Вы находитесь на странице: 1из 9

Republic of the Philippines

ISABELA STATE UNIVERSITY


Cauayan City, Isabela

COLLEGE OF COMPUTING AND INFORMATION TECHNOLOGY

COURSE SYLLABUS IN

PHILO 13 ETHICS/ VALUES FOR IT PROFESSIONALS

First Semester
School Year 2009 - 2010

DIONICIO D. GANTE
Instructor

Vision of the Isabela State University


The Isabela State University, a globally recognized institution of
higher learning for people empowerment and sustainable
development embodying excellence, effectiveness, accountability
and integrity.

Mission of the Isabela State University


The Isabela State University is committed to train and develop
students to become professionally competent graduates who are
equipped with sound moral principles; and to serve the community
through research, extension and resource generation by way of
inspired leadership and responsive manpower.

I.

COURSE NUMBER:

Philo 13

II.

DESCRIPTIVE TITLE:

Ethics/ Values for IT Professionals

III.

COURSE DESCRIPTION:

IV.

CREDIT UNITS:

3 Units

V.

COURSE PRE-REQUISITE:

IT 30/ IT 101/ CompSci11

VI.

COURSE OBJECTIVES:

At
1.
2.
3.
4.
5.

The course introduces ethics and ethical theories; provides discussions on the ethical
dilemmas and issues facing IT practitioners. An appreciation and discussion of the Code of
Ethics of I. T. Professionals; cybercrimes and appropriate Philippine Laws are also included.

the end of the course, the students are expected to:


appreciate and explain the meaning of ethics, values and attitudes;
apply in their ethical thinking and considerations as they relate in the cyber world;
differentiate ethical dilemma/issues in the cyber world;
distinguish and internalize the code of conduct of an I. T. Professional; and
interpret apply various related Philippine Laws that penalizes cyber crimes

COURSE SYLLABUS
in
PHILO 13 ETHICS/ VALUES FOR IT PROFESSIONALS

SPECIFIC OBJECTIVES

COURSE CONTENT

TIME
ALLOT.

TEACHING
STRATEGIES

MATERIALS

EVALUATIVE
MEASURES

VALUES

o To orient the students of


vision, mission, goals and
objectives of the department
and the university.

o University Mission/Vision
o Cauayan Campus
Mission/Vision
o IICT Mission/Vision

10 mins.

o Orientation
Discussion

o Printed
Copies

o To list several definitions of


ethics put forward by various
philosophical theorists.
o To explain how such
definitions can be applied to
computer ethics.

1. What is Ethics?
Ethics defined

1 week

o Lecture
o Discussion
o Internet and
Library
Research

o Modules

o Quizzes
o Graded
Recitation
o Case
Analysis

o
o
o
o

Intelligence
Independence
Objectivity
Critical
Thinking

o To discuss the ethics and


different laws.
o To explain the copyright laws
from the point of view of
different laws.

2. Ethics and the Law

Divine Law

Natural Law

Moral Law
Physical Law

1 week

o Lecture
o Discussion
o Library and
Internet
Research

o Modules

o Quizzes
o Graded
Recitation
o Case
Analysis

o
o
o
o
o

Independence
Initiative
Love of work
Objectivity
Critical
Thinking

o To define the different ethical


concepts classified as
preliminary.
o To discuss their similarities
and differences.
o To apply them to analyze and
resolve, ethical issues.

3. Preliminary Theorist
Ethical Relativism
Ethical Absolutism
Ethical Egoism
Ethical Altruism

1 week

o Lecture
o Discussion
o Library and
Internet
Research
o Community
Survey

o Modules

o Quizzes
o Graded
Recitation
o Case
Analysis

o
o
o
o

o To discuss the difference

4. Finalist Theorist

2 weeks

o Lecture

o Modules

o Quizzes

o Obedience

o Information
Update

Self-discipline
Sensitivity
Intelligence
Selfconfidence
o Objectivity
o Critical
Thinking

INPUT

between the preliminary


theories and finalist theories
as ways of classifying ethical
system.
o To apply to computing the
philosophies of Mill, Kant and
Aristotle.

John Stuart Mills


Utilitarianism

Immanuel Kants
Categorical Imperativeness

Aristotles
Nicomachean Ethics

o Discussion
o Library and
Internet
Research
o Film Viewing

o Graded
Recitation
o Case
Analysis

o Selfawareness
o Objectivity
o Critical
Thinking

o To distinguish the different


problems confronting morals
which are relevant to the area
of computing.

5. Moral Problems
Moral Principle
Scope of Morality
Moral Obligation
Freedom

2 weeks

o Lecture
o Discussion
o Library and
Internet
Research
o Reaction
Paper

o Modules

o Quizzes
o Graded
Recitation
o Case
Analysis

o Responsibility
o Self-discipline
o Selfawareness
o Objectivity
o Critical
Thinking

o To define computer ethics.


o To discuss and analyze the ten
commandments for computer
ethics.

6. Computer Ethics
Computer Ethics Defined
Ten Commandments for
Computer Ethics

1 week

o Lecture
o Discussion
o Library and
Internet
Research

o Modules

o Quizzes
o Graded
Recitation
o Case
Analysis

o
o
o
o
o

o To list and explain different


computer abuses.

