This document contains complete course outline of Professional Practices. Most of the topics are for computer science students. This document covers course of 32 lectures 1.5 hours each for professional practice course also known as Professional Ethics.
Accountability And Auditing In Professional PracticeSyed Hassan Ali
Accountability And Auditing In Professional practice
what is accountability
what is auditing
pillar of accountability
types of auditing
internal auditing
external auditing
example of auditing
real life example of auditing
real life example of accountability
why we use auditing
the main purpose of auditing
Accountability And Auditing In Professional PracticeSyed Hassan Ali
Accountability And Auditing In Professional practice
what is accountability
what is auditing
pillar of accountability
types of auditing
internal auditing
external auditing
example of auditing
real life example of auditing
real life example of accountability
why we use auditing
the main purpose of auditing
professional practices answers
You are the owner of a software engineering company. Your employees (engineers) want you to pay for them to attend training.
You are the owner of a software engineering company. Your employees (engineers) want you to let them do pro bono work for a local non-profit organization on company time.
You are a software engineer at a company where management routinely encourages you and your colleagues to use pirated software.
Cloud Computing is the internet-based computing wherby shared resources, software, and information are provided to computers and other devices on demand, like the electrcity grid
This lecture include introduction to software contracts. Before starting development companies prepare agreement document to deal with conflicts afterwards.
professional practices answers
You are the owner of a software engineering company. Your employees (engineers) want you to pay for them to attend training.
You are the owner of a software engineering company. Your employees (engineers) want you to let them do pro bono work for a local non-profit organization on company time.
You are a software engineer at a company where management routinely encourages you and your colleagues to use pirated software.
Cloud Computing is the internet-based computing wherby shared resources, software, and information are provided to computers and other devices on demand, like the electrcity grid
This lecture include introduction to software contracts. Before starting development companies prepare agreement document to deal with conflicts afterwards.
· General Design Analysis - Information is collected from library.docxalinainglis
· General Design Analysis - Information is collected from library/internet sources on a design problem that is local, nationwide, or worldwide in scope. A number of journals available online are an excellent place to start
The effect of alternate fuels on vehicle performance
· It is important for your paper to be well structured. Although each paper will be different, most papers should have:
· A. Problem Statement, including the significance of the problem and who is likely to be interested in the solution.
· B. Evaluation of the important factors involved in solving the problem.
· C. Presentation of one or more proposed solutions.
· D. Conclusions
12/3/2018 Week 8 Assignment Paper D - IFSM 304 7982 Ethics in Information Technology (2188)
https://learn.umuc.edu/d2l/le/content/329020/viewContent/12976314/View 1/1
Week 8 Assignment Paper D
Instructions
Paper D: Reflective paper on class learning.
Consider this assignment as a reflective piece on class learning as it applies to
Ethics in Information Technology. It describes your Ah-haor Eureka moments.
It is hoped that this course made you think about the ethical issues that occur
in your personal and work lives and how to go about making ethical choices.
Please use the ideas you learned from this course; how you will synthesize what
you learned from your research about your topic including - over-arching
issues, readings, discussion from class, and conclusions from other
assignments that apply to your research.
Please address the following elements:
From a class learning perspective, what were some of your “take-aways?”
How has this impacted your understanding of the ethical issues?
What will you do differently?
How has what you have learned in this course influenced your career?
As we continue to move toward a global community, what new
challenges might we see relating to ethics in IT?
You are to prepare a reflective piece of not more than 2-3 pages, double-
spaced and submit it to your Assignment Folder as an attached Microsoft Word
file. This paper may be subjective in nature!
javascript:void(0);
https://learn.umuc.edu/d2l/le/content/329020/navigateContent/347/Previous?pId=12976197
https://learn.umuc.edu/d2l/le/content/329020/navigateContent/347/Next?pId=12976197
Faculty Contact
Linda Beach [email protected]
Course Description
Recommended: IFSM 201. A comprehensive study of ethics and of personal and organizational ethical decision making in the use of
information systems in a global environment. The aim is to identify ethical issues raised by existing and emerging technologies, apply a
structured framework to analyze risk and decision alternatives, and understand the impact of personal ethics and organizational values on an
ethical workplace.
Course Introduction
The word ethics has its root in the word ethos, which most often refers to character. The concepts of ethics, character, right and wrong, and
good and evil have captivated humankind ever since we beg.
Erau cybersecurity and security degreesERAUWebinars
Slides from a degree briefing presented in April 2018 covering Embry-Riddle degrees in Aviation Security and Cybersecurity. Covers the BS in Aviation Security, the MS in Cybersecurity Management and Policy, the MS in Cybersecurity Engineering, and Non-credit Aviation Cybersecurity 3-day course.
