Sei sulla pagina 1di 13

Module Title Module JACS Subject ASC Category(ies)

Number Code(s) and % of


each subject
Professional & Ethical Issues in IT CIS6004 I200: 50% 6
I100: 50%

Level (3 to Credits ECTS Module Value % Taught in Module Type


8) Credit (1=20 credits) Welsh
6 20 10 1.0 0% Taught

Teaching Period (Term/Semester) Pre-requisites


Term 1 None

Module Leader School(s) Campus


Fiona Carroll Cardiff School of Technologies Llandaff

Assessment Methods
Assessment Code Duration/Length of Weighting of Threshold Approximate
and Method Assessment Method Assessment Date of
Submission
WRIT1 – Student led 2000 words 50% 1 Mid-module
Workshop (workshop equivalent
plan and delivery)
EXAM1 – Examination 2 hours (2000 words 50% 1 End of module
equivalent) (Open (Exam Period)
book)

Aim(s)

This module explores the principal social, legal, professional and ethical issues associated with
computing and information technology, with respect to managing people, software and systems,
and to the ethical dimensions of the use and development of information systems.

Learning Outcomes

On successful completion of the module, students should be able to:


1 Critically consider the wider legal, social, professional and ethical environment for IT
professionals.
2 Critically discuss contemporary issues at the intersection of computing, technology,
economy, politics and society.
3 Demonstrate appreciation of the importance of a professional and ethical approach to
computer science, software engineering and information systems, along with the importance
of lifelong professional development.

Learning and Teaching Delivery Methods


Method Rationale Type of Contact (scheduled/ Total
guided independent hours
study/placement)
Lectures To enable core knowledge and Scheduled 24
understanding content to be delivered to the
whole module cohort
Seminars To allow exploration of all aspects of module Scheduled 24
and content (knowledge, understanding, skills &
Workshops other attributes) in an interactive group
setting
Independent To enable students to independently Guided Independent Study 152
Study develop their understanding of the module
concepts and to complete formative &
summative assessment activity
Total 200

Indicative Content
 Aspects of professional and ethical approaches to the management of Computing, Software
Engineering and Information Systems within the current environment;
 Applications of hardware and software
 Information, data, privacy and civil liberties;
 BYOD, mobile devices, fair use.
 Professional approach and legal aspects to employment within the industry;
 Social media, professional profiles, digital footprints.
 Contemporary societal issues e.g. data retention, encryption, national security, net neutrality,
copyright, IP.

Required Reading
Baase, S., (2012) A Gift of Fire: Social, Legal & Ethical Issues for Computing & the Internet. 4th
Edition. Pearson Education;

Recommended Reading
Cushway, B., (2014). The Employers’ Handbook: An Essential Guide to Employment Law. Personnel
Policies & Procedures, 10th Edition , Kogan Page;
Ayres, R. & Bainbridge, D., (2004) The Essence of Professional Issues in Computing, Prentice Hall.
Quinn, M. (2010), Ethics for the Information Age, 4th Edition, Pearson Publishers.
Journals and On-line Material
International Journal of Information Technology
International Journal of Technology, Policy and Management
Management and Technology
Computer Weekly
Tech Target
Computer Business Review
OPSI

Access to Specialist Requirements


None.
Cardiff Metropolitan University
B.Sc. (Hons) in Software Engineering
Assignment Cover Sheet
Student Details ( Student should fill the content)
Name
Student ID
Scheduled unit details
Unit code CIS6004
Unit title Professional & Ethical Issues in IT
Unit enrolment details Year 3
Study period 2020
Lecturer Upeka Wijesinghe
Mode of delivery Full Time
Assignment Details
Nature of the Assessment Written Report
Final Grade Weighting 50%
Topic of the Case Study Identifying and assessing Ethical, social, legal and professional issues in
IT related areas
Learning Outcomes covered 1,2,3
Word count 2000
Due date / Time 27th February 2021
Extension granted? Yes No Extension Date
Is this a resubmission? Yes No Resubmission Date
Declaration
I certify that the attached material is my original work. No other person’s work or ideas have been used
without acknowledgement. Except where I have clearly stated that I have used some of this material
elsewhere, I have not presented it for examination / assessment in any other course or unit at this or any
other institution
Name/Signature Date
Submission
Return to:
Result
Marks by 1st Name & Signature of the 1st Assessor Agreed Mark
Assessor
Marks by2nd Name & Signature of the 2nd Assessor
Assessor
Comments on
the Agreed
mark
ASSIGNMENT FEEDBACK SHEET

