Professional issues in information technology, Computer Network Security

Assignment Help:

Thinking ethically is difficult without a background in moral philosophy. Asking people to embrace ethics without offering practical explanation of the efficacy of so doing, is a thankless task. A technique that people can follow easily, that helps them value ethical behaviour is needed. Illustrations of such a procedure show how professional scenarios are used in the domain of web accessibility. Scenario design and extensions to the technique are considered.

At Swinburne University of Technology, 'Professional Issues in Information Technology' (PIIT) is taught to all final year IT students. It can be taken by students from other faculties as an elective, although students without industrial experience are strongly discouraged from taking the subject. Over the past 12 years, as the subject has evolved, the focus has been to explore real cases that will confront young (and not so young) professionals in the workplace. This is achieved by having about half the lectures led by industry speakers, as well as through tutorial work, debate and discussion that explore cases collected over the years, and draw heavily on the Industry Based Learning (IBL) experiences of the students.

Students have often expressed difficulty in thinking through ethical situations. PIIT is usually the only subject requiring this in their computing courses. Despite their lack of familiarity with this type of work, almost all students, after finishing the subject, rate it as one of the most valuable to their professional development and one of the most enjoyable in their course.

To overcome students' initial difficulties, a simple approach to scenario analysis has been developed. Formative feedback during the semester from tutors has often involved answering student queries in terms of this process, getting them to think through pertinent issues. Similarly, summative assessment has shown that critical thinking and meaningful consideration of multiple alternate solutions to derive a best fit, most frequently occur when this approach is adopted by students. Although the technique was developed for student use, it is not limited to this context. In the view of the authors, it is widely applicable. To illustrate this point, the scenarios below offer a professional Internet developer's viewpoint, with the technique applied as though carried out by professional peers.


Related Discussions:- Professional issues in information technology

Fragmentation and path mtu, FRAGMENTATION AND PATH MTU IPv6 source is ...

FRAGMENTATION AND PATH MTU IPv6 source is responsible for fragmentation. Routers simply drop datagrams bigger than network MTU. So source have to fragment datagram to arrive d

Determine the round trip time, a) determine the RTT (round trip time) betwe...

a) determine the RTT (round trip time) between a client requesting a web page of 1024 bytes in size from an internal web server on a 100 Base-T Ethernet. Assume a one-way propagati

Efforts of advanced research project agency, ADVANCED RESEARCH PROJECT AGEN...

ADVANCED RESEARCH PROJECT AGENCY (ARPA) The efforts of ARPA was to active all its research groups have accept to new era computers. For this purpose ARPA started investing in wa

People, People,Procedures,Data Asset Identification-Risk Management Th...

People,Procedures,Data Asset Identification-Risk Management The human resources, data information and documentation assets are more difficult to identify. People having knowle

Elliptic curve encryption - decryption scheme, (a) (i) If m = p·q·r where...

(a) (i) If m = p·q·r where p, q, and r are prime numbers, what is Φ(m)? (ii) Therefore, Determine Φ(440). (b) Describe the following terms as used in cryptography: (i)

Internet protocol(ip), Internet Protocol IP Gives computer-to-comp...

Internet Protocol IP Gives computer-to-computer communication. Host and receiver addresses are computers. This is also known machine-to-machine communication.

Define shift operation, SHIFT OPERATION:  This operation replaced all...

SHIFT OPERATION:  This operation replaced all bits to the left one position. For example in the diagram below a 16-bit CRC hardware is given, which needs three Exclusive OR (

Risk control strategies-risk management, Risk Control Strategies Once th...

Risk Control Strategies Once the ranked vulnerability risk worksheet has created, they should choose one of following 4 strategies to control each risk: •    Apply safeguards wh

Explain how the framework will align to the model, MB Enterprise Systems Lt...

MB Enterprise Systems Ltd based in Mauritius is a company specialized in application development with Europe as the main customer base. The company has implemented CMMI and has rec

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd