Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
COLLEGE I
OF NFORMATION TECHNOLOGY AND ENGINEERING : DAN PAOLO E. RAMOS, MSHM
Course Code : Quality Assurance for Academics and Administration
Date Signed : ______________________
Descriptive Title : SOCIAL AND PROFESSIONAL ISSUES 1
Noted by : RONIE E. SUGAROL, LCB, MPBM
Credits : 3 Units (3 units lecture) Dean, Business Education/ School Overseer
90 hrs. lecture Date Signed : ______________________
Page 1 of 15
CORE VALUES: INSTITUTIONAL OUTCOMES:
Dr. Ronald P. Guzman is a visionary founder and Christian Leader who pursuits for the The International School of Asia and the Pacific Institutional Outcomes are the qualities that
transformation of the nation. The following core values exhibited by the founder should be ISAPians must possess.
imbibed to all members of the ISAP: 1. Demonstrates through institutional mechanisms, quality standards and code of good
practice which are reflective of equal participatory decision making and accountability.
I- INTEGRITY 2. Practices spiritual values and ethical behaviours which promote and inspire greater
S- SPIRITUAL UPRIGHTNESS harmony to project a credible image in the society.
A- ALTRUISM 3. Exhibits life-long learning and global competency proficient in entrepreneurial skills,
P- PATIENCE selfless innovative mindset and socio-civic services.
I- INNOVATIVENESS 4. Manifests self-discipline, self-direction and adaptability in dealing with life’s situations
A- ADAPTIVENESS and challenges.
N- NATIONALISM
5. Mobilizes community resources to foster and sustain institutional programs for
PURPOSE: community development.
Page 2 of 15
to the signs and demands of the times and nurturing of the succeeding generation’s
future.
7. Spiritually Upright – one who keeps the Laws of God primary in all his undertakings
and transcends human aspirations into God’s wilful promises.
PROGRAM EDUCATIONAL OBJECTIVES (PEO)
The Information Technology program has adopted the following educational objectives:
a. Few years after graduation, the Information Technology alumni shall have successful careers in Information Technology fields or will be able to successfully pursue advanced degrees;
b. Provide solutions to challenging problems in their profession by applying Information Technology theory and principles;
c. Communicate effectively, work collaboratively and exhibit high levels of professionalism and ethical responsibility to contribute significantly for the welfare of others;
d. Engage in life-long learning and professional development to adapt to rapidly changing work environment; and
e. Become indispensable partners for national progress applying their profession.
Page 3 of 15
COURSE OUTCOMES (CO): SPECIFIC TO THE SUBJECT
Review and analyze the effects of computer technology on the society, and to anticipate the impact of that technology on individuals, companies and the wider community.
Select from the many algorithms for the implementation of computer applications those that will not only satisfy the needs of the economy but also those that will have higher factors of
safety, greater sensitivity to user needs, and increased reliability.
Understand their potential impact on the community that they serve based on the level of ethics practiced in the use of computer technologies and make rational decisions regarding their
responsibilities to the community.
Interpret the social and legal context in which a particular system is being used and deduce its likely impact.
Develop strategies and policies to address a range of ethical, social, and legal issues arising from developments in computing.
Distinguish between the various forms of intellectual property (patent, copyright, trademark, and trade secret).
Evaluate the privacy issues as it relates to information systems and the Internet
COURSE DESCRIPTION:
This course examines the ethical, legal, and social responsibilities of the practicing professional IT specialist and will introduce the concepts needed to ensure that students are aware of
the accepted practices internationally. Issues addressed include computers and privacy, computer crime, public safety, intellectual property and professional codes of ethics. Key issues will
normally be considered through case studies.
VALUE AIMS:
This course is meant to prepare students for work in industry in the information processing fields as well as prepare students for business and computer-related courses and it will also
help them to continue the lifetime learning necessary for staying at the forefront of computing systems development and to be an object-oriented person with due manner to uplift their spiritual
uprightness with the notion of promoting their nationalism.
assignments The student’s grade at the end of the semester represents the combined marks for
project (programming) Knowledge (AQ, TT, Rotation Exam, Case Presentation); Skills (Actual Performance in the
three to four quizzes each periodic coverage Laboratory); and Attitude (Attendance, Recitation, Assignment and Behavior/ Conduct).
laboratory exercises There are four (4) grading periods namely, Preliminary, Midterm, Semi – Final and Final
periodic examination (prelims, midterms, semi-finals and finals) Examinations. The school has adopted the cumulative grading system, which is computed
as follows:
1. Prelim Grade
PG= ((AQ+CS+TT)/3+ S )
PG= Average (60%) + S(40%)
2. Midterm Grade
Page 4 of 15
MG = ((AQ+CS+TT)/3+ S )
MG= Average (60%) + S (40%)
MCA= PG + 2(MG)
LABORATORY MANAGEMENT:
Page 5 of 15
1. Only those authorized to work inside the laboratory are allowed to enter the area.
Students should log before and after working in the laboratory
2. Good housekeeping and safety precautions should be observed at all times.
3. Eating and bringing of food and soft drinks are strictly prohibited inside the
laboratory.