Ethics and TechnologyACM Code of Ethics Project Guidelines.docxSANSKAR20
Ethics and Technology ACM Code of Ethics Project Guidelines
Spring 2018
(from course syllabus)
100 points – Code of Ethics Project
A summary description of five cases in computer ethics that violate five different parts of the Association for Computing Machinery (ACM) code of ethics, picking out the appropriate, relevant parts of the code and applying them to the cases of ethics violations. More details TBA.
This final project is intended to have your apply the code to five ethical issues we have considered this semester. Students are to articulate five distinct, separate issues in three “Parts”: articulate the “Ethical Issue,” relevant pats of the code, and “Applying the Code” to the issue, where a resolution grounded in the code is made. Each of the five examples should first describe the issue, then list the relevant parts of the code, and finally concluding how one should respond, applying the code to the issue. This process should have students cut and paste relevant parts of the entire code.
Example: Volkswagen Software Developers and Beating the Emissions Test:
Part 1: Ethical Issue: Software developer for VW and are asked to sign off on software designed to detect and pass emissions testing
Part 2: Relevant Parts of the Code1.1 Contribute to society and human well-being.
“An essential aim of computing professionals is to minimize negative consequences of computing systems, including threats to health and safety.”
“When designing or implementing systems, computing professionals must attempt to ensure that the products of their efforts will be used in socially responsible ways, will meet social needs, and will avoid harmful effects to health and welfare.”
“In addition to a safe social environment, human well-being includes a safe natural environment. Therefore, computing professionals who design and develop systems must be alert to, and make others aware of, any potential damage to the local or global environment.”
1.2 Avoid harm to others.
"Harm" means injury or negative consequences, such as undesirable loss of information, loss of property, property damage, or unwanted environmental impacts.
1.3 Be honest and trustworthy.
2.3 Know and respect existing laws pertaining to professional work.
ACM members must obey existing local, state, province, national, and international laws unless there is a compelling ethical basis not to do so.
Part 3: Applying Code to the Issue
The ACM code would condemn the actions of the VW software developer, as this software designed to avoid emissions tests. The resulting software violates 1.1 (doesn’t contribute to society and well-being, is not socially responsible, and against a safe natural environment. It violates 1.2 as it has unwanted environmental impacts, violates 2.3 as it violates emissions laws.
Grading will be based on comprehensiveness, choosing controversial ethical issues, citing most relevant parts of the code to the issue involved in a concise manner. Answers are due posted to ...
Project Access Control ProposalPurposeThis course project i.docxstilliegeorgiana
Project: Access Control Proposal
Purpose
This course project is intended to assess your ability to comprehend and apply the basic concepts related to information security management, such as the following:
The ability to discern when a risk assessment should be performed and carrying out the task
Understanding user or customer access requirements, whether remote or local
Using a layered security approach to establish and maintain access controls
Working with other departments, such as the human resources department, to identify and implement methods to prevent unwarranted exposure to information by inappropriate personnel
Your ability to execute the tasks within these information security domains and others will be evaluated against the learning objectives as identified and described in previous lessons of instruction for this course. Required Source Information and Tools
Web References: Links to Web references in this Instructor Guide and related materials are subject to change without prior notice. These links were last verified on August 2, 2014.
The following tools and resources will be needed to complete this project:
· Course textbook
· Access to the Internet
· Access to the library
· Text sheet: Integrated Distributors Incorporated (access_project_ts_integrateddistributors)Learning Objectives and Outcomes
Successful completion of this project will ensure that you are capable of supporting the implementation and management of an information systems security framework. To be able to do so, you need to be able to do the following:
Relate how an access control policy framework is used to define authorization and access to an information technology (IT) infrastructure for compliance.
Mitigate risks to an IT infrastructure’s confidentiality, integrity, and availability with sound access controls.
Relate how a data classification standard influences an IT infrastructure’s access control requirements and implementation.
Develop an access control policy framework consisting of best practices for policies, standards, procedures, and guidelines to mitigate unauthorized access.
Define proper security controls within the User Domain to mitigate risks and threats caused by human nature and behavior.
Implement appropriate access controls for information systems within IT infrastructures.
Mitigate risks from unauthorized access to IT systems through proper testing and reporting.Project Checkpoints
The course project has a checkpoint strategy. Checkpoint deliverables allow you to receive valuable feedback on your interim work. In this project, you have four ungraded checkpoint deliverables. (See the syllabus for the schedule.) You may discuss project questions with the instructor, and you should receive feedback from the instructor on previously submitted work. The checkpoint deliverable ensures refinement of the final deliverables, if incorporated effectively. The final deliverable for this project is a professional report and a PowerPoint presenta ...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...360 BSI
This 4 day intensive training workshop addresses the latest concerns on IT infrastructure and cybersecurity. This course covers effective strategies, techniques, systems, policies, and procedures to establish stronger cybersecurity and cybercrime controls, reduce operational risk, and improve online working whilst covering international best practices, ISO standards, compliance, audit, and industry regulations.
Course Participants will:
- Develop strategies and ways of working to improve detection of cyber security treats and improve information compliance
- Understand the security-related international information compliance and regulations, including industry specific standards
- Expand the expertise of personnel involved in developing skills and knowledge in the latest techniques, processes, and systems on cyber security, which will enable teams to become more effective
- Align cybersecurity, cybercrime and information compliance within the organization with related initiatives, including HR training and legal departments
- Help managers gain more confidence in cyber security awareness and understand information compliance in their industries
- Improve the overall process for secure working and reducing risk when dealing with different kinds of information such as confidential and sensitive data
Contact kris@360bsi.com to register.
Professional Ethics , there importance in human life. Professional ethics in Islam. Ethics which should be follow by the developer or Software Engineering
Similar to Professional Practice Course Outline (20)
Social Impacts of Artificial intelligenceSaqib Raza
This lecture gives detail introduction, applications about AI. This lecture gives details about the social perspective and realities in the field of AI.
This lecture includes detail about ethical hacking profession, there jobs description, responsibilities duties and skills required to excel in their field.
This lecture includes introduction to computers security and privacy. This lecture include basic concepts of terminologies and technologies involve in current securities and privacy needs.
This lecture include detail about engineering especially software engineering profession. include common and mostly used schema to develop organisational structure.
This is a detail lecture about software re-engineering. To make software more maintainable. This lecture also give detail about software reverse engineering. When to re-engineer and how to re-engineer software.
This lecture is about the detail definition of software quality and quality assurance. Provide details about software tesing and its types. Clear the basic concepts of software quality and software testing.
This lecture provide a detail concepts of user interface development design and evaluation. This lecture have complete guideline toward UI development. The interesting thing about this lecture is Software User Interface Design trends.
This lecture helps to understand basics software design and especially Architecture Design and its importance. This lecture also describes the goals and importance of architecture design.
This lecture provide a review of requirement engineering process. The slides have been prepared after reading Ian Summerville and Roger Pressman work. This lecture is helpful to understand user, and user requirements.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
2024.06.01 Introducing a competency framework for languag learning materials ...
Professional Practice Course Outline
1. THE UNIVERSITY OF LAHORE
Course Outline
FALL Semester September 2017
Session 2017-18
CS-3327 Professional Practices
Effective Date: 18 September, 2017
SCU 3 Credit(s)
Co-requisite (s) None
Pre-requisite(s) Introduction to computing (CS-1010)
Weekly tuition pattern 2 sessions (90 min session)
Teaching Team
Syed Saqib Raza Rizvi
saqib.raza@cs.uol.edu.pk
1- Course Description
A Computing graduate as professional has some responsibilities with respect to the
society. This course develops student understanding about historical, social, economic,
ethical, and professional issues related to the discipline of Computing. It identifies key
sources for information and opinion about professionalism and ethics. Students analyze,
evaluate, and assess ethical and professional computing case studies.
2- Objectives
The course mainly aims to achieve the following objectives:
1. Defines that why students want to graduate in computing field and what are the
common things in every organization?
2. Describe in detail the field of computing and its subfields.
3. Describes what a profession is and what makes a profession.
4. Define the structure and little history of the engineering.
5. Describes the professional ethics, definitions, types, and standards, and social
responsibilities.
6. Introduces the professional code of ethics by IEEE-CS/ACM and its weaknesses.
7. Describe computer misuse act, intellectual property rights, and cyber law.
8. Describe the importance of information security and how we can secure it by
using various methods.
2. 9. Defines the need and brief introduction about the software contracts.
10. Defines the anatomy of software house organizations.
3- Student Learning Outcomes
By the completion of this course, the students should able to:
1. Know the scope of computing field after graduating in it and what are the
common things in every organization.
2. Distinguish between the various fields of computing.
3. Describe the core of any profession.
4. Know that how business and professional environment of computing field work.
5. Adhere his responsibilities according to profession, organization, and himself.
6. Know that how broadly code of ethics will affect his actions during employment.
7. Know the standards and rules about intellectual property, computer misuse, and
cyber law.
