DEPARTMENT OF
COMPUTER
SCIENCE
Course
Guide
(Fall 2019)
Professional Practices (CS – 270)
FALL 2022
BSCS-III
Instructor: Muhammad Yasir Khan
Email:
[email protected]Office: B124
Extension#: 567
Air University Multan Campus
Course Objectives:
Professional Practices (IT) enables students to extend their knowledge and skills within a practical
environment. This course provides a practical and theoretical introduction to what it means to be an IT
professional today. Students will encounter a range of issues relevant to professional practice in the
workplace, as well as an understanding of the wider responsibilities that professionals are called upon to
uphold in society.
The main goal of this course is for the student to develop an understanding of the following:
1. Issues caused due to information systems
Students will understand how computing and information systems give rise to social
issues and ethical dilemmas.
2. Ethics
To make students capable of making an appropriate decision in their professional lives
with difficult situations involving ethical issues and make a positive impact in the field of
IT.
3. Privacy
To make students capable of making an appropriate decision in their professional lives
with difficult situations involving privacy issues.
4. Cyber laws regulations and Workplace Crimes
To make students capable of making an appropriate decision in their professional lives
with difficult situations involving ethical issues and make a positive impact in the field of
IT.
5. Freedom of Speech
To make students capable of making an appropriate decision in their professional lives
with difficult situations involving laws for freedom of speech and knowledge sharing to
make a positive impact in the field of IT.
6. Intellectual Property Law
To make students capable of making an appropriate decision in their professional lives
with difficult situations involving applicability of Intellectual Property Law, its regulations
on Free Software, and Pakistan’s Cyber Crime law to make a positive impact in the field
of IT.
7. Job Discrimination
To make students capable of understanding the meaning of job discrimination, evidence
of job discrimination, affirmative actions. Pakistani laws on Job discrimination.
8. Research Ethics
To make students capable of making an appropriate decision in their professional lives
with difficult situations involving knowledge of doing research, and the violation of
research ethics to make a positive impact in the field of IT.
9. Professional Ethics and Responsibilities
To make students capable of making an appropriate decision in their professional lives
with difficult situations involving violation of professional code of practices and make a
positive impact in the field of IT.
Software Engineering Code of Ethics IEEE/ACM
To make students capable of making an appropriate decision in their professional lives
with difficult situations involving implementation of ethically secure software and make a
positive impact in the field of IT.
Pre-requisites
None
Relevant Program Learning Outcome (PLO/S):
The course is designed so that students will achieve the following PLO/s:
PLO8: Computing Professionalism and Society:
Understand and assess societal, health, safety, legal, and cultural issues within local and global
contexts, and the consequential responsibilities relevant to professional computing practice.
PLO9: Ethics:
Understand and commit to professional ethics, responsibilities, and norms of professional
computing practice.
Course Learning Outcomes:
Upon successful completion of the course, the student will be able to:
CLO# Description Level PLO
CLO-1 Describe and classify the individual attitude and Understanding PLO9
organizational behaviour
CLO-2 Discuss as well as interpret the professional Understanding PLO9
aspects of ethics from constitution of Pakistan
CLO-3 Debate and recognize conflicts in an ethical way Evaluation PLO8
at national and international level
CLO-4 Follow and implement the acquired knowledge of Applying PLO9
ethical skills in given situations by controlling
his/her temperament
Assessment of CLOs:
Performance related to each CLO is assessed as follows
CLOs Assessments Taxonomy PLO
Quizzes Assignments Mid-Term Final Level
CLO-1 Quiz 1 Assignment 1 Q1 [30%] Q1 [25%] C2 PLO9
CLO-2 Quiz 2 Assignment 2 Q2 [30%] Q2 [25%] C2 PLO9
CLO-3 Quiz 3 Assignment 3 Q3 [40%] Q3 [25%] C3 PLO8
CLO-4 Quiz 4 Assignment 4 Q4 [25%] C6 PLO9
Course Outline with Week Breakdown:
Week Contents Assessment Lab Reading Material
# Due Activity
1 1. Inspiration for N/A
CS students Chapter 1 Textbook
and course
overview.
2. Advances in technology
leading to invasion of
privacy
3. Rapid Pace of Change,
New Developments and
Dramatic Impacts, Issues
and Themes.
2 1. Ethics Definition, and how Chapter 1 Textbook
Philosophy Drives Ethics
2. Laws implementing ethics
and Law enforcing a
particular group’s idea of
how people should behave.
3. Theories of Ethics, Morality
and Beliefs
4. Best practice theory of
ethics, Morals, and
Beliefs for solving
problems of Society
5. Software Engineering and
ACM Code of Professional
Ethics
3 1. What is privacy? Chapter 2 Textbook
a. Aspects of privacy
protecting Systems
b. Public Concern of
Privacy
2. Protecting
Privacy, Fair
principles of
information Ethical
Guidelines for
Computer
Professionals
4 4. Privacy and Computer Chapter 2 Textbook
Technology
a. “Big Brother is
Watching You”.
