrated into professional development programs in academic settings. The conceptual foundations of computer ethics are investigated by information ethics, a branch of philosophical ethics established by Luciano Floridi. Computer ethics is a very important topic in computer applications. The importance of computer ethics increased through the 1990s. With the growth of the Internet, privacy issues as well as concerns regarding computing technologies such as spyware and web browser cookies have called into question ethical behavior in technology. Identifying issues Identifying ethical issues as they arise, as well as defining how to deal with them, has traditionally been problematic in computer ethics. Some have argued against the idea of computer ethics as a whole. However, Collins and Miller proposed a method of identifying issues in computer ethics in their Paramedic Ethics model. The model is a data-centered view of judging ethical issues, involving the gathering, analysis, negotiation, and judging of data about the issue. In solving problems relating to ethical issues, Davis proposed a unique problem-solving method. In Davis's model, the ethical problem is stated, facts...

Words: 6774 - Pages: 28

Free Essay

Ethics

...permiso pues era el ofrecido por la editorial) Professional Codes of Ethics Commitment to ethical professional conduct is expected of every voting, ssociate, and student member of the ACM. — preamble to the ACM Code of Ethics. We, the members of the IEEE, in recognition of the importance of our technologies in affecting the quality of life throughout the world, and in ccepting a personal obligation to our profession, its members and the communities we serve, do hereby commit ourselves to conduct of the highest ethical and rofessional manner... — preamble to the IEEE Code of Ethics 3.1 Introduction Some students react with surprise when told that there is even one published code of ethics for the computing disciplines. In fact, almost every professional organization dealing with the field of computing has published its own code of ethics. For this text, I selected the codes published by the two most influential organizations for computer professionals: the Institute of Electrical and Electronics Engineers and the Association for Computing Machinery. I also selected a third code, from the National Society of Professional Engineers. A variety of other professional organizations have published computing codes, such as the Data Processing Management Association and the Institute for Certification of Computer Professionals [6], but I selected the NSPE code because it is still relevant to computing and contains some useful points of contrast to the IEEE and ACM codes...

Words: 5527 - Pages: 23

Premium Essay

Cloud Computing

...Cloud Computing: The Benefits and the Downside Air, energy, the environment are intangible to the human eye, but yet all three play an integral part in our survival. Cloud computing relates to these three things because all of these could be adversely affected by cloud computing. Technology is an ever evolving and growing market dominated by the consumerism of Apple products and a world where instant gratification is gloried as information is processed in the matter of seconds. The evolution of technology has not only changed the way that we communicate with one another, but also the way in which businesses must conduct their daily transactions. A person in the United States can keep in touch with a friend thousands of miles of way in Brazil or England using Facebook or Twitter. World events spread in the same manner as wildfire, uniting citizens around the world with such topics as war and human rights. We live in a society in which technology has shaped the people that we are today. Most students in middle or high school have had access to a cellular phone since their birth. Beyond the surface of technology being used as a device to interact with one another, technology is used as a device to store information. Our society has transformed from storing information on a hard drive or a flash drive to the information being stored on the Internet via the concept of cloud computing. Cloud computing is the act in which information can be stored and reviewed over the Internet rather...

Words: 3023 - Pages: 13

Premium Essay

The Differences Between Ethics and Law

...THE DIFFERENCES BETWEEN ETHICS AND LAW DEFINITION OF ETHICS In general, ethics is a moral philosophy where a person makes a specific moral choice and sticks to it. On the other hand, ethics in computing means moral guidelines to refer to when using the computer and computer networks. This includes the Internet. DEFINITION OF LAW Law is a legal system comprising of rules and principles that govern the affairs of a community and controlled by a political authority. Law differs from one country to another. In the era of technology, computer law is needed to clarify goods or actions that fall under the computer law. Computer law refers to all areas in law that requires an understanding of computer technology such as hardware, software and Internet. Examples of laws of computing in Malaysia include the Malaysian Communication and Multimedia Act, the Computer Crime Act 1997 and the Telemedicine Act 1997. WHY DO WE NEED ETHICS & LAW IN COMPUTING? Ethics and law are needed i computing to: • • • Respect Ownership Respect Privacy & Confidentiality Respect Property Respect Ownership We must respect ownership by not stealing other people’s work either by duplicating or distributing it. Duplicating and distributing copies of audio tapes, video tapes and computer programs without permission and authorisation from the individual or company that created the program are immoral and illegal. Respect Privacy & Confidentiality We should respect other people's privacy and confidentiality by...

