SlideShare a Scribd company logo
Course Title Learning Outcomes
Capstone Project and Research 2
Evaluate ad interpret the performance results of
the IT solutions based on identified evaluation
metrics.
Recommend possible improvements in the IT
solution due to implementation issues.
Justify how resources will be allocated to the
various administrative domains.
ITE 303
Social and Professional Issues
Argue the pros and cons of the design and
implementation of computing solutions in various
organizations.
Analyze ethical and legal issues that arise in IT
field to determine how to address them technically
and ethically.
Examine the relationship between threats,
vulnerabilities, countermeasures, attackers,
compromises and remediation throughout the
entire system life cycle.
COURSE: ITE 303
Social and Professional Issues
Topics
 Morality and Law
 Ethics and Ethical Responsibilities
 Professions and Professionalism
 Privacy in the Cyberspace
 Anonymity in the Internet
 Security in the Cyberspace
 Intellectual Property Rights
 Cyber Crime
 Artificial Intelligence
 Online Communities and Virtual Environments
 Online Social Network Ecosystems
Capstone Project 2 and Social and Professional Issues Deliverables

More Related Content

What's hot

IoT
IoTIoT
IoT
Mphasis
 
The Internet of Things (IoT)
The Internet of Things (IoT)The Internet of Things (IoT)
The Internet of Things (IoT)
Dadhaniya Renish
 
A Survey of Building Robust Business Models in Pervasive Computing
A Survey of Building Robust Business Models in Pervasive ComputingA Survey of Building Robust Business Models in Pervasive Computing
A Survey of Building Robust Business Models in Pervasive Computing
Osama M. Khaled
 
Different applications and security concerns in Iot by Jatin Akad
Different applications and security concerns in Iot by Jatin AkadDifferent applications and security concerns in Iot by Jatin Akad
Different applications and security concerns in Iot by Jatin Akad
Jatin Akar
 
03.ethics
03.ethics03.ethics
IEEE Projects
IEEE ProjectsIEEE Projects
IEEE Projects
cegonsoft1999
 

What's hot (6)

IoT
IoTIoT
IoT
 
The Internet of Things (IoT)
The Internet of Things (IoT)The Internet of Things (IoT)
The Internet of Things (IoT)
 
A Survey of Building Robust Business Models in Pervasive Computing
A Survey of Building Robust Business Models in Pervasive ComputingA Survey of Building Robust Business Models in Pervasive Computing
A Survey of Building Robust Business Models in Pervasive Computing
 
Different applications and security concerns in Iot by Jatin Akad
Different applications and security concerns in Iot by Jatin AkadDifferent applications and security concerns in Iot by Jatin Akad
Different applications and security concerns in Iot by Jatin Akad
 
03.ethics
03.ethics03.ethics
03.ethics
 
IEEE Projects
IEEE ProjectsIEEE Projects
IEEE Projects
 

Similar to Capstone Project 2 and Social and Professional Issues Deliverables

computingcomputingcomputingcomputingcomputingcomputingcomputingcomputingcompu...
computingcomputingcomputingcomputingcomputingcomputingcomputingcomputingcompu...computingcomputingcomputingcomputingcomputingcomputingcomputingcomputingcompu...
computingcomputingcomputingcomputingcomputingcomputingcomputingcomputingcompu...
ma7808766
 
1Ethical issues arising from use of ICT technologiesStud.docx
1Ethical issues arising from use of ICT technologiesStud.docx1Ethical issues arising from use of ICT technologiesStud.docx
1Ethical issues arising from use of ICT technologiesStud.docx
drennanmicah
 
Ethics Part-2-new1.pptx
Ethics Part-2-new1.pptxEthics Part-2-new1.pptx
Ethics Part-2-new1.pptx
MohammedAish
 
