This document contains complete course outline of Professional Practices. Most of the topics are for computer science students. This document covers course of 32 lectures 1.5 hours each for professional practice course also known as Professional Ethics.
1. THE UNIVERSITY OF LAHORE
Course Outline
FALL Semester September 2017
Session 2017-18
CS-3327 Professional Practices
Effective Date: 18 September, 2017
SCU 3 Credit(s)
Co-requisite (s) None
Pre-requisite(s) Introduction to computing (CS-1010)
Weekly tuition pattern 2 sessions (90 min session)
Teaching Team
Syed Saqib Raza Rizvi
saqib.raza@cs.uol.edu.pk
1- Course Description
A Computing graduate as professional has some responsibilities with respect to the
society. This course develops student understanding about historical, social, economic,
ethical, and professional issues related to the discipline of Computing. It identifies key
sources for information and opinion about professionalism and ethics. Students analyze,
evaluate, and assess ethical and professional computing case studies.
2- Objectives
The course mainly aims to achieve the following objectives:
1. Defines that why students want to graduate in computing field and what are the
common things in every organization?
2. Describe in detail the field of computing and its subfields.
3. Describes what a profession is and what makes a profession.
4. Define the structure and little history of the engineering.
5. Describes the professional ethics, definitions, types, and standards, and social
responsibilities.
6. Introduces the professional code of ethics by IEEE-CS/ACM and its weaknesses.
7. Describe computer misuse act, intellectual property rights, and cyber law.
8. Describe the importance of information security and how we can secure it by
using various methods.
2. 9. Defines the need and brief introduction about the software contracts.
10. Defines the anatomy of software house organizations.
3- Student Learning Outcomes
By the completion of this course, the students should able to:
1. Know the scope of computing field after graduating in it and what are the
common things in every organization.
2. Distinguish between the various fields of computing.
3. Describe the core of any profession.
4. Know that how business and professional environment of computing field work.
5. Adhere his responsibilities according to profession, organization, and himself.
6. Know that how broadly code of ethics will affect his actions during employment.
7. Know the standards and rules about intellectual property, computer misuse, and
cyber law.
8. Know the standards/tools/models/polices/principles to secure information.
9. Write and analyze software contracts as an employer or an employee.
10. Know the business and professional environment of software house.
4- Course Structure
1. Presentation by lecturer
2. Group discussion
3. Assignments
4. Presentations
5. Quiz
6. Mid Term and Final Term Exams
5- Course Duration
This course will be held twice a week of 3 hours (each 60 min session) class duration.
6- Course style
The course will be delivered in a classroom environment.
7- Additional Course Requirement
In addition to the objectives of this course, students are expected to gain skills which
would be needed in the professional work environment. These skills include but not
limited to: Writing, Presentation, Decision Making and Teamwork.
8- Text and Other Resources
8.1 Text
3. 1. Professional Issues in Software Engineering, M.F. Bott et al.
8.2 Other Resources
1. Information Security: Principles and Practices, Mark Merkow et al.
9- Course Outline
The lecturers are supposed to complete the following topics/sub-topics before the
mid/final term examination as prescribed in the course outline below:
Week Lecture Topics/Sub-Topics Reading Material
1
1
Introduction to Ethics, Philosophies regarding to
Ethics and morals, Introduction to Computer and
Cyber Ethics
1. Intro to Ethics.ppt
2
Computer Ethics History, Sample Case studies, Ten
commandments, Sample topics to study in this
subject
1. Intro to Ethics.ppt
2
1
Types of Ethics, Relationship of different types
of ethics Ethics ,Essential Components of
Personal Ethics, ACM code of Conduct,
Netiquette
2. Types of Ethics.ppt
2
Business Ethics, Relationship between law and
ethics, Deontology theory, Unitarianism theory,
Right Model
3. Business Ethics.ppt
3
1
Application of Deontology, Unitarianism
theory, Right Model, Examples, Code of
Conduct for Employees and Employers
3. Business Ethics.ppt
2
Definition of Cyber Crime, General Types of
Cyber Crime, Cyber Crime Statistics
4. Cyber Ethics.ppt
4 1
Types of Cyber Crime Technically specified by
Australian Institute of Criminology
4. Cyber Ethics.ppt
2 QUIZ-1, Intellectual Property, Categories of IP
4. 5
1
World Intellectual PropertyOrganization
5. IP.ppt
2
Trade Secrets, Protection for Software
Copyright, Violation of Software Copyright,
5. IP.ppt
6
1
Reverse Engineering, Open Source Software,
Benefits of Open Source Software
5. IP.ppt
2
Introduction to Software Contracts, Structure of
Software Contracts, Clauses of Software
Contracts, Sample Software Agreement
6. Contracts.ppt
7
1
Introduction to Profession, History of
Engineering Profession, Software House
Structure
7. Profession.ppt
2
Common Roles in Software Organization
QUIZ-II
8
1
MID TERMS2
9
1
Management Hierarchy, IT Organization Structure,
Staff Management, Five Golden rules of Staff
management
7. Profession.ppt
2
Definition of Team, Team Management, Four C’s
of Team Management, Elements of Healthy Teams,
Way to Inspire and Motivate team, Ethical issues in
team management, Characteristics of High
Performance Teams
8. Team Management.ppt
10
1
Stages of Team development, Barriers to Team
Building, characteristics of High Performance
Teams,How to manage conflicts in team,
8. Team Management.ppt
2
What is SEEP? Software Engineering Profession,
Roles in Software Engineering Professions, Need
of Code of Ethics
9. SEEP.ppt
5. 11
1
Introduction to IEEE and ACM, Eight
Principles Related to Software Engineering
Code of Ethics and Profession Practice, Case
Studies
9. SEEP.ppt
2
Definition of Software Risks, Introduction to
Risk management, RM Strategies, Types of
Risks, Categories of Risks
10. Risk Management.ppt
12
1
Steps of Risk Management, Risk Mitigation,
Monitoring and Management Plan
10. Risk
Management.ppt
2 Risk Mitigation, Monitoring and Management Plan QUIZ-III
13
1
Introduction to Computer Privacy, Email
Privacy, TCP/IP and Security, Introduction to
Encryption, Virus, Worms and Trojan Horses,
Working of Anti-Virus Programs, Un-authorize
access
11. Computer
Security.ppt
2
Introduction to Firewalls, Bio-metric devices
and security, Software theft, System failures
and data backup policies
11. Computer
Security.ppt
14
1
, Web browsers and data security, Privacy laws
Content Filtering, Ergonomics, Green
Computing, Potential Computer Risks and
Security measures
11. Computer
Security.ppt
2
Introduction to Security Policies, History of
Information Security, Information Security
policy life cycle, laws and regulations of
Information Security, Standards of IS.
