Social and Professional Issues 2

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 20

UNIVERSITY OF LA SALETTE, INC.

Santiago City, Isabela, Philippines


COLLEGE OF INFORMATION TECHNOLOGY

COURSE LEARNING PLAN


Second Semester, Academic Year 2022-2023

Course Number : PBSIT 019


Descriptive Title : Social and Professional Issues 2
Units : 3 units
Contact Hours per Week : 2 hours Lecture per week
Type of Course : Lecture

Prepared and Submitted by: Date Submitted: Reviewed by: Date Reviewed:

_______________
KING CHRISTIAN D. ANTONIO,MIT, LPT __ KING CHRISTIAN D. ANTONIO, MIT, LPT _________________
Instructor Program Coordinator

Reviewed by: Date Reviewed: Endorsed by: Date Endorsed:

________________
MARY JOIE C. PADRON, MAED _ RAMONSITO B. ADDUCUL, DIT _________________
Instructional Coordinator Dean, College of Information Technology

Approved by:

MADEILYN B. ESTACIO, Ph.D.


Vice President for Academic Affairs

1
VISION
In keeping with its Philosophy, Vision and Mission, La Salette professes the following
The University of La Salette, Inc., a Catholic institution founded by the Missionaries of institutional objectives:
Our Lady of La Salette, forms RECONCILERS “so that they may have life, and have 1. To foster a reconciled and reconciling community through spiritual upliftment
it to the full.” (John 10:10) programs and liturgical activities.
2. To sustain the quality assured education of the university through institutional
MISSION and program accreditations, professional certification, and compliance with
international standards for curricular programs and university management.
The University of La Salette, Inc. is a premier institution of choice, providing 3. To provide accessible education through various modalities of learning.
accessible, quality, and transformative education for integral human development 4. To lead the academic community with strategic and transformative competencies
particularly the poor. in realizing the Vision, Mission and La Salette Philosophy of Education.
5. To develop and implement transformative teaching and learning experience
CORE VALUES through critical approach and values-based integration.
6. To undertake research on various disciplines and generate new knowledge
1. FAITH-The total submission to God’s call to Holiness to His will needed for the advancement of the university as well as for the national
2. RECONCILIATION-Constantly renewing our relationship with God, others and all development.
creation through a life of prayer, penance and zeal 7. To realize ICT oriented learning by establishing the monitoring system to collect
3. INTEGRITY-The courage and determination to live and to die for Salettinian and review information needed to manage an organization or on-going activities
ideals of the university.
4. EXCELLENCE – Upholding the highest standard of quality education and 8. To provide industry experience through on-the-job-trainings, exposures,
professionalism in the areas of instruction, research and extension internship, immersion programs and linkages.
5. SOLIDARITY – Commitment to building a community anchored on mutual trust, 9. To provide a holistic curriculum that integrates instruction, extension, research,
confidence, teamwork, unity and respect for the dignity of the human person and ICT, industry experience for both students and faculty.
creation 10. To adopt an interdisciplinary approach by enhancing the institution’s interest in
the understanding of the cultural reproduction and social integration and in
CORE COMPETENCIES spiritual and moral formation

 Researched-Based Oriented Learning


 ICT-Integrated Learning
 Industry-Based Oriented Learning
 Oriented Toward Transformative Learning
 Oriented Toward Integrative Learning

INSTITUTIONAL OUTCOMES
INSTITUTIONAL OBJECTIVES

2
Having finished their academic degree at the University of La Salette, the graduates
are expected to become:

Transformative Leaders. Active involvement in their respective community and


organization by championing the Salettinian ideals.

Reconcilers. Continue to communicate their Salettinian identity and culture through


active involvements in the evangelizing ministry of reconciliation in their local
communities, work-places and in social organizations.

Industry Competent. Demonstrate their readiness in the arena of and qualification for
employment through the established link between theoretical aspect of the curriculum
and its practical dimension as a result of their on-the-job trainings, exposures,
internship, immersion programs and linkages with relevant industries or workplaces.

Research-Oriented. Keep abreast with current developments and trends in all


relevant technical/professional knowledge areas for successful adaptation to a
changing and complex world through continuing engagement in research projects to
contribute to the humanization of the world in general, and to the reconciling effects
on their relationships with God, with fellow human beings, with society and with
nature.

Information and Communication Technology Proficient. Demonstrate contemporary


skills applications as they offer innovative solutions in work situations through the
employment of new technology and new ways of communication.

Critical Thinkers. Engage themselves in critical reflection and communicative


discourses on uncritically assimilated assumptions, beliefs, value-system and diverse
perspectives that need to be collaboratively addressed for an emancipatory and
integral process of human growth and community building.