8. Know the standards/tools/models/polices/principles to secure information.
9. Write and analyze software contracts as an employer or an employee.
10. Know the business and professional environment of software house.
4- Course Structure
1. Presentation by lecturer
2. Group discussion
3. Assignments
4. Presentations
5. Quiz
6. Mid Term and Final Term Exams
5- Course Duration
This course will be held twice a week of 3 hours (each 60 min session) class duration.
6- Course style
The course will be delivered in a classroom environment.
7- Additional Course Requirement
In addition to the objectives of this course, students are expected to gain skills which
would be needed in the professional work environment. These skills include but not
limited to: Writing, Presentation, Decision Making and Teamwork.
8- Text and Other Resources
8.1 Text
3. 1. Professional Issues in Software Engineering, M.F. Bott et al.
8.2 Other Resources
1. Information Security: Principles and Practices, Mark Merkow et al.
9- Course Outline
The lecturers are supposed to complete the following topics/sub-topics before the
mid/final term examination as prescribed in the course outline below:
Week Lecture Topics/Sub-Topics Reading Material
1
1
Introduction to Ethics, Philosophies regarding to
Ethics and morals, Introduction to Computer and
Cyber Ethics
1. Intro to Ethics.ppt
2
Computer Ethics History, Sample Case studies, Ten
commandments, Sample topics to study in this
subject
1. Intro to Ethics.ppt
2
1
Types of Ethics, Relationship of different types
of ethics Ethics ,Essential Components of
Personal Ethics, ACM code of Conduct,
Netiquette
2. Types of Ethics.ppt
2
Business Ethics, Relationship between law and
ethics, Deontology theory, Unitarianism theory,
Right Model
3. Business Ethics.ppt
3
1
Application of Deontology, Unitarianism
theory, Right Model, Examples, Code of
Conduct for Employees and Employers
3. Business Ethics.ppt
2
Definition of Cyber Crime, General Types of
Cyber Crime, Cyber Crime Statistics
4. Cyber Ethics.ppt
4 1
Types of Cyber Crime Technically specified by
Australian Institute of Criminology
4. Cyber Ethics.ppt
2 QUIZ-1, Intellectual Property, Categories of IP
4. 5
1
World Intellectual PropertyOrganization
5. IP.ppt
2
Trade Secrets, Protection for Software
Copyright, Violation of Software Copyright,
5. IP.ppt
6
1
Reverse Engineering, Open Source Software,
Benefits of Open Source Software
5. IP.ppt
2
Introduction to Software Contracts, Structure of
Software Contracts, Clauses of Software
Contracts, Sample Software Agreement
6. Contracts.ppt
7
1
Introduction to Profession, History of
Engineering Profession, Software House
Structure
7. Profession.ppt
2
Common Roles in Software Organization
QUIZ-II
8
1
MID TERMS2
9
1
Management Hierarchy, IT Organization Structure,
Staff Management, Five Golden rules of Staff
management
7. Profession.ppt
2
Definition of Team, Team Management, Four C’s
of Team Management, Elements of Healthy Teams,
Way to Inspire and Motivate team, Ethical issues in
team management, Characteristics of High
Performance Teams
8. Team Management.ppt
10
1
Stages of Team development, Barriers to Team
Building, characteristics of High Performance
Teams,How to manage conflicts in team,
8. Team Management.ppt
2
What is SEEP? Software Engineering Profession,
Roles in Software Engineering Professions, Need
of Code of Ethics
9. SEEP.ppt
5. 11
1
Introduction to IEEE and ACM, Eight
Principles Related to Software Engineering
Code of Ethics and Profession Practice, Case
Studies
9. SEEP.ppt
2
Definition of Software Risks, Introduction to
Risk management, RM Strategies, Types of
Risks, Categories of Risks
10. Risk Management.ppt
12
1
Steps of Risk Management, Risk Mitigation,
Monitoring and Management Plan
10. Risk
Management.ppt
2 Risk Mitigation, Monitoring and Management Plan QUIZ-III
13
1
Introduction to Computer Privacy, Email
Privacy, TCP/IP and Security, Introduction to
Encryption, Virus, Worms and Trojan Horses,
Working of Anti-Virus Programs, Un-authorize
access
11. Computer
Security.ppt
2
Introduction to Firewalls, Bio-metric devices
and security, Software theft, System failures
and data backup policies
11. Computer
Security.ppt
14
1
, Web browsers and data security, Privacy laws
Content Filtering, Ergonomics, Green
Computing, Potential Computer Risks and
Security measures
11. Computer
Security.ppt
2
Introduction to Security Policies, History of
Information Security, Information Security
policy life cycle, laws and regulations of
Information Security, Standards of IS.