7. Computers Abuses
o Denial of Service
o Hacking
o Flaming
o Spamming
o Worm and Virus
o Internet Hoaxes

2 weeks

o Lecture
o Discussion
o Library and
Internet
Research
o Film Viewing

o Modules

o Quizzes
o Graded
Recitation

o
o
o
o

o To determine the privacy


issues related to database,

8. Privacy Issues
Database Privacy

2 weeks

o Lecture
o Discussion

o Modules

o Quizzes
o Graded

o Self-discipline
o Objectivity

Intelligence
Obedience
Self-discipline
Objectivity
Critical
Thinking

Sensitivity
Love of work
Objectivity
Critical
Thinking
o Selfawareness

email and on the web.

Email Privacy
o Privacy on the Web

o Library and
Internet
Research

Recitation

o Intelligence
o Patience

o To describe the social justice


issues that affect computer
users and passive recipients
of artificial intelligence.

9. Social Justice Issues

1 week

o Lecture
o Discussion
o Library and
Internet
Research

o Modules

o Quizzes
o Graded
Recitation
o Case
Analysis

o Sensitivity
o Objectivity
o Love of
country
o Critical
Thinking

o To identify free speech issues


in computing such as
pornography, hate speech and
Internet filters.

10.Free Speech Issues

1 week

o Lecture
o Discussion
o Library and
Internet
Research
o Participative
Exercise

o Modules

o Quizzes
o Case
Analysis

o Objectivity
o Critical
Thinking
o Self-discipline

o To discuss and define the


different acts in computing
that are considered as
infringement of the
intellectual property rights of
patent and copyright owners.

11.Intellectual Property
Rights
Software Piracy
Plagiarism
Software and Copyright of
the US

2 weeks

o Lecture
o Discussion
o Library and
Internet
Research
o Community
Survey

o Modules

o Quizzes
o Graded
Recitation
o Case
Analysis

o
o
o
o

o To list different computer


crimes.
o To determine when a
computer abuse counts as a
computer crime.

12.Computer Crimes
Credit Card Fraud
Creating a Virus and
Unleashing it to a Network
Hacking
Stock Fraud
Spamming
Hate and Vengeance Case

1 week

o Lecture
o Discussion
o Library and
Internet
Research
o Reporting

o Modules

o Quizzes
o Graded
Recitation

o Initiative
o Objectivity
o Critical
Thinking

Sensitivity
Love of work
Objectivity
Critical
Thinking

o To discuss related Philippine


Laws.

VII.

13.Related Philippine Laws


Republic Act Number 8293
Republic Act Number 8792

1 week

o Lecture
o Discussion
o Library and
Internet
Research

o Modules

o Quizzes
o Graded
Recitation

o
o
o
o

Obedience
Sensitivity
Objectivity
Critical
Thinking

REFERENCES:

1. Books
Reynolds, George. (2006). Ethics in Information Technology
Reynolds, George. (2007). Ethics in Information Technology, Second Edition.
Laudon, Kenneth C., Traver, Carol Guercio, Laudon, Jane P. (1997). Information Technology: Concepts and Issues, Second
Edition.
Baase, Sara. (2004). A Gift of Fire: Social, Legal and Ethical Issues for Computers and the Internet, Second Edition.

Articulo, Archimedes C, Florendo, Gloria G. (2003). Values and Work Ethics

2. Videotapes/ VCD/ DVD


Simone
Philadelphia
Antitrust
3. Internet
Ethics. Retrieved June 6, 2009, from Wikipedia. Website: http://en.wikipedia.org/wiki/Ethics
(1997). Code of Ethics. Retrieved June 6, 2009, from Association for Computing Machinery. Website:
http://www.acm.org/constitution/code.html
(2001). Chapter 2: What are the Crimes from the book Computer Crimes. Retrieved June 7, 2008, from the OReilly Online.
Website: http://www.oreilly.com/catalog/crime/chapter/cri_02.html
(2002). Computer Crimes. Retrieved June 7, 2008, from Dr. Ronald B. Standler. Website: http://www.rbs2.com/ccrime.htm
(2001). Computer Ethics: Basic Concepts and Historical Overview. Retrieved June 9, 2008, from Standford Encyclopedia of
Philosophy. Website: http://plato.stanford.edu/entries/ethics-computer/

VIII.

COURSE REQUIREMENT:
The student should follow the following requirements in order to pass the subject:
1. Pass all written and quizzes.
2. Posted their comments and replies to blogs and wiki messages respectively.
3. Submit reaction papers and community survey.
4. Submit assignments required on time.
5. Complete 80% of the total attendance during the semester.

IX.

GRADING SYSTEM:
LECTURE (100%)

GRADE EQUIVALENT

Midterm Examination
- 25%
Final Examination
- 25%
Quizzes
- 15%
Project
- 15%
Assignment
- 5%
Class Standing
- 15%
Recitation
- 5%
Attendance - 5%
Attitude
- 5%

1.25
1.75
2.00
2.50
2.75
3.00
4.00
5.00
INC
DRP

100%

1.00 98 - 100
95 - 97
1.50 92 - 94
89 - 91
86 - 88
2.25 83 - 85
80 - 82
77 - 79
75 - 76
70 74 (Conditional)
Below 70 (Failure)
Incomplete
Dropped

Submitted by:

Approved by:

Noted by:

DIONICIO D. GANTE
Instructor

DIONICIO D. GANTE
Program Chair, BSIT

DR. MARY JANE S. BITANGA


Dean, CCIT

Вам также может понравиться