Holistic Persons. Demonstrate through their attitude, behavior and engagement a


synthesis of faith and lived experience, of faith and science; synthesis of cognitive,
affective and behavioral aspects of learning; synthesis of cultural and global
concerns, and a synthesis of curricular and co-curricular programs.

PROGRAM OUTCOMES

An IT graduate must acquire skill set that enables him or her to successfully perform
integrative task including:

3
CODE BSIT PROGRAM OUTCOMES
Apply knowledge of computing, science and mathematics appropriate to
IT01
the discipline
IT02 Understand best practices and standards and their applications
Analyze complex problems, and identify and define the computing
IT03
requirements appropriate to its solution
Identify and analyze user needs and take them into account in the
IT04 selection, creation, evaluation and administration of computer-based
systems
Design, implement and evaluate computer-based systems, processes,
IT05 components or programs to meet desired needs and requirements under
various constraints
IT06 Integrate IT-based solutions into the user environment effectively
IT07 Apply knowledge through the use of current techniques, skills, tools and
practices
Function necessary
effectively for
as the IT profession
a member or leader of a development team
IT08 recognizing the different roles within a team to accomplish a common
IT09 goal
Assist in the creation of an effective IT project plan
Communicate effectively with the computing community and with society
IT10 at large about complex computing activities through logical writing,
presentations andand
Analyze the local clearglobal
instructions
impact of computing information technology
IT11
on individuals, organizations and society
Understand professional, ethical, legal, security and social issues and
IT12
responsibilities in the utilization of information technology.
Recognize the need for and engage in planning self-learning and
IT13 improving performance as a foundation for continuing professional
development

4
PROGRAM OUTCOMES AND THEIR RELATIONSHIP TO THE INSTITUTIONAL OUTCOMES

INSTITUTIONAL OUTCOMES
CODE BSIT PROGRAM OUTCOMES
T R I R I C H
IT01 Apply knowledge of computing, science and mathematics appropriate to the discipline    
IT02 Understand best practices and standards and their applications    
IT03 Analyze complex problems, and identify and define the computing requirements appropriate to its solution    
Identify and analyze user needs and take them into account in the selection, creation, evaluation and administration of
IT04
computer-based systems
   

Design, implement and evaluate computer-based systems, processes, components or programs to meet desired needs
IT05
and requirements under various constraints
   

IT06 Integrate IT-based solutions into the user environment effectively    


IT07 Apply knowledge through the use of current techniques, skills, tools and practices necessary for the IT profession     
Function effectively as a member or leader of a development team recognizing the different roles within a team to
IT08
accomplish a common goal
   

IT09 Assist in the creation of an effective IT project plan    


Communicate effectively with the computing community and with society at large about complex computing activities
IT10
through logical writing, presentations and clear instructions
   

IT11 Analyze the local and global impact of computing information technology on individuals, organizations and society    
Understand professional, ethical, legal, security and social issues and responsibilities in the utilization of information
IT12
technology.
   
Recognize the need for and engage in planning self-learning and improving performance as a foundation for continuing
IT13
professional development
   

5
COURSE INFORMATION

Course Code PBSIT 019


Course Title Social and Professional Issues 2
Course Description This course explores the major ethical, professional, social and legal issues arising from the widespread use of IT, highlighting dilemmas that may
be faced by IT practitioners. It also includes an appreciation and discussion of the Code of Ethics for I.T. Professionals; cybercrimes and
appropriate Philippine Laws are also included.
Pre / Co -requisite PBSIT 011
Credit 3 Units
Contact Hours Per Week 2 hours Lecture
Class Schedule 10:30AM – 12:30NN Friday (Lecture )
Room Assignment HB319

