publication . Article . 2017

Improving Student Engagement in the Study of Professional Ethics: Concepts and an Example in Cyber Security

John D. Bustard;
Open Access English
  • Published: 11 Apr 2017 Journal: Science and Engineering Ethics, volume 24, issue 2, pages 683-698 (issn: 1353-3452, eissn: 1471-5546, Copyright policy)
  • Publisher: Springer Netherlands
  • Country: Bangladesh
In spite of the acknowledged importance of professional ethics, technical students often show little enthusiasm for studying the subject. This paper considers how such engagement might be improved. Four guiding principles for promoting engagement are identified: (1) aligning teaching content with student interests; (2) taking a pragmatic rather than a philosophical approach to issue resolution; (3) addressing the full complexity of real-world case studies; and (4) covering content in a way that students find entertaining. The use of these principles is then discussed with respect to the specific experience of developing and presenting a master’s module in Ethica...
free text keywords: Ethics, Professional, Cybersecurity, research,inovation, trust, resilience, translation, Curriculum development, Original Paper, Ethics, Cyber security, Case studies, Psychology, Curriculum design, Management of Technology and Innovation, Health Policy, Issues, ethics and legal aspects, Health(social science), Engineering ethics, Enthusiasm, media_common.quotation_subject, media_common, Sociology, Conflict of interest, Curriculum, Guiding Principles, Professional ethics, Computer security, computer.software_genre, computer, Public relations, business.industry, business, Philosophical methodology, Student engagement
Related Organizations
45 references, page 1 of 3

Alinsky, S. (2010). Rules for radicals: A pragmatic primer for realistic radicals. Vintage.

Alterio, M, McDrury, J. Learning through storytelling in higher education: Using reflection and experience to improve learning. 2003

Bairaktarova, D., & Woodcock, A. (2016). Engineering student’s ethical awareness and behavior: A new motivational model. Science and Engineering Ethics. doi:10.1007/s11948-016-9814-x.

Baldini, G., Botterman, M., Neisse, R., & Tallacchini, M. (2016). Ethical design in the internet of things. Science and Engineering Ethics. doi:10.1007/s11948-016-9754-5.

BBC News (2016). UK must retaliate against cyber-attacks says chancellor. Article. BBC News. Accessed February 22, 2017,

Bucciarelli, LL. Ethics and engineering education. European Journal of Engineering Education. 2008; 33 (2): 141-149 [OpenAIRE] [DOI]

Bustard, J. D. (2013). Ethical issues surrounding the asymmetric nature of workplace monitoring. In L. Marinos & I. Askoxylakis (Eds.), International conference on human aspects of information security, privacy, and trust (pp. 226–235). Berlin, Heidelberg: Springer.

Bustard, JD. The Impact of EU privacy legislation on biometric system deployment: protecting citizens but constraining applications. IEEE Signal Processing Magazine. 2015; 32 (5): 101-108 [OpenAIRE] [DOI]

Coldwell, J. (2000). It is possible to teach computer ethics via distance education!. In J. Weckert (Ed.), Selected papers from the second Australian institute conference on computer ethics (pp. 73–80). Canberra: Australian Computer Society, Inc.

DC-IoT (2016). Dynamic coalition on the internet of things. Accessed February 22, 2017,

District Court (2010). Robbins v. lower Merion school district. Civil Action No. 10-665. District Court, E.D. Pennsylvania.

Farrell, C. B., Gray, M. E. & Bartley, M., A. (2012). Google will pay $22.5 million to settle FTC charges it misrepresented privacy assurances to users of Apple’s Safari internet browser. Press Release. Federal Trade Commission. Accessed 22 February, 2017,

FBI (2016). FBI records: The vault. Hillary R. Clinton. report. Federal Bureau of Investigation. Accessed 22 February, 2017,

Freeman, E. Vulnerability disclosure: The strange case of Bret McDanel. Information Systems Security. 2007; 16 (2): 127-131 [OpenAIRE] [DOI]

Gürses, S., Troncoso, C., & Diaz, C. (2011). Engineering privacy by design. Computers, Privacy and Data Protection, 14(3), 1–25.

45 references, page 1 of 3
Powered by OpenAIRE Open Research Graph
Any information missing or wrong?Report an Issue
publication . Article . 2017

Improving Student Engagement in the Study of Professional Ethics: Concepts and an Example in Cyber Security

John D. Bustard;