Categories

Newsletter

News and Updates

Professional Ethics (2014) Maximize

Professional Ethics (2014)

P. Velmurugadass

ISBN-9789351630890

More details

AUC/MCA/3/04

110.00 Rs

110.00 Rs per Book

» Add to my wishlist

4 other products in the same category:

Anna University, MCA, Third Semester
Syllabus
 
MC7304: PROFESSIONAL ETHICS
 
Unit-I: Computer Ethics Introduction and Computer Hacking                   9
A General Introduction – Computer Ethics: an overview – Identifying an Ethical Issue – Ethics and Law – Ethical Theories - Professional Code of Conduct – An Ethical Dilemma – A Framework for Ethical Decision Making - Computer Hacking – Introduction – Definition of Hacking – Destructive Programs – Hacker Ethics - Professional Constraints – BCS Code of Conduct – To Hack or Not to hack? – Ethical positions on hacking.
 
Unit-II: Aspects of Computer Crime and Intellectual Property Rights      9
Aspects of Computer Crime - Introduction - What is Computer Crime – Computer Security Measures – Professional Duties and Obligations - Intellectual Property Rights – The Nature of Intellectual Property – Intellectual Property – Patents, Trademarks, Trade Secrets, Software Issues, Copyright - The Extent and Nature of Software Piracy – Ethical and Professional Issues – Free Software and Open Source Code.
 
Unit-III: Regulating Internet Content, Technology and Safety                   9
Introduction – In Defence of Freedom Expression – Censorship – Laws Upholding Free Speech – Free Speech and the Internet - Ethical and Professional Issues - Internet Technologies and Privacy – Safety and Risk – Assessment of Safety and Risk – Risk Benefit Analysis – Reducing Risk.
 
Unit-IV: Computer Technologies Accessibility Issues                               9
Introduction – Principle of Equal Access – Obstacles to Access for Individuals – Professional Responsibility - Empowering Computers in the Workplace – Introduction – Computers and Employment – Computers and the Quality of Work – Computerized Monitoring in the Work Place – Telecommuting – Social, Legal and Professional Issues - Use of Software, Computers and Internet based Tools - Liability for Software Errors - Documentation Authentication and Control – Software Engineering Code of Ethics and Practices – IEEE-CS – ACM Joint Task Force.
 
Unit-V: Software Development and Social Networking                               9
Software Development – Strategies for Engineering Quality Standards – Quality Management Standards – Social Networking – Company Owned Social Network Website – the Use of Social Networks in the Hiring Process – Social Networking Ethical Issues – Cyber Bullying – Cyber Stalking – Online Virtual World – Crime in Virtual World - Digital Rights Management - Online Defamation – Piracy – Fraud.
Unit 1: Computer Ethics and Computer Hacking
1.1.       A General Introduction
15
1.2.       Computer Ethics
15
1.2.1.    Overview
15
1.2.2.    Importance of Computer Ethics
16
1.2.3.    Identifying an Ethical Issue
17
1.2.4.    Ethics and Law
18
1.2.5.    Ethical Theories
20
1.2.5.1. Kantianism
20
1.2.5.2. Utilitarianism
21
1.2.6.    Professional Code of Conduct
24
1.2.7.    An Ethical Dilemma
24
1.2.8.    Framework for Ethical Decision-Making
26
1.3.       Computer Hacking
29
1.3.1.    Introduction
29
1.3.2.    Definition
29
1.3.3.    Destructive Programs
31
1.3.3.1. Viruses
31
1.3.3.2.Worms
33
1.3.3.3. Trojan Horses
33
1.3.3.4. Bombs
34
1.3.3.5. Spyware
34
1.3.4.    Hacker Ethics
35
1.3.5.    Professional Constraints: BCS Code of Conduct
37
1.3.6.    To Hack or Not to Hack? Ethical Positions on Hacking
39
1.4.       Exercise
40
 
 
Unit 2: Aspects of Computer Crime and
Intellectual Property Rights
2.1.       Aspects of Computer Crime
41
2.1.1.    Introduction
41
2.1.2.    What is Computer Crime
41
2.1.3.    Types of Computer Crimes
42
2.1.3.1. Unauthorised Access (Hacking)
42
2.1.3.2. Theft: Goods, Information and Money
43
2.1.3.3. Theft of Computer Time/Unauthorised Use at Work
44
2.1.3.4. Computer Fraud
45
2.1.3.5. Corporate Espionage
46
2.1.3.6. Forgery and Piracy
47
2.1.3.7. Identity Theft
48
2.1.3.8. Harassment and Sexually-Related Material
49
2.1.4.    Computer Security Measures
50
2.1.4.1. Password
50
2.1.4.2. Firewall
52
2.1.4.3. Encryption
53
2.1.4.4. Antivirus Software
54
2.1.4.5. Biometrics
56
2.1.4.6. Access Control
57
2.1.4.7. Audit Control Software
57
2.1.5.    Professional Duties and Obligations
58
2.1.6.    Intellectual Property Right
59
2.1.6.1. Nature of Intellectual Property Rights (IPS)
60
2.1.6.2. Intellectual Property
61
2.1.6.3. Computer Technology and Intellectual Property
61
2.1.6.4. Intellectual Property Legislation
61
2.1.7.    Software Issues
66
2.1.8.    Software Piracy
67
2.1.8.1. Extent and Nature of Software Piracy
67
2.1.8.2. Activities in Software Piracy
69
2.1.9.    Ethical and Professional Issues
70
2.1.10.  Free Software and Open Source Code
71
2.2.       Exercise
75
 
