You are on page 1of 48

What is a PROFESSION:

• “A paid occupation, especially one that involves


prolonged training and a formal qualification”
• Mastery of this material and associated skills which is
obtained through long standardized period of education,
training and apprenticeship.
• Provide service to those who do not have expertise.
• Besides these, a profession is also required to :
• Conduct research which improves the quality of their
services and report findings not only to their colleagues
but also to the public
• Maintain a caring relationship with the client or person /s
served based on altruism, trust and virtue.
• Based on the above criteria, determine weather
architecture can be called a profession.
Professional have formal education:
• A formal education is one where you would go to
a college or university for an actual degree.
• The formal education is what most employers would
prefer to see because it is easier to prove. Having
a degree in a specific field will mean that you have
certain knowledge that will translate into a better paying
job and the company that’s employing you getting a
qualified person for the job.
Informal education:
• An informal education is simply learning a trade from
someone else. It’s possible to have a formal education
and an informal education.
• An informal education is what many people end up
having. You work under someone who has a degree or
has been doing it for enough years to be knowledgeable
about the subject.
• Informal education can also be referred to as life
experience. After going through life for so many years,
you’ll naturally acquire some knowledge about different
things that you may not even learn after going through a
formal education.:
Fundamental characteristics of a profession:
• Great responsibility
• Professionals deal in matters of vital importance to
their clients and are therefore entrusted with grave
responsibilities and obligations.
• Given these essential obligations, professional work
typically involves circumstances where
carelessness, inadequate (nakafi) skill, or breach
(kilafwarze) of ethics would be significantly
damaging to the client and/or his fortunes (qesmat).
• Based on specialized, theoretical knowledge
• Professionals render specialized services based on
theory, knowledge, and skills that are characteristic
to their profession and generally beyond the
understanding or capability of those outside of the
profession.
• Sometimes, this specialization will extend to access to
the tools and technologies used in the profession (e.g.
medical equipment)
• . Institutional preparation
• Professions typically require a significant period of
hands-on, practical experience in the protected
company of senior members before candidates are
recognized as professionals.
• After this provisional period, ongoing education
toward professional development is compulsory.
• Ethical constraints
• Due to the other characteristics on this list, there is a
clear requirement for ethical constraints in the
professions.
• Professionals are bound to a code of conduct or
ethics specific to the distinct profession.
• Professionals also aim toward a general body of
core values, which are centered upon the client's
benefit and best interests.
• Merit-based
• In a profession, members achieve employment and
success based on merit rather than on corrupted
ideas such as social principle, mandated support, or
extortion.
• Therefore, a professional is one who must attract
clients and profits due to the merits of his work.
• In the absence of this characteristic, issues of
responsibility and ethical constraints become
irrelevant.
10 things that define a true professional:
• Put customer satisfaction first
• Make expertise your specialty
• Do more than expected
• Do what you say and say what you can do
• Communicate effectively
• Follow exceptional guiding principles
• Praise your peers not yourself
• Share your knowledge
• Say thank you
• Keep a smile on your face and the right attitude in your
heart
• Ethics:

