This course offers an introduction to ethics in business, with a focus …
This course offers an introduction to ethics in business, with a focus on business management. Students explore theoretical concepts in business ethics, and cases representing the challenges they will likely face as managers. There is opportunity to work with guest faculty as well as business and other professional practitioners. Individual class sessions take the form of moderated discussion, with occasional short lectures from the instructor.
What are the ethical considerations for researchers who use data? This data …
What are the ethical considerations for researchers who use data? This data primer describes standards for gathering, analyzing, storing, and distributing data for new data users and serves as a reference for advanced data users.
Short Description: This book is the result of a co-design project in …
Short Description: This book is the result of a co-design project in a class in the Masters of Education program at the University of Calgary. The course, and the resulting book, focus primarily on the safe and ethical use of technology in digital learning environments. The course was organized according to four topics based on Farrow’s (2016) Framework for the Ethics of Open Education.This is the first of 2 Versions of this pressbook. Click on Volume 2 for information.
Long Description: This book is the result of a co-design project in a class in the Masters of Education program at the University of Calgary. The course, and the resulting book, focus primarily on the safe and ethical use of technology in digital learning environments. The course was organized according to four topics based on Farrow’s (2016) Framework for the Ethics of Open Education. Students were asked to review, analyze, and synthesize each topic from three meta-ethical theoretical positions: deontological, consequentialist, and virtue ethical (Farrow, 2016). The chapters in this open educational resource (OER) were co-designed using a participatory pedagogy with the intention to share and mobilize knowledge with a broader audience. The first three chapters in the book discuss specific ethical considerations related to technologies such as Artificial Intelligence (AI) , social networking services (SNS), and 3D printing. The next four chapters shift to a broader discussion of resource sharing, adaptive learning systems, STEM, and assistive technologies. The final two chapters discuss admissions and communications that need to be considered from an institutional perspective. In each of the nine chapters, the authors discuss the connection to the value of technology in education, and practical possibilities of learning technologies for inclusive, participatory, democratic, and pluralistic educational paradigms.
Word Count: 56853
ISBN: 0-88953-438-1
(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)
Short Description: This book is the result of a co-design project in …
Short Description: This book is the result of a co-design project in a class in the Masters of Education program at the University of Calgary. The course, and the resulting book, focus primarily on the safe and ethical use of technology in digital learning environments. The course was organized according to four topics based on Farrow’s (2016) Framework for the Ethics of Open Education.
Long Description: Click on Volume 1 to read the first book in this series.
This book is the result of a co-design project in a class in the Masters of Education program at the University of Calgary. The course, and the resulting book, focus primarily on the safe and ethical use of technology in digital learning environments, and is the second volume in the series. The course was organized according to four topics based on Farrow’s (2016) Framework for the Ethics of Open Education. Students were asked to review, analyze, and synthesize each topic from three meta-ethical theoretical positions: deontological, consequentialist, and virtue ethical (Farrow, 2016). The chapters in this open educational resource (OER) were co-designed using a participatory pedagogy with the intention to share and mobilize knowledge with a broader audience. The first section, comprised of four chapters, focuses on topics relating to well-being in technology-enabled learning environments, including the use of web cameras, eproctoring software, video games, and access to broadband connectivity. The second section focuses on privacy and autonomy of learners and citizens in a variety of contexts from schools to clinical settings. In each of the seven chapters, the authors discuss the connection to the value of technology in education, and practical possibilities of learning technologies for inclusive, participatory, democratic, and pluralistic educational paradigms. The book concludes with reflections from the course instructor gained over two iterations of teaching the course.
Word Count: 40312
ISBN: 978-0-88953-472-8
(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)
This resource uses Articulate Rise to provide information on creating a code of …
This resource uses Articulate Rise to provide information on creating a code of ethics and compliance in the workplace. This resource can be used as a stand-alone learning object or added to a course.
This course considers the interaction between law, policy, and technology as they …
This course considers the interaction between law, policy, and technology as they relate to the evolving controversies over control of the Internet. In addition, there will be an in-depth treatment of privacy and the notion of “transparency” – regulations and technologies that govern the use of information, as well as access to information. Topics explored will include:
Legal Background for Regulation of the Internet Fourth Amendment Law and Electronic Surveillance Profiling, Data Mining, and the U.S. PATRIOT Act Technologies for Anonymity and Transparency The Policy-Aware Web
Eine Einführung Short Description: Diese Einführung stellt ethische Theorien und Fragestellungen in …
Eine Einführung
Short Description: Diese Einführung stellt ethische Theorien und Fragestellungen in einen Bezug zur IT-Sicherheit. Sie bietet Menschen, die in der Cybersecurity arbeiten oder von ihr betroffen sind, einen Zugang zu ethischen Reflexionen und zur Beurteilung von kritischen Sachverhalten der IT-Sicherheit. Interessierten Leserinnen und Lesern bietet sie Impulse zur kritischen Meinungsbildung in einem herausfordernden und gesellschaftspolitisch relevanten Themenfeld. Bestellen Sie hier das eBook als PDF / ePub: https://csr-news.org
Long Description: Ethik und IT-Sicherheit haben augenscheinlich auf den ersten Blick nichts miteinander zu tun. Das eine ist eine geisteswissenschaftliche, das andere eine technologische Disziplin. Doch die Distanz löst sich auf, wenn man den Blick auf die informationelle Selbstbestimmung von Menschen richtet. Denn in letzter Konsequenz haben die Daten, die im Kern geschützt werden, immer auch mit Menschen und deren Handlungsräumen zu tun.
Diese Einführung stellt ethische Theorien und Fragestellungen in einen Bezug zur IT-Sicherheit. Sie bietet Menschen, die in der Cybersecurity arbeiten oder von ihr betroffen sind, einen Zugang zu ethischen Reflexionen und zur Beurteilung von kritischen Sachverhalten der IT-Sicherheit. Interessierten Leserinnen und Lesern bietet sie Impulse zur kritischen Meinungsbildung in einem herausfordernden und gesellschaftspolitisch relevanten Themenfeld.
Word Count: 40571
(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)
Short Description: Les manières de faire de la science aujourd’hui sont multiples …
Short Description: Les manières de faire de la science aujourd’hui sont multiples et innovantes. Pourtant, un modèle normatif continue d’écraser les autres : le modèle positiviste. Il soutient que la science vise l’étude objective de la réalité en s’appuyant sur l’application rigoureuse de la méthode « scientifique » dont la neutralité est un des emblèmes. Cette vision est vivement contestée dans plusieurs champs de recherche, tels que les études sociales des sciences, l’histoire des sciences et les études féministes et décoloniales. Ces critiques considèrent que les théories scientifiques sont construites et influencées par le contexte social, culturel et politique dans lequel travaillent les scientifiques, ainsi que par les conditions matérielles de leur travail. Cet ancrage social de la science rend impensable, pour ces critiques, l’idée même de neutralité. Faut-il donc renoncer à cette exigence normative? Par quelle autre norme la remplacer?Né d’un colloque tenu en 2017 à Montréal, ce livre propose les réflexions et analyses de 25 auteurs et autrices issues de sept pays sur ces questions. Études de cas, analyses réflexives et discussions théoriques s’entrecroisent pour permettre une réflexion collective approfondie sur ces enjeux anciens, mais constamment renouvelés, notamment dans le contexte du nouveau statut précaire de l’expertise scientifique dans l’espace public.
Long Description: Les manières de faire de la science aujourd’hui sont multiples et innovantes. Pourtant, un modèle normatif continue d’écraser les autres : le modèle positiviste. Il soutient que la science vise l’étude objective de la réalité en s’appuyant sur l’application rigoureuse de la méthode « scientifique » dont la neutralité est un des emblèmes. Cette vision est vivement contestée dans plusieurs champs de recherche, tels que les études sociales des sciences, l’histoire des sciences et les études féministes et décoloniales. Ces critiques considèrent que les théories scientifiques sont construites et influencées par le contexte social, culturel et politique dans lequel travaillent les scientifiques, ainsi que par les conditions matérielles de leur travail. Cet ancrage social de la science rend impensable, pour ces critiques, l’idée même de neutralité. Faut-il donc renoncer à cette exigence normative? Par quelle autre norme la remplacer?