12. Information
Security Policy
15
1
Basic Information Security Principles,
Information Security Architecture
12. Information
Security Policy
2
Policy and Process, Access Control, QUIZ-IV
6. 16
1
Ethical Hacking, Types of Hackers, Model of
Ethical Hacking, Process of Ethical Hacking,
Ethical hacking Skills and knowledge
13. Ethical Hacking
2
Group Presentations
17
1
FINAL TERM EXAMINATION
2
10- AssessmentCriteria
No. Assessment Percentage
1. Mid Exam 20%
2. Final Exam 50%
3. Assignments 10%
4. Quizzes 10%
5. Presentation 5%
6. Project 5%
Total 100%
11- Attendance Requirements
You are expected to attend all lectures, seminars, tutorials, and lab sessions or any other
classroom activity. Where you fail to attend classes, you cannot expect the lecturer to
brief you on what you have missed. You are responsible for your attendance, not the
academic staff. Attendance at tutorials and lab sessions will be strictly monitored, and
failure to attend will be taken into account.
12- Submission and Collectionof Assignment
All assignments should be handed in at the beginning of the class sessions when they are
due. All assignments may be handed back during scheduled classes.
13- GeneralInformation
Students are required to be familiar with the university code Conduct, and to abide by its
terms and conditions.
13.1 Copying of Copyright Material by Student
A condition of acceptance as a student is the obligation to abide by the University’s
policy on the copying of copyright material. This obligation covers photocopying of any
material using the University’s photocopying machines, and the recording off air, and
making subsequent copies, of radio or television broadcasts, and photocopying textbooks.
7. Students who flagrantly disregard University policy and copyright requirements will be
liable to disciplinary action under the Code of Conduct.
13.2 Academic Misconduct
Please refer to the Code of Conduct for definitions and penalties for Academic
Misconduct, plagiarism, collusion, and other specific acts of academic dishonesty.
Academic honesty is crucial to a student's credibility and self-esteem, and ultimately
reflects the values and morals of the University as a whole. A student may work together
with one or a group of students discussing assignment content, identifying relevant
references, and debating issues relevant to the subject. Academic investigation is not
limited to the views and opinions of one individual, but is built by forming opinion based
on past and present work in the field. It is legitimate and appropriate to synthesize the
work of others, provided that such work is clearly and accurately referenced. Plagiarism
occurs when the work (including such things as text, figures, ideas, or conceptual
structure, whether verbatim or not) created by another person or persons is used and
presented as one’s own creation, unless the source of each quotation or piece of borrowed
material is acknowledged with an appropriate citation. Encouraging or assisting another
person to commit plagiarism is a form of improper collusion and may attract the same
penalties. To prevent Academic Misconduct occurring, students are expected to
familiarize themselves with the University policy, the Subject Outline statements, and
specific assignment guidelines.
13.3 Guidelines to Avoid Plagiarism
Whenever you copy more than a few words from any source, you must acknowledge that
source by putting the quote in quotation marks and providing the name of the author. Full
details must be provided in your bibliography. If you copy a diagram, statistical table,
map, etc., you must acknowledge the source. The recommended way is to show this
under the diagram. If you quote any statistics in your text, the source should be
acknowledged. Again full details must be provided in your bibliography. Whenever you
use the ideas of any other author you should acknowledge those, using the APA
(American Psychological Association) style of referencing.
Students are encouraged to co-operate, but collusion is a form of cheating. Students may
use any sources (acknowledged of course) other than the assignments of fellow students.
Unless your Subject Leader informs you otherwise, the following guideline should be
used: Students may work together in obtaining references, discussing the content of the
references and discussing the assignment, but when they write, they must write alone.
13.4 Referencing For Written Work
Referencing is necessary to acknowledge others' ideas, avoid plagiarism, and allow
readers to access those others’ ideas. Referencing should:
1. Acknowledge others' ideas
2. Allow readers to find the source
3. Be consistent in format and
4. Acknowledge the source of the referencing format
8. To attain these qualities, the school recommends use of either the Harvard or American
Psychological Association style of referencing, both of which use the author/date.
13.5 Referencing Standards
APA style referencing
Approval
Prepared By :
Syed Saqib Raza Rizvi
Assistant Professor
(University Of Lahore)
Approved by,
Dr. Amin Ur Rehman
Course Mentor
Dept. Computer Science & IT