Access for Remote Professionals
Course Description
Explore technological and cybersecurity factors in a remote work context. Learn about essential tools and strategies for staying safe online. Complete all Access 101 lessons successfully which counts toward your Remote Professional Certificate.
Learning Objectives
- Identify key concepts related to information technology.
- Examine important elements of technology policies and support mechanisms that affect remote workers.
- Compare factors influencing internet speed and connectivity.
- Identify cybersecurity strategies to secure operations in a remote environment.
- Evaluate various digital tools and platforms for remote work.
- Create a Professional Code of Ethics for Access, ensuring practices reflect ethical standards.
Research and References
Following are sources consulted/additional readings related to the course topics.
Adams, J.S., Tashchian, A., & Shore, T. (2001). Codes of ethics a signals for ethical behavior. Journal of Business Ethics, 29, 199-211.
Barquin, R. C. (1992). In pursuit of ‘ten commandments’ for computer ethics. Computer Ethics Institute.
Choudhury, P., Star, E., Teodoovicz, T. (2022). Work-from-anywhere as a public policy: 3 findgins from the Tulsa remote program. Harvard Business Review.
Cisco. (2021) Cybersecurity threat trends: Phishing, crypto top the lists. Cisco.com
Cooper, S. (2022). The Best Free Remote Desktop Software for 2022.
Cybersecurity basics. (n.d.). Federal Trade Commission. www.ftc.gov
FBI Internet Crime Complaint Center (IC3). 2022. On the Internet, Be Cautious When Connected. FBI.gov
Gomez, M. (2020). Set yourself up to effectively work from home or learn remotely. Ookla.com
Holsin, P. (2022). What are hotspots and how do they work? HighSpeedInternet.com
IBM. (2022). Cost of a data breach 2022: A million-dollar race to detect and respond. IBM.com
IBM. (2022a). What is cybersecurity? IBM.com
Ladd, J. (1985). The quest for a code of professional ethics, in D.G. Johnson and J.W. Snapper (eds.) Ethical issues in the use of computers, pp. 37-38. Wadsworth, Belmont CA.
Microsoft. (2021). Microsoft Digital Defense Report. Microsoft.com
Nissenbaum, H.(1998). Information technology and ethics. In The Routledge Encyclopedia of Philosophy. Taylor and Francis.
Ponemon Institute. (2022). Cost of Insider Threats Global Report. Proofpoint.com
Speedtest (n.d.). What speeds do I need for streaming or large downloads? Speedtest.net
Stone, B. (2022. Best remote desktop software 2022. TechRepublic.
Symantec. (2019). International Security Threat Report. 24.
Tischer, M., Durumeric, Z., Foster, S., Duan, S., Mori, A., Bursztein, Bailey, E., Bailey, M. (2019). Users really do plug in USB that they find. (2016). IEEE Symposium on Security and Privacy.
University of Central Florida. (2020). RAPID: Exploring the Cyber Behaviors of Temporary Work-From-Home (TWFH) Employees.
Warburton, D. (2020). Phishing and fraud report. F5 labs. F5.com /