COURSE OUTCOMES AND THEIR RELATIONSHIP TO THE PROGRAM OUTCOMES

PROGRAM OUTCOMES
COURSE OUTCOMES
IT01 IT02 IT03 IT04 IT05 IT06 IT07 IT08 IT09 IT10 IT11 IT12 IT13

Analyze ethical and legal issues that arise in information technology


E E E E E E E
field to determine how to address them technically and ethically

6
COURSE OUTLINE

TIME
Learning Outcomes Topic Outline Methodology Assessment Learning Resources
FRAME
At the end of the week, Course Orientation Synchronous:  Recitation on the university’s Student Handbook
students should have the  University’s vision,  Virtual discussion vision, mission, core values,
ability to: mission, core values, through video core competencies, CHED CMO 25, series 2015 “PSG for IT
 Explain the University of La core competencies, conferencing platform institutional objectives and Education”
(GMeet)
Salette vision, mission, institutional institutional outcomes
core values, core objectives and  Short quiz about the Curriculum Guidelines for Baccalaureate
Asynchronous:
competencies, institutional institutional  Learning resources and university’s policies Degree Programs in Information
objectives and outcomes; ` outcomes activities will be uploaded  Writing a reflective essay on Technology (IT2017)
 Relate BSIT program  BSIT program in the ULS CLMS site the purpose of institutional of ACM and IEEE-CS
educational outcomes to description (https://ulsclms.online) outcomes in helping
the institutional outcomes;  Course information students become what they ULS Official Website
Week 1  Figure out the relationship  Face to face want to become https://uls.edu.ph
of course outcomes to the  Lecture/ Discussion  Conceptualize a career plan
program educational  Demonstration aligned with BSIT program
outcomes;  Illustration and core values of ULS
 Present the different rules  Problem Solving
 Hands-on Activities
and policies in the
administration of the
course through online
learning management
system of the university as
well as the policies of the
university.
At the end of the week,  SP. Professional and Synchronous:  Quiz about the different Books/e-Books
students should have the Ethical Issues &  Virtual discussion ideas in  Ethical Issues and Blokdyk, G. (2019). Technology Risk And
ability to: Responsibilities through video Responsibilities'  Cybersecurity A Complete Guide - 2019
o Relationships with conferencing platform Edition. 5starcooks.
professional societies (GMeet) Internet
 Define Professional and
Ethical Issues & Course: Social and Professional Issues in
Week 2 Asynchronous: Computing. (n.d.).
Responsibilities' guiding  Learning resources and https://elearn.daffodilvarsity.edu.bd/course/v
concepts. activities will be uploaded iew.php?id=6327
in the ULS CLMS site Journal Articles
(https://ulsclms.online)
 Sun, C. C., Hahn, A., & Liu, C. C. (2018).
Cyber security of a power grid: State-of-the-
 Face to face

7
 Lecture/ Discussion art. International Journal of Electrical Power
 Demonstration & Energy Systems, 99, 45-56.
 Illustration
 Problem Solving
 Hands-on Activities
At the end of the week, o Codes of professional Synchronous:  Create a PowerPoint Books/e-Books
students should have the conduct, such as  Virtual discussion presentation outlining the Stojanovi?, M. D., & Slavica, B. R., V. (2020).
ability to: IEEE, ACM, BCS, through video principles and benefits of Cyber Security of Industrial Control Systems
ITAA, AITP conferencing platform IEEE, ACM, BCS, ITAA, and in the Future Internet Environment. IGI
(GMeet) Global.
 Describe how the various AITP.
codes of conduct (IEEE, Internet
Asynchronous: Faculty of Science. (2019, December 6).
ACM, BCS, ITAA, and  Learning resources and Social Issues and Professional Practice in
AITP) differ. activities will be uploaded IT & Computing.
Week 3 in the ULS CLMS site http://open.uct.ac.za/handle/11427/30659
(https://ulsclms.online) Journal Articles
 Sun, C. C., Hahn, A., & Liu, C. C. (2018).
 Face to face Cyber security of a power grid: State-of-the-
 Lecture/ Discussion art. International Journal of Electrical Power
 Demonstration & Energy Systems, 99, 45-56.
 Illustration
 Problem Solving
 Hands-on Activities
At the end of the week, o Ethics and history of Synchronous:  Recitation about the Books/e-Books
students should have the ethics  Virtual discussion principles guiding internet Stojanovi?, M. D., & Slavica, B. R., V. (2020).
ability to: o Whistle-blowing through video and computer ethics. Cyber Security of Industrial Control Systems
conferencing platform in the Future Internet Environment. IGI
(GMeet) Global.
 Discuss about the ideas
behind computer and Internet
Asynchronous: Issues in Computing. (n.d.).
internet ethics.  Learning resources and https://home.adelphi.edu/~siegfried/gen110/
activities will be uploaded social.html
Week 4 in the ULS CLMS site Journal Articles
(https://ulsclms.online)
 Kaur, J., & Ramkumar, K. R. (2022). The
recent trends in cyber security: A review.
 Face to face Journal of King Saud University-Computer
 Lecture/ Discussion and Information Sciences, 34(8), 5766-
 Demonstration 5781.
 Illustration
 Problem Solving
 Hands-on Activities