4. Log-in/out notebook should be filled out every time a particular equipment is to
be used. Any malfunctioning of an equipment should be immediately reported to
the instructor.
5. Damages must be reported immediately to the instructor or lab technician and
an immediate replacement should be arranged.
6. The computer connected to the equipment should not be used for other purposes
not related to the operation of the equipment where it is attached.
7. The last person who leaves the room should see to it that every utility
(equipment, lights, aircon, etc.) is turned off
8. All students are required to attend the Laboratory Safety Seminar sponsored by
the college prior to their laboratory schedules.
9. The following are not allowed inside the laboratory
• Vandalism. Do not write anything on the tables and walls
• Smoking, Sleeping and Playing Cards.
• Computer Games, especially obscene and pornographic ones
TEXTBOOK:
1. Silberschatz, Galvin, Gagne. John Wiley & sons , inc: Operating System Concepts
ADDITIONAL REFERENCES:
1.
WEBSITE REFERENCES:
1.
Page 6 of 15
Time
Frame Teaching and Learning Activities Assessment Tasks
Intended Learning Outcomes (ILO) Course Contents Resource Materials
(TLA) (TA)
Week:
PRELIMINARY PERIOD
Discuss the main ideas in the 1. Professional Ethics and Discussion and recitation about Overhead projector, Pre-test using paper and
Week 1 different theories of ethics Responsibility professional ethics and responsibility, books and laptop pencil technique
to Week Describe how laws relating to 1.1. Ethical Theories learning the different code of ethics used
5 computing implement ethical 1.2. Code of Ethics by computing professionals.
principles 1.3. Ethical Guidelines for Computer
Explain how computer and Professionals
professional ethics differ from
ethics in general
2 HRS Define the terms: ‘personal 2. Privacy and Freedom of Speech in The students will be divided into 5 groups Manuals, books and Quiz using paper and
LEC information’ and ‘invisible Cyberspace and each group will contain 3-4 laptop pencil test and graded
information gathering’ 2.1. The value of privacy members. After grouping, the teacher will recitation
Discuss how the release of 2.2. Privacy Risks hand them their reports for the different Group presentation using
3 HRS someone’s personal information 2.2.1. Government Information Banks topics about privacy and freedom of rubrics followed by a quiz
LAB can threaten their safety 2.2.2. Consumer Information speech in cyberspace which they will
Describe tools that can be used to 2.2.3. Medical Records discuss and present to their classmates
protect a person’s privacy on the 2.3. Privacy of Consumer Information each meeting
Web 2.3.1. Database and Personal
Describe methods parents can use Records Discussion and recitation about the Manuals, books and
to restrict access by their children 2.3.2. E-mail Privacy ethical, legal and social issues involved in laptop Quiz using paper and
1 hour to inappropriate material on the 2.3.3. Web Privacy freedom of speech and privacy in pencil test and graded
examin Web 2.4. Protecting Privacy Cyberspace recitation
ation 2.5. Anonymity
Explain the reasons for censorship
2.6. SPAM
and how it impacts on freedom of
speech
List reasons people object to Spam
Identify methods used to control
access to information
PRELIM EXAMINATION
MIDTERM PERIOD
Page 7 of 15
Week 6 1. Risk and Responsibility
to Week Discuss the hardware and software 1.1. Computer Liability Research about the different risk and Manuals, books and Research works
9 risks involved in the use of 1.1.1. Malfunction of Computers – responsibility in the computer world. laptop submission
computers in society Hardware and Software
Explain how information stored on reliability
computers can be kept safe 1.1.2. Safety Discussion and recitation about computer Manuals, books and Graded presentation
Describe how effective design can 1.1.3. Misinterpretation of liability, what are the possible problem to laptop using rubrics followed by
impact information technology Information occur for misinterpretation of information, a quiz
Evaluate accountability issues in 1.1.4. Liability of defective malfunction of computers and more.
our computerized society information
Discuss the ethical, legal and social 1.2. Evaluation of Safety-Critical
issues regarding the risk and Systems
2 HRS responsibility for public information 1.3. Values in Design Research activity about Values in design, Manuals, books and Research works
LEC 1.3.1. Software and Design what are the different software and laptop submission
Problems design problems and how to eliminate
1.3.2. Elimination of Hardware hardware switch.
3 HRS Switch
LAB 1.4. Taking responsibility –
Accountability in Computerized
Society
1.5. Role and Responsibility of
Computer Scientists
1.6. Professional Responsibility of the
Computer User
Distinguish between the different
types of computer crime 2. Computer Crime, Security and The teacher will demonstrate on how to Manuals, books, Hands-on activity and
1 hour Explain how computer crime can Protection prevent security risk to ensure smooth internet, USB and knowledge survey
examin be prevented or minimized 2.1. Hacking, cracking and crime work flow followed by the students computer unit
ation 2.2. Viruses, Worms, Trojan Horses
Explain what the computer user
2.3. Digital Forgery Each student’s will be given a certain Graded performance
can do to protect him/herself
2.4. Software Piracy situation about the topic computer crim using rubrics
Discuss the ethical, legal and social
2.5. Online Scams wherein they will create a narration about
issues involved in computer crime
2.6. Misuse of resources it and perform it in class
2.7. Protective systems
2.8. Reliability and factors of safety
Page 8 of 15
MIDTERM EXAM
SEMI FINAL PERIOD
Week 1. Intellectual Property
10 to Discuss the different technologies 1.1. Intellectual property and changing The students will make a research work Manuals, books, Submission of research
Week that has made copyright technology about intellectual property, it’s computer unit/laptop work
14 infringement easier 1.2. Copyright Law components and the roots of its origin to and internet
Explain the factors that can be used 1.3. Computer Software be submitted next meeting and after
in deciding whether a use of 1.3.1. Intellectual Property which is a recitation followed by a quiz to
2 HRS copyrighted Protections for Computer determine whether they read their
LEC material is fair Software research work.
