You are on page 1of 5

Form No.

811c

College Course Syllabus


SUBJECT (3 Units): COURSE TITLE: I. ITC 56 IT Professional Ethics

Course Description & Objectives This course prepares the students to be responsible IT professionals who understand the value of ethics and morals as they enter the industry. The growth of computer usage and networks have increased the responsibilities of IT professionals in issues such as privacy, hacking, copyright, malware and intellectual property. After taking this course, the students will be better in analyzing situations involving ethical conflicts. . At the end of this course, the student is expected to: a. Determine information needs by considering topics from various perspectives; b. Develop strategies in locating and retrieving information thru traditional and electronic means following ethical standards; c. Acquire, analyze, and organize information using appropriate methodology in line with the scope of inquiry; d. Synthesize information in constructing meaning and integrating prior and new knowledge; and e. Use information in solving problems, presenting arguments and making rational decisions. II. Course Classification Required for a Degree in BSIT Required for a Major in ________ Elective Pre-Requisite: CSC 15 REFERENCES Reynolds pp 2-18

III.

Course Outline TIME TOPICS ALLOTMENT PRELIM I. Overview of Ethics WEEK 1- 2 1. What Is Ethics? 1.1 Definition of Ethics 1.2 The Importance of Integrity 2. Ethics in the Business World 2.1 Why Fostering Good Business Ethics Is Important 2.2 Improving Corporate Ethics

Page 1 of 5

Form No. 811c

2.3 2.4 2.5 WEEK 3 - 4

When Good Ethics Result in Short-term Losses Creating an Ethical Work Environment Ethical Decision Making

Reynolds pp 26-42

II. Ethics for IT Professionals and IT Users 3. IT Professionals 3.1 Definition of an IT Professional 3.2 Professional Relationships That Must Be Managed 4. The Ethical Behavior of IT Professionals 4.1 Professional Codes of Ethics 4.2 Professional Organizations 4.3 Certification 5. IT Users 5.1 IT users and Common Ethical Issues 5.2 Supporting the Ethical Practices of IT Users Reynolds pp 52-71

WEEK 5 - 6

III. Computer and Internet Crime 6. Security Incidents: A Worsening Problem 6.1 Types of Attacks 6.2 Perpetrator Types 7. Reducing Vulnerabilities 7.1. Risk Assessment 7.2. Establishing a Security Policy 7.3. Educating Employees, Contractors, and Part-Time Workers 7.4. Prevention 7.5. Detection 7.6. Response

Reynolds pp 82-102

MIDTERM WEEK 7 - 9

IV. Privacy 8. Reducing Vulnerabilities The Right of Privacy Recent History of Privacy Protection 9. a. Data Encryption 10. Key Privacy and
Page 2 of 5

Key Privacy and Anonymity Issues

Form No. 811c

WEEK 10 - 12 V. 8.

Anonymity Issues a. Consumer Profiling b. Treating Consumer Data Responsibility Workplace Monitoring Spamming Carnivore Advanced Surveillance Technology Freedom of Expression First Amendments Rights Obscene Speech a. Defamation Freedom of Expression: Key Issues a. Controlling Access to Information on the Internet b. Anonymity c. National Security Letters d. Defamation and Hate Speech e. Pornography

Reynolds pp 112-124

12.

Reynolds pp 132-151

FINAL TERM WEEK 13 - 14

VI. Intellectual Property 13. What is Intellectual Property a. Copyrights b. Patents c. Trade Secret Laws Key Intellectual Property Issues a. Plagiarism b. Reverse Engineering c. Open Source Code d. Competitive Intelligence e. Cybersquatting

Reynolds pp 162-177

14.

WEEK 15 - 16

VII.Software Devlopment 15. Strategies to Engineer Quality Software a. The Importance of Software Quality b. Software Development Process c. Capability Maturity Model Integration for Software Key Issues in Software Development a. Development of Safety-Critical Systems b. Quality Management Standards
Page 3 of 5

Reynolds pp 188-202

16.

Form No. 811c

WEEK 17 - 18 VIII. Employer/Employee Issues 17. Use of Nontraditional Workers a. Contingent Workers b. H-1B Workers c. Offshore Outsourcing Whistle-Blowing a. Protection for Whistle-Blowers b. Dealing with a Whistle-Blowing Situation

18.

IV.

Class Activities 1. Classroom Discussion 2. Seatwork 3. Group and Individual Cases Course Examinations and Grading Examination (Prelim, Midterm, Finals) Class Standing Quizzes Cases Recitation/Seatwork Assignment (25%) (20%) (10%) (5%) ____ 100% 40% 60%

V.

VI.

Textbook Adopted Reynolds, George Ethics in Information Technology Thomson Course Technology, 2006 (96068) Date Adopted: June 2011 References 1. Reynolds, George, Ethics in Information Technology, c2009 (103325 ) 2. Harrison, Rob, The Ethical Consumer, SAGE c2005 93210 3. Harris, Shon, Grayhat Hacking: The Ethical Hackers Handbook, McGraw Hill/Osborne c2005 (91400) 4. Quinn, Michael, Ethics for the Information Age, Addison-Wesley, c2010 (106844) 5. Sinn, Richard Software Security Technologies, Thomson c2008 (101055)

VII.

Page 4 of 5

Form No. 811c

VIII. Grading System First Prelim Grade (FPG) Class Standing First Prelim Exam Second Prelim Grade (SPG) Class Standing Second Prelim Exam Final Term Grade (FTG) Class Standing Second Prelim Exam Final Grade (FG) 60% 40% 100% 60% 40% 25% 60% 40% 25% 25%

Class Standing Includes: Quizzes Assignments Written Reports Laboratory Exercises


Prepared by: Noted by: Date: Arlene Mae C. Valderama Department Chair, Computer Science/IT Milani M. Austria Dean, Technological Studies June 6, 2011

Page 5 of 5