8
At the end of the week, o Workplace issues Synchronous:  Forum discussion about Books/e-Books
students should have the (harassment,  Virtual discussion the various forms of Shekokar, N. M., Vasudevan, H., Durbha, S.
ability to: discrimination) through video discrimination and S., Michalas, A., Nagarhalli, T. P.,
o Identify theft conferencing platform Mangrulkar, R., & Mangla, M. (2023). Cyber
harassment at work.
o Ethical hacking (GMeet) Security Threats and Challenges Facing
 Analyze the numerous forms
Human Life.
of harassment and Asynchronous:  Quiz about identity theft Internet
discrimination in the  Learning resources and concepts and ethical hacking Issues in Computing. (n.d.).
Week 5 - workplace. activities will be uploaded principles. https://home.adelphi.edu/~siegfried/gen110/
6 in the ULS CLMS site social.html
 Describe concepts of identity (https://ulsclms.online) Journal Articles
theft and ethical hacking  Li, Y., & Liu, Q. (2021). A comprehensive
ideas.  Face to face review study of cyber-attacks and cyber
 Lecture/ Discussion security; Emerging trends and recent
 Demonstration developments. Energy Reports, 7, 8176-
 Illustration 8186.
 Problem Solving
 Hands-on Activities
PRELIMINARY EXAMINATION
At the end of the week,  SP. History of Synchronous:  Forum discussion about the Books/e-Books
students should have the Computing  Virtual discussion numerous computer Ahmed, M., & White, D. (2021). Cyber
ability to: through video breakthroughs and their Security: the CISO Quick Start Guide:
conferencing platform effects. Enterprise Security Operations Risk
(GMeet) Management Architecture for Chief
 Describe the various
Information Security Officers.
developments in computing Asynchronous: Internet
and their impact.  Learning resources and GEN 110: Computers and Society - An
activities will be uploaded Introduction to Ethical Issues in Computing.
Week 7 in the ULS CLMS site (n.d.).
(https://ulsclms.online) https://home.adelphi.edu/~siegfried/gen110/
social.html
 Face to face Journal Articles
 Lecture/ Discussion  Sun, C. C., Hahn, A., & Liu, C. C. (2018).
 Demonstration Cyber security of a power grid: State-of-the-
 Illustration art. International Journal of Electrical Power
 Problem Solving & Energy Systems, 99, 45-56.
 Hands-on Activities
Week 8 At the end of the week, o Implications of: Synchronous:  Fill out an advance organizer Books/e-Books
students should have the o History of computer  Virtual discussion about the benefits and Blokdyk, G. (2019). Technology Risk And
ability to: hardware, software through video advantages of computer Cybersecurity A Complete Guide - 2019
conferencing platform technology and software. Edition. 5starcooks.

9
 Examine the various (GMeet) Internet
advantages of a computer's Faculty of Science. (2019, December 6).
hardware and software. Asynchronous: Social Issues and Professional Practice in
 Learning resources and IT & Computing.
activities will be uploaded http://open.uct.ac.za/handle/11427/30659
in the ULS CLMS site Journal Articles
(https://ulsclms.online)  Or-Meir, O., Nissim, N., Elovici, Y., &
Rokach, L. (2019). Dynamic malware
 Face to face analysis in the modern era—A state of the
 Lecture/ Discussion art survey. ACM Computing Surveys
 Demonstration (CSUR), 52(5), 1-48.
 Illustration
 Problem Solving
 Hands-on Activities
At the end of the week, o History of the Synchronous:  Recitation about the different Books/e-Books
students should have the Internet  Virtual discussion Internet advances and their Stojanovi?, M. D., & Slavica, B. R., V. (2020).
ability to: through video benefits. Cyber Security of Industrial Control Systems
conferencing platform in the Future Internet Environment. IGI
(GMeet) Global.
 Describe the various Internet
developments and their Internet
Asynchronous: Faculty of Science. (2019, December 6).
advantages.  Learning resources and Social Issues and Professional Practice in
activities will be uploaded IT & Computing.
Week 9 in the ULS CLMS site http://open.uct.ac.za/handle/11427/30659
(https://ulsclms.online) Journal Articles
 Or-Meir, O., Nissim, N., Elovici, Y., &
 Face to face Rokach, L. (2019). Dynamic malware
 Lecture/ Discussion analysis in the modern era—A state of the
 Demonstration art survey. ACM Computing Surveys
 Illustration (CSUR), 52(5), 1-48.
 Problem Solving
 Hands-on Activities
Week 10 At the end of the week, o Telecommunications Synchronous:  Forum discussion about the Books/e-Books
students should have the  Virtual discussion advantage and disadvantage Ahmed, M., & White, D. (2021). Cyber
ability to: through video of telecommunication in our Security: the CISO Quick Start Guide:
conferencing platform daily life Enterprise Security Operations Risk
(GMeet) Management Architecture for Chief
 Describe the principles and
Information Security Officers.
benefits of Asynchronous: Internet
telecommunication.  Learning resources and Course: Social and Professional Issues in
activities will be uploaded Computing. (n.d.).
in the ULS CLMS site https://elearn.daffodilvarsity.edu.bd/course/v

10
(https://ulsclms.online) iew.php?id=6327
Journal Articles
 Face to face  Or-Meir, O., Nissim, N., Elovici, Y., &
 Lecture/ Discussion Rokach, L. (2019). Dynamic malware
 Demonstration analysis in the modern era—A state of the
 Illustration art survey. ACM Computing Surveys
 Problem Solving (CSUR), 52(5), 1-48.
 Hands-on Activities
At the end of the week,  The IT profession Synchronous:  Forum discussion about the Books/e-Books
students should have the  Virtual discussion different ideas about careers Shekokar, N. M., Vasudevan, H., Durbha, S.
ability to: through video in information technology. S., Michalas, A., Nagarhalli, T. P.,
conferencing platform Mangrulkar, R., & Mangla, M. (2023). Cyber
(GMeet) Security Threats and Challenges Facing
 Differentiate from various
Human Life.
concepts of Information Asynchronous: Internet
Technology careers.  Learning resources and Social & professional issues in IT. (n.d.).
activities will be uploaded https://www.slideshare.net/RohanaAmarako
Week 11 in the ULS CLMS site on/social-professional-issues-in-it
(https://ulsclms.online) Journal Articles
 Kaur, J., & Ramkumar, K. R. (2022). The
 Face to face recent trends in cyber security: A review.
 Lecture/ Discussion Journal of King Saud University-Computer
 Demonstration and Information Sciences, 34(8), 5766-
 Illustration 5781.
 Problem Solving
 Hands-on Activities
At the end of the week,  IT education Synchronous: Recitation about the Books/e-Books
students should have the  Virtual discussion advantages and underlying Kaur, J., & Ramkumar, K. R. (2022). The
ability to: through video tenets of information recent trends in cyber security: A review.
conferencing platform technology education. Journal of King Saud University-Computer
(GMeet) and Information Sciences, 34(8), 5766-
 Analyze the benefits and
5781.
guiding principles of Asynchronous: Internet
information technology  Learning resources and
Week 12 Faculty of Science. (2019, December 6).
education. activities will be uploaded Social Issues and Professional Practice in
in the ULS CLMS site IT & Computing.
(https://ulsclms.online) http://open.uct.ac.za/handle/11427/30659
Journal Articles
 Face to face  Li, Y., & Liu, Q. (2021). A comprehensive
 Lecture/ Discussion review study of cyber-attacks and cyber
 Demonstration security; Emerging trends and recent
 Illustration

11
 Problem Solving developments. Energy Reports, 7, 8176-
 Hands-on Activities 8186.
MIDTERM EXAMINATION
At the end of the week,  SP. Privacy and Civil Synchronous:  Fill out an advance organizer Books/e-Books
students should have the Liberties  Virtual discussion about the advantages and Stojanovi?, M. D., & Slavica, B. R., V. (2020).
ability to: o HIPPA and FERPA through video benefits of privacy and civil Cyber Security of Industrial Control Systems
o E.U. Data Protection conferencing platformliberties in the Future Internet Environment. IGI
o Gramm-Leach-Bailey (GMeet) Global.
 Examine the various ideas
and principles of civil Act Internet
Asynchronous: Social & professional issues in IT. (n.d.).
liberties and privacy  Learning resources and https://www.slideshare.net/RohanaAmarako
Week 13 activities will be uploaded on/social-professional-issues-in-it
- 14 in the ULS CLMS site Journal Articles
(https://ulsclms.online)
 Kaur, J., & Ramkumar, K. R. (2022). The
recent trends in cyber security: A review.
 Face to face Journal of King Saud University-Computer
 Lecture/ Discussion and Information Sciences, 34(8), 5766-
 Demonstration 5781.
 Illustration
 Problem Solving
 Hands-on Activities
At the end of the week,  SP. Intellectual Synchronous:  Forum discussion about the Books/e-Books
students should have the Property  Virtual discussion guiding ideas of intellectual Shekokar, N. M., Vasudevan, H., Durbha, S.
ability to: through video property. S., Michalas, A., Nagarhalli, T. P.,
o Ownership of conferencing platform Mangrulkar, R., & Mangla, M. (2023). Cyber
information (GMeet) Security Threats and Challenges Facing
 Examine the underlying
Human Life.
principles of intellectual Asynchronous: Internet
property.  Learning resources and Course: Social and Professional Issues in
activities will be uploaded Computing. (n.d.).
Week 15 in the ULS CLMS site https://elearn.daffodilvarsity.edu.bd/course/v
(https://ulsclms.online) iew.php?id=6327
Journal Articles
 Face to face  Li, Y., & Liu, Q. (2021). A comprehensive
 Lecture/ Discussion review study of cyber-attacks and cyber
 Demonstration security; Emerging trends and recent
 Illustration developments. Energy Reports, 7, 8176-
 Problem Solving 8186.
 Hands-on Activities
At the end of the week, o Plagiarism Synchronous:  Forum discussion about the Books/e-Books
Week 16 students should have the o Software piracy  Virtual discussion harmful effect of plagiarism Stojanovi?, M. D., & Slavica, B. R., V. (2020).

