COURSE INFORMATION
Course Title: ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS
Code Course Type Regular Semester Theory Practice Lab Credits ECTS
BINF 204 B 4 3 0 0 3 5
Academic staff member responsible for the design of the course syllabus (name, surname, academic title/scientific degree, email address and signature) NA
Main Course Lecturer (name, surname, academic title/scientific degree, email address and signature) and Office Hours: Prof.Dr. Osman Köroğlu okoroglu@epoka.edu.al , Friday 08:00 - 11:00 E209
Second Course Lecturer(s) (name, surname, academic title/scientific degree, email address and signature) and Office Hours: NA
Teaching Assistant(s) and Office Hours: NA
Language: English
Compulsory/Elective: Elective
Study program: (the study for which this course is offered) Bachelor in Business Informatics (3 years)
Classroom and Meeting Time: -
Code of Ethics: Code of Ethics of EPOKA University
Regulation of EPOKA University "On Student Discipline"
Attendance Requirement: 75% is mandatory.
Course Description: This course examines the ethical and social issues arising from advances in computer technology and the responsibility that computer professionals and users have with regard to computer use by focusing on the intrinsic link between ethics and the law, how both try to define the validity of human actions, and on the moral and ethical dilemmas created by computer technology that challenge the traditional ethical and moral concepts.
Course Objectives: Welcome to the Ethical & Social Issues in Information Systems course! In today's rapidly evolving digital landscape, information technology has become ubiquitous and permeates almost every aspect of our lives. From personal communication and entertainment to business operations and healthcare management, information systems have revolutionized the way we live and work. However, with the tremendous power and influence of technology comes great responsibility, and ethical and social issues surrounding the use of information systems have become increasingly relevant and pressing. In this course, we will explore the ethical and social implications of information systems, with a focus on understanding how technology can impact society, culture, and individual behavior. We will examine topics such as privacy, security, intellectual property, and cybercrime, as well as the social implications of emerging technologies like artificial intelligence, machine learning, and social media. Through readings, discussions, case studies, and assignments, we will critically analyze the impact of information systems on society and develop strategies for addressing ethical and social issues in the use of technology. By the end of the course, students will have a deeper understanding of the complex relationship between information systems and society and be better equipped to navigate the ethical challenges of the digital age.
BASIC CONCEPTS OF THE COURSE
1 Ethics: The principles of right and wrong that guide human behavior and decision-making.
2 Social responsibility: The idea that individuals and organizations have a duty to act in the best interests of society as a whole.
3 Information privacy: The right of individuals to control the collection, use, and disclosure of their personal information.
4 Cybersecurity: The protection of computer systems and networks from unauthorized access or attacks.
5 Intellectual property: The legal rights that protect original creations of the mind, such as inventions, literary and artistic works, and symbols.
6 Digital divide: The gap between those who have access to technology and those who do not.
7 Artificial intelligence: The development of computer systems that can perform tasks that typically require human intelligence, such as visual perception, speech recognition, and decision-making.
8 Social media: Online platforms and tools that enable users to create, share, and exchange information, ideas, and content.
9 Globalization: The increasing interconnectedness of the world's economies, societies, and cultures through the rapid movement of goods, services, and information across borders.
10 Digital rights management, Accessibility, Bias, Discrimination, social impact of technology, global information systems, Social media, Healthcare IT, Digital citizenship, Transparency, Accountability, Sustainability, Emerging technologies, Big data, Robotics, Internet of Things (IoT), Privacy.
COURSE OUTLINE
Week Topics
1 1. An Overview of Ethics-I (pp.1-42) We will consider the following questions: 1. What is ethics? 2. What trends have increased the likelihood of an unethical behavior? 3. What is corporate social responsibility, and why is fostering good business ethics important? 4. What measures can organizations take to improve their business ethics? 5. How can you include ethical considerations in your decision making? 6. What trends have increased the risk that information technology will be used in an unethical manner?
2 2. An Overview of Ethics-II (pp.1-42) We will consider the following questions: 1. What is ethics? 2. What trends have increased the likelihood of an unethical behavior? 3. What is corporate social responsibility, and why is fostering good business ethics important? 4. What measures can organizations take to improve their business ethics? 5. How can you include ethical considerations in your decision making? 6. What trends have increased the risk that information technology will be used in an unethical manner?
3 3. Ethics for IT Workers and IT Users-I (pp.43-82) We will consider the following questions: 1. What relationships must an IT worker manage, and what key ethical issues can arise in each? 2. What can be done to encourage the professionalism of IT workers? 3. What ethical issues do IT users face, and what can be done to encourage their ethical behavior?
4 4. Ethics for IT Workers and IT Users-II (pp.43-82) We will consider the following questions: 1. What relationships must an IT worker manage, and what key ethical issues can arise in each? 2. What can be done to encourage the professionalism of IT workers? 3. What ethical issues do IT users face, and what can be done to encourage their ethical behavior?
5 5. Cyberattacks and Cybersecurity-I (pp.83-132) We will consider the following questions: 1. Why are computer incidents so prevalent, and what are their effects? 2. What can be done to implement a strong security program to prevent cyberattacks? 3. What actions must be taken in the event of a successful security intrusion?
6 6. Cyberattacks and Cybersecurity-II (pp.83-132) We will consider the following questions: 1. Why are computer incidents so prevalent, and what are their effects? 2. What can be done to implement a strong security program to prevent cyberattacks? 3. What actions must be taken in the event of a successful security intrusion?
7 7. Privacy (pp.133-184) We will consider the following questions: 1. What is the right of privacy, and what is the basis for protecting personal privacy under the law? 2. What are some of the laws that provide protection for the privacy of personal data, and what are some of the associated ethical issues? 3. What are the various strategies for consumer profiling, and what are the associated ethical issues? 4. What is e-discovery, and how is it being used? 5. Why and how are employers increasingly using workplace monitoring? 6. What are the capabilities of advanced surveillance technologies, and what ethical issues do they raise?
8 8. Freedom of Expression (pp.185-220) We will consider the following questions: 1. What is the basis for the protection of freedom of expression in the United States as the prominent example, and what types of expressions are not protected under the law? 2. What are some key federal laws that affect online freedom of expression, and how do they impact organizations? 3. What important freedom of expression issues relate to the use of information technology? Comparison of Albanian situation.
9 9. Intellectual Property (pp.221-262) We will consider the following questions: 1. What does the term intellectual property encompass, and what measures can organizations take to protect their intellectual property? 2. What are some of the current issues associated with the protection of intellectual property?
10 10. Ethical Decisions in Software Development (pp.263-298) We will consider the following questions: 1. What is meant by software quality, why is it so important, and what potential ethical issues do software manufacturers face when making decisions that involve trade-offs between project schedules, project costs, and software quality? 2. What are some effective strategies for developing quality systems?
11 11. The Impact of Information Technology on Society (pp.299-328) We will consider the following questions: 1. What is the relationship between IT investment and productivity growth in the United States? 2. How will artificial intelligence, machine learning, robotics, and natural language processing affect the future workforce? 3. What impact has the application of IT had on health care?
12 12. Social Media (pp.329-356) We will consider the following questions: 1. How do individuals use social networks, and what are some practical business uses of social networking and other social media tools? 2. What are some of the key ethical issues associated with the use of social networks and other social media?
13 13. Ethics of IT Organizations (pp.357-396) We will consider the following questions: 1. What key legal and ethical issues are associated with the use of contingent workers, H-1B visa holders, and offshore outsourcing companies? 2. What is whistle-blowing, and what ethical issues are associated with it? 3. What is green computing, and what are organizations doing to support this initiative?
14 14. A Brief Introduction to Morality (pp.397-411) A quick survey of various attempts by Western civilization to make sense of the ethical questions What is the good? How should we live our lives? How should we act? Which goals are worth pursuing and which are not? What do we owe to ourselves and to others? This appendix is not specifically focused on the ethical problems created by technology. But you are expected to ask yourself how you would deal with the moral dilemmas you have studied and confronted in your own life.
Prerequisite(s): -
Textbook(s): Reynolds, G. W. (2019). Ethics in information technology. Cengage Learning.
Additional Literature: Ågerfalk, P. J., Fitzgerald, B., & Stol, K. J. (2015). Software sourcing in the age of open: leveraging the unknown workforce. Springer. Agrawal, A., Gans, J., & Goldfarb, A. (2022). Power and Prediction: The Disruptive Economics of Artificial Intelligence. Harvard Business Review Press. Agrawal, A., Gans, J., & Goldfarb, A. (2022). Prediction Machines, Updated and Expanded: The Simple Economics of Artificial Intelligence. Harvard Business Review Press. Aiden, E., & Michel, J. B. (2014). Uncharted: Big data as a lens on human culture. Penguin. Al-Deen, H. S. N., & Hendricks, J. A. (2011). Social media: usage and impact. Lexington books. Altshuler, Y., Elovici, Y., Cremers, A. B., Aharony, N., & Pentland, A. (Eds.). (2012). Security and privacy in social networks. Springer Science & Business Media. Ammanath, B. (2022). Trustworthy AI: a business guide for navigating trust and ethics in AI. John Wiley & Sons. Aral, S. (2020). The Hype Machine: How Social Media Disrupts Our Elections. Our Economy, and Our Health–and How We Must Adapt (Crown, 2020). Awari, G. K., & Warjurkar, S. V. (2022). Ethics in Information Technology: A Practical Guide. CRC Press. Ball, M. (2022). The metaverse: and how it will revolutionize everything. Liveright Publishing. Barfield, W. (2015). Cyber-humans: Our future with machines. Springer. Barrat, J. (2015). Our final invention: Artificial intelligence and the end of the human era. Macmillan. Batarseh, F. A., & Freeman, L. (Eds.). (2022). AI Assurance: Towards Trustworthy, Explainable, Safe, and Ethical AI. Elsevier. Bauerlein, M. (2011). The Digital Divide: Arguments for and Against Facebook, Google, Texting, and the Age of Social Networking. Penguin. Benjamin, R. (2019). Race after technology: Abolitionist tools for the new jim code. Social forces. Bennett, L., Chin, B., & Jones, B. (2015). Crowdfunding the future: Media industries, ethics, and digital society (No. 98). Peter Lang. Bergen, M. (2022). Like, Comment, Subscribe: Inside YouTube's Chaotic Rise to World Domination. Penguin. Berry, D. M. Copy, rip, burn the politics of copyleft and open source, 2008. Bilton, N. (2014). Hatching Twitter: A true story of money, power, friendship, and betrayal. Penguin. Blackburn, A., Chen, I. L., & Pfeffer, R. (Eds.). (2018). Emerging trends in cyber ethics and education. Blackford, R., & Broderick, D. (Eds.). (2014). Intelligence unbound: The future of uploaded and machine minds. John Wiley & Sons. Blackman, R. (2022). Ethical Machines: Your Concise Guide to Totally Unbiased, Transparent, and Respectful AI. Harvard Business Review Press. Blundell, B. G. (2020). Ethics in Computing, Science, and Engineering: A Student's Guide to Doing Things Right. Cham: Springer. Bostrom, N. (2014). Superintelligence: Paths, Dangers, Strategies. Oxford University Press. Boylan, M., & Teays, W. (2022). Ethics in the AI, Technology, and Information Age. Rowman & Littlefield Publishers. Brabham D.C. (2013) Crowdsourcing. MIT Press Brasseur, V. V. (2018). Forge Your Future with Open Source: Build Your Skills. Build Your Network. Build the Future of Technology. Pragmatic Bookshelf. Braunschweig, B., & Ghallab, M. (Eds.). (2021). Reflections on artificial intelligence for humanity. Cham: Springer. Brennan, M. (2020). Attention factory: The story of TikTok and China's ByteDance. China Channel. Brockman, J. (Ed.). (2020). Possible minds: Twenty-five ways of looking at AI. Penguin. Bryar, C., & Carr, B. (2021). Working Backwards: Insights, Stories, and Secrets from Inside Amazon. Pan Macmillan. Burton, E., Goldsmith, J., Mattei, N., Siler, C., & Swiatek, S. J. (2023). Computing and Technology Ethics: Engaging through Science Fiction. MIT Press. Cain, G. (2020). Samsung rising: The inside story of the South Korean giant that set out to beat Apple and Conquer Tech. Currency. Carr, N. (2020). The shallows: What the Internet is doing to our brains. WW Norton & Company. Christen, M., Gordijn, B., & Loi, M. (2020). The ethics of cybersecurity. Springer Nature. Christian, B. (2020). The alignment problem: Machine learning and human values. WW Norton & Company. Christian, B., & Griffiths, T. (2016). Algorithms to live by: The computer science of human decisions. Macmillan. Coeckelbergh, M. (2020). AI ethics. Mit Press. Coleman, E. G. (2012). Coding freedom. In Coding Freedom. Princeton University Press. Curtin, M. (2005). Brute Force. Springer. Davenport, T. H., & Mittal, N. (2023). All-in On AI: How Smart Companies Win Big with Artificial Intelligence. Harvard Business Review Press. Davis, K. (2012). Ethics of Big Data: Balancing risk and innovation. O'Reilly Media, Inc. De George, R. T. (2002). The Ethics of Information Technology and Business (Foundations of Business Ethics). Wiley-Blackwell. Deek, F. P., & McHugh, J. A. (2007). Open source: Technology and policy. Cambridge University Press. Delgado, E. (2015). The Internet of Things: Emergence, Perspectives, Privacy and Security Issues (Internet Theory, Technology and Applications). Nova Science Pub Inc. Dhanjani, N. (2015). Abusing the internet of things: blackouts, freakouts, and stakeouts. " O'Reilly Media, Inc.". DiBona, C., Stone, M., & Cooper, D. (2005). Open sources 2.0: The continuing evolution. " O'Reilly Media, Inc.". Dooling, R. (2008). Rapture for the geeks: When AI outsmarts IQ. Crown. Dormehl, L. (2015). The formula: How algorithms solve all our problems... and create more. TarcherPerigee. Dubber, M. D., Pasquale, F., & Das, S. (Eds.). (2020). The Oxford handbook of ethics of AI. Oxford Handbooks. Edwards, A. V. (2015). Digital is Destroying Everything: What the Tech Giants Won't Tell You about how Robots, Big Data, and Algorithms are Radically Remaking Your Future. Rowman & Littlefield. Etzioni, A., & Rice, C. J. (2015). Privacy in a cyber age: policy and practice. New York: Palgrave Macmillan. Eubanks, V. (2018). Automating inequality: How high-tech tools profile, police, and punish the poor. St. Martin's Press. Foer, F. (2018). World without mind: The existential threat of big tech. Penguin. Franco, P. (2014). Understanding Bitcoin: Cryptography, engineering and economics. John Wiley & Sons. Frier, S. (2021). No filter: The inside story of Instagram. Simon and Schuster. Fry, H. (2018). Hello world: Being human in the age of algorithms. WW Norton & Company. Gallagher, L. (2017). The airbnb story: How three ordinary guys disrupted an industry, made billions… and created plenty of controversy. Houghton Mifflin. Graham, M., & Dutton, W. H. (Eds.). (2019). Society and the internet: How networks of information and communication are changing our lives. Oxford University Press. Gray, M. L., & Suri, S. (2019). Ghost work: How to stop Silicon Valley from building a new global underclass. Eamon Dolan Books. Guertin, C. (2012). Digital prohibition: Piracy and authorship in new media art. Bloomsbury Publishing USA. Haidt, J. (2012). The righteous mind: Why good people are divided by politics and religion. Vintage. Hamelink, C. J. (2023). Communication and Human Rights Towards Communicative Justice Global Media and Communication. Polity. Hari, J. (2023). Stolen Focus: Why You Can't Pay Attention--and how to Think Deeply Again. Crown. Harper, A., Linn, R., Sims, S., Baucom, M., Fernandez, D., Tejeda, H., & Frost, M. (2022). Gray hat hacking: the ethical hacker's handbook. McGraw-Hill Education. Hastings, R., & Meyer, E. (2020). No rules rules: Netflix and the culture of reinvention. Penguin. Helbing, D. (2015). Thinking ahead-essays on big data, digital revolution, and participatory market society (Vol. 10). Cham: Springer. Hicks, M. (2017). Programmed inequality: How Britain discarded women technologists and lost its edge in computing. MIT press. Isaac, M. (2019). Super pumped: The battle for Uber. WW Norton & Company. Jordan, T. (2008). Hacking: Digital media and technological determinism. Polity. Kanaan, M. (2020). T-minus AI: Humanity's Countdown to Artificial Intelligence and the New Pursuit of Global Power. Benbella Books. Kao, M. Y. (Ed.). (2008). Encyclopedia of algorithms. Springer Science & Business Media. Karrar, A. (2021). Computing Ethics. Nova Science Publishers Inc. Kearns, M., & Roth, A. (2019). The ethical algorithm: The science of socially aware algorithm design. Oxford University Press. Keenan, T. P. (2014). Technocreep: the surrender of privacy and the capitalization of intimacy. Greystone Books Ltd. Kelly, B. (2014). The bitcoin big bang: how alternative currencies are about to change the world. John Wiley & Sons. Kelty, C. M. (2008). Two bits: The cultural significance of free software. Duke University Press. Kissinger, H. A., Schmidt, E., & Huttenlocher, D. (2021). The age of AI: and our human future. Hachette UK. Kizza, J. M. (2014). Computer network security and cyber ethics. McFarland. Kizza, J. M. (2019). Ethical and Secure Computing: A Concise Module. Springer. Kizza, J. M. (Ed.). (2017). Ethical and social issues in the information age. New York, NY: Springer New York. Lane, J., Stodden, V., Bender, S., & Nissenbaum, H. (Eds.). (2014). Privacy, big data, and the public good: Frameworks for engagement. Cambridge University Press. Lanier, J. (2018). Ten arguments for deleting your social media accounts right now. Random House. Lee, K. F. (2018). AI superpowers: China, Silicon Valley, and the new world order. Houghton Mifflin. Lee, K. F., & Qiufan, C. (2021). AI 2041: Ten visions for our future. Currency. Lee, N. (2014). Facebook nation. Total information awareness. Springer. Levy, S. (2020). Facebook: The inside story. Penguin UK. Mantelero, A. (2022). Beyond Data: Human Rights, Ethical and Social Impact Assessment in AI (p. 200). Springer Nature. Manu, A. (2016). Value creation and the internet of things: How the behavior economy will shape the 4th industrial revolution. Routledge. Mayer-Schönberger, V., & Cukier, K. (2013). Big data: A revolution that will transform how we live, work, and think. Houghton Mifflin Harcourt. Metz, C. (2022). Genius Makers: The mavericks who brought AI to Google, Facebook, and the World. Penguin. Mickle, T. (2022). After Steve: How Apple Became a Trillion-dollar Company and Lost Its Soul. HarperCollins. Miller, C. (2022). Chip War: The Fight for the World's Most Critical Technology. Simon and Schuster. Miller, V. (2020). Understanding digital culture. Sage Mitchell, M. (2019). Artificial intelligence: A guide for thinking humans. Penguin UK. Moody, G. (2009). Rebel code: Linux and the open source revolution. Hachette UK. Mosco, V. (2015). To the cloud: Big data in a turbulent world. Routledge. Musa, B. A., & Willis, J. (Eds.). (2014). From Twitter to Tahrir Square: Ethics in Social and New Media Communication [2 volumes]: Ethics in Social and New Media Communication. ABC-CLIO. Newport, C. (2019). Digital minimalism: Choosing a focused life in a noisy world. Penguin. Noble, S. U. (2018). Algorithms of oppression. New York University Press. Novella, S., Novella, J., & Novella, B. (2022). The Skeptics' Guide to the Future: What Yesterday's Science and Science Fiction Tell Us About the World of Tomorrow. Oberbrunner, K., & Richter, L. (2022). Blockchain Life: Making Sense of the Metaverse, NFTs, Cryptocurrency, Virtual Reality, Augmented Reality, and Web3. Ethos Collective. O'neil, C. (2017). Weapons of math destruction: How big data increases inequality and threatens democracy. Crown. Padallan, J. O. (2019). Information and Computer Ethics. Arcler Press. Pearson, S. (2013). Privacy, security and trust in cloud computing (pp. 3-42). Springer London. Perez, C. C. (2019). Invisible women: Data bias in a world designed for men. Abrams. Postman, N. (2011). Technopoly: The surrender of culture to technology. Vintage. Price, C. (2018). How to break up with your phone: The 30-day plan to take back your life. Ten Speed Press. Randolph, M. (2019). That will never work: The birth of Netflix and the amazing life of an idea. Hachette UK. Renieris, E. M. (2023). Beyond Data: Reclaiming Human Rights at the Dawn of the Metaverse. MIT Press. Roberts, S. T. (2019). Behind the screen. Yale University Press. Robson, G. J., & Tsou, J. Y. (2023). Technology Ethics: A Philosophical Introduction and Readings. Taylor & Francis. Russell, S. (2019). Human compatible: Artificial intelligence and the problem of control. Penguin. Sadkhan Al Maliky, S. B. (Ed.). (2014). Multidisciplinary perspectives in cryptology and information security. IGI Global. Schneier, B. (2015). Data and Goliath: The hidden battles to collect your data and control your world. WW Norton & Company. Shanahan, M. (2015). The technological singularity. MIT press. Silverman, J. (2015). Terms of service: Social media and the price of constant connection. Harper Collins. Snowden, E. (2019). Permanent Record: A Memoir of a Reluctant Whistleblower. Pan Macmillan. Soni, J. (2022). The Founders: The Story of PayPal and the Entrepreneurs who Shaped Silicon Valley. Simon and Schuster. Stokel-Walker, C. (2023). TikTok boom: China's dynamite app and the superpower race for social media. Sourcebooks, Inc.. Stone, B. (2022). Amazon unbound: Jeff Bezos and the invention of a global empire. Simon and Schuster. Tavani, H. T. (2016). Ethics and technology: Controversies, questions, and strategies for ethical computing. John Wiley & Sons. Tegmark, M. (2018). Life 3.0: Being human in the age of artificial intelligence. Vintage. Tolentino, J. (2020). Trick mirror: Reflections on self-delusion. Random House Trade Paperbacks. Toscano, J. (2018). Automating humanity. Vaidhyanathan, S. (2018). Antisocial media: How Facebook disconnects us and undermines democracy. Oxford University Press. Véliz, C. (2020). Privacy is power: reclaiming democracy in the digital age. Vieweg, S. H. (2021). AI for the Good. Springer International Publishing. Vigna, P., & Casey, M. J. (2016). The age of cryptocurrency: how bitcoin and the blockchain are challenging the global economic order. Macmillan. Wiedeman, R. (2020). Billion Dollar Loser: The Epic Rise and Spectacular Fall of Adam Neumann and WeWork. Hachette UK. Wilson, R., & Tyson, J. (2022). Age of Invisible Machines: A Practical Guide to Creating a Hyperautomated Ecosystem of Intelligent Digital Workers. Wiley. Zuboff, S. (2019). The age of surveillance capitalism: The fight for a human future at the new frontier of power. Profile books.
Laboratory Work: -
Computer Usage: -
Others: No
COURSE LEARNING OUTCOMES
1 • Analyze the ethical and social implications of information systems and their impact on society, culture, and individual behavior.
2 • Critically evaluate the role of information systems in shaping the values, norms, and power structures of modern society.
3 • Assess the legal and ethical frameworks that govern the use of information systems, including privacy, security, intellectual property, and cybercrime.
4 • Identify the social and cultural implications of emerging technologies like artificial intelligence, machine learning, and social media.
5 • Develop strategies for addressing ethical and social issues in the use of information systems, including approaches for promoting social responsibility and sustainability in the design and implementation of technology.
6 • Demonstrate effective communication skills by articulating complex ethical and social issues related to information systems in both written and oral formats.
7 • Collaborate effectively with peers and instructors to analyze case studies and real-world scenarios that involve ethical and social issues related to information systems.
8 • Understand the historical context and evolution of information systems, and the ways in which they have shaped and been shaped by society.
9 • Evaluate the impact of information systems on different stakeholders, including individuals, organizations, and society as a whole.
10 • Apply ethical and social frameworks to analyze and solve real-world problems related to the use of information systems, taking into account diverse perspectives and potential consequences.
COURSE CONTRIBUTION TO... PROGRAM COMPETENCIES
(Blank : no contribution, 1: least contribution ... 5: highest contribution)
No Program Competencies Cont.
Bachelor in Business Informatics (3 years) Program
1 Identify activities, tasks, and skills in management, marketing, accounting, finance, and economics. 3
2 Apply key theories to practical problems within the global business context. 5
3 Demonstrate ethical, social, and legal responsibilities in organizations. 5
4 Develop an open minded-attitude through continuous learning and team-work. 4
5 Integrate different skills and approaches to be used in decision making and data management. 1
6 Combine computer skills with managerial skills, in the analysis of large amounts of data. 1
7 Provide solutions to complex information technology problems. 1
8 Recognize, analyze, and suggest various types of information-communication systems/services that are encountered in everyday life and in the business world. 2
COURSE EVALUATION METHOD
Method Quantity Percentage
Project
3
60
Final Exam
1
40
Total Percent: 100%
ECTS (ALLOCATED BASED ON STUDENT WORKLOAD)
Activities Quantity Duration(Hours) Total Workload(Hours)
Course Duration (Including the exam week: 16x Total course hours) 16 16 256
Hours for off-the-classroom study (Pre-study, practice) 16 16 256
Mid-terms 0
Assignments 3 16 48
Final examination 1 16 16
Other 0
Total Work Load:
576
Total Work Load/25(h):
23.04
ECTS Credit of the Course:
5
CONCLUDING REMARKS BY THE COURSE LECTURER

N/A