Words: 552 - Pages: 3

Premium Essay

Computer Cthics

...------------------------------------------------- Computer Ethics Ethics is a set of moral principles that govern the behavior of a group or individual. Therefore, computer ethics is set of moral principles that regulate the use of computers. Some common issues of computer ethics include intellectual property rights (such as copyrighted electronic content), privacy concerns, and how computers affect society. For example, while it is easy to duplicate copyrighted electronic (or digital) content, computer ethics would suggest that it is wrong to do so without the author's approval. And while it may be possible to access someone's personal information on a computer system, computer ethics would advise that such an action is unethical. As technology advances, computers continue to have a greater impact on society. Therefore, computer ethics promotes the discussion of how much influence computers should have in areas such as artificial intelligence and human communication. As the world of computers evolves, computer ethics continues to create ethical standards that address new issues raised by new technologies. Computer Ethics is a part of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct.[1] Margaret Anne Pierce, a professor in the Department of Mathematics and Computers at Georgia Southern University has categorized the ethical decisions related to computer technology and usage into 3 primary influences: ...

Words: 3631 - Pages: 15

Premium Essay

Ethics

...Reference Material on Ethics Books and Book Chapters Baase, S. (1997) A Gift of Fire: Social, Legal and Ethical Issues in Computing, Prentice Hall. Berleur, J. and Bruunstein, K. (Eds.) (1996) Ethics of Computing: Codes, Spaces for Discussion and Law, Chapman & Hall: London. Berleur, J. and Whitehouse, D. (Eds.) (1997) An Ethical Global Information Society: Cuture and Democracy Revisited (Proceedings of the IFIP WG 9.2/9.5 Corfu International Conference) Chapman & Hall: London. Berleur, J., Duquenoy, P. and Whitehouse, D. (Eds) (1999) Ethics and the Governance of the Internet, IFIP-SIG 9.2.2 (IFIP Framework for the Ethics of Computing), IFIP Press: Laxenburg, Austria  Bowman, J.S. and Menzel, D.C. (1998) Teaching Ethics and Values in Public Administration Programs: Innovations, Strategies and Issues, SUNY Press: Albany. Cappel, J.J. and Kappelman, L. (1997) The Year 2000 Problem: An Ethical Perspective, in: Kappelman, L., (Ed.), Year 2000 Problem: Strategies and Solutions from the Fortune 100, International Thomson Computer Press, Boston, 158-163. Floridi, L. (1999) Philosophy and Computing, London: Routledge. Johnson, D.G. and Nissenbaum, H. (1995) Computers, Ethics and Social Values, Prentice Hall. Kallman, E.A. and Grillo, J.P. (1996) Ethical Decision Making and Information Technology: An Introduction with Cases, McGraw Hill. Kaplan, B., Farzanfar, R. and Friedman R.H. (1999) Research and Ethical Issues Arising from Ethnographic Interviews of Patients’...

Words: 1786 - Pages: 8

Premium Essay

Ethics in Cyberspace

...Title: Ethics in Cyberspace Ethics in Cyberspace Chris Jones Strayer University CIS 324 Professor Luis ACEVEDO March 15, 2012 Ethics in Cyberspace What is Cyberspace? Cyberspace is a global community of people using computers in networks. For ensured functionality, virtual communities with Internet support depend on rules of conduct, likewise with any other society. Business people like librarians and information technologists must have matured knowledge about ethical issues for their companies’ welfare and to protect and mentor other users. What is ethics? Ethics is the art of determining what is good or right. It can also be defined as a way of life or general pattern, a set of rules of conduct or moral code. Ethical guidelines are based on values. The Association of Computing Machinery (ACM) is a national organization that has a developed statement of its values. ACM’s every member is expected to uphold the Code of Ethics and Professional Conduct which includes these morals: 1) contribute to society and human well-being 2) avoid harm to others 3) be honest and trustworthy 4) be fair and take action not to discriminate 5) honor property rights including copyrights and patents 6) give proper credit for intellectual property 7) respect the privacy of others 8) honor confidentiality. New moral issues occur due to the nature of electronic...

