Sultan Qaboos University Course Outline PROGRAM: B.Sc. in Computer Science
Sultan Qaboos University Course Outline PROGRAM: B.Sc. in Computer Science
Sultan Qaboos University Course Outline PROGRAM: B.Sc. in Computer Science
COURSE OUTLINE
PROGRAM: B.Sc. in Computer Science
Department Requirement
1
leadership qualities
1.
Program SQU
SLO # Student Learning Outcome Educationa Postgraduate
l Objectives Attributes
Recognize the ethical issues that arise in professional decision SO7 B3, C
1 making.
Describe current computer-based threats to security and SO6 C
2 privacy.
3 Distinguish among patent, copyright and trade secret protection. SO6 C
Discuss the ethical and legal issues related to software ownership SO6 B3
4 and protection
Discuss the elements of software quality, and explain the role of SO6 A1
5 software quality in solving many software liability problems.
6
Describe trends in computer crimes and different cyber attacker SO7 A1, C
approaches.
7 Identify the major ethical issues in cyberspace. SO7 C
Communicate effectively orally and in writing in a variety of SO5 A2
8 professional contexts.
18. Student Responsibilities
It is the student’s responsibility to know and comply with all University Academic Regulations relevant to
participation in this course. These regulations specifically include attendance requirement and students`
academic code of conduct.
For attendance, it is the student’s responsibility to be punctual and to attend all classes.
Students are expected to perform their work with honesty and avoid any academic misconduct, which is
defined as the use of any dishonest or deceitful means to gain some academic advantage or benefit. This can
take many forms, including but not limited to, the following: copying, plagiarism, collusion and forging
documents. For full details, please refer to the Undergraduate Academic Regulations and to the Student
Academic Misconduct Policy.
COURSE INFORMATION
Course Code COMP4100 Course Title ETHICAL AND SOCIAL ISSUES FOR COMPUTING PROFESSIONS
Semester/ Year Fall 2021 Section 10
Day, Time, and Place Tuesday (10:00 - 10:50 @ CMT/D08) & Thursday (08:00 – 09:50 @ CMT/D08)
2
and Ethical Egoism and Last five “workable” theories:
Kantianism theory)
W4 Ch2: Introduction W4L1: Nine ethical theories (Last five “workable” theories: Project, Exam1
26/9/2021 to Ethics Act Utilitarianism, Rule Utilitarianism and Social Contract and Final Exam
Theory)
W4L2: Nine ethical theories (Last five “workable” theories:
Virtue Ethics Theory), Comparing workable ethical theories,
Morality of breaking the law.
W4L2_PART2: Oman Laws (Oman-ecrime - Royal Decree
No 122011_issuing_the_cyber_crime_law-eng-2011)
W5 Ch3: Networked W5L1: Introduction, Spam, Internet interactions, Text Project, Exam1
3/10/2021 Communications messaging, and Censorship. and Final Exam
W5L2: Freedom of expression, Children and inappropriate
content, Breaking trust and Internet addiction.
W6 Computer Crimes W6L1_Part1: Introduction, Virus and Hacking, Computer Project, Exam1
10/10/2021 Systems Types of Attacks, Motives of Attacks, Costs and and Final Exam
Ch6: Intellectual Social consequences, Computer Crimes Prevention Strategies
Property Rights W6L1_Part2: Definition, Foundations of Intellectual Property,
and Computer Copyrights, Patents, Trade Secrets, Trademarks, Intellectual
Technology Property Crimes, Protecting Computer software under IP, Free
Software.
W6L2: EXAM1
W7 Ch8: Software W7L1: Software Standards, Software Failures, Software Risks Project, Exam2
17/10/2021 Issues Risks and and Historical Example of Software Risks, Buyers and and Final Exam
Liabilities Producer Protection
W8 Ch4: Intellectual W8L1: Digital Media, and Peer-to-Peer Networks and Cyber Project, Exam2
24/10/2021 Property (IP) lockers and Final Exam
W8L2: Protections for Software, Legitimacy of Intellectual
Property Protection for Software, Open-Source Software,
Creative Commons Protection for Software
W9 Anonymity, W9L1_Part1: Introduction, Anonymity, Privacy, Security. Project, Exam2
31/10/2021 Privacy and and Final Exam
Security W9L1_Part2: Introduction, Perspectives on Privacy
3
IEEE Code of Ethics
ACM Code of ethics, Plagiarism.
It is essential that each student solves all programming assignments, lab tests and exams individually unless instructed
otherwise, e.g., for group projects. Copying, plagiarism, collusion, switching, and falsification are violations of the
university academic regulations. Students involved in such acts will be severely penalized. The department has adopted a
firm policy on this issue. A zero mark will be assigned the first time a student is caught involved in copying and his/her
name will be added to a watch list maintained by the Head of Department. Further repeated involvements in copying will
cause the student to get an F grade in that course. This is in line with the university academic regulations.
Grade A A- B+ B B- C+ C C- D+ D F
4
Score ≥ 90 ≥ 87 ≥ 84 ≥ 80 ≥ 77 ≥ 73 ≥ 68 ≥ 64 ≥ 58 ≥ 50 < 50