Upload
joella-lambert
View
218
Download
0
Embed Size (px)
Citation preview
Revision
The Paper
Watch out for …
• Identify and explain• Explain with examples• Compare and contrast• Discuss and justify• Marks – figure out the marks distribution
before you start answering– E.g. identify the four types and explain each one’s
benefits [10 marks]
Watch out for …
What to revise?• Read all the slides, pay attention to the learning outcomes
listed (objectives) in all chapters, ask yourself if you are able to demonstrate the knowledge identified in the learning outcomes
• Revise all the questions discussed in tutorials, if the questions ask for examples, work on providing relevant examples and always try to match with the main objectives of BI in business
• Use table to provide comparison, ensure the points discussed relate to the ones compared to
• Help me to help you – look after the format & handwriting and structure and label your answers accordingly
How much writing is enough?• Look at the marks allocated.• Try to work out the math for the points required in your
answer. Example : There are 4 types of software piracy. Identify and explain each type.
[4 marks]Answer:Four types of software piracy:
Softlifting (an act of ___________)Hard disk loading (an act of ___________)Type 3 (an act of ___________)Type 4 (an act of ___________)
(Award 1 mark each for the correct identification and explanation)
Compare and contrast
• Always use a table• Identify the basis for each comparison• Try to make a contrasting point for each items
to be compared.Elephants Cats
Weight 1000kg 4kg
Habitat Jungle Home
Length 5 meter 0.8 meter
?? ?? ??
Segmenting your answer• If ask to identify a few list of items, segment your answer, don’t
combine discussion on all of the items in one paragraph.
E.g. Identifying project activities• Planning: Setting goals and objectives etc……• Data Gathering : Establishing data/information/requirement ……• Design : Based on data gathered ….• Develop: Develop the system …….
rather than
The first process is ----------------------------------------------------------------------------------……………………………………………………………………………………………………………………………………… The second process is ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------The third process is ----------------------------------------------------------------------------------------------------------------
Answer to the question
• Identify what are the questions that need to be answered.
E.g.• Describe teleworking in detail and explain why it has become popular in
organization today. Include in your answer a discussion on how does teleworking differ from the traditional work arrangement.
• Describe teleworking in detail and explain why it has become popular in organization today. Include in your answer a discussion on how does teleworking differ from the traditional work arrangement
Learning Outcomes
At the end of this course, the student should be able to:• Use and appreciates the ethical theories as tools to
analyse moral problems• Discuss issues related to the introduction of
Information Technology into society• Explain the ethical implication of Information
Technology and Internet to intellectual property, privacy, lifestyle, work, wealth, and health.
• Be aware of the vulnerability of networked computers• Be acquainted with selected professional codes of
conducts
Learning Outcomes
– Describe and compare the frameworks/ethical principles that can be used for moral decisions
Learning Outcomes
– Identify issues that come with networking especially the use of world wide web.
Learning Outcomes
– Identify intellectual properties issues that come with the use of Information Technology
Learning Outcomes– Describe ways privacy can be compromised through
the usage of technology
Learning Outcomes– Identify and describe the need for professional code
of ethics
Learning Outcomes– Describe whistleblowing from the stance of
organization and moral
Learning Outcomes– Discuss how Information Technology and
automation affect workplace
Learning Outcomes– Discuss the changes in workplace and the impact to
the society
Learning Outcomes– Apply the ethical principles on the issues to establish
morality of the action
Key Terms• Society• Ethics• Etiquette• Subjective Relativism• Cultural Relativism• Divine Command Theory• Kantianism• Act Utilitarianism• Rule Utilitarianism• Social Contract Theory
Key Terms
• Email SPAM• Pornography• Web Filters• Identity theft• Online Predators• Internet Addiction
Key Terms– Intellectual Property• Copyrights• Patents• Trademarks• Trade secrets• Software Piracy – Softlifting, Uploading &
Downloading, Software Counterfeiting, OEM, Hard disk loading, Renting
• Licensing – Freeware, Free Software, Shareware, Nagware, Crippleware etc
Key Terms• Privacy• Public Record• Public Information• Personal Information• Types of information disclosure – statutory, involuntary,
voluntary• Data mining• Ownership of transaction info – opt-in, opt-out• Dumpster diving, shoulder surfing (low tech info theft)• Encryption
Chapter 7 Key Terms
• Professional society• whistle blowing
Chapter 8 Key Terms
• Temporary Work• Telework• Workplace monitoring• Video surveillance• Digital Divide
Good Luck