12
ability to: through video in its different forms and Cyber Security of Industrial Control Systems
conferencing platform software privacy. in the Future Internet Environment. IGI
 Discuss about the various (GMeet) Global.
types of plagiarism and Internet
Asynchronous: GEN 110: Computers and Society - An
software privacy.
 Learning resources and Introduction to Ethical Issues in Computing.
activities will be uploaded (n.d.).
in the ULS CLMS site https://home.adelphi.edu/~siegfried/gen110/
(https://ulsclms.online) social.html
Journal Articles
 Face to face  Kaur, J., & Ramkumar, K. R. (2022). The
 Lecture/ Discussion recent trends in cyber security: A review.
 Demonstration Journal of King Saud University-Computer
 Illustration and Information Sciences, 34(8), 5766-
 Problem Solving 5781.
 Hands-on Activities
At the end of the week, o Fair use Synchronous:  Create a PowerPoint Books/e-Books
students should have the o Digital Millennium  Virtual discussion presentation about the Ahmed, M., & White, D. (2021). Cyber
ability to: Copyright Act through video principles and objectives of Security: the CISO Quick Start Guide:
(DMCA) conferencing platform the Digital Millennium Enterprise Security Operations Risk
(GMeet) Management Architecture for Chief
 Examine the ideas behind Copyright Act (DMCA).
Information Security Officers.
and purposes of the Digital Asynchronous: Internet
Millennium Copyright Act  Learning resources and Faculty of Science. (2019, December 6).
(DMCA). activities will be uploaded Social Issues and Professional Practice in IT
Week 17 in the ULS CLMS site & Computing.
(https://ulsclms.online) http://open.uct.ac.za/handle/11427/30659
Journal Articles
 Face to face  Or-Meir, O., Nissim, N., Elovici, Y., &
 Lecture/ Discussion Rokach, L. (2019). Dynamic malware
 Demonstration analysis in the modern era—A state of the art
 Illustration survey. ACM Computing Surveys (CSUR),
 Problem Solving 52(5), 1-48.
 Hands-on Activities
Week 18 At the end of the week, o Copyrights, patents, Synchronous:  Create a video presentation Books/e-Books
students should have the trademarks and trade  Virtual discussion and about the harmful effect Bott, F., & Taylor, N. (2022). Professional
ability to: secrets, NDAs through video of NDAs, trade secrets, Issues in IT, Third Edition.
o International conferencing platform patents, and copyrights all Internet
differences (GMeet)
 Analyze the various have different definitions and Course: Social and Professional Issues in
meanings and formats of structures. Computing. (n.d.).
Asynchronous: https://elearn.daffodilvarsity.edu.bd/course/v
NDAs, trade secrets,  Learning resources and

13
patents, and copyrights. activities will be uploaded iew.php?id=6327
in the ULS CLMS site Journal Articles
(https://ulsclms.online)  Li, Y., & Liu, Q. (2021). A comprehensive
review study of cyber-attacks and cyber
 Face to face security; Emerging trends and recent
 Lecture/ Discussion developments. Energy Reports, 7, 8176-
 Demonstration 8186.
 Illustration
 Problem Solving
 Hands-on Activities
FINAL EXAMINATION

COURSE REQUIREMENTS

1. Examinations (Prelim, Midterm, Finals)

14
2. Completed Module Activities
3. Quizzes
4. Completed Assessment Tasks
5. Submission of Assignments

GRADING SYSTEM

The student’s grade is composed of:


a. Prelim Period
 Class Standing (CS) = 2/3 (Quizzes/ Assignments/ Recitations/ Seat Works/Lab Exercises/ Requirements)
 Prelim Examination (PE) = 1/3
 Prelim Grade = CS + PE
b. Midterm Period
 Class Standing (CS) = 2/3 (Quizzes/ Assignments/ Recitations/ Seat Works/Lab Exercises/ Requirements)
 Midterm Examination (ME) = 1/3
 Midterm Grade = CS + ME
 Cumulative Midterm Grade = 2/3 of Midterm Grade + 1/3 of Prelim Grade
c. Final Period
 Class Standing (CS) = 2/3 (Quizzes/ Assignments/ Recitations/ Seat Works/Lab Exercises/ Requirements)
 Final Examination (FE) = 1/3
 Final Grade = CS + FE
 Cumulative Final Grade = 2/3 of Final Grade + 1/3 of Cumulative Midterm Grade

Final Grade Remarks:


a. Passing Mark is 75% and above.
b. Failing Mark is below 75%.
c. Incomplete Mark will be given to students on the following instances:
 The student failed to take the final examination.
 The student failed to submit course requirements.
d. FDA (Failure Due to Absences) Mark will be given to students who have incurred a significant number of absences. (ULS-Student Handbook Section 3.3.4-6)

PERFORMANCE ASSESSMENT RUBRICS

Criteria Exemplary Acceptable Developing Beginning

15
4 3 2 1
Descriptions of scientific terms, facts, Descriptions of scientific terms, facts, Descriptions of scientific terms, facts, Descriptions of scientific terms, facts,
concepts, principles, theories and concepts, principles, theories and concepts, principles, theories and concepts, principles, theories and
Knowledge
methods are complete and correct methods are mostly complete and methods are somewhat complete and methods are minimally present or correct
correct correct
Applications are thorough, appropriate Applications are mostly thorough, Applications are somewhat thorough, Applications are minimally appropriate
Application
and accurate appropriate and accurate appropriate and accurate and accurate
All of the written, oral and/or visual Most of the written, oral and/or visual Some of the written, oral and/or visual Little of the written, oral and/or visual
Communication communication is organized and effective communication is organized and communication is organized and communication is organized and effective
effective effective

PERFORMANCE ASSESSMENT RUBRICS: LABORATORY ACTIVITIES

Exemplary Acceptable Developing Beginning No Output


Criteria
4 3 2 1 0
Program Correctness The application meets all the The code works for typical input, The code sometimes fails or The code often fails, even for Program that does not run and/
requirements specified in the but fails for minor special cases; typical input. Many parts of typical input. Most indicated or implemented incorrectly
project specification. the major requirements are met, the program implementation restrictions were violated (based on specifications and
The code is syntactically and though some minor ones are violate indicated restrictions restrictions) automatically gets
logically correct for all cases. not. Some implementation of the and some parts of the solution 0 for this course output
Implementation of the program program violates restrictions are not implemented using
follows the indicated guidelines appropriate programming
and does not violate indicated constructs
restrictions. The implementation
also exhibits appropriate use of
programming constructs.
Effective Answers to questions are correct, Answers to questions are Answers to questions are Correct understanding of the Failure to explain and justify
communication/ reasonable, and reflective of the correct, but some justifications correct, but cannot justify problem, but was unable to workings of the code submitted
Concept Under- code. The justifications provided provided are weak. solution (e.g., solution via trial explain workings of code will automatically merit for this
standing are sound. and error, rather than proper provided. course output
understanding and application
of concepts.)
Readability The program conforms to a Minor code formatting does not Not all functions/ program Minimal internal No internal documentation and
coding standard that promotes exhibit consistency in coding features have proper internal documentation and code code is not readable.
code readability. Internal standard documentation readability
documentation is comprehensive

SPECIFIC COURSE POLICIES

According to the University of La Salette, Inc. Student Handbook Section 5.7

16
1. A class hour begins and ends with a prayer. Classroom prayer must be recited with decorum.
2. Respect, orderly and decent behavior and conduct shall be observed inside the classroom at all times.
3. A student may be allowed to leave the room with the permission of the instructor and/or authorized personnel of the university while the class is in session.
4. Students who wish to sit-in class must secure permit from the instructor.
5. Students are not allowed to stay inside the classroom if there are no classes.
6. Students are not allowed to attend classes if not in proper uniform. It must be observed that PE uniform shall be utilized for PE classes only.

Other course policies are stated in The Student Handbook under Policy on Class Attendance……

1. Per College policy, excused/unexcused absences should not exceed 20% of the assigned number of hours. More than 20% absences incurred during the semester would
mean being dropped from the class roll.
2. Class attendance is important. Class participation is expected and will form a part of the final grade. Students are expected to come to all classes and be on time. Roll will be
checked each class meeting. Classes missed for legitimate reasons, such as illness, temporary duty, are excusable; however, the student must make up for the missed work by
completing class exercise sheets and attending alternate activities.
3. Students are required to read all assigned materials prior to class and be prepared to discuss them and apply them to problem solving situations presented in class.
4. In this course, students are encouraged to discuss problems with their peers and to seek help from others in understanding the topic. Material submitted for grading should be
the synthesis of the students’ ideas and the input (lectures) they have received. Instances discovered of UNFAIR ADVANTAGE being taken of any other individual or group will
result in a loss of grade substance.
5. Plagiarism: All academic work submitted by students, written or otherwise, is expected to be the result of their own independent thought and research. In cases where students
submit work professing to be their own, but uses the ideas, organization, wording or anything else from another source without the appropriate acknowledgment, then the
student(s) is/are guilty of plagiarism.
a. Students may discuss assignments among themselves or with a professor or tutor, but the actual work/report/result to be submitted should be done completely and solely by
the student. In cases where a student's report or assignment involves research in outside sources or information, the student must carefully acknowledge exactly what, where
and how he/she has utilized the sources or information.
6. Cheating during examinations is never condoned and allowed! Students caught cheating in any form will have their papers confiscated and will be sent out of the examination
room and will not be allowed to retake the exam anymore.
7. Make up policy: Students who are unavoidably absent from an examination (long exams or major exams) or recitation must submit an excuse letter duly signed by any of
his/her parents before he/she can take the missed examination. If the cause of the absence is illness, then the student must present a medical certificate. Quizzes and
exercises missed because of valid absences will be prorated.
8. Quizzes are unannounced while long exams are announced. Strictly no make-up exams on quizzes, long exams and term exams unless an excuse slip or
certification is shown.
9. Students are required to submit course requirements on time to avoid deductions of points.

CONSULTATION HOURS

DAYS TIME / AVAILABILITY ROOM

17
Monday/Wednesday/Friday 10:30am - 11:30am CIT Office
Tuesday/Thursday 7:30am – 8:30am CIT Office

REFERENCES

BOOKS
 Bott, F., & Taylor, N. (2022). Professional Issues in IT, Third Edition.
 Ahmed, M., & White, D. (2021). Cyber Security: the CISO Quick Start Guide: Enterprise Security Operations Risk Management Architecture for Chief
Information Security Officers.
 Blokdyk, G. (2019). Technology Risk And Cybersecurity A Complete Guide - 2019 Edition. 5starcooks.
 Shekokar, N. M., Vasudevan, H., Durbha, S. S., Michalas, A., Nagarhalli, T. P., Mangrulkar, R., & Mangla, M. (2023). Cyber Security Threats and Challenges
Facing Human Life.
 Stojanovi?, M. D., & Slavica, B. R., V. (2020). Cyber Security of Industrial Control Systems in the Future Internet Environment. IGI Global.
ONLINE
 Social & professional issues in IT. (n.d.). https://www.slideshare.net/RohanaAmarakoon/social-professional-issues-in-it
 Course: Social and Professional Issues in Computing. (n.d.). https://elearn.daffodilvarsity.edu.bd/course/view.php?id=6327
 Faculty of Science. (2019, December 6). Social Issues and Professional Practice in IT & Computing. http://open.uct.ac.za/handle/11427/30659
 GEN 110: Computers and Society - An Introduction to Ethical Issues in Computing. (n.d.). https://home.adelphi.edu/~siegfried/gen110/social.html
 CISB 412 Social and Professional Issues Introduction. (n.d.). https://slideplayer.com/slide/7875453/

JOURNALS
 Sun, C. C., Hahn, A., & Liu, C. C. (2018). Cyber security of a power grid: State-of-the-art. International Journal of Electrical Power & Energy Systems, 99, 45-
56.
 Kaur, J., & Ramkumar, K. R. (2022). The recent trends in cyber security: A review. Journal of King Saud University-Computer and Information Sciences,
34(8), 5766-5781.
 Li, Y., & Liu, Q. (2021). A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments. Energy Reports, 7,
8176-8186.
 Or-Meir, O., Nissim, N., Elovici, Y., & Rokach, L. (2019). Dynamic malware analysis in the modern era—A state of the art survey. ACM Computing Surveys
(CSUR), 52(5), 1-48.
 Kaur, J., & Ramkumar, K. R. (2022). The recent trends in cyber security: A review. Journal of King Saud University-Computer and Information Sciences,
34(8), 5766-5781.

REVISION AND APPROVAL NOTATION:

NAME POSITION/DESIGNATION SIGNATURE DATE

18
Last Revised by KING CHRISTIAN D. ANTONIO,MIT,LPT Instructor
Last Updated by KING CHRISTIAN D. ANTONIO, MIT, LPT Instructor
Reviewed by KING CHRISTIAN D. ANTONIO, MIT, LPT Program Coordinator
Reviewed by MARY JOIE C. PADRON, MAED Instructional Coordinator
Endorsed by RAMONSITO B. ADDUCUL, DIT College Dean
Approved by MADEILYN B. ESTACIO, Ph.D. Vice President for Academics

19
20
Revised as of August 2020

You might also like