SOW ITS610

Topics: Ethics, 1978, 1972 Pages: 6 (856 words) Published: October 17, 2014

Universiti Teknologi Mara
COURSE INFORMATION

Code

:
ITS610
Course

:
Social, Ethical and Professional Issues
Level

:
Bachelor Degree
Credit Unit

:
3
Contact Hour

:
4
Part

:
6
Course Status

:
Core
Pre-requisite

:
None
Objectives

:
At the end of the course, students should be able to:

Explain the concept of ethics, morals, values and attitude from the western and Islamic perspective as the foundation practice in the era of the information age. Describe the benefits offered by computing technology in many different areas and the risks and problems associated to these technologies Interpret the theories of ethics to case situations in the context of organizational use of IT. Demonstrate the moral, social, ethical and legal issues relevant to IT innovations, with some exposure on the Islamic perspective particularly with respect to the internet, changing work practices, social relationships, political representation and skill requirements.

Course Description

:
This subject will cover the social issues related to society, issues on history, development and economics of IT will be covered. The issues that will be discussed include the effects of the IT application on the society, the changing nature of work, the ethical issues and computer crime. The issues covered are relevant to being a responsible computer user, professional or personal. The course also expresses the Islamic perspective to the students as effort to elevate the value amongst the students.

SYLLABUS CONTENTS

Week
Topics and Sub-topics
Remarks
1
(8 – 12 Sept)

2
(15 – 19 Sept)
16/9/2014 – Malaysia Day

3
(22 – 26 Sept)

1. Introduction
1.1 The Computer Revolution
1.2 The Digital Generation
1.3 Historical Overview of Computer Ethics
1.4 Basic Concepts of Computer Ethics
Handout:
Computer Ethics
Entrance Survey

Class Activity 1

4
(29 Sept – 3 Oct)

2. Islamic Perspective
2.1 Moral Theories
2.2 Akhlaq Theories
2.3 Social System Belief

1,2

Class Activity 2

5
(6 – 10 Oct)

3. Social Issues in IT
3.1 Privacy and Personal Information
3.2 Impact of Computer Technology
3.3 Privacy Risks, Protecting Privacy, Communications Privacy 3.4 Risk of New Technology
3.5 Computer Errors & Failure
3,4

Class Activity 3

6
(13– 17 Oct)
4. Computer and Community
4.1 Freedom of Speech in Cyberspace
4.2 Changing Communications Paradigms
4.3 Censorship in Cyberspace
4.4 Computers and Community
4.5 The Digital Divide

5,6

Class Activity 4

7
(20 – 24 Oct)
22/10/2014 - Deepavali

Case Study 1 – Freedom of Speech
Submission of term paper

Case Study 1 : discussion

Week
Topics and Sub-topics
Remarks
8
(27 Oct – 31 Oct)

5. Computers & Work
5.1 The Changing Nature of Work
5.2 The Impact on Employment
5.3 The Work Environment & Employee Monitoring
5.4 Analytical Tools in Monitoring

7,8
Week 7:
20/10/14
&
23/10/14

21/10/14
&
22/10/14

Class Activity 5

9
(3 – 7 Nov)

6. Computer Crime
6.1 Hacking
6.2 Fraud and Identity Theft
6.3 Scam and Digital Forgery
6.4 Search and Seizure of Computer
6.5 Analytical Tools in Cyber Crime
6.6 Emergence Cyber Law in Malaysia

9,10
Week 8:

27/10/14
&
30/10/14

28/10/14
&
29/10/14

The Hindu Advisory Board (HAB) has confirmed that Deepavali will fall on 22 October 2014 (Wednesday) instead of 23 October 2014 (Thursday). Hence, 22 October 2014 (Wednesday) will be gazette as a public holiday. 

Class Activity 6

10
(10– 14 Nov)

7. IT Ownership
7.1 Intellectual Property and Changing Technology
7.2 Intellectual Property Laws
7.3 Search Engine and Online Libraries
7.4 Fair-Use Doctrine
7.5 International Piracy
7.6 Analytical Tools in Plagiarism

11,12
Week 9:

3/11/14
&
6/11/14

10/11/14
&
13/11/14

Class Activity 7

11
(17 – 21 Nov)

Case Study 2 – IT...


References: 1. Reynolds, G. W. (2012). Ethics in Information Technology. 4th Edition. Course Technology.
2. Musa, H. (2001). Falsafah, Logic Teori, Nilai dan Etika Melayu: Suatu Pengenalan. Akedemi pengajian Melayu. Universiti Malaya.
3. Al-Attas, S. M. N., (2007) Tinjauan Ringkas Peri Ilmu dan Pandangan Alam. Universiti Sains Malaya. Sahib Graphic.
4. Saad, A.R. (2005) Personal Data and Privacy Protection. Lexis Nexis (Malayisan Law Journal)
5. Quinn, M. J. (2012). Ethics for the Information Age. 5 th Edition. Pearson Education, Inc
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • The Sow Essay
  • Reap What You Sow Essay
  • SOW MARSOC CCE ISR Essay
  • Reproductive Phisiology and Anatomy of the Sow Essay
  • Pt2520 Sow Essay
  • Sow Bugs and Their Preference of Hickory Leaves Research Paper
  • As You Show Sow U Ripe Essay
  • Reaping What We Sow! Essay

Become a StudyMode Member

Sign Up - It's Free