11

Click here to load reader

Course Introduction

Embed Size (px)

DESCRIPTION

PROFESSIONALISM AND ETHICS IN IT

Citation preview

Page 1: Course Introduction
Page 2: Course Introduction

COURSE : DFP1032 PROFESSIONALISM AND

ETHICS IN IT

CREDIT(S) : 2

PRE REQUISITE(S) : NONE

Page 3: Course Introduction

PROFESSIONALISM AND ETHICS IN IT course

deals with some theories and code of ethics

that computer professionals are likely to

encounter in the ICT field. Students are

exposed to several areas of ethical issues,

privacy of personal information, piracy,

sharing of information, accuracy and access

to information. This course also exposes

student the code of conduct for computing

and information technology professional.

Page 4: Course Introduction

Upon completion of this course, students should be able to:

1. distinguish between the various ethical theories and code of ethics which can be used to form the basis of ethical computing.

2. response constructively to various emerging issues related to ethics in cyberspace.

3. adhere to code of ethics and enforcements when working with computers and the Internet.

Page 5: Course Introduction

This topic focuses on the definitions of

ethics, professionalism and law. It also

distinguishes students with main concepts

in computing. Students will be able to

know the importance of professionalism

and ethics in computing.

Page 6: Course Introduction

This topic covers the code of ethics in

computing and technology. Students will

have discussion on codes of ethics and

commandments in computer ethics.

Besides that, students are also exposed to

the problems and awareness in computing

ethics.

Page 7: Course Introduction

This topic covers the ethical issues and

problems in computing. Students will learn

categories of ethics and the ethical ways

of using the Internet.

Page 8: Course Introduction

This topic focuses on topics related to

Internet and Cyberethics. Students will

understand the codes of blogging ethics

and social networking. Students will also

discuss the growth of social networking in

Malaysia and the enforcements involved in

ethical computing aspects.

Page 9: Course Introduction
Page 10: Course Introduction

Test [ 1 ] : 15%

Quiz [ 2 ] :10%

Case Study[ 2 ] : 25%

› TOTAL : 50%

Page 11: Course Introduction

Main :

Herman T.Tavani, (2010). Ethics and Technology: Controversies, Questions and Strategies for Ethical Computing, Wiley, 3rd Edition. (ISBN: 978-0470509500).

Robert N. Barger, (2008). Computer Ethics: A Cased-based Approach. Cambridge University Press.(ISBN: 978-0521709149)

Additional : Micheal J. Quinn,(2012), Ethics for the Information Age. Addison Wesley,5th Edition. (ISBN: 978-0132133876)

Kenneth Einar Himma, Herman T. Tavani. (2008) The Handbook of Information and Computer Ethics, Wiley. (ISBN: 978-0471-79959-7) Sara Baase, (2012). A Gift of Fire: Social, Legal and Ethical Issues for Computing.Prentice-Hall, 4th Edition. (ISBN: 978-0132492679)