INVESTIGATING GAME DEVELOPERS’ GUILT EMOTIONS USING SENTIMENT ANALYSIS
INVESTIGATING GAME DEVELOPERS’ GUILT EMOTIONS USING SENTIMENT ANALYSISINVESTIGATING GAME DEVELOPERS’ GUILT EMOTIONS USING SENTIMENT ANALYSIS
INVESTIGATING GAME DEVELOPERS’ GUILT EMOTIONS USING SENTIMENT ANALYSIS
ijseajournal
 
· General Design Analysis - Information is collected from library.docx
· General Design Analysis - Information is collected from library.docx· General Design Analysis - Information is collected from library.docx
· General Design Analysis - Information is collected from library.docx
alinainglis
 
Ethic02
Ethic02Ethic02
Eleonora Fiore: Ethical challenges of the Internet of Things in the household...
Eleonora Fiore: Ethical challenges of the Internet of Things in the household...Eleonora Fiore: Ethical challenges of the Internet of Things in the household...
Eleonora Fiore: Ethical challenges of the Internet of Things in the household...
RSD Relating Systems Thinking and Design
 
Ethics.ppt
Ethics.pptEthics.ppt
Ethics.ppt
ClaudeDex
 
Course overview
Course overviewCourse overview
Course overview
Viettel
 
pic and place.you need in your daily life
pic and place.you need in your  daily lifepic and place.you need in your  daily life
pic and place.you need in your daily life
muhammadshahbaz66570
 
3.0 computer ethic
3.0 computer ethic3.0 computer ethic
3.0 computer ethic
fauzihayob
 
The ethics of software engineering
The ethics of software engineeringThe ethics of software engineering
The ethics of software engineering
jndatirwa
 
P.practices-week-2.pptx
P.practices-week-2.pptxP.practices-week-2.pptx
P.practices-week-2.pptx
IshratFatima288747
 
Security and ethical challenges of it
Security and ethical challenges of itSecurity and ethical challenges of it
Security and ethical challenges of it
Praveen Choursiya
 
Ethics Case Study Review_JKostak_APA_Style
Ethics Case Study Review_JKostak_APA_StyleEthics Case Study Review_JKostak_APA_Style
Ethics Case Study Review_JKostak_APA_StyleJohn Kostak
 
NIST Privacy Engineering Working Group -- Risk Models
 NIST Privacy Engineering Working Group -- Risk Models NIST Privacy Engineering Working Group -- Risk Models
NIST Privacy Engineering Working Group -- Risk Models
David Sweigert
 
Professional practices week 2 lec 2.pptx
Professional practices week 2 lec 2.pptxProfessional practices week 2 lec 2.pptx
Professional practices week 2 lec 2.pptx
bahmed0192
 
IT Conferences 2024 To Navigate The Moral Landscape Of Artificial Intelligenc...
IT Conferences 2024 To Navigate The Moral Landscape Of Artificial Intelligenc...IT Conferences 2024 To Navigate The Moral Landscape Of Artificial Intelligenc...
IT Conferences 2024 To Navigate The Moral Landscape Of Artificial Intelligenc...
Internet 2Conf
 
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
360 BSI
 
Poster ECIS 2016
Poster ECIS 2016Poster ECIS 2016
Poster ECIS 2016Rui Silva
 

Similar to Capstone Project 2 and Social and Professional Issues Deliverables (20)

computingcomputingcomputingcomputingcomputingcomputingcomputingcomputingcompu...
computingcomputingcomputingcomputingcomputingcomputingcomputingcomputingcompu...computingcomputingcomputingcomputingcomputingcomputingcomputingcomputingcompu...
computingcomputingcomputingcomputingcomputingcomputingcomputingcomputingcompu...
 
