COSC2P50 The Computing Professional John Levay

328 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
328
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
4
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

COSC2P50 The Computing Professional John Levay

  1. 1. COSC2P50 The Computing Professional John Levay [email_address] Prof. Jon Radue [email_address]
  2. 2. “ Everthing I wish I knew about business when I graduated”
  3. 3. Mark Distribution <ul><li>Seminars - 10 - best 9x3% = 27 </li></ul><ul><li>Resume/Cover Letter Assignment - 3% </li></ul><ul><li>Code of Conduct - 20% </li></ul><ul><li>Term Paper (4000 words) - 20% </li></ul><ul><li>Final Exam - 30% </li></ul>
  4. 4. Seminars <ul><li>Readings posted on web </li></ul><ul><li>50% preparation </li></ul><ul><ul><li>based on the readings and other research </li></ul></ul><ul><li>50% participation </li></ul><ul><li>must be in seminar to be marked </li></ul><ul><li>medical certificate will get an OMIT </li></ul>
  5. 5. Resume/Cover Letter <ul><li>Fictitious job posting </li></ul><ul><li>Apply for the job with a valid resume and cover letter as if you were a graduate </li></ul>
  6. 6. Academic Misconduct Policy <ul><li>What is plagiarism in programming? </li></ul><ul><li>Prepare a code of conduct for computer science students </li></ul><ul><li>More material will follow in the second week of classes </li></ul>
  7. 7. Term Paper <ul><li>4000 word essay </li></ul><ul><ul><li>proper essay format </li></ul></ul><ul><ul><li>http://www. brocku .ca/ studentdevcentre /learning/workshops.html </li></ul></ul><ul><li>Peer review required (5 papers) </li></ul><ul><li>plagiarism web site and 5% bonus for detecting non-cited work </li></ul>
  8. 8. Exam <ul><li>30% of final mark </li></ul><ul><li>must get 40% or better otherwise fail </li></ul><ul><ul><li>department policy </li></ul></ul><ul><li>Material for exam made up from lecture material - not seminars - could be some overlap because of topics </li></ul>
  9. 9. Course Topics <ul><li>Netiquette </li></ul><ul><li>Business writing </li></ul><ul><ul><li>resumes </li></ul></ul><ul><ul><li>correspondence </li></ul></ul><ul><li>How to conduct effective presentations </li></ul><ul><li>IT Training </li></ul><ul><li>Employment law </li></ul>
  10. 10. Course Topics … cont <ul><li>Copyright law </li></ul><ul><li>Wireless and Broadband Networks </li></ul><ul><li>IT business ownership </li></ul><ul><li>Management and Politics </li></ul><ul><li>Open source initiatives </li></ul><ul><li>IT Ethics </li></ul>
  11. 11. Course Topics … cont <ul><li>Video conferencing and distance collaboration </li></ul><ul><li>Other topics as time permits </li></ul>
  12. 12. Why a computer ethics course? <ul><li>What is computer or IT ethics? </li></ul><ul><ul><li>Involves a study of how people react to technology </li></ul></ul><ul><ul><li>Ethics is not rules </li></ul></ul><ul><ul><li>It is the free choice decisions that people make based on general broad societal rules to do what is right for society. </li></ul></ul>
  13. 13. Why is ethics study important? <ul><li>What does it involve? </li></ul><ul><ul><li>Computers </li></ul></ul><ul><ul><li>Telecommunications and broadband - wired, fibred and wireless </li></ul></ul><ul><ul><li>Video, audio, remote surgery </li></ul></ul><ul><ul><li>robotics </li></ul></ul><ul><ul><li>basically technology of any kind </li></ul></ul>
  14. 14. Topics to look at <ul><li>CD’s, DVD’s, Satellite, digital video, MP3’s </li></ul><ul><ul><li>Audio-galaxy, Kazaa, etc </li></ul></ul><ul><li>Hacking and Cracking </li></ul><ul><li>Pornography </li></ul><ul><ul><li>at home, work </li></ul></ul><ul><li>Communication surveillance at work/public </li></ul>
  15. 15. Losses <ul><li>Financial </li></ul><ul><li>Lost opportunity </li></ul><ul><li>Copyright </li></ul><ul><li>Tarnished reputation </li></ul><ul><li>Legal action </li></ul><ul><li>Loss of life </li></ul>
  16. 16. IT People must - <ul><li>Control ethical IT risks </li></ul><ul><li>Educate people to recognize unethical technological situations </li></ul><ul><li>Learn forensic computer skills </li></ul><ul><li>Must understand what the issues are </li></ul><ul><li>NO RIGHT ANSWERS - that is why we don’t test this </li></ul>
  17. 17. Course Objective <ul><li>Raise your sensitivity to harmful or potentially harmful issues </li></ul><ul><ul><li>technology related issues </li></ul></ul><ul><ul><li>technology associated issues </li></ul></ul><ul><ul><li>other areas where technology is not present </li></ul></ul><ul><li>Teach you to analyze situations and make appropriate responses/decisions </li></ul><ul><ul><li>there are not always easy rules it takes work to be ethical </li></ul></ul>
  18. 18. Results <ul><li>Work ethically </li></ul><ul><li>Create ethical work environment </li></ul><ul><li>Guide others to be ethical </li></ul><ul><li>Spot ethical situations </li></ul><ul><li>Report ethical violations </li></ul>

×