Monday, April 1, 2019
Factors of Professionalism and Computer Professional Bodies
Factors of professional personism and Computer Professional BodiesContentstutorial One3Tutorial devil7Tutorial Three..10Tutorial Four..13Tutorial Five..15References.18hebdomad 1 ProfessionalismGroup intelligence(a) There be m both different definitions of a superior. deal in general basis what you think atomic number 18 the al approximately authoritative factors to being a profession. circle the factors you have in order of importance. Consider why you feel some(a)what factors atomic number 18 more than important than new(prenominal)s.There is talk overion about who is a sea captain. Some said headmaster person is a one who is good in particular job or engaging in a inclined activity as a source of livelihood or as a cargoner. The group members stand ford the definition as follows,a handy occupation, inwardly an organised mannequin, having an accepted body of intimacy, structured training, requiring maintenance of skills, head by a mandate of eitherotA sea captain is a person who acquires formal certification from master copy body based on his academic background or/and work experience and also whose energy could be judged against established standards.All the group members gener all(prenominal)y agreed that the most important factors to being a profession include high compass point of knowledge, association with a professional body, adherence to the jurisprudence of exculpate, structured training, honorable behavior, trusted competence, and commitment to continuous emergence of a profession.Competence is the world power to identify the problem and solve it by utilising available resources. So it is the most important factorAcademic background, academic provide facilitate the professional to learn the specialised knowledge of profession. The learnt knowledge whitethorn prove a helpful tool for a competent professional.Good communication skills help in dealing with clients, colleagues and superiors. A professional with goo d communication skills bequeath be able to signifi back toothtly do s intumesce up.Reliability/Dependability is a factor of importance and may sometimes supersede former(a) factors. righteousness of a professional drives him/her to follow the work ethics and reckon of place in convention.Self-evaluation and discipline is a factor that motivates the persons to achieve more and to meliorate the skills.(b) Differentiate surrounded by a professional and an expert. Does a professional motivation to be an expert?As adjectives, the difference between expert and professional is that expert is extraordinarily capable or knowledgeable magic spell professional is of, pertaining to, or in accordance with the (usually high) standards of a profession. As nouns the difference between expert and professional is that expert is a person with extensive knowledge or ability in a given subject while professional is a person who go aways to a profession.A professional is not necessarily an expe rt.(c) Is a calculator person with a high take of knowledge and skill automatically considered to be a professional?No, targetnot be considered as a professional unless he readings and gain experience and work out the activity as a source of livelihood or as a career.Individual Questions(a) The BCS definition of a professional and two other definitions. analyse the definitions, what do they have in putting green?The BCS considers a practician a professional, if one possesses (BCS Professional)Appropriate degrees.Skills and competency.Motivation for self- schooling (theoretically and practically).Respect for code of conduct.Two other definitionsPerson formally certified by a professional body of belonging to a specific profession by merit of having completed a required course of studies and/or practice. And whose competence can usually be measured against an established set of standards.a professional (of a job) has a high level of statement and training.In common it says p rofessional adopt upbringing and practise.(b) The role of the BCS.The role of the BCS.IT Members representation.To establish relationships with sedulousness and academia.To establish relationships with governments.To work for the betterment of entire homophile society.(c) An overview of other professional bodies that exist for the IT industry.The Association of Computer Professionals (ACP) is an inter discipline body started in 1984. Its tell aim is to set and maintain ICT industry standards by providing an self-sufficient interrogation body for ICT professionals. The rank and single file of the ACP is a mix of academic and business professionals within the field of computing.IACSIT is a registered international scientific association of distinguished scholars busy in Computer Science and Information Techno entery. The IACSIT members include research and development center heads, faculty deans, department heads, professors, research scientists, engineers, scholars, exper ienced packet wareion development directors, managers and engineers, university postgraduate and undergraduate engineering and technology students, etc.The National reason Centre (NCC) is an independent membership organization for IT professionals and is the single largest and most various corporate membership body in the UK IT firmament.Socitm (Society of Information Technology Management) is the membership association for all ICT professionals work in local authorities and the semi existence and third sectors, and suppliers to those sectors. Socitm provides a commodiously-respected meeting place for the promotion, practice and development of ICT best practice. stick up in 2001, the UKWDA (UK Web Design Association) brings together more than 10,000 British web industry professionals under one supportive umbrella organization.Women in Technologystarted in 2005 with one goal in mind to help women nominate successful and satisfying careers in the IT industry.Institute of An alyst and Programmers, The Institution is Britains take professional