Professional issues in information technology, Computer Network Security

Assignment Help:

Thinking ethically is difficult without a background in moral philosophy. Asking people to embrace ethics without offering practical explanation of the efficacy of so doing, is a thankless task. A technique that people can follow easily, that helps them value ethical behaviour is needed. Illustrations of such a procedure show how professional scenarios are used in the domain of web accessibility. Scenario design and extensions to the technique are considered.

At Swinburne University of Technology, 'Professional Issues in Information Technology' (PIIT) is taught to all final year IT students. It can be taken by students from other faculties as an elective, although students without industrial experience are strongly discouraged from taking the subject. Over the past 12 years, as the subject has evolved, the focus has been to explore real cases that will confront young (and not so young) professionals in the workplace. This is achieved by having about half the lectures led by industry speakers, as well as through tutorial work, debate and discussion that explore cases collected over the years, and draw heavily on the Industry Based Learning (IBL) experiences of the students.

Students have often expressed difficulty in thinking through ethical situations. PIIT is usually the only subject requiring this in their computing courses. Despite their lack of familiarity with this type of work, almost all students, after finishing the subject, rate it as one of the most valuable to their professional development and one of the most enjoyable in their course.

To overcome students' initial difficulties, a simple approach to scenario analysis has been developed. Formative feedback during the semester from tutors has often involved answering student queries in terms of this process, getting them to think through pertinent issues. Similarly, summative assessment has shown that critical thinking and meaningful consideration of multiple alternate solutions to derive a best fit, most frequently occur when this approach is adopted by students. Although the technique was developed for student use, it is not limited to this context. In the view of the authors, it is widely applicable. To illustrate this point, the scenarios below offer a professional Internet developer's viewpoint, with the technique applied as though carried out by professional peers.


Related Discussions:- Professional issues in information technology

Explain the various costs of quality, Problem 1: Show what are the bene...

Problem 1: Show what are the benefits of project quality management? • Customer satisfaction • Reduced cost • Increased competitiveness • Fulfilment of social and economic r

Pcm encoder, You have been asked to setup a remote temperature sensing syst...

You have been asked to setup a remote temperature sensing system for an electric furnace. The system consists of a sensor unit which feeds an analogue signal to a PCM encoder. The

Calculate the minimum sampling rate, QUESTION An analog sensor is used...

QUESTION An analog sensor is used to monitor the temperature of sea water at different depth. The sensor is fitted to a buoy and incorporates a wireless transmitter that send

Explain the terms used in network security, Question 1 (a) Explain b...

Question 1 (a) Explain briefly the following terms as used in network security: (i) Denial of service (DoS) attack (ii) Birthday attack (iii) DeMilitarized Zone

Describe benefits of effective communication, Question: (a) Explain the...

Question: (a) Explain the following terms: Information Communication Technology, Operating System and Application Software. (b) Define what a computer is, give four anatomi

Define byte stuffing, Sometimes the special character may see in data and a...

Sometimes the special character may see in data and as a part of data they will be misinterpreted as packet data. The solution to this cause is Byte stuffing.   In general to

Encryption key size-cryptography, Encryption Key Size When using ciphers...

Encryption Key Size When using ciphers, the size of crypto variable or key is quite important as the strength of many encryption applications and cryptosystems were measured by

Explain briefly how go-back-n operates, Question: a) There are two basi...

Question: a) There are two basic approaches to dealing with errors in the presence of pipelining. One way is Go-Back-N and the other strategy is Selective Repeat. i. Explain

Describe briefly an artificial intelligent technique, Question : (a) W...

Question : (a) What is an IDS and what is the basic problem it faces which can be solved by Artificial Intelligence. (b) Identify and describe briefly an Artificial Intell

Legal, LEGAL, ETHICAL AND PROFESSIONAL ISSUES To minimize liabilities an...

LEGAL, ETHICAL AND PROFESSIONAL ISSUES To minimize liabilities and reduce risks, information security practitioner should: •    to understand current legal environment •    to s

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd