CET 4930 - Professional Issues in IET

CET 4930 - Professional Issues in Information Engineering Technology

Last modified: 20 August 2012 by R.Levow: Original posting.

Professor: Roy B. Levow
Textbooks:  CyberEthics Morality and Law in CyberSpace, 4rd edition, Richard A. Spinello, Jones and Bartlett, 2011, ISBN 978-0-7637-0015-9
    Information Security Illuminated, Michael Solomon and Mike Chapple, Jones and Bartlett, 2005, ISBN 0-7637-2677-X

Current Events: ACM TECHNews, C-Net Tech News, Ziff-Davis Tech Update
Reference Sites: ACM Code of Ethics, IEEE Code of Ethics

Prerequisite: B.I.E.T. major with at least 30 credits of computing courses and ENC 2210 (or ENC 1102).

Catalog Description

Study of ethical, legal, and security issues in computing.  Ethical and legal topics covered include computer law, privacy, intellectual property rights, social impact of computing, and professional ethics.  Security issues include physical, software system, and network security. Students will do oral and written technical reports that will be graded for writing, presentation, and content.

Course Objectives

On completion of the course, students will have demonstrated the following knowledge or skills.

  1. Understand major of social issues related to computing.
  2. Understanding ethical issues related to work as a computing professional.
  3. Understanding the principles of information system security.
  4. The ability to do oral effective presentations related to Informaiton Engineering Technology.
  5. The ability to write technical reports and documents related to Information Engineering Technology.

Class Syllabus (times are approximate)

  1. Course Introduction
    Introduction to ethics: principles, frameworks, normative principles (1 week)
  2. Free speech and regulation of the internet (1.5 week)
  3. Intellectual property and protections: copyrights and patents for IT (1.5 weeks)
  4. Protecting private information in information systems and on the internet (1 week)
  5. Introduction to information security (1 week)
  6. Exam I (topics 1-5) (does not replace lecture)
  7. Access control techniques (1 week)
  8. General security principles (1 week)
  9. The business case for security (1 week)
  10. Cryptographic techniques (1 week)
  11. Network security and firewalls (2 week)
  12. Security threats, detection, and prevention (3 week)
  13. Exam II (topics 6-11)

Assignments will be posted in Blackboard

Class Policies and Grading

The grade will be based on student work on assignments, exams, and participation in class.  Regular participation in class discussions is a required element of the course.  Written assignments will be submitted using Blackboard.  Exams will be administered online using Blackboard.  The final grade will be weighted as follows:  Assignments 50%, Midterm Exam 20%, Final Exam 20%, Participation 10%.

Click here for general information on course policies including program submission, late penalties, getting help, etc.

Plagiarism and SafeAssign

Writing assignments will be submitted through Blackboard to SafeAssign, a plagiarism detection service   Material in your report that is quoted from or derived from another source must be appropriately identified and referenced with a proper citation.   Significant failure to follow these guidelines will result in a failing grade for the course and may lead to the filing of an Academic Irregularity report.

 

[Prof. Roy Levow] [COP 3813 - Intro to Internet Computing] [COP 4814 - Web Services] [CET 4915 - Capstone Project (BIET)] [CET 4930 - Professional Issues in IET] [Previous Classes]