12. Information
Security Policy
15
1
Basic Information Security Principles,
Information Security Architecture
12. Information
Security Policy
2
Policy and Process, Access Control, QUIZ-IV
6. 16
1
Ethical Hacking, Types of Hackers, Model of
Ethical Hacking, Process of Ethical Hacking,
Ethical hacking Skills and knowledge
13. Ethical Hacking
2
Group Presentations
17
1
FINAL TERM EXAMINATION
2
10- AssessmentCriteria
No. Assessment Percentage
1. Mid Exam 20%
2. Final Exam 50%
3. Assignments 10%
4. Quizzes 10%
5. Presentation 5%
6. Project 5%
Total 100%
11- Attendance Requirements
You are expected to attend all lectures, seminars, tutorials, and lab sessions or any other
classroom activity. Where you fail to attend classes, you cannot expect the lecturer to
brief you on what you have missed. You are responsible for your attendance, not the
academic staff. Attendance at tutorials and lab sessions will be strictly monitored, and
failure to attend will be taken into account.
12- Submission and Collectionof Assignment
All assignments should be handed in at the beginning of the class sessions when they are
due. All assignments may be handed back during scheduled classes.
13- GeneralInformation
Students are required to be familiar with the university code Conduct, and to abide by its
terms and conditions.
13.1 Copying of Copyright Material by Student
A condition of acceptance as a student is the obligation to abide by the University’s
policy on the copying of copyright material. This obligation covers photocopying of any
material using the University’s photocopying machines, and the recording off air, and
making subsequent copies, of radio or television broadcasts, and photocopying textbooks.
7. Students who flagrantly disregard University policy and copyright requirements will be
liable to disciplinary action under the Code of Conduct.
13.2 Academic Misconduct
Please refer to the Code of Conduct for definitions and penalties for Academic
Misconduct, plagiarism, collusion, and other specific acts of academic dishonesty.
Academic honesty is crucial to a student's credibility and self-esteem, and ultimately
reflects the values and morals of the University as a whole. A student may work together
with one or a group of students discussing assignment content, identifying relevant
references, and debating issues relevant to the subject. Academic investigation is not
limited to the views and opinions of one individual, but is built by forming opinion based
on past and present work in the field. It is legitimate and appropriate to synthesize the
work of others, provided that such work is clearly and accurately referenced. Plagiarism
occurs when the work (including such things as text, figures, ideas, or conceptual
structure, whether verbatim or not) created by another person or persons is used and
presented as one’s own creation, unless the source of each quotation or piece of borrowed
material is acknowledged with an appropriate citation. Encouraging or assisting another
person to commit plagiarism is a form of improper collusion and may attract the same
penalties. To prevent Academic Misconduct occurring, students are expected to
familiarize themselves with the University policy, the Subject Outline statements, and
specific assignment guidelines.
13.3 Guidelines to Avoid Plagiarism
Whenever you copy more than a few words from any source, you must acknowledge that
source by putting the quote in quotation marks and providing the name of the author. Full
details must be provided in your bibliography. If you copy a diagram, statistical table,
map, etc., you must acknowledge the source. The recommended way is to show this
under the diagram. If you quote any statistics in your text, the source should be
acknowledged. Again full details must be provided in your bibliography. Whenever you
use the ideas of any other author you should acknowledge those, using the APA
(American Psychological Association) style of referencing.
Students are encouraged to co-operate, but collusion is a form of cheating. Students may
use any sources (acknowledged of course) other than the assignments of fellow students.
Unless your Subject Leader informs you otherwise, the following guideline should be
used: Students may work together in obtaining references, discussing the content of the
references and discussing the assignment, but when they write, they must write alone.
13.4 Referencing For Written Work
Referencing is necessary to acknowledge others' ideas, avoid plagiarism, and allow
readers to access those others’ ideas. Referencing should:
1. Acknowledge others' ideas
2. Allow readers to find the source
3. Be consistent in format and
4. Acknowledge the source of the referencing format
8. To attain these qualities, the school recommends use of either the Harvard or American
Psychological Association style of referencing, both of which use the author/date.
13.5 Referencing Standards
APA style referencing
Approval
Prepared By :
Syed Saqib Raza Rizvi
Assistant Professor
(University Of Lahore)
Approved by,
Dr. Amin Ur Rehman
Course Mentor
Dept. Computer Science & IT