CISB 412 Social and Professional Issues Introduction.

Slides:



Advertisements
Similar presentations
Introduction to studying at University STUDY SUPPORT LANGUAGE AND LEARNING ADVISERS T1, 2015.
Advertisements

Advertising & Event Management (MGT-520). ADVERTISING AND EVENT MANAGEMENT M R. A BID S AEED (Assistant Professor) Department of Management Sciences COMSATS.
Academic Integrity at Griffith. 2 Definitions of Academic Integrity and Misconduct Perceptions and definitions vary between cultures and academic disciplines.
Conceptualising Cultural Environments Seminar 10: circuits of culture.
Computer Systems Week 3: Social Issues Alma Whitfield.
General information CSE 230 : Introduction to Software Engineering
DT211/1 - Assignment 1 Proposal to Equip Compu- Global-Hyper-Mega-Net.
CMPD 434 MULTIMEDIA AUTHORING
IACT303 – INTI 2005 World Wide Networking Welcome and Introduction to Subject. Penney McFarlane The University of Wollongong.
LE 4000 ENGLISH FOR ACADEMIC PURPOSES
CS 450: COMPUTER GRAPHICS COURSE AND SYLLABUS OVERVIEW SPRING 2015 DR. MICHAEL J. REALE.
PROGRAM LAUNCHING Business Plan Writing ELIB 203.
Strategic Information Systems Planning
Business Marketing Overview of Course Dr. Dawne Martin Calvin 201 B – 107 next week Office telephone: Office.
CS 150 PERSONAL PRODUCTIVITY USING TECHNOLOGY Instructor: Dr. Xenia Mountrouidou.
Week 4 Essays Reasoned arguments to support a thesis statement Assignment one: Five exercices - two mini essays Assignment two: Wordpress and first blog.
Ho Chui Chui ELC093 Academic Writing for Foundation Studies Briefing Credit unit: 3 Contact hours: 6 Pre-requisite: ELC080, ELC091.
Postgraduate Programmes MK364 MARKETING COMMUNICATIONS & INTERNATIONAL ADVERTISING Introduction to the module.
1 COMS 161 Introduction to Computing Title: Course Introduction Date: August 25, 2004 Lecture Number: 1.
CISB594 – Business Intelligence. What will we look at today Lecturer Learning Outcomes Course Structure Materials Reference Texts Assessments Expectations.
Library Research Practices in Education
The Bill of Rights: A PowerQuest for Grade Five By: Donna Cannon, Tricia Gallagher, Kathy Joyce, and Erin Mulhern Old Richmond Elementary School.
Object Oriented Programming (OOP) Design Lecture 1 : Course Overview Bong-Soo Sohn Associate Professor School of Computer Science and Engineering Chung-Ang.
Course Introduction Software Engineering
WXGE 6103 Digital Image Processing Semester 2, Session 2013/2014.
CISB594 – Business Intelligence
CISB594 – Business Intelligence Assignment Briefing.
MIS 300: Introduction to Management Information Systems Yong Choi School of Business Administration CSU, Bakersfield.
CMPF112 – Computing Skills for Engineers Assignment 1 Briefing.
CISB594 – Business Intelligence Introduction. What will we look at today Lecturer Learning Outcomes Course Structure Materials Reference Texts Assessments.
CISB 412 Social and Professional Issues Introduction.
PERCEPTION IS REALITY. Marketing 260 Buyer Behaviour with Duane Weaver Week 1 – Introduction.
CISB594 Business Intelligence Introduction. What will we look at today Lecturer Learning Outcomes Course Structure Materials Reference Texts Assessments.
CIS 3360: Security in Computing Cliff Zou Spring 2012.
CISB594 Business Intelligence Introduction. What will we look at today Lecturer Learning Outcomes Course Structure Materials Reference Texts Assessments.
Revision. The Paper Watch out for … Identify and explain Explain with examples Compare and contrast Discuss and justify Marks – figure out the marks.
CISB594 Business Intelligence Introduction. What will we look at today Lecturer Learning Outcomes Course Structure Materials Reference Texts Assessments.
CMPF112 – Computing Skills for Engineers Introduction.
CGMB324: MULTIMEDIA SYSTEM DESIGN
CISB113 Fundamentals of Information Systems Introduction.
Welcome to CITB223 Mngt. Info. System An Overview of the Course.
CISB 412 Social and Professional Issues Final Discussion.
Class will start at the top of the hour! Please turn the volume up on your computer speakers to access the audio feature of this seminar. WELCOME TO CE101.
First week. Catalog Description This course explores basic cultural, social, legal, and ethical issues inherent in the discipline of computing. Students.
Course Information CSE 2031 Fall Instructor U. T. Nguyen /new-yen/ Office: CSEB Office hours:  Tuesday,
PLAGIARISM Dr Cordelia Beattie School Academic Misconduct Officer.
CSC-305 Design and Analysis of AlgorithmsBS(CS) -6 Fall-2014CSC-305 Design and Analysis of AlgorithmsBS(CS) -6 Fall-2014 Design and Analysis of Algorithms.
Department name (edit in View > Header and Footer...) Academic Integrity and Academic Misconduct Presenter’s name Presenter’s title.
IST 210: ORGANIZATION OF DATA Introduction IST210 1.
Information Systems in Organizations 1.2 What’s in it for you? 1.3 Ethics of analysis and use of systems, data and information.
MIS 610: Seminar in Information Systems Management Yong Choi School of Business Administration CSU, Bakersfield.
Course Information CSE 2031 Fall Instructor U.T. Nguyen Office: CSE Home page:
LECTURER-TASNUVA CHAUDHURY (TCY) TERM PROJECT SPRING’16 MGT 321: Organizational Behavior.
Dr Jane Tonge Senior Examiner
Recruiting and Retaining People Lecture 1: Introduction to the Module Classroom L212.
Managing Corporate Reputation Sarah Williams Senior Examiner December 2013 / March 2014 Assignment Brief.
Banda Ramadan - Citing and Referencing 1 Communication Skills (603281) Citing and Referencing.
Recruiting and Retaining People Lecture 1: Introduction to the Module.
NEEDS ASSESSMENT HRM560 Sheikh Rahman
FRANCHISE INSTITUTION
Lecture 1. Course Introduction
APA Format Crediting sources
It’s called “wifi”! Source: Somewhere on the Internet!
Lecture 1. Course Introduction
Lecture 1. Course Introduction
What is Academic Integrity?
COMS 161 Introduction to Computing
COMP390/3/4/5 Final Year Project Introduction & Specification
UWB : EFFECTIVE COMMUNICATION
UWB 10202: EFFECTIVE COMMUNICATION
Presentation transcript:

CISB 412 Social and Professional Issues Introduction

Your lecturer Rohaini Ramli BW4-C Consultation by appointment

Expectation Final year = Young adult = Not a kid – Be responsible – Do not be late (we only meet once a week) – Take pride in what you do – Do not cut corners, if you decide to do so, do not make it obvious to me ! – Listen closely, attempt all activities

So, what is it all about? This course introduces students to ethics and professional issues pertaining to Information Technology. It prepares students (who will be the future professionals in a complex technological society) to deal with issues related to computers through introduction to issues ranging from ethical, social, legal, and economical relevant to being a responsible computer user (professional or personal). It also exposes students to the use of ethical/value analysis as a practical tool in defining and solving day-to-day ethical conflicts they might confront as computing and IT professionals.

Learning Outcomes At the end of this course, the student should be able to: Use and appreciates the ethical theories as tools to analyse moral problems Discuss issues related to the introduction of Information Technology into society Explain the legal and ethical implication of Information Technology and Internet to intellectual property, privacy, lifestyle, work, wealth, and health. Be aware of the vulnerability of networked computers Be acquainted with selected professional codes of conducts Be familiar with notable cases of computerised system failures

Teaching-learning strategy Lecture Discussion / Case study Presentation

Text Compulsory Michael J. Quinn “Ethics for the Information Age”, 3 rd edition. Pearson 2009 Additional: George Reynolds “Ethics in Information Technology” 3 rd edition Barnes and Noble, 2007

Assessment Methods and Types Final Exam 50% Mid-Term Test/ Quizzes 20% Assignment/Presentation 30%

Assignment Briefing

Objectives At the completion of this assignment, the students are expected to be able to: – Critically discuss issues related to the introduction of Information Technology into society – Describe and explain the legal and ethical implication of Information Technology and Internet to Intellectual property, privacy, lifestyle, work, wealth, and health. – Be acquainted with selected professional codes of conducts

Distribution & Weight & Assignment Type 2 parts – Part 1 : Academic paper & presentation – Part 2 : Case study & presentation Total of 60 marks (30 marks/section) Contributing to 30% of overall marks This is a group assignment. You are to work in a group of at least five (5) and at most six (6) members.

Submission Style Students are to complete and submit their work in a form of a blog entry. Each team is required to open a new blog account with any blog hosting of your choice. You are to upload your work through your blog on the stipulated dates/time For confidentiality and security reason, you may password protect your blog (of course I will need to be allowed access to your blog, so invite me to your blog) Your very first entry should be an intro to your team member (pic will be helpful, thank you!)

Part 1 : The Task You are to conduct a mini research to discuss the importance of Ethics among the IT professionals. The outcome of this research should be presented in a form of an academic paper, of not less than 1500 words (not inclusive of the list of references) in length. You are also to select a presenter from your team to deliver a presentation on this paper. The presentation is to be recorded and uploaded in a video format as part of your blog entry. The url of the blog is to be sent to your lecturer by 5 PM week 5. The final updates of the blog for assignment Part 1 should be finalized by then too.

