You are on page 1of 3

FAKULTI SAINS KOMPUTER DAN TEKNOLOGI MAKLUMAT TEACHING PLAN

Course Title Course Code Credit Contact Hours Total Learning Hours Semester Prerequisite Instructor Objectives: At the end of this course, students are able to: 1. Correlate ethics with computing process in organization (Menghubungkait etika dengan proses pengkomputeran dalam organisasi ) 2. Exhibit ethics in computing implementation (Mempamerkan etika di dalam pelaksanaan pengkomputeran) 3. Choose the strategy implementation and enforcement of ethical rules in computing (Memilih stratergi pelaksanaan dan pengguatkuasaan peraturan etika dalam pengkomputeran ) 4. Practice ethical behavior and responsibility as computer professionals (Mengamalkan sikap beretika dan bertanggungjawab sebagai ahli profesional komputer ) Synopsis: This course discusses the topics on computerization in ethics and its relation to information technology. This includes issues such as copyright, piracy, intellectual properties, unauthorized usage of information technology and others. Emphasis will also be given to its importance to all level of computer users such as professional businessmen and end user (Kursus ini membincangkan tajuk-tajuk mengenai etika dalam pengkomputeran dan hubungannya dengan teknologi maklumat. Ini termasuklah isu-isu seperti hak cipta,cetak rompak, harta intelek, penggunaan teknologi komputer tanpa kebenaran dan lain-lain. Penekanan juga akan diberikan kepada kepentingannya terhadap semua lapisan pengguna komputer seperti para profesional, ahli perniagaan dan pengguna akhir itu sendiri ) : Ethics in Computerization (Etika dalam Pengkomputeran) : SIM4207 : 3 (3+0) : 1 x 2 hour of lecture & 1 x 1 hour of lecture per week : 122 : Semester 1 2013/2014 : SSK3101 : Dr. Pathiah Abdul Samat

Course Contents: Topic Chapter 1: Introduction First world Introduction to ethics Chapter 1:Philosophical Ethics An Introduction The approaches Chapter 2:Professional Ethics The profession and the professional Professional relationship to be manage Chapter 3: Privacy Public information Perspective on privacy Definition of ethics Ethics and Morality Week 1(lecture)

2(lecture), 3(pre, debate, diss & lecture) Making ethical decision and professional code of ethics (IEEE,ACM) Privacy and personal information Privacy protection and law More privacy risk Free software Choice for software developer Ethics of copying solution Embesslement Sabotage Information theft 4(lecture), 5(pre, debate, diss & lecture)

6(test 1 & lecture)

Chapter 4: Intellectual property right Protection the IP Copyright law The technology threat Chapter 5:Computer and Internet Crime Hacking Online scams Fraud Chapter 6:Computer security and risk analysis Security in cyberspace Defining computer security Security counter measures

7 (movie & lecture) , 8(lecture), 9(pre, debate, diss & lecture)

10(role play), 11(lecture)

Acceptance usage policy Computer crime act (Malaysia)

12(lecture & case study) 13(pre, debate, diss & lecture), 14(lecture)

Course materials: Putra LMS (www.lms.upm.edu.my) Teaching methods: lecture/group presentation/debate/group discussion Assessments: 1. Test 1 2. Test 2 (Role play) 3. Assignments 4. Final examination Reference Books:

:20% :20% :20% (movie-5%, group presentation/debate/discussion-5%, case study-10%) :40%

1. Baase, S. (2003). A Gift Of Fire: Social, Legal, And Ethical Issues For Computer And The Internet. 2nd Ed. New Jersey: Prentice-Hall 2. Quinn, M. J. (2005), Ethics For Information Age. Oregon State University: Pearson Addison Wesley. 3. Reynolds, G. (2007). Ethics Information Technology. 2nd Ed. New York: Thomas Course Technology 4. Tavani, H. T. (2011). Ethics and Technology, 3rd Ed: Controversies, Questions, and Strategies for Ethical Computing. London: John Wiley and Sons, Inc.

You might also like