3 HRS Describe technical means of 1.3.2. Why Software Should be Free
LAB protecting copyright of intellectual Should I Copy My Neighbor’s Discussion and recitation about copyright Manuals, book, laptop Quiz using paper and
property on the Web Software law, intellectual property rights and the and projector pencil test and graded
List benefits of free software 1.3.3. Moral Foundations of difference between copyright and patent recitation
Differentiate between copyright Intellectual Property Rights
and patent 1.4. Issues for Software Developers o
1 hour Discuss the ethical, legal and social 1.4.1. Copyright or patent?
examin issues involved in intellectual 1.4.2. Similar software products
ation property rights
SEMI-FINAL PERIOD
FINAL PERIOD
Week 1. The Internet
15 to Discuss the inequalities in Internet 1.1. The National Information Research work about the internet, its Books, Computer unit Submission of Research
Week access Infrastructure properties, how does it evolved and how and internet work
18 Explain how the Internet can help to 1.2. Bridging the Racial Divide on does it manage to connect each device connection
alleviate social problems the Internet around the world
2 HRS Discuss the ethical, legal and social 1.3. Alleviating Poverty Through
LEC issues involved in internet use Technology
3 HRS 1.4. Governance of the internet: By
LAB whom? And How?
1.5. Who governs the internet?
1 hour
examin Locate some case studies about the 2. Case Studies The students will collect some case Books, Computer unit Submission of Case
ation history and everything about the 2.1. The Internet studies regarding the topic ‘internet’ and internet Studies
internet connection
Page 9 of 15
FINAL EXAM
Total no
of hrs:
90 hrs
COURSE
COURSE OUTCOMES
STUDENT OUTCOMES (SO) LEVEL OUTCOMES
Proficiency assessed by
Satisfied
a. Apply knowledge of computing, science and mathematics appropriate to the discipline Written examination with the use of
P /
OBE rubrics
b. Understand best practices and standards and their applications. Problem/cased based & written
D / examination with the use of OBE
rubrics
Page 11 of 15
c. Analyze complex problems and identify and define the computing requirements appropriate to its solution. Problem/cased based & written
P / examination with the use of OBE
rubrics
d. Identify and analyze user needs and take them into account in the selection, creation, evaluation and Problem/cased based & written
administration of computer-based systems. D / examination with the use of OBE
rubrics
e. Design, implement and evaluate computer-based systems, processes, components or programs to meet Problem/cased based & written
desired needs and requirements under various constraints D / examination with the use of OBE
rubrics
f. Integrate IT-based solutions into the user environment effectively. Problem/cased based & written
P / examination with the use of OBE
rubrics
g. Apply knowledge through the use of current techniques, skills, tools and practices necessary for the IT Problem/cased based & written
Profession. P / examination with the use of OBE
rubrics
h. Function effectively as a member or leader of a development team recognizing the different roles within a Problem/cased based & written
team to accomplish a common goal. P / examination with the use of OBE
rubrics
i. Assist in the creation of an effective IT project plan Problem/cased based & written
D / examination with the use of OBE
rubrics
j. Communicate effectively with the computing community and with society at large about complex computing Problem/cased based & written
activities through logical writing, presentations and clear instructions. P / examination with the use of OBE
rubrics
k. Analyze the local and global impact of computing information technology of individuals, organizations and Problem/cased based & written
society. P / examination with the use of OBE
rubrics
l. Understand professional, ethical, legal, security and social issues and responsibilities in the utilization of Problem/cased based & written
information technology. P / examination with the use of OBE
rubrics
m. Recognize the need for and engage in planning self-learning and improving performance as foundation for Problem/cased based & written
continuing professional development. P / examination with the use of OBE
rubrics
Page 12 of 15
STUDENT OUTCOMES
COURSE CONTENTS
A B C D E F G H I J K L M
Page 13 of 15
Curriculum Map
KEY LEGENDS ON LEVELS:
I – INTRODUCED: Basic Concepts are merely Introduced
P – PRACTICED: The concepts and principles are presented with applications
D – DEMONSTRATE: Introduced and Practiced with skills acquisition
Page 14 of 15
Distinguish between the various forms of intellectual property (patent,
copyright, trademark, and trade secret).
Evaluate the privacy issues as it relates to information systems and the
Internet
Page 15 of 15