Words: 851 - Pages: 4

Premium Essay

Review the Process of Implementing Cloud Computing of Smes in Uk - an Exploratory Study

...Review the process of implementing cloud computing of SMEs in UK - an Exploratory Study 1. Introduction Information technology (IT) plays an important role in increasing innovation and competitiveness and performance for small and medium-sized enterprise (SMEs). Cloud computing or on-demand computing is IT infrastructures that empower SMEs with various capabilities to store, share and access information, data and resources in third-party data center. Cloud computing when implemented strategically will help enterprises to improve their performances, processes and efficiency. Despite the importance of cloud-based computing, limited research has done to study about the implementation and usage of cloud-based computing in the SMEs within the UK context (Shiels et al., 2003). The objective of the research reviewed in this proposal is to contribute to the valuable research on cloud solutions by studying the implementation of SMEs. UK was selected for this research as in UK, SMEs accounts for the vast mojarity of all companies and it is home of innovation companies that develop with the development of information and communication technologies. The relevant literature are referred and the theoretical framework is used in this research are discussed in the next part of the paper. 2. Literature Review According to Sultan, N. A. (2011) small- and medium-sized enterprises can take a lot of advantages from embracing cloud solutions. Because no matter of what type of business...

Words: 2789 - Pages: 12

Free Essay

N Report

...ON-THE-JOB TRAINING AT THE DEAN’S OFFICE, COLLEGE OF COMPUTING AND INFORMATION TECHNOLOGY, ISABELA STATE UNIVERSITY, CAUAYAN CITY, ISABELA JOHN DAVID C. CADIENTE ============================= NARRATIVE REPORT ============================= Republic of the Philippines ISABELA STATE UNIVERSITY College of Computing and Information Technology Cauayan City, Isabela March 2012 APPROVAL SHEET The narrative report entitled, “ON-THE-JOB TRAINING AT THE DEAN’S OFFICE, COLLEGE OF COMPUTING AND INFORMATION TECHNOLOGY, ISABELA STATE UNIVERSITY, CAUAYAN CITY, ISABELA”, prepared and submitted by JOHN DAVID C. CADIENTE, in partial fulfillment in the requirements for graduation with the course, BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY (BSIT), is hereby endorsed. GUIDANCE/ADVISORY COMMITTE DIONICIO D. GANTE OJT Coordinator/ Adviser CARMELO M. IBBARETA English Critic ________________________________________________________________________ Accepted as a partial fulfillment of the requirements for graduation with the course Bachelor of Science in Information Technology. MARY JANE S. BITANGA _________________ Dean, CCIT Date Recorded by: ADELA L. REYNO _________________ Campus Registrar Date ACKNOWLEDGEMENT DEDICATION TABLE OF...

Words: 728 - Pages: 3

Premium Essay

Protecting the Virtual Environment

...storage, communication of, and access to information, whether such information is encoded in bits and bytes in a computer memory or transcribed in genes and protein structures in a human cell.” Job growth significantly contributed to my decision on a major. According to the U.S. Bureau of Labor Statistics, careers requiring at least a B.S. in Computer Science are seeing the greatest amount of growth, and are expected to continue to do so through 2016. Also, people in this major tend to receive the greatest average starting salary at $65,000. However, the field is not without its problems. Because computing is so new and many laws have yet to form, the computer science environment faces ethical issues such as intellectual ownership, security, and what can be published to the Internet. Currently, the field of computer science is facing one of the greatest issues of the technological age: ethics. Ethical concerns seem to revolve around ownership of intellectual property and the copying and unauthorized use of software. Who owns a software program, the writer, creator, or the financer? The most notable problem is piracy and peer-to-peer sharing. Programs such as Limewire, Napster, and Frostwire...

Words: 1011 - Pages: 5

Premium Essay

Critical Components of a Successful Business

...Critical Components of a Successful Business University Maryland University College Professor Jerry Griffin BMGT 110 What Are Some Key and Critical Components of Running a Successful Business? Learning how to run and operate a business can be a big and daunting task. Many small businesses don’t even turn a profit for months or even years, and even if they do there is no guarantee that they will be around in a few years. Most of these small businesses, about 70 percent survive the first two years but after that the numbers decrease to “50 percent by the fifth year mark, and by the tenth year 82 percent have closed” (Boone & Kurtz p.152). If you want your company or business to succeed and grow you need to know a few important factors that will help it and they are: dynamic business environments, critical business functions, integration of individuals and systems, and ethical and social responsibilities that confront a business. To start a company you need a plan, capital, and a location to start the company, but once you get those you need to be able to have a dynamic business environment. A dynamic business environment is characterized by the ability to respond to changing trends. One of these changes could be the aging of the population and its shrinking labor pool. As stated by Boone and Kurtz, “that by the year 2030, the number of U.S. workers 65 or older will reach 72 million, taking their experience and expertise with them” (pg. 20). Which means...

Words: 1541 - Pages: 7

Free Essay

Ethics in the Modern Workplace

...Workplace deviance has long been a concept that was definable, quantifiable, and evaluatable. Representing an organization’s loss due theft of property, deliberate employee misconduct, or inadvertent employee waste, workplace deviance stemmed from generally overt practices that could be weighted for their significance and addressed accordingly. Although this valuation may often be subjective, it could still be made tangible to a manager in ways that suited their (and their organization’s) ethical norm. In today’s workplace, it is not easy to run a successful and profitable company and maintain ethical behavior at all times. There are too many variables involved in running a business that it can sometimes be tough to determine between right and wrong. We will discuss some of the most common and potentially troubling changes in technology that have resulted in electronic surveillance, email monitoring, restricting access to programs and or websites, and social media trafficking. Due to technological advances, workplace deviance is becoming more and more of a concern for today’s employers. In years past, employers did encounter workplace deviance, but it was of a lesser degree. Chuck Williams, author of our management book, describes workplace deviance as, “unethical behavior that violates organizational norms about right and wrong.” Workplace deviance can have both tangible and intangible effects on a company’s assets. With the dawn of the Information...

Words: 2353 - Pages: 10

Premium Essay

Table

...Operations Management(RM 2) * Media and Communications Ethics(RM 2) * Mobile Communications(RM 2) * Social Work Legal and practice(RM 33) * Employee Engagement (RM 33) | TUESDAY23/06/2015 | * Management Information Systems1(Gym & RM 36) * Java Programming(RM 33) * Mathematics for economics (RM 1) * Software Economics(RM 1) * Media and Society (RM 1) * Marketing(RM 2) * Human Resource Development (RM 2) * Human Rights and Development (RM 2) | * Business Communication/Communication Skills(Gym, RMs 36, 33, 2) * Project Planning and Management Software(Project) * Public Finance(RM 1) * Intermediate macroeconomics 2(RM 1) * Project Appraisal(RM 1) * Wood based Materials &Processes I(RM 1) * Financial Management(RM 1) | WEDNESDAY24/06/2015 | * Media Law(RM 1) * Introduction to Business( Gym) * Introduction to Public Administration(RM 36) * Intermediate microeconomics 1(RM 1) * Cyber Law(Gym) * Food security in Developing Countries(RM 33) * Risk Management(RM 2) * Project Design 1(RM 2) | * Sociology of Education(Gym) * Managerial Accounting (Gym) * Geographical Information Systems(RM 33) * Writing for Media (RM 2) * Ethics in Human Resources(RM 33) * NGOs and Development(RM 1) * Introduction to Social and Cultural Anthropology(RM 1) * Development psychology(RM 1) * Fundamentals of Information Security (RM 1) * Electronics For Computing 2(RM 36) * Project Portfolio Management (RM 2) * Wood...

Words: 924 - Pages: 4