Professional issues in information technology, Computer Network Security

Assignment Help:

Thinking ethically is difficult without a background in moral philosophy. Asking people to embrace ethics without offering practical explanation of the efficacy of so doing, is a thankless task. A technique that people can follow easily, that helps them value ethical behaviour is needed. Illustrations of such a procedure show how professional scenarios are used in the domain of web accessibility. Scenario design and extensions to the technique are considered.

At Swinburne University of Technology, 'Professional Issues in Information Technology' (PIIT) is taught to all final year IT students. It can be taken by students from other faculties as an elective, although students without industrial experience are strongly discouraged from taking the subject. Over the past 12 years, as the subject has evolved, the focus has been to explore real cases that will confront young (and not so young) professionals in the workplace. This is achieved by having about half the lectures led by industry speakers, as well as through tutorial work, debate and discussion that explore cases collected over the years, and draw heavily on the Industry Based Learning (IBL) experiences of the students.

Students have often expressed difficulty in thinking through ethical situations. PIIT is usually the only subject requiring this in their computing courses. Despite their lack of familiarity with this type of work, almost all students, after finishing the subject, rate it as one of the most valuable to their professional development and one of the most enjoyable in their course.

To overcome students' initial difficulties, a simple approach to scenario analysis has been developed. Formative feedback during the semester from tutors has often involved answering student queries in terms of this process, getting them to think through pertinent issues. Similarly, summative assessment has shown that critical thinking and meaningful consideration of multiple alternate solutions to derive a best fit, most frequently occur when this approach is adopted by students. Although the technique was developed for student use, it is not limited to this context. In the view of the authors, it is widely applicable. To illustrate this point, the scenarios below offer a professional Internet developer's viewpoint, with the technique applied as though carried out by professional peers.


Related Discussions:- Professional issues in information technology

CNSS Security model, "Using the CNSS Model, examine each of the cells and w...

"Using the CNSS Model, examine each of the cells and write a brief statement on how you would address the components respesented in that cell"

Ipv6 base header format, IPV6 BASE HEADER FORMAT: It has less informat...

IPV6 BASE HEADER FORMAT: It has less information than IPV4 message header. Next header shows to first extension message header. Flow label is partitioned into a TRAFFIC CLASS

CRC, CRC in matlab

CRC in matlab

Introduction to risk management and its component, INTRODUCTION TO RISK MAN...

INTRODUCTION TO RISK MANAGEMENT Risk management is the procedure of identifying and controlling risks facing an organization. Risk management is the discipline which is employed

Define full-duplex., A  full-duplex (FDX) , accepts communication in both...

A  full-duplex (FDX) , accepts communication in both ways, and, unlike half-duplex, accept this to occur simultaneously. Land-line telephone networks are full-duplex, since they

Define protocol, For simplicity, each character is regarded as one data pac...

For simplicity, each character is regarded as one data packet, which means that the data in each packet should have the max length of only 1 byte. Your own packet header (not th

Address resolution techniques, Address resolution algorithms may be grouped...

Address resolution algorithms may be grouped into three basic types: Table lookup Closed-form computation Message Exchange 1. TABLE LOOKUP: In Table Loo

Describe the functioning of cloud computing, Question 1:  Describe the ...

Question 1:  Describe the functioning of cloud computing. Question 2: Discuss on "Platform as a Service". Question 3: Discuss the steps involved in effective co

Explain how can we achieved privacy in an e-mail system, Explain how can we...

Explain how can we achieved privacy in an e-mail system.  The full form of PEM is Privacy Enhanced Mail: PEM  is  the  internet  Privacy  Enhanced  Mail  standard  adopted

Ip Datagram, Size of Option field of an ip datagram is 20 bytes. What is th...

Size of Option field of an ip datagram is 20 bytes. What is the value of HLEN? What is the value in binary?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd