meljun cortes cs4121 it professional_ethics_values_updated_hours
TRANSCRIPT
Page | 1
Republic of the Philippines
TAGUIG CITY UNIVERSITY Gen., Santos Ave., Central Bicutan Taguig City Philippines
COLLEGE OF EGINEERING TECHNOLOGY AND COMPUTER SCIENCE BACHELOR OF SCIENCE COMPUTER SCIENCE
COURSE SYLLABUS IN I.T PROFESSIONAL ETHICS AND VALUES
I. COURSE CODE : CS 4121
II. COURSE TITLE : I.T Professional Ethics and Values
Prerequisite : none Credit units : 3 Total hours : 54 hours
III. COURSE DESCRIPTION
IT Professional Ethics and Values fills a void of practical business information for business and I.T. professional and provides a little
practical advice and the people primarily responsible for addressing ethical issues in workplace. The course introduces ethics and ethical
theories; provides discussions on the ethical dilemmas and issues facing IT practitioners. An appreciation and discussion of the Code of
Ethics of I. T. Professionals; cybercrimes and appropriate Philippine Laws are also included.
MELJUN CORTES, MBA,MPA,MSCS
Page | 2
. IV. GENERAL OBJECTIVES
At the end of the semester students should be able to:
Cognitive
1. Know the concepts of the Information ethics 2. Know how todifferentiate the ethical dilemma/issues in the cyber world. 3. Demonstrate and understand and appreciate the meaning of ethics, values and attitudes
Affective
1. Appreciate and internalize the code of conduct of an I. T. Professional 2. Cooperate for individual and group exercises 3. Contribute ideas in doing activities 4. Accept equal distribution of tasks seatwork’s in solving a certain problem.
Psycho – motor
1. Use MS PowerPoint in reporting/demonstrating subject matter. 2. Use internet or any advance technological tools which the teacher prefers to do a certain case study
Page | 3
V. COURSE CONTENT/COVERAGE
TIME FRAME CONTENT
SPECIFIC OBJECTIVES/COMPETENCIES Within the given period the students are
expected to
STRATEGIES/ METHODOLOGY/
ACTIVITIES
INSTRUCTIONAL MATERIALS/ TOOLS &
EQUIPMENT
LERARNING OUTCOMES (Skills Developed/Value
Focus) EVALUATION/ ASSESSMENT
Week 1
3
Hours/Sessi
on
Class Orientation:
- (Familiarization &
Internalization of
Vision, Mission,
Philosophy & Goals of
TCU)
- Discuss the Grading
Systems
To orient the student
policy regulation of
the school.
To familiarize the
different components
for the basis of the
grades.
- Orientation
Chalk
-Chalkboard
-Computers/Audio
Visual Aid
1. self-
determination
2. Decision making
3. Analysis
4. awareness
1. oral- recitation
2. exercises &Activities
Page | 4
TIME FRAME CONTENT
SPECIFIC OBJECTIVES/COMPETENCIES Within the given period the students are expected to
STRATEGIES/ METHODOLOGY/ ACTIVITIES
INSTRUCTIONAL MATERIALS/
TOOLS & EQUIPMENT
LERARNING OUTCOMES (Skills Developed/Value Focus)
EVALUATION/ ASSESSMENT
Week 2 & 3
1 Hour
Lecture & 2
Hours Lab
Module 1: An
Overview of Ethics
Definition of
Ethics
The Importance
of Integrity
Ethics in the
Business World
Why
Fostering
Good
Business
Ethics is
Important
Improving
Corporate
Ethics
When Good
To define ethics.
To identify the
importance of integrity.
To identify the difference
of the ethics in the
business world.
Class Discussion
-Consultation
-Peer tutoring
-Advance
assignment/Take-
home study
Chalk
-Chalkboard
-Computers/Audio
Visual Aid
-Slide Presentation
-Text Materials
1. self-
determination
2. Decision making
3. Analysis
4. awareness
1. quizzes
2. oral-recitation
3. exercises
4. Group activities
Page | 5
Ethics
Result in
Short Term
Losses
Creating an
Ethical
Work
Environme
nt
Ethical
Decision-
making
Week 4 & 5
1 Hour
Lecture & 2
Hours Lab.
Module 2: Ethics for IT
Professionals and IT
Users
IT Professionals
Definition
of IT
Professiona
l
Professional
Relationshi
To define the IT
Professionals.
To identify the Ethical
Behavior of IT
Professionals
Class Discussion
-Consultation
-Peer tutoring
-Advance
assignment/Take-
home study
Chalk
-Chalkboard
-Computers/Audio
Visual Aid
-Slide Presentation
-Text Materials
1. self-
determination
2. Decision making
3. Analysis
4. awareness
1. quizzes
2. oral-recitation
3. exercises
4. Group activities
Page | 6
ps that
must be
Managed
The Ethical
Behavior of IT
Professionals
Professional
Code of
Ethics
Professional
Organizati
ons
Certification
IT Users
IT Users and
Common
Ethical
Issues
Supporting
the Ethical
Practices of
IT Users
Module 3: Computer
To identify the IT
Security Incidents.
Class Discussion Chalk 1. self-
determination
1. quizzes
2. oral-recitation
Page | 7
Week 6 & 7
1 Hour
Lecture & 2
Hours Lab.
and Internet Crime
IT Security
Incidents: A
Worsening
Problem
Types of
Attacks
Perpetrator
Types
Reducing
Vulnerabilities
Risk
Assessmen
t
Establish A
Security
Policy
Educate
Employees,
Contractor
s and Part-
Time
Workers
Prevention
To identify how to
reduce vulnerabilities.
-Consultation
-Peer tutoring
-Advance
assignment/Take-
home study
-Chalkboard
-Computers/Audio
Visual Aid
-Slide Presentation
-Text Materials
2. Decision making
3. Analysis
4. awareness
3. exercises
4. Group activities
Page | 8
Detection
Response
Week 8
MID-TERM
Page | 9
Week 9 & 10
1 Hour
Lecture & 2
Hours Lab
Module 4: Privacy
Privacy
Protection and
The Law
The Right of
Privacy
Recent
History of
Privacy
Protection
Key Privacy and
Anonymity
Issues
Data
Encryption
Key Privacy and
Anonymity
Issues
To define the privacy
To enumerate different
privacy protection and
the law.
To define the advance
surveillance
technology.
Class Discussion
-Consultation
-Peer tutoring
-Advance
assignment/Take-
home study
Chalk
-Chalkboard
-Computers/Audio
Visual Aid
-Slide Presentation
-Text Materials
1. self-
determination
2. Decision making
3. Analysis
4. Awareness
1. quizzes
2. oral-recitation
3. exercises
4. Group activities
Page | 10
Consumer
Profiling
Treating
Customer
Data
Responsibl
y
Workplace
Monitoring
Spamming
Carnivore
Advance Surveillance
Technology
Week 11 &
12
1 Hour
Lecture & 2
Hours Lab.
Module 5: Freedom of
Expression
First
Amendment
Rights
Obscene
Speech
Defamatio
n
Key Freedom of
To define the freedom of
expression.
To describe the first
amendment rights.
To enumerate the cause
of pornography.
Class Discussion
-Consultation
-Peer tutoring
-Advance
assignment/Take-
home study
Chalk
-Chalkboard
-Computers/Audio
Visual Aid
-Slide Presentation
-Text Materials
1. self-
determination
2. Decision making
3. Analysis
4. awareness
1. quizzes
2. oral-recitation
3. exercises
4. Group activities
Page | 11
Expression
Issues
Controlling
Access to
Informatio
n to the
Internet
Anonymity
Defamatio
n and Hate
Speech
Pornography
Week 13 &
14
1 Hour
Lecture & 2
Hours Lab.
Module 7: Intellectual
Property
What is
Intellectual
Property?
Copyrights
Patents
Trade
Secret
Laws
Key Intellectual
To define the intellectual
property.
To define the
cybersquatting
Class Discussion
-Consultation
-Peer tutoring
-Advance
assignment/Take-
home study
Chalk
-Chalkboard
-Computers/Audio
Visual Aid
-Slide Presentation
-Text Materials
1. self-
determination
2. Decision making
3. Analysis
4. awareness
1. quizzes
2. oral-recitation
3. exercises
4. Group activities
Page | 12
Property Issues
Reverse
Engineerin
g
Uniform
Computer
Informatio
n
Transaction
s Act
(UCITA)
Competitiv
e
Intelligence
Cybersquatting
Week 15 &
16
1 Hour
Lecture & 2
Hours Lab.
Module 8: Software
Development
Strategies to
Engineer
Quality
Software
The
Importance
To define the software
development.
To enumerate the
different strategies to
engineer quality
software.
Class Discussion
-Consultation
-Peer tutoring
-Advance
assignment/Take-
home study
Chalk
-Chalkboard
-Computers/Audio
Visual Aid
-Slide Presentation
-Text Materials
1. self-
determination
2. Decision making
3. Analysis
4. awareness
1. quizzes
2. oral-recitation
3. exercises
4. Group activities
Page | 13
of Software
Quality
Software
Developme
nt Process
Capability
Maturity
Model for
Software
Key Issues
Developme
nt of
Safety-
Critical
Systems
Quality Management
Standards
Page | 14
Week 17
1 Hour
Lecture & 2
Hours Lab
Module9:
Employer/Employee
Issues
Use of Non-
Traditional
Workers
Contingent
Workers
H-1B
Workers
Offshore
Outsourcin
g
Whistle Blowing
Protection
for Whistle
Blowers
Dealing
with a
Whistle
To identify the use of
non-traditional
workers.
To define the
whistleblowing.
-Class Discussion
-Consultation
-Peer tutoring
-Advance
assignment/Take-home
study
Chalk
-Chalkboard
-Computers/Audio
Visual Aid
-Slide Presentation
-Text Materials
1. self-
determination
2. Decision making
3. Analysis
4. awareness
1. quizzes 2. oral-recitation 3. exercises 4. Group activities
Page | 15
100%
Blowing
Situation
Week 18
FINAL-TERM
Total: 54
Hours
GRADING SYSTEM
LECTURE
Attendance------------------------------10%
Quizzes-----------------------------------15%
Assignment/Seatwork----------------10%
Activity------------------------------------15%
Project------------------------------------15%
Major Exam-----------------------------35%
100%
Final Grade Computation
Midterm - ----------------------------- -50%
Final ------------------------------- -50%
Page | 16
TEXTBOOKS AND REFERENCES
1. Principle of Ethics in Information Technology by George Reynolds / Philippine Edition .
2. Langford, D. (1995) Practical Computer Ethics, London: McGraw Hill.
3. Spinello, R.A. (1995) Ethical Aspects of Information Technology, Prentice Hall.
4. Tavani, H.T. (2001) The State of Computer Ethics as a Philosophical Field of Inquiry: Some
Contemporary Perspectives, Future
Projections, and Current Resources,
Ethics and Information Technology, 3, 2,
97-108.
Endorsed by:
Prepared & Noted by: GRACELYN T. CONDEZ CS, Coordinator/Instructor
Approved/Disapproved:
DR. OFELIA M. CARAGUE VP for Academic Affairs
Endorsed by: DR. VISITACION B. CRISOSTOMO Dean, CETCS
Page | 17