Jordan University of Science & Technology
CIS 99
CIS 150
CIS 200
CIS 202
CIS 252
 
 
 
 

HSS 119
 

Assignment 1

 

Assignment 2

 

Assignment 3

 

Business Plan

 

 

Syllabus

Chapter 01: The Foundations of Entrepreneurship

               Chapter 01(PDF)

 

Chapter 02: Inside the Entrepreneurial Mind: From Ideas to Reality

              Chapter 02 (PDF)

Chapter 03: Conducting a Feasibility Analysis and Designing a Business Model

              Chapter 03 (PDF)

Chapter 04: Crafting a Business Plan and Building a Solid Strategic Plan

              Chapter 04 (PDF)

 


 

 

   
   

 

 

 
 
  © Copyright 2006. All Rights Reserved. Design by Ala'a Mayyas  

Jordan University of Science and Technology

Faculty of Computer & Information Technology

Computer Information Systems Department

 

 

Course Catalog

3 Credit hours (3 h lectures): this course introduces the students to ethical issues of technology. We discuss ethical theories and the Interplay of technology and ethics including technology ethical impact on the society. We cover topics such as Intellectual property, Internet addiction, children and the web, computer failures and their impact on people, and others.

Text Book(s)

Title

Ethics for the Information age.

Author(s)

Michael J. Quinn

Publisher

Pearson

Year

2009

Edition

4th Ed.

Instructors

Instructor

Qais A. Marji

Office Location

Medical building, Lab 9

Office Phone

E-mail

mqais@just.edu.jo

Class Schedule & Room

Lecture Time

Section 1: Sunday 2:15 - 3:15 Room: P2-104

Section 2: Tuesday 2:15 - 3:15 Room: P2-104

Section 3: Thursday 2:15 - 3:15 Room: P2-104

Office Hours

Sunday, Tuesday, and Thursday: 9:15 ~ 10:15/ 12.15-1.15

 

Teaching Assistant

TBD

Prerequisites

Prerequisites by course

 

 

 

Topics Covered

Topics

Chepters in Text

Week number

Catalyst for Chagne

Chapter 1

1

Introduction to ethical theories

Chapter 2

2

Spam, WWW, children on the web, and Internet addiction

Chapter 3

3

Intellectual property, copyrights and fair uses, open source software

Chapter 4

4, 5

Privacy, public Information and records, data mining, Identity theft

Chapter 5

6

Viruses, worms, hacking, and DoS attacks

Chapter 6

7

Computer failures, data entry errors, software errors, famous incidents, software testing, and software warranties

Chapter 7

8, 9

Professional code of ethics

Chapter 8

10, 11

Work, impact of technology on unemployment, workplace, globalization, and digital divide

Chapter 9

12, 13

Plagiarism

Appendix-A

14

Mapping of Course Objectives to Program Outcomes

Assessment method

Relationship to Program Outcomes (score out of 5)

A

B

C

D

E

F

G

H

I

J

K

                     

 

Relationship to Program Objectives

1

2

3

4

5

Evaluation

Assessment Tool

Expected Due Date

Weight

First Exam

According to the department schedule

25 %

Second Exam

According to the department schedule

25 %

Final Exam

According to the University final examination schedule

40 %

Policy

Attendance

Attendance is very important for the course.  In accordance with university policy, students missing more than 10% of total classes are subject to failure. Penalties may be assessed without regard to the student's performance.  Attendance will be recorded at the beginning or end of each class.

Homework/Lab

Students are expected to keep up with the material as it is presented and submit assignments on time.

Exams

All exams will be CLOSE-BOOK. The date of the Exams will be scheduled according to the department schedule

 

Prepared by: Qais A. Marji Last Modified: Feb 13, 2011