Né d’un colloque tenu en 2017 à Montréal, ce livre propose les réflexions et analyses de 25 auteurs et autrices issues de sept pays sur ces questions. Études de cas, analyses réflexives et discussions théoriques s’entrecroisent pour permettre une réflexion collective approfondie sur ces enjeux anciens, mais constamment renouvelés, notamment dans le contexte du nouveau statut précaire de l’expertise scientifique dans l’espace public.
Word Count: 189292
ISBN: 978-2-924661-54-3
(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)
From pineapples grown in Hawaii to English-speaking call centers outsourced to India, …
From pineapples grown in Hawaii to English-speaking call centers outsourced to India, the legacy of the “Age of Imperialism” appears everywhere in our modern world. This class explores the history of European imperialism in its political, economic, and cultural dimensions from the 1840s through the 1960s.
This basic guideline is a tool addressed to all the seniors and …
This basic guideline is a tool addressed to all the seniors and people working in the social field who would like to have a thorough knowledge of what the European Senior Volunteering (ESV) is about. This guideline aims to reach organizations, institutions, seniors, youth and leaders who are willing to organize their first activities addressed to seniors under the EU Programmes or other volunteering actions. This final output of the “ERASVUS+” project represents the recommendations gathered by the four partner organizations, on how to manage international volunteering projects for seniors, focusing on their needs and expectations and by taking into consideration the effectiveness of the intercultural and intergenerational aspects of the learning paths.
"The European Commission's support for the production of this publication does not constitute an endorsement of the contents, which reflect the views only of the authors, and the Commission cannot be held responsible for any use which may be made of the information contained therein."
The freely downloadable version is available on the official website of the project: https://erasmuspluswebsite.wixsite.com/erasvus
Students use the 5 Ws (who, what, when, where, why, and how) …
Students use the 5 Ws (who, what, when, where, why, and how) to evaluate an information source and determine if they would cite it in a paper. This assignment is used as an information literacy exercise at the University of Tennessee Libraries, where students are given a New York Times column to read before completing the assignment in groups.
For a copy of this resource as it was originally given to students, go to: https://drive.google.com/file/d/0B0vtrPDaeiV6VFJUYUNzRGlfb00/view?usp=sharing. Results of the use of this activity were shared in an article published in the journal Reference & User Services Quarterly 53, no. 4 (Summer 2014): 334-347.
Web sources can be created by anyone and therefore are riskier in …
Web sources can be created by anyone and therefore are riskier in terms of their credibility and authority. This source offer some criteria by which webpages can be evaluated for authenticity.
Cultivating stakeholders is a critical part of event management. This application activity …
Cultivating stakeholders is a critical part of event management. This application activity covers the following four-stage process for involving stakeholders in an event: identification of stakeholders, classifying stakeholders, assessing stakeholders, and maintaining stakeholders. A case study is provided for students to apply to cultivating stakeholders in an industry example.
In the market segmentation of festival attendees’ application activity, students will review …
In the market segmentation of festival attendees’ application activity, students will review a mini-lecture material related to market segmentation, target marketing, and event positioning. Students will then apply the concepts of marketing segmentation, target marketing, and event positioning by analyzing data collected from an international music festival to establish the target market of the international music festival.
Risk management is a critical part of event management. This worksheet covers …
Risk management is a critical part of event management. This worksheet covers definitions of the key aspects of risk management and the steps taken by event management in creating a risk management plan. A case study is provided for students to apply the risk management process in an industry example.
Sponsorship management is activities that an event organization engages in to secure …
Sponsorship management is activities that an event organization engages in to secure support from sponsors and manage the interests of sponsors at the event. The organizer and sponsor are jointly interested in successfully operating events for their mutual benefit. This section provides an overview of sponsorship management for events. The differences between sponsorship and advertising were compared for their strengths and weaknesses. The sponsorship management of a social event was discussed from the prospective from the perspective of organizers and sponsors. A case study on an LGBT+ event provided a case problem for how to construct a social media sponsorship package.
Volunteer management is an integral part of any event that relies on …
Volunteer management is an integral part of any event that relies on volunteer contributions. Managing volunteers for events is related to three related domains: events, human resources, and volunteering. Each of the domains is discussed for its relation to volunteer management in the context of a sporting event. The practice of managing volunteers is considered in terms of its phases. A real-life case is provided so that students can apply their understandings of volunteer management in resolving the case problems.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.