Part 1 : The Marking Scheme Part 1Marks (30) Research & Referencing - Use of research to support viewpoints discussed in the paper. References must come from credible sources (no Wikipedia please!). Please also use the Harvard Referencing system. 10 Overall understanding of the importance of ethics among IT professionals. 10 A demonstration of good presentation skills and a good team work, in completing this task. 10

Part 2 : The case study Read & understand this case study

Part 2 : The task Answer the above questions

Part 2 : The task Similar to Part 1, you are to produce your work as a blog entry with a video insert. It is up to your team’s creativity to plan and produce the work. The rule is that every team member must appear in the video to answer at least one question. The update of the blog is to be completed by 5 PM week 8.

Part 2 : The Marking Scheme Part 2Marks (30) Demonstration of overall understanding of the importance of ethics among IT professionals and relevant and justifiable answers to the questions 20 A demonstration of good presentation skills, creativity and a good team work, in completing this task. 10

Academic Writing Citations and References

Plagiarism and Referencing What is plagiarism? – the use of the ideas and/or words of others without due acknowledgement. – copying material from the Internet, library books and the work of others without the use of quotation marks and/or acknowledgement of the source. – summarising or paraphrasing another person's work by simply changing a few words without acknowledgement – an assessment offence, and carries major penalties

Differences between References & Citations Citations According to Thomas and Watzman (2005), teenagers seem the most vulnerable to potential negative effects as they use the Internet for more hours than do adults. Reference Thomas, T.S & Watzman, A (2005) Computers and kids: Pulling the plug can protect the planet, Phi Delta Volume 84 Number 8. Retrieved May 10, 2003 from

Avoiding Plagiarism – some samples of citations Technology, though useful is never problem free. According to Teicher (1999), “no technology is fail-safe”. In addition, Emmans (2000) has pointed out that students must be made aware of the cyber responsibilities as the solutions designed to address the problems can only do so much as “no software and no policy can be foolproof”. Reference List at the end of the document Emmans, C. (2000). Internet Ethics. Technos: Quarterly for Education and Technology. Volume 9, Number 1. Retrieved May 10, 2003 from Teicher, J (1999) An Action Plan For Smart Internet Use. Educational Leadership. Volume 56 Number 5. Retrieved May 7, 2003 from This is your statement The green texts are your citations – to support your statement

Paraphrasing – Change text into your own words – Must also include citation e.g. …as stated by Kotler, 2000 According to Hoyer and MacInnis (2001), satisfied customers form the foundation of any successful business. They said that customer satisfaction is critical and it leads to repeat purchase, brand loyalty, and positive word of mouth. Reference List at the end of the document Hoyer, W. D. & MacInnis, D. J., 2001, Consumer Behaviour. 2nd ed., Boston, Houghton Mifflin Company. Avoiding Plagiarism - paraphrasing

Avoiding Plagiarism – copying word for word Copying word for word from a source – Only copy a small amount “Today’s companies are finding it increasingly unrewarding to practice mass marketing or product-variety marketing. Mass markets are becoming ‘demassified’. They are dissolving into hundreds of micromarkets characterised by different buyers pursuing different products in different distribution channels and attending to different communication channels ” (Kotler, 2000) Reference List at the end of the document Kotler, P., 2000, Marketing Management. 10th ed., New Jersey, Prentice- Hall.

The majority of literatures viewed for this research agree that the Internet in particular is reputed to be one of the reasons for social and ethical problems among school’s students. (Affonso, 1999; Davies, 2001; Piercey, 2000). On the other hand, Rahman (2002), brings up a valid point by stating that the blame for teenagers social and ethical misconducts should not be put on the technology alone, other factors like the family background and the children's upbringing should also be considered. Avoiding Plagiarism & Demonstrating Critical Thinking

Reference List at the end of the document Affonso, B (1999). Is the Internet Affecting the Social Skills of Our Children? Retrieved May 7, 2003 from Davis, R. (1999). Is internet addiction real? Victoria Point Multimedia. Retrieved May 7, 2003 from Piercey, D. (2000) Students' psychological well-being and the Internet.WWWise Retrieved May 7, Rahman, A. S. (2002) Blaming the Internet Unjustly.Computimes Malaysia, Jan 28, Retrieved May 7, 2003 from bin/buddy/erc

Final words Keep a softcopy of your work – to be submitted at the end of the semester for record keeping Where to find samples of academic writing? Blog naming convention – Subjectcode-section-groupnumber – E.g. CISB412section2group11.blogspot.com Standard Subject

Questions?