 
Unit 3: Regulating Internet Content, Technology
and Safety
3.1.       Regulating Internet Content
76
3.1.1.    Introduction
76
3.1.2.    Regulatory Options
78
3.1.3.    In Defence of Freedom Expression
79
3.1.4.    Censorship
80
3.1.5.    Laws Upholding Free Speech
82
3.1.6.    Free Speech and Internet
82
3.1.7.    Internet Technologies Supporting Free Expression
84
3.1.8.    Internet Technologies as Tools for Censorship
84
3.1.9.    Ethical and Professional Issues
85
3.2.       Privacy and Computer Technology
86
3.2.1.    Introduction
86
3.2.2.    Valuing Privacy
87
3.2.3.    Impact of Computer Technology
88
3.2.4.    Internet Technologies and Privacy
90
3.3.       Safety and Risk
97
3.3.1.    Introduction
97
3.3.2.    Safety
97
3.3.3.    Risks
98
3.3.4.    Assessment of Safety and Risk
101
3.3.4.1. Uncertainties in Design
102
3.3.4.2. Testing for Safety
103
3.3.4.3. When Testing is Inappropriate
103
3.3.5.    Risk Benefit Analysis and Reducing Risk
104
3.3.5.1. Personal Risk
106
3.3.5.2. Public Risk and Public Acceptance
108
3.3.5.3. Accounting Publicly for Benefits and Risks
109
3.3.5.4. Incentives to Reduce Risk
112
3.3.6.    Examples of Improved Safety
113
3.4.       Exercise
114
 
 
Unit 4: Computer Technologies Accessibility Issues
4.1.       Computer Technologies: Accessibility Issues
115
4.1.1.    Introduction
115
4.1.2.    Principles of Equal Access
115
4.1.3.    Obstacles to Access for Individuals
116
4.1.4.    Professional Responsibility
117
4.2.       Empowering Computers in the Workplace
120
4.2.1.    Introduction
120
4.2.2.    Computers and Employment
121
4.2.3.    Computers and Quality of Work
122
4.2.4.    Computerized Monitoring in the Work Place
123
4.2.5.    Telecommuting
125
4.2.6.    Social, Legal and Professional Issues
126
4.3.       Software, Computers and Internet-Based Tools
130
4.3.1.    Use of Computers
130
4.3.2.    Use of Software
130
4.3.3.    Liability for Software Errors
132
4.3.4.    Use of Internet-Based Tools
134
4.3.5.    Documentation Authentication and Control
136
4.4.       Software Engineering Code of Ethics and Practices
139
4.4.1.    Software Engineering
139
4.4.2.    Key Challenges Facing Software Engineering
140
4.4.3.    Professional and Ethical Responsibility
140
4.4.3.1. IEEE CS-ACM Joint Task Force
141
4.4.3.2. Short Version
141
4.4.3.3. Full Version
142
4.5.       Exercise
149
 
 
Unit 5: Software Development and Social Networking
5.1.       Software Development
150
5.1.1.    Introduction
150
5.1.2.    Steps of Software Development
151
5.1.2.1. Feasibility Study
151
5.1.2.2. Requirement Determination and Analysis
153
5.1.2.3. Software Design
155
5.1.2.4. Coding
157
5.1.2.5. Testing
157
5.1.2.6. Maintenance
159
5.1.3.    Strategies for Engineering Quality Software
160
5.1.3.1. Factors Influencing Software Quality
163
5.1.3.2. Importance of Software Quality
163
5.1.3.3. Activities of Quality Management
164
5.1.4.    Quality Management Standards
164
5.1.4.1. International Standards
164
5.1.4.2. ISO Standards
166
5.1.4.3. ISO 9126 Quality Standard
167
5.2.       Social Networking
169
5.2.1.    Introduction
169
5.2.2.    Advantages of Social Networking
171
5.2.3.    Disadvantages of Social Networking
171
5.2.4.    Company Owned Social Network Web Site
171
5.2.5.    The Use of Social Networks in the Hiring Process
172
5.2.6.    Social Network Advertising
172
5.3.       Social Networking Ethical Issues
173
5.3.1.    Introduction
173
5.3.2.    Cyberbullying
174
5.3.3.    Cyberstalking
175
5.3.4.    Encounters with Sexual Predators
176
5.3.5.    Uploading of Inappropriate Material
176
5.4.       Online Virtual World
177
5.4.1.    Introduction
177
5.4.2.    Crime in Virtual World
178
5.4.2.1. In-World Threats
179
5.4.2.2. External Threats
181
5.4.3.    Advantages of Online Virtual World
182
5.4.4.    Disadvantages of Online Virtual World
182
5.4.5.    Educational  Uses of Online Virtual World
183
5.4.6.    Business Uses of Online Virtual World
183
5.4.7.    Increased Business Use of Virtual Worlds
184
5.4.8.    Multi-Layered Security and Virtual Worlds
184
5.5.       Digital Rights Management
185
5.5.1.    Introduction
185
5.5.2.    Major Functionality of DRM
188
5.5.3.    Architecture and Components of Digital Right Management
189
5.5.3.1. Content Delivery
190
5.5.3.2. Security and Content Protection
190
5.5.3.3. Metadata
191
5.5.3.4. Rights Object and Usage Rights
191
5.5.3.5. Licence Generation
192
5.5.4.    Digital Right Management Techniques
193
5.6.       Online Defamation
195
5.6.1.    Introduction
195
5.6.2.    Problem of Online Defamation
196
5.7.       Piracy
197
5.7.1.    Introduction
197
5.7.2.    Types of Computer Based Piracy
197
5.7.2.1. Software Piracy
197
5.7.2.2. Piracy of Intellectual Property
197
5.8.       Fraud
198
5.9.       Exercise
200
 
 
Model Papers
201

No customer comments for the moment.

Write your review

Professional Ethics (2014)

Professional Ethics (2014)

P. Velmurugadass

ISBN-9789351630890

Write your review