• Ethics is the study of right and wrong in relation to


human actions. It includes
• Meta-ethics: study of general principles from which
ethical systems can be built.
• Moral theory: ethical systems, consisting of the
criteria to decide whether individual actions are
right and wrong.
• Practical ethics: application of ethical systems to
the analysis of particular situations.
What is Professional Ethics:
• One's conduct of behavior and practice when carrying
out professional work, e.g., consulting, researching,
teaching.
• The principles and standards that guide members of a
particular profession in their interactions with internal &
external stakeholders.
• „ Professional Ethics must take into accounts:
• Relations between professionals and clients
• Relation between profession and society
• Relations among professionals
• Relations between employee and employer
Why professional ethics?
• Awareness of professional ethics is gaining importance
with time.
• Decision making process in the work place is a complex
phenomena.
• The professional ethics provide a way of simplifying that
decision making process.
Ethical Issues in Computer Science:
• As software becomes pervasive in our daily lives, its
values from a purely human perspective are brought to
light.
• Ethical conduct is one such human value.
• By participating in a software development process,
computer scientists can influence the final product,
namely the software itself, in different ways including
those that may be contrary to public interest.
• In other words, they could engage in an unethical
behavior, intentionally or un-intentionally.
• This could lead to personal harm, and potentially result
in loss of confidence in software and loss of trust in
organizations that own them.
• This can adversely affect the acceptance of software as a
useful product, question the credibility of computer
science as a profession.
• Computer Science professionals must concern
themselves primarily with the health, safety and welfare
of those who are affected by their work.
Ten Commandments of Computer ethics:
• The Ten Commandments of Computer Ethics were
created in 1992 by the Computer Ethics Institute.
• 1 Not use a computer to harm other people. This is
the foundation for computer ethics.
• 2 Not interfere with other people’s computer work.
Such as sending numerous thoughtless e-mails to
larger issues like purposely sending computer
viruses.
• 3 Not snoop around in other people’s computer
files. Don’t go looking through other people’s
computer files unless given permission.
• 4 Not use a computer to steal.
• 5 Not use a computer to bear false witness. Don’t
spread rumors or change your email address so that
the receiver of an email believes that it came from
someone other than yourself.
• 6 Not copy or use proprietary software for which
you have not paid. Once you buy a software system,
music CD or DVD you should not make copies of
that information and distribute it to your friends.
• 7 Not use other people’s computer resources
without authorization or proper compensation. This
means do not surf the internet or print off large
amounts of paper for personal use during work
hours.
• 8 Not appropriate other people’s intellectual output.
Don’t upload information and take credit for it such
as music, images and text.
• 9 Think about the social consequences of the
program you are writing or the system you are
designing.
• 10 Use a computer in ways that ensure
consideration and respect for your fellow humans.
Just because you can’t always see someone face to
face doesn’t give you the right to offer any less
respect then you would offer in a personal
encounter.
• Historical, Social and economic context of computing:
• History of computing:
• The history of computing is longer than the history of
computing hardware and modern computing
technology and includes the history of methods intended
for pen and paper or for chalk and slate, with or without
the aid of tables.
• The earliest known tool for use in computation was
the abacus, and it was thought to have been invented
2400 BC. Its original style of usage was by lines drawn
in sand with pebbles.
• The first fully functioning electronic digital computer
was Colossus (1943)
• 'first generation' computers
• weighed 30 tons and contained 18,000 electronic valves
• Second generation Computing:
• Transistor was invented in 1947
• 'Second Generation' and computers made their debut the
late 1950s and early 1960s
• still bulky and strictly the domain of Universities and
governments
• 'Third and Fourth Generation' computing the great
leap forward
• Jack St. Claire Kilby's invention of the integrated circuit
or microchip in the 1950’s
• 1963 technology was integrated creating the first 3rd
generation computers
• Smaller more efficient were used by smaller businesses
• November 15th, 1971, Intel released the 4004, the
world's first commercial microprocessor and the RAM
chip
• Dawn of the fourth and latest generation of computing
Effects:
• Drive toward improvement and applicability
• The creation of operating systems in the 1980’s that
directly translated conceptual action into computer code
• Cheap affordable computing became possible to a much
larger audience
• Revolutionized the job market restructured the inner
operations of many businesses. Outdated a lot of
technology.
• The emergence of hacking and viruses as threats
• Social context of computing:
• Community:
• Beneficial Effects
• Study has shown that networked communications
increase both local and global community
involvement.
• But the involvement of local is less.
• Detrimental Effects
• Internet communities are not situated anywhere.
• Creates a certain level of unease and mistrust.
• Transition from group-based societies to network-
based societies.
• Internet communities contain a very weak level of
connectivity.
• Human ware (Human Capacity):
• Providing equipment not always the answer
• Need technical knowledge
• Lack for trained workers for maintenance
• Lack of teachers and institutions to train
• Technology needs to meet and serve the local need
Economic context of Computing:
• Economic context of Computing § Introduction
Computing economics is a field of economic study
at the intersection of computer science, economics
and management science. The main focus of is the
integration of information (IT) into economics and
the automation of formerly manual processes.
Computing economics uses advanced computing to
solve problems from all branches of economic
study. Both empirical and theoretical economics
can use computing economics.
• IT and Economy:
• IT consumers and IT producers in Asia
• Japan Model of IT Industrial Development


