Jordan University of Science & Technology
CIS 99
HSS 119
CIS 151
CIS 202
CIS 251
CIS 700
 

CIS 200
 

 

Syllabus

CIS 200 Book

Introduction

Chapter 1: Introduction to Cyberethics: Concepts, Perspectives, and Methodological Frameworks

Chapter 2: Ethical Concepts and Ethical Theories: Establishing and Justifying a Moral System

Chapter 5: Privacy and Cyberspace

 

 

 
 
  © Copyright 2006. All Rights Reserved. Design by Ala'a Mayyas  

Jordan University of Science and Technology

Faculty of Computer & Information Technology

Computer Information Systems Department

 

 

Course Catalog

3 Credit hours (3 h lectures): this course introduces the students to ethical issues of technology. We discuss ethical theories and the Interplay of technology and ethics including technology ethical impact on the society. We cover topics such as Intellectual property, Internet addiction, children and the web, computer failures and their impact on people, and others.

Text Book(s)

Title

Ethics for the Information age.

Author(s)

Michael J. Quinn

Publisher

Pearson

Year

2009

Edition

4th Ed.

Instructors

Instructor

Qais A. Marji

Office Location

Medical building, Lab 9

Office Phone

E-mail

mqais@just.edu.jo

Class Schedule & Room

Lecture Time

Section 1: Sunday 2:15 - 3:15 Room: P2-104

Section 2: Tuesday 2:15 - 3:15 Room: P2-104

Section 3: Thursday 2:15 - 3:15 Room: P2-104

Office Hours

Sunday, Tuesday, and Thursday: 9:15 ~ 10:15/ 12.15-1.15

 

Teaching Assistant

TBD

Prerequisites

Prerequisites by course

 

 

 

Topics Covered

Topics

Chepters in Text

Week number

Catalyst for Chagne

Chapter 1

1

Introduction to ethical theories

Chapter 2

2

Spam, WWW, children on the web, and Internet addiction

Chapter 3

3

Intellectual property, copyrights and fair uses, open source software

Chapter 4

4, 5

Privacy, public Information and records, data mining, Identity theft

Chapter 5

6

Viruses, worms, hacking, and DoS attacks

Chapter 6

7

Computer failures, data entry errors, software errors, famous incidents, software testing, and software warranties

Chapter 7

8, 9

Professional code of ethics

Chapter 8

10, 11

Work, impact of technology on unemployment, workplace, globalization, and digital divide

Chapter 9

12, 13

Plagiarism

Appendix-A

14

Mapping of Course Objectives to Program Outcomes

Assessment method

Relationship to Program Outcomes (score out of 5)

A

B

C

D

E

F

G

H

I

J

K

                     

 

Relationship to Program Objectives

1

2

3

4

5

Evaluation

Assessment Tool

Expected Due Date

Weight

First Exam

According to the department schedule

25 %

Second Exam

According to the department schedule

25 %

Final Exam

According to the University final examination schedule

40 %

Policy

Attendance

Attendance is very important for the course.  In accordance with university policy, students missing more than 10% of total classes are subject to failure. Penalties may be assessed without regard to the student's performance.  Attendance will be recorded at the beginning or end of each class.

Homework/Lab

Students are expected to keep up with the material as it is presented and submit assignments on time.

Exams

All exams will be CLOSE-BOOK. The date of the Exams will be scheduled according to the department schedule

 

Prepared by: Qais A. Marji Last Modified: Feb 13, 2011