1Ethical issues arising from use of ICT technologiesStud.docx
1Ethical issues arising from use of ICT technologiesStud.docx1Ethical issues arising from use of ICT technologiesStud.docx
1Ethical issues arising from use of ICT technologiesStud.docx
 
Ethics Part-2-new1.pptx
Ethics Part-2-new1.pptxEthics Part-2-new1.pptx
Ethics Part-2-new1.pptx
 
INVESTIGATING GAME DEVELOPERS’ GUILT EMOTIONS USING SENTIMENT ANALYSIS
INVESTIGATING GAME DEVELOPERS’ GUILT EMOTIONS USING SENTIMENT ANALYSISINVESTIGATING GAME DEVELOPERS’ GUILT EMOTIONS USING SENTIMENT ANALYSIS
INVESTIGATING GAME DEVELOPERS’ GUILT EMOTIONS USING SENTIMENT ANALYSIS
 
· General Design Analysis - Information is collected from library.docx
· General Design Analysis - Information is collected from library.docx· General Design Analysis - Information is collected from library.docx
· General Design Analysis - Information is collected from library.docx
 
Ethic02
Ethic02Ethic02
Ethic02
 
Eleonora Fiore: Ethical challenges of the Internet of Things in the household...
Eleonora Fiore: Ethical challenges of the Internet of Things in the household...Eleonora Fiore: Ethical challenges of the Internet of Things in the household...
Eleonora Fiore: Ethical challenges of the Internet of Things in the household...
 
Ethics.ppt
Ethics.pptEthics.ppt
Ethics.ppt
 
Course overview
Course overviewCourse overview
Course overview
 
pic and place.you need in your daily life
pic and place.you need in your  daily lifepic and place.you need in your  daily life
pic and place.you need in your daily life
 
3.0 computer ethic
3.0 computer ethic3.0 computer ethic
3.0 computer ethic
 
The ethics of software engineering
The ethics of software engineeringThe ethics of software engineering
The ethics of software engineering
 
P.practices-week-2.pptx
P.practices-week-2.pptxP.practices-week-2.pptx
P.practices-week-2.pptx
 
Security and ethical challenges of it
Security and ethical challenges of itSecurity and ethical challenges of it
Security and ethical challenges of it
 
Ethics Case Study Review_JKostak_APA_Style
Ethics Case Study Review_JKostak_APA_StyleEthics Case Study Review_JKostak_APA_Style
Ethics Case Study Review_JKostak_APA_Style
 
NIST Privacy Engineering Working Group -- Risk Models
 NIST Privacy Engineering Working Group -- Risk Models NIST Privacy Engineering Working Group -- Risk Models
NIST Privacy Engineering Working Group -- Risk Models
 
Professional practices week 2 lec 2.pptx
Professional practices week 2 lec 2.pptxProfessional practices week 2 lec 2.pptx
Professional practices week 2 lec 2.pptx
 
IT Conferences 2024 To Navigate The Moral Landscape Of Artificial Intelligenc...
IT Conferences 2024 To Navigate The Moral Landscape Of Artificial Intelligenc...IT Conferences 2024 To Navigate The Moral Landscape Of Artificial Intelligenc...
IT Conferences 2024 To Navigate The Moral Landscape Of Artificial Intelligenc...
 
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
 
Poster ECIS 2016
Poster ECIS 2016Poster ECIS 2016
Poster ECIS 2016
 

Recently uploaded

Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 

Recently uploaded (20)

Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 

Capstone Project 2 and Social and Professional Issues Deliverables

  • 1. Course Title Learning Outcomes Capstone Project and Research 2 Evaluate ad interpret the performance results of the IT solutions based on identified evaluation metrics. Recommend possible improvements in the IT solution due to implementation issues. Justify how resources will be allocated to the various administrative domains. ITE 303 Social and Professional Issues Argue the pros and cons of the design and implementation of computing solutions in various organizations. Analyze ethical and legal issues that arise in IT field to determine how to address them technically and ethically. Examine the relationship between threats, vulnerabilities, countermeasures, attackers, compromises and remediation throughout the entire system life cycle. COURSE: ITE 303 Social and Professional Issues Topics  Morality and Law  Ethics and Ethical Responsibilities  Professions and Professionalism  Privacy in the Cyberspace  Anonymity in the Internet  Security in the Cyberspace  Intellectual Property Rights  Cyber Crime  Artificial Intelligence  Online Communities and Virtual Environments  Online Social Network Ecosystems