Download presentation
Presentation is loading. Please wait.
Published byOliver Logan Modified over 9 years ago
1
CISB 412 Social and Professional Issues Introduction
2
Your lecturer Rohaini Ramli BW4-C16 03-89212343 rohaini@uniten.edu.my Consultation by appointment
3
Expectation Final year = Young adult = Not a kid – Be responsible – Do not be late (we only meet once a week) – Take pride in what you do – Do not cut corners, if you decide to do so, do not make it obvious to me ! – Listen closely, attempt all activities
4
So, what is it all about? This course introduces students to ethics and professional issues pertaining to Information Technology. It prepares students (who will be the future professionals in a complex technological society) to deal with issues related to computers through introduction to issues ranging from ethical, social, legal, and economical relevant to being a responsible computer user (professional or personal). It also exposes students to the use of ethical/value analysis as a practical tool in defining and solving day-to-day ethical conflicts they might confront as computing and IT professionals.
5
Learning Outcomes At the end of this course, the student should be able to: Use and appreciates the ethical theories as tools to analyse moral problems Discuss issues related to the introduction of Information Technology into society Explain the legal and ethical implication of Information Technology and Internet to intellectual property, privacy, lifestyle, work, wealth, and health. Be aware of the vulnerability of networked computers Be acquainted with selected professional codes of conducts
6
Teaching-learning strategy Lecture Discussion / Case study Unsupervised learning Presentation
7
Text Main Michael J. Quinn “Ethics for the Information Age”, 3 rd edition. Pearson 2009 Additional: George Reynolds “Ethics in Information Technology” 3 rd edition Barnes and Noble, 2007
8
Assessment Methods and Types Final Exam 50% Mid-Term Test/ Quizzes 20% Assignment/Presentation 30% – To be submitted through a blog 1.Introduction to team members 2.Assignment Part 1 - Monday week 5, by 5 PM 3.Assignment Part 2 - Monday week 10, by 5 PM 4.Additional task as we go (to be advised)
9
Assignment Briefing
10
Objectives At the completion of this assignment, the students are expected to be able to: – Critically discuss issues related to the introduction of Information Technology into society – Describe and explain the legal and ethical implication of Information Technology and Internet to Intellectual property, privacy, lifestyle, work, wealth, and health. – Be acquainted with selected professional codes of conducts
11
Distribution & Weight & Assignment Type This is a group assignment. You are to work in a group of at least five (5) and at most six (6) members.
12
Distribution & Weight & Assignment Type 3 parts (entries) – Intro to group members (5 marks) – Part 1 : Academic paper & presentation (20 marks) – Part 2 : The ACM sketch (20 marks) – Part 3 : ongoing tutorial tasks (15 marks) Total of 60 marks - contributing to 30% of overall marks
13
Submission Style Students are to complete and submit their work in a form of a blog entry. Each team is required to open a new blog account with blogspot. You are to upload your work through your blog on the stipulated dates/time Your very first entry should be an intro to your team member (pic of team members will be helpful and compulsory, thank you!) Give me the full names as per your student registration (you may keep your nick name to your FB, thanks )
14
Part 1 : The Task You are to conduct a mini research to discuss the importance of Ethics among the IT professionals. The outcome of this research should be presented in a form of an academic paper, of not less than 1200 words (not inclusive of the list of references) in length. You are also to select a presenter from your team to deliver a presentation on this paper. The presentation is to be recorded and uploaded in a video format as part of your blog entry. To be completed by 5 PM Monday, week 5. Activate time/date stamp for your blog entry.
15
Part 1 : The Marking Scheme Part 1Marks (20) Research & Referencing - Use of research to support viewpoints discussed in the paper. References must come from credible sources (no Wikipedia please!). 10 Overall understanding of the importance of ethics among IT professionals. 5 A demonstration of good presentation skills and a good team work, in completing this task. 5
16
Part 2 : The ACM sketch The Association for Computing Machinery (ACM) stated that a member should adhere to the following code of conducts : 1. Contribute to society and human well-being. 2.Avoid harm to others. 3.Be honest and trustworthy. 4. Be fair and take action not to discriminate. 5. Honor property rights including copyrights and patent. 6. Give proper credit for intellectual property. 7. Respect the privacy of others. 8. Honor confidentiality.
17
Part 2 : The task Your team is to produce a sketch/play to demonstrate two (2) ACM’s code of conducts of your choice.
18
Part 2 : The task Similar to Part 1, you are to produce your work as a blog entry with a video insert. It is up to your team’s creativity to plan and produce the work. The rule is that every team member must appear in the video. Failing to do so without a formal notification and supporting document will result in a deduction of marks. The update of the blog is to be completed by 5 PM Monday, week 10. Activate time/date stamp for your blog entry.