STUDENT NAME: STUDENT NUMBER:

Module Number & Title: Semester:

Assignment Type & Title:

For student use: Critical feedback on the individual progression towards achieving the assignment outcomes

For the Assessors’ feedback


Indicate the Task number strength and Weaknesses and the marks for each task
Strengths
Task No/
Question No
Weaknesses

Task No
/Question
No

Areas for future improvement

Marks

Allocated Awarded
/Question Marks Marks Remarks
No

Total Marks
Assessor Signature:
Date:

International College of Business and Technology


Page 5 of 13
Assignment Brief

ANSWER TWO (02) QUESTIONS IN TOTAL

Question 1

“Privacy is one of the most important civil rights. Although there are many aspects of privacy, we focus on
one of these aspects: the ability to prevent other parties from learning one’s current identity by
recognizing his/her personal characteristics. In recent years, advanced digital cameras and computer
vision technology have been widely deployed in many circumstances. While these technologies provide
many conveniences, they also expose individuals' privacy. As private organizations and governments
collect, store, and analyze massive amounts of surveillance data, individuals are increasingly
vulnerable to privacy threats. In particular, individuals risk exposure to identity theft, reputation
damage, and loss of personal privacy if their information is disseminated in violation of data protection
laws or their own privacy preferences” (Yu et al 2008)

Answer the following question based on the above scenario.

Critically discuss the ethical and legal implication in terms of privacy raised in “Surveillance Systems”.
Apply the ethical framework (Ethical principles, theories and laws) with balance view of different
stakeholders.
[50 Marks]

International College of Business and Technology


Page 6 of 13
Question 2

“Meanwhile the disadvantages faced due to computer usage are also rising steadily not only in countries
like USA but also in all the European countries where people are going through a lot of issues with regard
to video-games. Researchers around the world are coming out with the bitter fact that most of the teenagers
are being affected by the amount of violence involved in these video games which would cause
psychological impacts and bring about addiction. The negative effects of video games are rising drastically
along with the advancements of the technologies. Initially the target markets of the electronic gaming
industry were youngsters, but nowadays people of all age categories seem to be addicted to video-games.”
(Essays, UK 2018)

Answer the following question based on the above scenario.

Critically discuss the ethical, social and legal issues related to” Computer Games”. Discussion should
carried out by applying ethical principles and laws

[50 Marks]

International College of Business and Technology


Page 7 of 13
Question 3

“Give us your fingerprint, your Iris print, your photograph. Trust us; we want to make your life easier!
This is the implicit message behind many corporations' move towards avid collection and use of
biometrics, and they expect us to accept their assurances at face value. Despite their attempts to sell this
as a wholly philanthropic move, the reality is that it is often done primarily to ease their own processes or
to increase profit. They offer no guarantees, allow no examination of their processes, and treat detractors
with derision or sanction” (Renaud, Hoskins and von Solms 2015)

Answer the following question based on the above scenario.

Critically discuss the code of conducts and laws related to “Biometric”. List them and explain why they are
relevant. Carryout the discussion based on 2 professional code of conducts and 2 laws.

[50 Marks]

International College of Business and Technology


Page 8 of 13
Question 4

“The early ethical issues of artificial intelligence began with the issue of machine ethics. It is
believed that the development of artificial intelligence not only fully perform their specific functions but
also complying with the moral norms and value systems of human moral subjects that within the legal and
moral bottom line.

In 2016, the Institute of Electrical and Electronics Engineers (IEEE) published the first edition of
“The Design of Ethical Guidelines: Autonomous and Intelligent Systems to Maximize Human Well-
Being.” This guidelines encourage scientific and technological personnel to give priority to ethical issues in
the process of artificial intelligence research and development.

In 2017, IEEE proposed the second edition of “Ethical Standards Design”, which strengthened the
principle of prioritization of artificial intelligence and autonomous system application and human well-
being. All of the efforts showing the growing importance of artificial intelligence ethics.” (Chian-Hsueng
Chao 2019)

Answer the following question based on the above scenario.