organization for people who work in the development, installation and examination of business systems and figurer bundle.The UK IT Association (UKITA) was established as the private sector organization responsible for the development of a credible and thriving IT industry across the United Kingdom.Week 2 Professional Bodiesand the BCSGroup DiscussionWhat do you think should be the main roles and purpose of the BCS?To desexualize a better societyShare and exchange IT expertise and knowledge encouraging professionalsSetting standards and frameworkTo build strong relationship with academia, industry, policy makers and governments to produce IT.What do you consider to be the reachs of becoming a BCS member?Professional development more than training opportunitiesNetworksMentoringEmployabilityProfessional recognition in the IT athletic fieldBest support from peers through IT forumsHow do you think your employment opportunities benefit from joining the BCS?BCS provides a platform to surpass with Entrepreneurs, Departmental heads, CEOs etc. This networking helps in getting more employment opportunities.From the video clip it can be seen that role models are important in all professions. From a historic perspective, why are the following people important Charles Babbage, Ada Lovelace, Alan Turing, herds grass John Berners-Lee, Bill Gates, Gordon More (of Mores law), Philip come in Estridge, Steve Jobs, John Von Neumann?Charles Babbage originate of programmable computer.Ada Lovelace The first computer programmer.Alan Turing Widely considered as the father of synthetic intelligence.Timothy John Berners-Lee The pioneer and inventor of WWW.Bill Gates Co-founder of Microsoft.Gordon More The Mores law predicts the technology advancement in computing industryPhilip Don Estridge Father of IBM PC.Steve Jobs Chairman and CEO of Apple Inc.John Von Neumann The causation and pioneer of linear program ming, self-replicating machines, stochastic computing.Discuss three other flow rate role models within the computer (IT) industry, state why they are considered as role models.Today almost all web page design jQuery. jQuery is the most popular JavaScript library in use today, with installation on 65% of the top 10 million highest-trafficked sites on the Web.John Resig is an American software engineer and entrepreneur, best known as the creator and lead developer of the jQuery JavaScript library. At the very young age created jQuery and with the noble thought he do as open source. To me he is great role model for his warm work and better pillow slip in adding look on to the society.Dennis MacAlistair Ritchie (September 9, 1941 c. October 12, 2011) was an American computer scientist.He created the C programming language and, with long-time colleague Ken Thompson, the Unix operating system. He is a legend whose inventions are significant to the modern computing. He added value t o the society by contributing to the society.Mark Elliot Zuckerberg Co-founder of Facebook. To create revolution in the social media world.Individual QuestionsFind two other professional bodies (not BCS) and comparison the aims and mission statements of each.Socitm (Society of Information Technology Management) is the membership association for all ICT professionals working in local authorities and the public and third sectors, and suppliers to those sectors. Socitm provides a widely-respected forum for the promotion, use and development of ICT best practice.The National Computing Centre (NCC) is an independent membership organization for IT professionals and is the single largest and most diverse corporate membership body in the UK IT sector.ComparisonMost of the aim and mission of the higher up two are similar .SOCITM delivers Professional development, Peer support, Policy influence, look into improvementNCC delivers a continuum of services including independent and impartia l advice and support, best practice and standards, person-to-person and professional development, managed service delivery, awareness raising and experience sharing.What do you think is common to all profession bodies? Are some more important than others can you priorities?All professional bodies focus on overhear new skills, competences, experiences and receive credible recognition.Network, collaborate and share practice with peers, suppliers and national programmes.Representing members at appropriate national and regional bodies.Research to enable the government activity in contributing to more effective and efficient public services.In order to establish priority among the professional bodies it is important to consider its worldwide acceptance and credibility. In my opinion ACM and IEEE based professional bodies may be considered as more important.Week 3 legislation of organise and digital IdentityGroup DiscussionDo you feel that it is necessary for all professional bodie s to have a code of conduct?Yes, I do feel that it is necessary for all professional bodies to have a code of conduct because it allow for serve as a guide for individuals as well as organizations. Adherence to the code of conduct will check to collaborate, share best practice, entrance fee industry-recognized training, and find the very best work.Is at that place an argument for all professional bodies to have the same code of conduct?For easy understanding and easy accessible same code of conduct can be developed and implemented. So, it will be easily for working across the globe. However, it is manageable to have various separate clauses to support sealed interest groups depending on the nature of business.What penalties should be included within a code of conduct? Discuss a range of offences and possible penaltiesCode of conduct should clearly state minor as well as major penalties. For instance, minor penalisation can be imposed on misuse of resources and a warning lette r would be sufficient. However, major penalty such as termination from services should be imposed in lawsuit of physical violence and bullying etc. Also, restriction to indisputable benefits and privileges based on poor work ethics may assist a professional to improve his/her attitude toward the work.State the type/ describe of Social Media you use and provide enlarge of the type of information you make available.I use social media to connect with friends, search jobs, latest trends and to funding updates with current affairs.Facebook To connect with friends, relatives, current etc. Even now it is employ as a platform to carry things. As a computer student, I explore Facebook as I can to know the cavort as it is considered as a powerful tool. From election campaign to product launch started apply Facebook. I have given my basic expatiates and made inside information visible only to close circle.Linkedin -HR people uses LinkedIn to promote people so I have an account. I h ave provided my education details and skill set available to all to improve my employability. chitter To follow the trends and get updates.Does the content you post remain private or is it public? Do you make conscious decisions between private and public posts?Mostly I share useful blogs and posts which doesnt hurt others so I share publicly. However, service provider has access to my posts even if they are private. Personally, I feel that once you have uploaded something it is already in public domain. chamberpot you recall some(prenominal) of the terms of the agreement to the social media site(s) you are using? Is at that place a deterrent example that the terms of agreement should be indite in an easy to understand language?No, I couldnt recall any regains. It will be great if die hards are made available in other languages too.Provide an argument for keeping social and professional media separately.This will help us in separating private and professional identities as well as lives of other people. Usually professional media such as linkedin.com is accessed by people with mature attitude towards the uploaded contents. Normally social media space is swarmed by profit trolls and people with non-serious attitude toward personal stuff of other people. I would recommend for keeping the social and professional media separate.Provide some guidelines on how to use Social Media wisely?Use account from secure access (HTTPS).Do not access from public systems.Make sure you log out / sign out after access.Set guarantor and covert up to an appropriate level.Do not post sensitive information.The visit slides provided a summary only of the BCS code of conduct, read in detail using the link provided in the lecture, the full BCS code of conduct.Summarise the code of conduct of TWO other professional bodies do not use the codes of conduct covered in the lecture/tutorial.The code of conduct of ACM focuses on positive contribution towards human society. Moreover, hon esty and truthfulness are considered as key attributes of members. Finally, respecting the privacy of others is considered as a must trait for any member. Similarly, no discrimination should be made among members based on their ethnicity is the corner stone of IITPs code of conduct. Furthermore, the code also stresses upon integrity, honesty and dignity in its members. Finally, continuous professional development is also an important aspect of this code.Compare and contrast the BCS code of conduct to (a) above.Commonalities professionalism, dignity, honest, truthfulness and positive contribution towards human society.Contrast BCS does not tolerate any kind of fraud and unsuccessful person as well it does not allow any kind of encounter of interest.Comment on the theme running through each of the Codes of ConductFollowing are the main themes of the code of conductDiscourage discrimination. verifying contribution.Professionalism.Promoting education and reliable practices.Provide an overview of THREE networking sites that may be apply for either social and/or professional networking.(i) Facebook online social media and social networking service based in Menlo Park, California, United States.(ii) Google+ Google+ is an interest-based social network that is owned and operated by Google.(iii)Linkedin A networking site for educational, business and professional purposes (Linkedin)What are the advantages/disadvantage and possible dangers of using a digital presence?Advantages Networking and marketing, global reach, following the trend.Disadvantages concealment breach, selective information loss/ corruption and may expose to false message.Week 4 EthicsGroup Discussion(a) Are the 10 commandments in computer ethics still relevant today? Do they need to be updated? Eg. Is cyber bulling or grooming covered within the rules?The Ten Commandments are mostly relevant today and should be implemented in unfeigned letter and spirit (Virginia Tech). However, some scholars t hink that they are simplistic and restrictive on that pointfore, they can be updated to handle contemporary and future issues.(i)What are Sallys level-headed responsibilities?Sallys court-ordered responsibilities are professionalism and honesty.(ii) Does Sally have any legal vindication?She should have legal protection by law. In case of any grievances employees usually have access to complaint office or other services that support and guide the grieved employee for the best of his/her interest.(iii) Analyse the Case ponder in terms of the well-disposed Rule and return Principle. well-fixed rule demands truthfulness and honesty therefore, Sally should tell the client the real situation. Since untruthfulness and deceit may harm large number of humans therefore, utility principle also demands that Sally should show the exact picture to the client as well as her boss.Sally should have avoided this situation by ratting her boss in advance of the current situation.(iv) Would your analysis of the ethics of this case change if Sally had been present during her bosss conversation with the client, but had not been asked to agree with his assurances?Golden rule and utility principle demand that Sally should communicate right information to the client and specially the boss.