5. Privacy in Business and
Social Media
a. Parental
monitoring,
right to be
forgotten
6. Government Databases
7. Technology Apps for
Protecting Privacy / Exploiting
Privacy
8. Business Ethics, Society and
Consumer Ethics
5 Workplace Environment/Crimes: Chapter 6 Textbook
1. Work place Crimes
2. Employment and changing
skill levels
3. Modes of Global
Workforce.
Outsourcing, Off
shoring side effects.
4. Product safety
5. Employee
Monitoring/Communication
on social media (Job
Applicant’s privacy on Net)
6 Cyber-Crimes Chapter 5 Textbook
1. Hacking
2. Identity Theft and
Credit Card Fraud,
forgery scams
Technologies for
stealing identities
Hacking
7 1. Identity Theft and Chapter 5 Textbook
Credit Card Fraud,
forgery scams
a. Technologies for
stealing identities
2. Anti-Hacking tactics
and counter tactics to
Credit card frauds
3. Crime Fighting
Versus Privacy and
Civil Liberties
4. Laws Against Hacking:
Laws that Rule the
Web Pakistan Cyber
Crime Bill 2016
8 Mid Term
9 Freedom of Speech Chapter 3 Textbook
1. Communications
2. Changing Communication
Paradigms
3. Controlling Offensive Speech
a. Spam,
Sexiting,
offensive
speech,
defamatio
n
4. Censorship on the Global Net
5. Political
Campaign
Regulations in
Cyberspace
6. Anonymity in cyber space
7. Protecting Access
and Innovation:
Net Neutrality or
De-regulation?
a. Net bandwidth control
Contents restricted
10 Intellectual Property Chapter 4 Textbook
1. Intellectual Property
and Changing
Technology
2. Copyright Law and Significant
Cases
a. 3rd Party
Copyright issue
on net in User
generated
contents Copying
and Sharing
11 1. Search Engines and Online Chapter 4 Textbook
Libraries
2. Free-Speech Issues
3. Freedom of Information
sharing Act and Case study
4. Free Software (FOSS)
a. Free software
types (copy left
and permissive)
and examples
Patent: Issues for
Software
Developers
12 Case Studies on IP rights and Chapter 7 Textbook
cyber crimes
Evaluating technology
1. Information, Knowledge,
and Judgment
2. Computers and
Community
3. The ‘Digital Divide’
4. Evaluations of the
Impact of Computer
Technology Making
Decisions About
Technology
13 Job Discrimination Chapter 9 Textbook
1. The meaning of job
discrimination
2. Affirmative action: a legal
context Affirmative action:
the moral issues
14 Plagiarism: Chapter 15 Textbook
(Pages 91-114)
1. SE code of
ethics in
software
development
2. What is PE how they
are different from
Normal Ethics
3. Intellectual property rights
International Cyber Crime
regulations / Laws.
15 Presentations
16 Revisions
17 Final Exams
Books / Reference Materials:
Text Book:
Sara Baase (2013), A Gift of Fire, Social, Legal, and Ethical Issues for
Computers and the Internet, 4th Edition, Prentice-Hall.
Reference Books:
Ferrora, Reder, Bird, Darrow, Aresly, Kiosek, Lichtenstein (2012),
“CyberLaw Text & Cases”, 3rd edition
Software Tools/ IDEs:
In this course the students will utilize the following tools:
MS Word
MS Powerpoint
General Grading Policy:
The tentative assessment’s weightage are as follows:
Item Assessment Weightage
Task
1 Mid Term 25%
2 Final Term 45%
3 Quizzes 10%
4 Assignments 10%
5 Presentations 10%
Grading and General Course Policies:
● Assignments and/or grade percentages are subject to change.
● There will be no makeup quizzes / assignments
● No late assignments will be accepted.
● All assignments and projects submitted should be the outcome of individual work only. In the case
of a group activity, it will always be explicitly announced
Plagiarism
We want to make it clear to you that we have a zero-tolerance policy for cheating and plagiarism. You have
made it to Air university after passing through significant competition. Do not squander a promising
opportunity that may have a significant impact on your future. After all, it will be too bad to be expelled from
university or to end up with an F grade.
Some typical cases that we have encountered in the past include submitting identical homework, copying a
paragraph from the internet for your assignment without referencing the source, and taking someone else’s
code, changing variable names in it, and then submitting it under your name.
The instructors also reserve the right to use automated tools to check for plagiarism.
Class Discipline
Participation in, and contribution to, class discussions will positively help you in understanding and applying
the concepts learned during the lectures. Raise your hand if you have any questions. Making any kind of
disruption (e.g. side talks, continually come to class late, continually leaving class early, use of cell phones,
etc.) in the class is strongly discouraged and may result in the removal of students from the lectures.
Course communication
All communication in this course will be done via emails, WhatsApp group, and Google classroom. You are
expected to regularly monitor the above communication channels for any important announcements during
the course.
Attendance
Excellent attendance (minimum 75%) is expected. University policy automatically assigns a WF
grade if a student misses 25% of the classes that are not excused.