• Computer crime:
is an act performed by a knowledgeable computer user,
sometimes referred to as a hacker that illegally browses
or steals a company's or individual's private information.
In some cases, this person or group of individuals may be
malicious and destroy or otherwise corrupt the computer
or data files.
• Types of Attacks
• Military and Intelligence attacks
• Business Attacks
• Financial Attacks
• Terrorist Attacks
• Grudge Attacks
• Fun Attacks
Prevention of Computer Crime:
There are many approaches to protect computer system
from attack.
 Identifying Risks
 Physical Security
 Personal Security
 Communication Security
 Operations Security

Computing:
• Computing is any Problem-oriented activity requiring,
benefiting from, or creating algorithmic processes - e.g.
through computers.
• Thus, computing includes
• designing and building hardware and software
• processing, structuring, and managing various kinds
of information
• doing scientific studies using computers
• making computer systems behave intelligently
• creating and using communications and
• entertainment media
• finding and gathering information relevant to any
particular purpose, and so on.
• Five sub-disciplines of the computing field:
• Computer Science, Currently the most popular of the
computing disciplines; tends to be relatively broad and
with an emphasis on the underlying science aspects.
• Computer Engineering, Typically involves software
and hardware and the development of systems that
involve software, hardware, and communications
• Information Systems, Essentially, this is computing in
an organizational context, typically in businesses.
• Information Technology, Focuses on computing
infrastructure and needs of individual users; tends to
involve a study of systems (perhaps just software
systems, but perhaps also systems in support of learning,
of information dissemination, etc.).
• Software Engineering. Focuses on large-scale software
systems; employs certain ideas from the world of
engineering in building reliable software systems.
Sub-disciplines of computing
Computer Engineering:
• Computer engineering is a discipline that integrates
several fields of electrical engineering and computer
science required to develop computer hardware and
software.
• Computer engineers usually have training in electronic
engineering (or electrical engineering), software design,
and hardware-software integration instead of only
software engineering or electronic engineering.
• Computer engineers are involved in many hardware and
software aspects of computing, from the design of
individual microprocessors, personal computers,
and supercomputers, to circuit design.
• An important area within computing engineering is the
development of embedded systems. Devices such as cell
phones, digital audio players, digital video recorders,
alarm systems, x-ray machines, and laser surgical
tools all require integration of hardware and embedded
software, and are all the result of computer engineering.
• Computer engineering majors are offered by a fairly
large number of universities, almost always within
engineering. This major requires significant study of
mathematics.
Sub-disciplines of computing
Software Engineering (SE):
• Software engineering (SE) is the application of a
systematic, disciplined, measurable approach to the
design, development, operation, and maintenance
of software,
• Software engineering (SE) is concerned with developing
and maintaining software systems that behave reliably
and efficiently, are affordable to develop and maintain,
• and satisfy all the requirements that customers have
defined for them.
• It is important because of the impact of large, expensive
software systems and the role of software in safety-
critical applications.
• Students can find software engineering in two contexts:
computer science programs offering one or more
software engineering courses as elements of the CS
curriculum, and in separate software engineering
programs.
• Degree programs in computer science and in software
engineering tend to have many courses in common;
however, as of Spring 2006 there are few SE programs at
the bachelor’s level.
• Software engineering focuses on software development
and goes beyond programming to include such things as
eliciting customers’ requirements, and designing and
testing software.
• SE students learn how to assess customer needs and
develop usable software that meets those needs.
• Both computer science and software engineering
curricula typically require a foundation in programming
fundamentals and basic computer science theory.
Sub-disciplines of computing
Computer Science (CS):
• Computer science (CS) spans the range from theory
through programming to cutting-edge development of
computing solutions.
• A computer scientist specializes in the theory of
computation and the design of computational systems.
• Computer science offers a foundation that permits
graduates to adapt to new technologies and new ideas.
• The work of computer scientists falls into three
categories:
• a) designing and building software;
• b) developing effective ways to solve computing
problems, such as storing information in databases,
sending data over networks or providing new
approaches to security problems;
• and c) devising new and better ways of using computers
and addressing particular challenges in areas such as
robotics, computer vision, or digital forensics (although
these specializations are not available in all computer
science programs). Most computer science programs
require some mathematical background.
Sub-disciplines of computing
Information System (IS):
• "Information systems (IS) is concerned with the
information that computer systems can provide to
aid a company, non-profit or governmental
organization in defining and achieving its goals.
• It is also concerned with the processes that an
enterprise can implement and improve using
information technology.
• IS professionals must understand both technical
and organizational factors, and must be able to help
an organization determine how information and
technology-enabled business processes can provide
a foundation for superior organizational
performance.
• They serve as a bridge between the technical and
management communities within an organization.
• What information does the enterprise need? How is
that information generated? Is it delivered to the
people who need it? Is it presented to them in ways
that permit them to use it readily? Is the
organization structured to be able to use technology
effectively? Are the business processes of the
organization well designed? Do they use the
opportunities created by information technology
fully? Does the organization use the
communication and collaboration capabilities of
information technologies appropriately? Is the
organization capable of adapting quickly enough to
changing external circumstances?
• These are the important issues that businesses rely
on IS people to address.
• A majority of IS programs are located in business
schools; however, they may have different names
such as management information systems,
computer information systems, or business
information systems.
• All IS degrees combine business and computing
topics,
Sub-disciplines of computing
Information Technology (IT):
• Information technology (IT) is a label that has two
meanings. In common usage, the term “information
technology” is often
• used to refer to all of computing. As a name of an
undergraduate degree program, it refers to the
preparation of students to
• meet the computer technology needs of business,
government, healthcare, schools, and other kinds of
organizations.
• IT professionals possess the right combination of
knowledge and practical, hands-on expertise to take
care of both an
• organization’s information technology
infrastructure and the people who use it. They
assume responsibility for selecting
• hardware and software products appropriate for an
organization.
• hey integrate those products with organizational
needs
• and infrastructure, and install, customize and
maintain those applications, thereby providing a
secure and effective
• environment that supports the activities of the
organization’s computer users.
• in the IT discipline require special skills – in
• understanding, for example, how networked
systems are composed and structured, and what
their strengths and
• weaknesses are. There are important software
systems concerns such as reliability, security,
usability, and effectiveness and
• efficiency for their intended purpose; all of these
concerns are vital. These topics are difficult and
intellectually demanding.
Sub-disciplines of computing
System Administrator:
• Systems administrator, is a person employed to
maintain and operate a computer system and/or
network.
• The duties of a system administrator are wide-
ranging, and vary widely from one organization to
another.
• System administrators are usually charged with
installing, supporting and maintaining servers or
other computer systems, and planning for and
responding to service outages and other problems.
• Other duties may include scripting or
light programming, project management for
systems-related projects, supervising or training
computer operators, and being the consultant for
computer problems beyond the knowledge
of technical support staff.
INTRODUCTION TO PROFESSIONAL BODIES
AND SOCIETIES.
• Professional bodies are organization whose
members are individual professional
• Group of professionals, working towards the
progress of a specific professional domain and its
stakeholders.
• Such bodies look after the interest of practitioners,
keep an oversight of the activities, establish
cooperation and coordination between organization
, individuals and policy makers.
Why these bodies:
• What are they doing why should we study them.
1. Recognition : eligibility criteria and membership
process, events and awards.
2. Professional Development : lectures , courses,
workshop and conferences. Discounts and
exclusive Access.
3. Professional Networking :local Branches, like
minded people magazines and news items.
4. Leadership Developments : Host, executive
positions ,policy making
5. Trends and Opportunities: industry practices,
internships, jobs and careers developments and
conferences.
6. Funds and support: financial support for research
and projects,
Professionals bodies for It professionals in societies:
• Network Engineers proession :ACM(association
for computing Machinery 1947).
• ACM focuses more on hardware and
standardization issues than theoretical computer
science
• . Professional Bodies For IT Professionals)
• 5. Project Managers Profession : PMI (Project
Management Institute – 1969) The PMI provides
services including the development of standards,
research, education, publication, networking-
opportunities in local chapters, hosting conferences
and training seminars, and providing accreditation
in project management.
• Professional Bodies For IT Professionals 21PST
32220 - Current Topics In Computer Technology
(Lecturer : Mr. Rohana K Amarakoon) 5. Project
Managers Profession : PMI (Project Management
Institute – 1969) Membership Categories 1.
Certified Associate in Project Management
(CAPM) 2. Project Management Professional
(PMP) 3. Program Management Professional
(PgMP) 4. Portfolio Management Professional
(PfMP) 5. PMI Agile Certified Practitioner (PMI-
ACP)
• Professional Bodies For IT Professionals
• 6. Software Architects Profession : IASA (IASA-
International Association of Software Architects -
2002).
• Benefits Of Become A Member Of Professional
Body • Career development with Continuous
Professional Development Programs • Being
formally recognized as a professional in your field
• Information and advice for particular new
knowledge areas • Networking opportunities with
other professionals in same field • Conferences and
seminars to showcase your talents • Broaden your
knowledge with knowledge sharing sessions •
Gaining professional status often helps get a more
senior and higher paid job • Being able to promote
your field in society •
Drawbacks Of Become A Member Of Professional
Body:
• • Most professional organizations require the
payment of annual fees is very expensive
• • In addition to the applications and membership
fees, you'll also be spending money on association
breakfasts, lunches and dinners as well as
transportation costs or gas expenses • profession
includes people with a wide variety of political
alignments, religious beliefs and personal values.
Sometimes an association forgets that create
stressful situations • You normally need at least a
degree or an equivalent to qualify •
What is a professional ethics?
• A professional ethics is a set of principles designed
to help a business govern its decision-making and
distinguish right from wrong.
• Often referred to as an ethical code, these
principles outline the mission and values of an
organization, how the professionals within the
organization are supposed to approach problems
and the standards to which employees are held.
• In some industries, such as finance or public health,
specific laws dictate professional conduct. In other
industries, a code of ethics may be voluntarily
adopted.
Why is a code of ethics important?
• A professional code of ethics is designed to ensure
employees are behaving in a manner that is socially
acceptable and respectful of one another.
• .It also provides the groundwork for a preemptive
warning if employees break the code. A code of
ethics can be valuable not just internally as a
professional guide but also externally as a
statement of a company’s values and commitments.
Examples of a professional code of ethics
Lawyers
• Lawyers are bound to a professional code of ethics
that exists independently of their employment.
• For example, Rule 1.1 in the American Bar
Association Model Rules of professional
Conduct reads, “A lawyer shall provide competent
representation to a client. Competent representation
requires the legal knowledge, skill, thoroughness
and preparation reasonably necessary for the
representation.”
Physicians
• Like lawyers, physicians are held to a universal
code of conduct because of their chosen
profession.
• A physician should addresses everything from
patient care to relationships with other staff
members. For example:
• 1 A physician shall provide competent medical
care, with compassion and respect for human
dignity and rights.
Teachers
• Professional educators are typically held to a
universal code of ethics that is designed to protect
the rights of all students.
• The code of ethics can vary from school to school
or differ slightly in each state, but the basic
principles always remain the same: Teachers are
required to show impartiality, integrity and ethical
behavior in the classroom and in their conduct with
parents and colleagues.

Businesses:
• Businesses often establish a professional code of
ethics to help employees decide if certain behaviors
are acceptable. Some examples of this are:
• Confidentiality and privacy policies: Companies
may require employees to maintain confidentiality
when handling clients’ private information or when
dealing with the company’s own proprietary data.
• Obeying the law: Companies may specify
guidelines that require employees to abide by the
law. For example, they may discuss profiting from
—or enabling others to profit from—inside
information regarding a company’s financial
stability, performance or internal problems.
• Introduction of CPD (Continuing Professional
Development:
• Requires all professionals to take personal
responsibility for the process of updating their own
ability to understand the range of topics relevant to
their area of competence “ Continuing Professional
Development (CPD) is the systematic maintenance,
improvement and broadening of relevant
knowledge and skills, and the development of these
qualities necessary for the successful carrying out
of professional duties throughout a software
engineer or information technology professional's
career. In this it is aimed at enhancing individual
worth and thus corporate performance."
• Continuing Professional Development is an
ongoing necessity in the ever changing
technological world in which we live. The
practicing professional software engineers and
information technology professionals should aim to
remain competent throughout their working careers
so that they can properly carry out their various
duties. To this end software engineers and
information technology professionals need to take
opportunities to update their depth and breadth of
knowledge and expertise and to develop those
personal qualities required to fulfil their roles in
industry and in society.
• CPD covers matters of direct technical relevance as
well as broader studies also of importance to the
professionals in the furtherance of their careers
such as communication, environmental matters,
financial management, leadership skills, legal
aspects, marketing, occupational safety and health
and professional ethics.

USES , MISUSES AND RISK OF SOFTWARE:


Software:
• Definition:
• Software is the set of instruction that enable the
user to communicate with computer and perform its
task . with out software hardware is nothing.
• Example:
• without browser you cannot surf internet. In this
way with out operating system you cannot run
browser and do any thing on computer.
• Two types of software:
• System software:
• system software is a program that is designs to run
hardware and application programs like mac ,
windows , etc.
• Application software
• Application software is designs to help the user to
complete its task.in other words the applications
software are the application that run on computer .
Uses of software:
• Software's are commonly uses in every field of life
because of the increase of the use of computer in
every field.
• Business
• Medical field
• Home
• Education
• Industries
• Communication
• Business:
• Almost every business uses computer to complete
its daily tasks . from making contacts with clients,
input records and generating reports and allow
business more mannered way as tradition like paper
work.
• Marketing:
• Computer allows business to make websites,
stunning ads and a complete marketing operations .
marketing videos editing and creating marketing
ads in-home with special software's.
• At home:
• At home computer are used for variety of
purposes .
Computer in home providing training , technical
reports, internet for students , families in
participating and for calculating monthly expenses.
• Education:
• Computer is used in education in teacher learning,
testing and evaluation ,guidance purpose and
school administration.
Miss uses of software:
• Computer are also used for beneficial as well as
illegal and destroy purpose . with the help of it
people committing frauds , stealing data and cause
damage other records etc.
• Uses of software in hacking purpose and disobey
privacy policies of other .
• A license agreement is the establish a legal
agreement between customer and the man or
company that develop the software . if a person is
use this software with out purchasing is misuse of
software.
• If a person buy software from un authorized site
and then he want to activate it . It not activate
because the license is used by the previous user
from which he purchase . and software id not
registered because license is not transferable.
Risk of software:
• Risk:
• Risk is future uncertain events with a
probability(‫ )امکان‬of occurrence and a potential for
loss.
• Product risk:
• it is the possibility that the system or software
might fail to satisfy or fulfill some reasonable
expectation of the customer, user, or stakeholder.
(Some authors also called the ‘Product risks’ as
‘Quality risks’ as they are risks to the quality of the
product.)
Some software products:
• If the software skips some key function that the
customers specified, the users required or the
stakeholders were promised.
• If the software is unreliable and frequently fails to
work.
• If software fail in ways that cause financial or other
damage to a user or the company that user works
for.
• If the software has problems related to a particular
quality characteristic, which might not be
functionality, but rather security, reliability,
usability, maintainability or performance.
Professional Competency:
• “The capability to perform the duties of one's
profession generally, or to perform a particular
professional task, with skill of an acceptable
quality.”
• Professional competence is the broad professional
knowledge, attitude, and skills required in order to
work in a specialized area or profession.
• Disciplinary knowledge and the application of
concepts, processes and skills are required in a test
of professional competence in any particular field.
• Disciplinary knowledge demonstrates the use of
available resources to identify facts and terms and
in the performance of required procedures. The
application allows the performance of tasks,
procedures and job related processes with
confidence and competence.
• Examples of competencies and skills include
teamwork, responsibility and commitment to
career, excellent communication, and leadership
and organizational skills. Other skills and
competencies include problem-solving ability,
trustworthiness and decision-making ability.

• Lifelong Learning:
• “Lifelong learning is the "ongoing, voluntary, and
self-motivated“ pursuit of knowledge for either
personal or professional reasons. Therefore, it not
only enhances social inclusion, active citizenship,
and personal development, but also self-
sustainability, as well as competitiveness and
employability.”
• Most people associate learning with formal
education at school, college, university etc.
• Told from early age ‘get a good education’.
• TREU that Formal education and the resulting
qualifications are important.
• Education may maximize our potential to find
better, more satisfying jobs, earn more and,
perhaps, become more successful in our chosen
career.
• However, ‘schooling’ is only one type of learning.
There are many other opportunities to further your
knowledge and develop the skills you need
throughout life.
• Benefits of Life Learning:

• Knowledge & Learning


• Knowledge can be acquired and skill-sets
developed anywhere
• Learning is unavoidable and happens all the time.
• However, lifelong learning is about creating and
maintaining a positive attitude to learning both for
personal and professional development.
• Lifelong learners are motivated to learn and
develop because they want to: it is a deliberate and
voluntary act.
• Lifelong learning (LLL) can enhance our
understanding of the world around us, provide us
with more and better opportunities and improve our
quality of life.
• Reasons for Life Long Learning (LLL):
• There are two main reasons for learning throughout
life:
• for personal development and for professional
development.
• These reasons may not necessarily be distinct as
personal development can improve your
employment opportunities and professional
development can enable personal growth.
• Learning for Personal Development;
• There does not need to be a specific reason for
learning since learning for the sake of learning can
in itself be a rewarding experience.
• There is a common view that continuous learning
and having an active mind throughout life may
delay or halt the progress of some forms of
dementia, although there is actually very little
scientific evidence to support these claims.
However, keeping the brain active does have
advantages since learning can prevent you from
becoming bored and thus enable a more fulfilling
life at any age.

