Professional Practices Course Outline PDF

Title Professional Practices Course Outline
Author fareeha rasheed
Course Professional Communication Skills
Institution University of the Punjab
Pages 5
File Size 210.9 KB
File Type PDF
Total Downloads 8
Total Views 135

Summary

lkhgfddrty knbvcdyuopyfff...


Description

The Institute of Management Sciences (PAK-AIMS)

Course Outline CSG– 482 Professional Practices FALL Semester October 2020 SCU Co-requisite (s) Pre-requisite(s) Weekly tuition pattern

3 Credit(s) None Introduction to computing (CS-1010) 2 sessions (90 min session)

Instructor

Fareeha Rasheed [email protected]

1- Course Description A Computing graduate as professional has some responsibilities with respect to the society. This course develops student understanding about historical, social, economic, ethical, and professional issues related to the discipline of Computing. It identifies key sources for information and opinion about professionalism and ethics. Students analyze, evaluate, and assess ethical and professional computing case studies.

2-

Objectives The course mainly aims to achieve the following objectives: 1. Defines that why students want to graduate in computing field and what are the common things in every organization? 2. Describe in detail the field of computing and its subfields. 3. Describes what a profession is and what makes a profession. 4. Define the structure and little history of the engineering. 5. Describes the professional ethics, definitions, types, and standards, and social responsibilities. 6. Introduces the professional code of ethics by IEEE-CS/ACM and its weaknesses. 7. Describe computer misuse act, intellectual property rights, and cyber law. 8. Describe the importance of information security and how we can secure it by using various methods. 9. Defines the need and brief introduction about the software contracts. 10. Defines the anatomy of software house organizations.

3-

Student Learning Outcomes By the completion of this course, the students should able to: 1. Know the scope of computing field after graduating in it and what are the common things in every organization. 2. Distinguish between the various fields of computing. 3. Describe the core of any profession.

4. 5. 6. 7. cyber 8. 9. 10.

Know that how business and professional environment of computing field work. Adhere his responsibilities according to profession, organization, and himself. Know that how broadly code of ethics will affect his actions during employment. Know the standards and rules about intellectual property, computer misuse, and law. Know the standards/tools/models/polices/principles to secure information. Write and analyze software contracts as an employer or an employee. Know the business and professional environment of software house.

4- Course Structure 1. 2. 3. 4. 5. 6.

5-

Presentation by lecturer Group discussion Assignments Presentations Quiz Mid Term and Final Term Exams

Course Duration This course will be held twice a week of 3 hours (each 90 min session) class duration.

6-

Course style The course will be delivered in a classroom environment.

7- Additional Course Requirement In addition to the objectives of this course, students are expected to gain skills, which would be needed in the professional work environment. These skills include but not limited to Writing, Presentation, Decision Making and Teamwork.

8-

Text and Other Resources 8.1

Text

Professional Issues in Software Engineering, M.F. Bott et al.

8.2

Other Resources

Information Security: Principles and Practices, Mark Merkow et al.

9-

Course Outline

The lecturers are supposed to complete the following topics/sub-topics before the mid/final term examination as prescribed in the course outline below: Week

1

2

Topics/Sub-Topics Introduction to Ethics, Philosophies regarding to ethics and morals, Introduction to Computer and Cyber Ethics, Computer Ethics History, Sample Case studies, Ten commandments, Sample topics to study in this subject

Types of Ethics, Relationship of different types of ethics, Essential Components of Personal Ethics, ACM code of Conduct, Netiquette, Business Ethics, Relationship between law and ethics, Deontology theory, Unitarianism theory, Right Model

Reading Material

Intro to Ethics.ppt

Types of Ethics.ppt

ASSIGNMENT- 1 3

Application of Deontology, Unitarianism theory, Right Model, Examples, Code of Conduct for Employees and Employers, Definition of Cyber Crime, General Types of Cyber Crime

4

Cyber Crime Statistics, Types of Cyber Crime Technically specified by Australian Institute of Criminology

Business.ppt

Cyber Ethics.ppt

QUIZ-1 5

6

Intellectual Property, Categories of IP, World Intellectual Property Organization, Trade Secrets, Protection for Software Copyright, Violation of Software Copyright Reverse Engineering, Open Source Software, Benefits of Open Source Software, Introduction to Software Contracts, Structure of Software Contracts

IP.ppt

Open Source.ppt

ASSIGNMENT- II 7

Introduction to Profession, History of Engineering Profession, Clauses of Software Contracts, Sample Software Agreement

8

Software House Structure , Common Roles in Software Organization QUIZ-II MID TERM EXAMS

Contracts.ppt

Profession.ppt

10

11

Management Hierarchy, IT Organization Structure, Staff Management, Five Golden rules of Staff management, Definition of Team, Team Management, Four C’s of Team Management, Elements of Healthy Teams, Way to Inspire and Motivate team, Ethical issues in team management, Characteristics of High Performance Teams Stages of Team development, Barriers to Team Building, characteristics of High Performance Teams, How to manage conflicts in team, What is SEEP? Software Engineering Profession, Roles in Software Engineering Professions, Need of Code of Ethics

Team Development.ppt

Team Management.ppt

ASSIGNMENT- III 12

Introduction to IEEE and ACM, Eight Principles Related to Software Engineering Code of Ethics and Profession Practice, Case Studies, Definition of Software Risks, Introduction to Risk management, RM Strategies, Types of Risks, Categories of Risks

Principles.ppt

13

Steps of Risk Management, Risk Mitigation, Monitoring and Management Plan, Risk Mitigation, Monitoring and Management Plan QUIZ-III

Risk Management.ppt

14

Introduction to Computer Privacy, Email Privacy, TCP/IP and Security, Introduction to Encryption, Virus, Worms and Trojan Horses, Working of Anti-Virus Programs, Un-authorize access, Introduction to Firewalls, Bio-metric devices and security, Software theft, System failures and data backup policies ASSIGNMENT- IV

Privacy Policy.ppt

15

Web browsers and data security, Privacy laws Content Filtering, Ergonomics, Green Computing, Potential Computer Risks and Security measures, Introduction to Security Policies, History of Information Security, Information Security policy life cycle, laws and regulations of Information Security, Standards of IS.

Web.ppt

16

Basic Information Security Principles, Information Security Architecture, Policy and Process, Access Control, Ethical Hacking, Types of Hackers, Model of Ethical Hacking, Process of Ethical Hacking, Ethical hacking Skills and knowledge QUIZ-IV 17

Group Presentations FINAL TERM EXAMS

Information Security.ppt

10-

Assessment Criteria No. 1. 2. 3. 4. 5. 6.

11-

Assessment Mid Exam Final Exam Assignments Quizzes Presentation Project/ Term Report Total

Percentage 30% 50% 10% 10% 5% 5% 100%

Submission and Collection of Assignment All assignments should be handed in at the beginning of the class sessions when they are due. All assignments may be handed back during scheduled classes. Online submission deadline must be followed accordingly....


Similar Free PDFs