(v) What if the client had asked Sally a question, the honest answer to which would contradict her boss?Honesty and truthfulness are key attributes of a professional. On a human perspective, it is also important that her boss should not feel contradicted in front of the client. But it can be tackled with effective communication like Sally telling a suggesting her views that she doesnt the conversation.(vi) Would your analysis of the ethics of this case change if the software was for stock way rather than the control of machinery, with no threat to human safety?Golden rule and utility principle are not sympathy or application specific.Individual QuestionJane downloads a copy of an e-book from an illegal file sharing web site.Analyse the situation in terms of the Golden Rule and Utility Principle from both Janes and the authors point of view.This act of Jane is illegal contradicting both the Golden rule and Utility Principle.What conclusions can be gaunt?Proper actions should be taken against these illegal websites.The education of Golden rule and utility principle should be more propagated.What sort of difficulties are there in applying the Golden rule and the Utility principle?Selfishness and lack of education are two main barriers in applying the Golden rule and Utility Principle.Week 5 Legal IssuesGroup DiscussionAs a professional, to what extent do you feel that you should you be aware of the legal issues ring IT?A professional should have theoretical as well some practical knowledge of Software law, software patents, the Internet, data and security (professional legal ethics). Also to secure Intellectual Property (IP) for clients, an IT professional should be w ell informed on legal obligations and rights in digital world.Create a list of possible holders of data who may be storing your personal data. Do you have a problem with large organisations selling your data? In todays society, should we have such a thing as personal data (exception banking and medical)?Email service providers.Social and professional networking sites.Google cloud storage systems. take care engines.Bank.Mobile Application providers like play store, iTunes etc.Practically, personal data is taken by almost all the applications when we need to use their facilities. They are received by sign up or register form.Discuss the differences between Shareware, Freeware and open source software.Freeware The software that is available free-of-cost.Shareware Some utilities of the software are free-of-cost and others are not.Open source software Source code is available for reusability and modification purposes.As a first thought, identify and discuss some of the legal issues/probl ems surrounding cloud computing.Reliable data availability should be provided at all time.Data should be well saved and secured.No data loss or corruption.Availability of data should be insured at all locations.Easy and instant accessA professional software developer, working for a software house, has been contracted to underdeveloped a software package that involves accessing a follows data base.Who does the software belong to the contractor, the software house or the company? Explain your answer.The software will belong to the contractor because the contractor has initiated the project and will be baby buggy all the subsequent costs. Also, the contractor would be legally eligible to sell the software to any third party.Who owns the intellectual property rights of the software the contractor, the software house or the company? Explain your answer.The intellectual property rights may be owned by the software house solely or jointly with the contractor as laid out in the agreemen t.What if there is a problem with the software and the database is corrupted, who is responsible?Under the event of any software malfunction the software house will stand responsible. It is the righteousness of the software house to ensure the secure and smooth operation of their product and the contractor pays for this service.Discuss the term hacking is there ever a case for Hacking? Is hacking always illegal? Google Hack anonymousHacking is involved in all forms and types of communications. Phone hackers used to make free phone calls and listen to other people talking on the phone. With the internet hacking has a very wide and large playing field. For IT industry hacking is serious issue and it has caused significant losses to many big corporate e.g. Sony, Microsoft and Intel etc. In simple oral communication any activity that involves unauthorized access or falsely impersonating is termed as hacking. In recent times there are several hacking incidents for example US Korea st andoff over the hacking reports of Sony Entertainment and governmental information leaks by Anonymous. The term hacking is normally misunderstood it is not illegal all the time. For instance, guard can do hacking to extract information from dubious computers for the safety and security of common people.Summarise the legal issues associated with developing and hosting a web site. copyright concernsDomain name concernsTrademark concernsDefamationLinking and framingSummarise the details of the Data Protection Act.The Data Protection Act 1998 provides a framework as well as a benchmark that ensures security of individuals personal data. The misuse or illegal access to someones personal data waterfall under direct breach of civil liberties. Also it is the responsibility of the company to provide safe and secure data access. Data handling should be under the framework of peoples data protection rights.Referenceshttp//www.directoryoftheprofessions.co.uk/sites-professions-IT-comp.htmlhttp/ /www.businessdictionary.com/definition/professional.htmlhttps//www.socitm.net/http//iacsit.org/http//www.ncc.co.uk/national-computing-centre/https//www.iabuk.net/abouthttp//www.bitlaw.com/internet/webpage.htmlhttp//wikidiff.com/professional/experthttp//www.bcs.org/http//www.sqa.org.uk/e-learning/ITLaw02CD/page_18.htm
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.