Software Contracts:
• Contracts set out the agreement between the parties
• Contracts Provide Legal Securities to Project and
Parties, i.e. Customer or Software Developers.
• There are gaps in the agreement because the parties
have failed to contemplate a particular issue.
• There are almost never disputes over contracts
which run perfectly But, if things go wrong?? For
Example Marriage.
Structure of the Contract: The introductory Section:
• The first part of the contract is brief; it states that it
is an agreement
between the parties whose names and registered
addresses are given.
• It often begins with a set of definitions of terms
used in the course of the agreement.
• For example, the definitions section will tell us that
Company X Ltd, the software house, is to be
referred to throughout the contract as “The
Company”, and Company Y Ltd, which has
commissioned the work, is to be known throughout
as “ The Client” .

Structure of the Contract: The Clause section:


• 1. What is to be produced?
• It is clearly necessary that the contract states what
is to be produced.
• Refers to a separate document which constitutes the
requirements specification.
• Software engineers will be familiar with the
problems of producing requirements
• A specification sets out the detailed
requirements of the client. Ideally, the
• Specification should be complete, consistent
and accurate and set out all that the client
• Wants to be done in the performance of the
contract
• 2. What is to be delivered?
• Producing software for a client is not, usually, a
matter of simply handing over the text of a program
which does what is required.
• The following is a non-exhaustive list of
possibilities:
• source code;
• command files for building the executable code
from the source and for installing it;
• documentation of the design and of the code;
• reference manuals, training manuals and
operations manuals;
• software tools to help maintain the code;
• user training;
• training for the client’s maintenance staff;
• test data and test results.
• 10. Termination of the contract
• There are many reasons why it may become necessary
to terminate a
contract before it has been completed.
• for example, for the client to be taken over by another
company
which already has a system of the type being developed,
or for a
change in policy on the part of the client to mean that
the system is
no longer relevant to its needs
• the contract make provision for terminating the work
in an amicable
manner
Structure of the Contract: The Authority section:
• The authorities of both party signature on the term
and conditions
mentioned in the clause section.
• The most Important things are Starting and ending
date of an
Agreement.
• Only an Authorized person from each party is
mentioned in this Section.

Computer Security:
• Computer security or Cyber security is the
protection of computer system from theft and
damage to its hardware, software and information.
Cyber security includes controlling physical access
to the hardware and software, as well as protecting
against harm that may come via network, data, and
code injection or by malpractice by operators of the
system. A system is considered to be secure if we
can depend upon it and it behaves as we expect.
• Internet Privacy
• Internet privacy, also known as online privacy is
the privacy and security level of personal data
published via the internet. It is a broad term that
refers to a verity of factors, techniques and
technologies used to protect sensitive and private
data, communication and preferences. Internet
privacy and anonymity is very important to users,
especially as ecommerce continues to grow.
Privacy violation and threat risks are standard
consideration for any website under development.
On the internet many users give away a lot of
information about themselves. Unencrypted emails
can read by the administration of the email server

• How to Minimize Security Risks


• Using internet, online shopping and banking or
working offline, we can minimize security and
privacy volition risks by following a numbers of
security measures. Some of them are mentioned
below.
• Always used application like anti-virus, anti –
malware, ant-spam and firewalls.
• Avoid exposing personal information on website
with lower security level.
• Avoid shopping on unreliable websites.
• Avoid opening spasm emails and clicking on links
sent form unknown sources.
• Constantly clean your browsers cache and
browsing history.
• Always use strong passwords that are not easy to
guess.
• Try not to expose your personal information on
social media.
• Your information in a cloud service may not be
secure, avoid storing sensitive information in cloud
storage.

• Computer Security:
• Computer security or Cyber security is the
protection of computer system from theft and
damage to its hardware, software and information.
Cyber security includes controlling physical access
to the hardware and software, as well as protecting
against harm that may come via network, data, and
code injection or by malpractice by operators of the
system. A system is considered to be secure if we
can depend upon it and it behaves as we expect.

Internet Privacy:
• Internet privacy, also known as online privacy is
the privacy and security level of personal data
published via the internet. It is a broad term that
refers to a verity of factors, techniques and
technologies used to protect sensitive and private
data, communication and preferences. Internet
privacy and anonymity is very important to users,
especially as ecommerce continues to grow.
Privacy violation and threat risks are standard
consideration for any website under development.
On the internet many users give away a lot of
information about themselves. Unencrypted emails
can read by the administration of the email server,
internet services providers and other parties can
reach the contents that sniffing the network traffic
if the connection in not secure.

Threats to Security and Privacy:


• There are number of threats to data security and our
privacy over the internet. Some malware can
destroy or steal our data; someone can reach
sensitive information like credit card information
which cost significantly.

How to Minimize Security Risks:


• Using internet, online shopping and banking or
working offline, we can minimize security and
privacy volition risks by following a numbers of
security measures. Some of them are mentioned
below.
• Always used application like anti-virus, anti –
malware, ant-spam and firewalls.
• Avoid exposing personal information on website
with lower security level.
• Avoid shopping on unreliable websites
• Avoid opening spasm emails and clicking on links
sent form unknown sources.
• Never download attachment form emails sent by
unknown sources.
• Constantly clean your browsers cache and
browsing history
• Always use strong passwords that are not easy to
guess.
• Try not to expose your personal information on
social media.
• Your information in a cloud service may not be
secure, avoid storing sensitive information in cloud
storage.
• Be careful about who can access the computer
system of your organization and always assign
limited access and privileges to users, as much as
needed.
What is Intellectual Property:
• Intellectual property refers to creations of the ideas,
inventions, literary and artistic works; and symbols,
names and images used in commerce.
• What is Intellectual Rights?? Intellectual
property rights are like any other property right.
They allow creators, or owners, to benefit from
their own work or investment in a creation.
• IP is Divided Into Two Categories??
• Industrial Property: Includes patents for inventions,
trademarks, industrial designs.
• CopyRight: Covers literary works such as novels,
poems and plays, films, music, artistic works, even
programming (e.g., drawings, paintings,
photographs and sculptures) etc.
• Why Promote and Protect IP?? First, the progress
and well-being of humanity depends upon capacity
to create and invent new works in the areas of
technology and culture. Second, the legal
protection of new creations encourages the
commitment of additional resources for further
innovation. Third, the promotion and protection of
intellectual property makes economic growth,
creates new jobs and industries.

Definition of cyber law:


• Cyber law is the part of the whole legal system that
deals with the Internet, cyberspace, and their
particular legal issues. Cyber law covers a justly
broad area, about several subtopics together with
freedom of look, access to and usage of the
Internet, and online privacy.
• Cyber law is the area of law that deals with the
Internet's relationship to technological and
electronic elements, including computers, software,
hardware and information systems (IS).
• Cyber law is also known as Cyber Law or Internet
Law.

Importance of cyber law:


• Cyber law is vital because it traces almost all parts
of transactions and actions on and about the
Internet, the World Wide Web and Cyberspace.
Mainly it may seem that Cyber laws is a very
nominal field and that it does not have any
approach to most activities in Cyberspace

Electronic Commerce Act (Ireland)
• Electronic Transactions Act (UK, USA,)
• Electronic Transactions Ordinance (Hong Kong)
• Information Technology Act (India)/
Cyber Law in Pakistan:
• There are different law are publicized in Pakistan.
• These laws not only deal with crime of Internet
but also deals crimes that related to cyber crimes.
• Two recent cyber crime bills pass in Pakistan to
stop cyber crimes
• Electronic Transaction Ordinance 2002
• Electronic / Cyber Crime Bill 2007
• Electronic transaction act 2002:
• it is made to secure transaction and it was the first
law made in Pakistan to the relate of it.it is related
to the foreign laws of cybercrime.
• Cyber crime bill (2007)
• It deals with the crimes that is given below:
• Cyber terrorism
• Data damage
• Electronic fraud
• Unauthorized access to code
The
End:

You might also like