Critically discuss the “The general principles of Ethically Aligned Design” the high-level principles that
should apply to all types of autonomous and intelligent systems (A/IS) based on ETHICALLY ALIGNED
DESIGN (First Edition) IEE. Discussion should carry out based on importance of ethical design,
development, deployment, adoption, and decommissioning of autonomous and intelligent systems. Should
consider the role of A/IS creators, those who design and manufacture, of operators, those with expertise
specific to use of A/IS, other users, and any other stakeholders or affected parties.
[50 Marks]

International College of Business and Technology


Page 9 of 13
Question Criteria

Marks 0-20 21-24 25-29 30-34 35-50

1 Very poor knowledge Identified the privacy issues A satisfactory answer is Discussed the implications Strong and outstanding
demonstrated in privacy related to surveillance system provided by identifying more of surveillance system by critical analysis of privacy
issues related to by applying at least one than 3 privacy issues related taking the perspectives of issues related to surveillance
surveillance system. Failed example to illustrate the to surveillance system. different stakeholders. system. Has provided clear
to identify relevant privacy issues. At least one key issue Sufficient and relevant Demonstrated a very high and specific examples to
issues, laws relevant to related to each component examples taken and sufficient knowledge in the relevant elaborate the issues reacted to
surveillance. need to be identified. One issues have been identified and specific issues result due surveillance systems.
example of the impact of relevant from each category to surveillance system. Different perspectives and
technological advancement to (Ethical and legal). argument given.
surveillance system.

Marks 0-20 21-24 25-29 30-34 35-50

2 Very poor knowledge Basic understanding A satisfactory answer given Demonstrated a very good Excellent answer is produced
demonstrated in identifying expressed in ethical, social by applying relevant in knowledge in Computer by critically discussing the
the relevant ethical, social and legal issues related to ethical, social and legal issues Games and the available issues related to Computer
and legal issues related to Computer Games. Ethical related to Computer Games A ethical theories and laws Games Looked at the matters
Computer Games. No principles and laws were basic discussion is available related the subject scope. A from the perspectives of many
evidence of the application applied at a very basic level. and few different perspectives critical discussion of the stakeholders and a very strong
of relevant law or ethical Just an explanation, no were considered. issues is available and many critical discussion is done by
theories to justify the discussion is present perspectives of the issues looking and positive and
issues. were considered as well. negative aspects of the issues.
Sufficient amount of

International College of Business and Technology


Page 10 of 13
examples, scenarios were
used to elaborate the issues

Marks 0-20 21-24 25-29 30-34 35-50

3 Very poor knowledge Code of conducts and laws (2 A satisfactory answer given Demonstrated a very good Excellent answer is produced
demonstrated in identifying each) were applied at a very by applying relevant code of knowledge in the subject by critical discussing the
the relevant code of basic level. Just an conducts and laws related to scope and the available code relevance of code of conducts
conducts and laws related to explanation, no discussion is the biometrics. A basic. Has of conducts and laws related and laws relayed to
biometrics. present discuss the relevance of code biometrics. Critical discuss biometrics. Sufficient amount
od conducts and laws chosen the relevance of code of of examples, scenarios were
conducts and laws chosen. used to elaborate the issues.
Sufficient amount of Different perspectives and
examples, scenarios were argument provided
used to elaborate the issues.

International College of Business and Technology


Page 11 of 13
Marks 0-20 21-24 25-29 30-34 35-50

4 Very poor knowledge Basic understanding of A satisfactory answer given Demonstrated a very good Excellent answer is produced
demonstrated in identifying applying the relevant by expressing importance of knowledge of the subject by discussing the importance
the relevant principles of principles of ethically aligned ethical and professional scope and the available code of ethical and professional
ethically aligned design. design. Expressed importance approach relate to AI. A basic of conducts and principles approach to AI. Has consider
of ethical and professional discussion is available and related Robotics with AI. different phases and
No discussion provided.
approach to AI. Just an few different perspectives Sufficient amount of perspectives of many
explanation, no discussion is were considered. examples, scenarios were stakeholders by looking and
present used to elaborate the issues. positive and negative aspects
Has carried out based on of the issues. Sufficient
different phases and different amount of examples,
perspectives. scenarios were used to
elaborate the issues

International College of Business and Technology


Page 12 of 13
Final Grading criteria for the coursework
Marks Final Grade
>=70 1
69-60 2:1
59-50 2:2
49-40 3
<40 fail

International College of Business and Technology


Page 13 of 13

Potrebbero piacerti anche