19
Part 2 : The Marking Scheme Part 2Marks (20) Demonstration of overall understanding of code of ethics of choice and relevant and justifiable sketch to demonstrate the scenario 10 A demonstration of good level of professionalism, product quality, creativity and a good team work, in completing this task. 10
20
Part 3 : Ongoing Tasks To be advised
21
Academic Writing Citations and References
22
Plagiarism and Referencing What is plagiarism? – the use of the ideas and/or words of others without due acknowledgement. – copying material from the Internet, library books and the work of others without the use of quotation marks and/or acknowledgement of the source. – summarising or paraphrasing another person's work by simply changing a few words without acknowledgement – an assessment offence, and carries major penalties
23
Differences between References & Citations Citations According to Thomas and Watzman (2005), teenagers seem the most vulnerable to potential negative effects as they use the Internet for more hours than do adults. Reference Thomas, T.S & Watzman, A (2005) Computers and kids: Pulling the plug can protect the planet, Phi Delta Volume 84 Number 8. Retrieved May 10, 2003 from http://buddy.lib.unimelb.edu.au/cgi-bin
24
Avoiding Plagiarism – some samples of citations Technology, though useful is never problem free. According to Teicher (1999), “no technology is fail-safe”. In addition, Emmans (2000) has pointed out that students must be made aware of the cyber responsibilities as the solutions designed to address the problems can only do so much as “no software and no policy can be foolproof”. Reference List at the end of the document Emmans, C. (2000). Internet Ethics. Technos: Quarterly for Education and Technology. Volume 9, Number 1. Retrieved May 10, 2003 from http://buddy.lib.unimelb.edu.au/cgi-bin/buddy/erc Teicher, J (1999) An Action Plan For Smart Internet Use. Educational Leadership. Volume 56 Number 5. Retrieved May 7, 2003 from http://buddy.lib.unimelb.edu.au/cgi-bin/buddy/erc This is your statement The green texts are your citations – to support your statement
25
Paraphrasing – Change text into your own words – Must also include citation e.g. …as stated by Kotler, 2000 According to Hoyer and MacInnis (2001), satisfied customers form the foundation of any successful business. They said that customer satisfaction is critical and it leads to repeat purchase, brand loyalty, and positive word of mouth. Reference List at the end of the document Hoyer, W. D. & MacInnis, D. J., 2001, Consumer Behaviour. 2nd ed., Boston, Houghton Mifflin Company. Avoiding Plagiarism - paraphrasing
26
Avoiding Plagiarism – copying word for word Copying word for word from a source – Only copy a small amount “Today’s companies are finding it increasingly unrewarding to practice mass marketing or product-variety marketing. Mass markets are becoming ‘demassified’. They are dissolving into hundreds of micromarkets characterised by different buyers pursuing different products in different distribution channels and attending to different communication channels ” (Kotler, 2000) Reference List at the end of the document Kotler, P., 2000, Marketing Management. 10th ed., New Jersey, Prentice- Hall.
27
The majority of literatures viewed for this research agree that the Internet in particular is reputed to be one of the reasons for social and ethical problems among school’s students. (Affonso, 1999; Davies, 2001; Piercey, 2000). On the other hand, Rahman (2002), brings up a valid point by stating that the blame for teenagers social and ethical misconducts should not be put on the technology alone, other factors like the family background and the children's upbringing should also be considered. Avoiding Plagiarism & Demonstrating Critical Thinking
28
Reference List at the end of the document Affonso, B (1999). Is the Internet Affecting the Social Skills of Our Children? Retrieved May 7, 2003 from http://www.sierrasource.com/cep612/internet.html Davis, R. (1999). Is internet addiction real? Victoria Point Multimedia. Retrieved May 7, 2003 from http://www.victoriapoint.com/ Piercey, D. (2000) Students' psychological well-being and the Internet.WWWise Retrieved May 7, 2003 http://dtp.epsb.net/projects/wwwise2.htm Rahman, A. S. (2002) Blaming the Internet Unjustly.Computimes Malaysia, Jan 28, 2002. Retrieved May 7, 2003 from http://buddy.lib.unimelb.edu.au/cgi- bin/buddy/erc
29
Final words Keep a softcopy of your work – to be submitted at the end of the semester for record keeping Where to find samples of academic writing? Blog naming convention – SubjectCodeMay2012SectionNumberGroupNumber – E.g. CISB412May2012section2group11.blogspot.com
30
Questions?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.