Professional issues in information technology, Computer Network Security

Assignment Help:

Thinking ethically is difficult without a background in moral philosophy. Asking people to embrace ethics without offering practical explanation of the efficacy of so doing, is a thankless task. A technique that people can follow easily, that helps them value ethical behaviour is needed. Illustrations of such a procedure show how professional scenarios are used in the domain of web accessibility. Scenario design and extensions to the technique are considered.

At Swinburne University of Technology, 'Professional Issues in Information Technology' (PIIT) is taught to all final year IT students. It can be taken by students from other faculties as an elective, although students without industrial experience are strongly discouraged from taking the subject. Over the past 12 years, as the subject has evolved, the focus has been to explore real cases that will confront young (and not so young) professionals in the workplace. This is achieved by having about half the lectures led by industry speakers, as well as through tutorial work, debate and discussion that explore cases collected over the years, and draw heavily on the Industry Based Learning (IBL) experiences of the students.

Students have often expressed difficulty in thinking through ethical situations. PIIT is usually the only subject requiring this in their computing courses. Despite their lack of familiarity with this type of work, almost all students, after finishing the subject, rate it as one of the most valuable to their professional development and one of the most enjoyable in their course.

To overcome students' initial difficulties, a simple approach to scenario analysis has been developed. Formative feedback during the semester from tutors has often involved answering student queries in terms of this process, getting them to think through pertinent issues. Similarly, summative assessment has shown that critical thinking and meaningful consideration of multiple alternate solutions to derive a best fit, most frequently occur when this approach is adopted by students. Although the technique was developed for student use, it is not limited to this context. In the view of the authors, it is widely applicable. To illustrate this point, the scenarios below offer a professional Internet developer's viewpoint, with the technique applied as though carried out by professional peers.


Related Discussions:- Professional issues in information technology

Datagram reassembly, DATAGRAM REASSEMBLY Recreation of original datagr...

DATAGRAM REASSEMBLY Recreation of original datagram is known as reassembly. Ultimate receiver acts reassembly as given below.Fragments can reach out of order. Header bit check

Enterprise information security policy (eisp), Enterprise Information Secur...

Enterprise Information Security Policy (EISP) EISP also known as security policy directly supports the mission of the organization and sets the strategic direction, scope, and t

Describe the functionality of a router, QUESTION: (a) Explain, with the...

QUESTION: (a) Explain, with the aid of a diagram, a Star topology of a network of your choice. (b) Illustrate on the use of a MAN and give an example of one. (c) Describe

Deployment and implementing of an ids, DEPLOYMENT AND IMPLEMENTING OF AN ID...

DEPLOYMENT AND IMPLEMENTING OF AN IDS The strategy for deploying IDS should consider various factors. These factors will determine the number of administrators required to insta

Perimeter Network Security System coursework, what is the guaranteed qualit...

what is the guaranteed quality of this coursework? how many days it take for 10-12 pages? how much will be? thanks

List vulnerabilities of using wep, Question: The Wired Equivalent Priv...

Question: The Wired Equivalent Privacy (WEP) standard was created in order to give wireless networks safety and security features similar to that of wired networks. (a) L

Find the possible deciphering transformations, Question: (a) A string o...

Question: (a) A string of ciphertext was enciphered using an a±ne transformation of single letters in a 28-letter alphabet consisting of A to Z, a blank and a?, where A to Z ha

Unguided media, Unguided Media This is the wireless media that transfe...

Unguided Media This is the wireless media that transfer electromagnetic waves without using a physical media. Waves are broadcast through the air. This is performing through r

Explain security, W h a t do you understand by the terms security, netwo...

W h a t do you understand by the terms security, network security and information security? How network security and information security are connected? Security can be def

Firewall analysis tools-information security, FIREWALL ANALYSIS TOOLS Th...

FIREWALL ANALYSIS TOOLS There are a number of tools automate remote discovery of firewall rules and assist the administrator in analyzing rules Administrators who feel wary of u

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd