• Tidak ada hasil yang ditemukan

Professional Responsibility Course Name

Lab.

Lec.

Contact Hours

1

Tot.

Lab.

Lec.

Credit Units

1

Course No

Course Code Course

Information CIS 413 670258 2 0 2 2 0

1

Every unit equals a minimum of 50 minutes in theory lecture or minimum 100 minutes in practical laboratory.

University Requirement College Requirement Program Requirement Core Elective

Track

Computer Science (CS)

Computer Information Systems (CIS) Cyber Security and Digital Forensics (CYS) Artificial Intelligence (AI)

Program

None Prerequisite

6 Level

Course Description

This course introduces the students to the legal, social, and ethical issues of information technology and use.

The course focuses on topics such as information assurance and security, growth and control of the internet, information rights, intangible digital intellectual property, liability, accountability, philosophical foundations of privacy protection, security, crime, ethical principles, codes of ethics, "the digital divide", philosophical foundations of intellectual property, role of Patent and Technology Transfer offices, role of government, role of law enforcement, role of business and industry; professional conduct, social responsibility, and rigorous standards for software testing and reliability.

Students read, write, discuss, and present reports on these topics: fraud and abuse, electronic communication privacy, mail fraud, credit card abuse, privacy protection, copyright and patent statute, digital-rights management, communication decency, ACM code of ethics and professional conduct, dispute resolution policy, privacy implications of widespread data collection for transactional databases, data warehouses, surveillance systems, and cloud computing, Ramifications of differential privacy, technology-based solutions for privacy protection, cultural and environmental impacts of implementation decisions (e.g. organizational policies, economic viability, and resource consumption), law and computer, Saudi anti-cybercrime law.

Course Learning Outcome (CLOs)

At the end of the course students will be able to:

1. Describe the role of intellectual property in computing profession. (SO:0; PI:0.1)

2. Assess professional implications in the design and usage of technological systems (SO:4;PI:4.2) 3. Analyze the risks associated with usage of computing technology at individual, organizational, and

societal levels. (SO:6;PI:6.2)

4. Develop communication skills through presentation to peers on ethical and unethical aspects of computing technologies. (SO:3;PI:3.2)

5. Write technical reports on ethical, legal and social impact of computing and responsibilities of computing professionals. (SO:3;PI:3.1)

6. Show skills to work in a group project in a cohesive manner to produce quality deliverables.

(SO:5;PI:5.1)

7. Show skills to structure themselves to work in a cohesive manner (SO:5;PI:5.2)

11/19/2020 62

Assignment(s)

15%

Quiz(zes) Grading

(assessment

strategies) Project(s) 20% Lab

Mid-term (II) 20%

Mid-term (I)

Final 40%

Participation 5%

Textbook:

Sara Baase, Timothy M. Henry (2017) “A Gift of Fire: Social, Legal, and Ethical Issues for Computing and the

Internet”, 5th edition, ISBN-10: 0134615271 ISBN-13: 978-0134615271 Pearson

Reference Book:

1. Ethics & Information Technology Journal

2. Michael J. Quinn, (2016) Ethics for the Information Age, Global Edition, 6/E, ISBN-10: 1292061235

• ISBN-13: 9781292061238, Pearson Higher Education.

3. Association of Computing Machinery Code of Ethics 4. Saudi Anti Cyber Crime Law available at

https://www.boe.gov.sa/ViewSystemDetails.aspx?lang=en&SystemID=217&VersionID=232

Brief list of topics to be covered

- IT and Unexpected Developments - Privacy

o

Philosophical foundations of privacy rights

o

Legal foundations of privacy protection

o

Privacy implications of widespread data collection for transactional databases, data warehouses, surveillance systems, and cloud computing

o

Ramifications of differential privacy

o

Technology-based solutions for privacy protection - Intellectual Property

- Evaluating and controlling Technology - Errors, Failures and Risks

- Professional Ethics and Responsibilities, ACM code of ethics and professional conduct, Ethical argumentation

- Growth and control of the Internet

- Philosophical foundations of intellectual property - Intangible digital intellectual property (IDIP)

- Legal foundations for intellectual property protection

-

Cyber Crime and Saudi Anti-Cybercrime Law - Digital rights management

- Being a sustainable practitioner by taking into consideration cultural and environmental impacts of implementation decisions (e.g. organizational policies, economic viability, and resource

consumption).

11/19/2020 63

Course

Name Operating Systems ليغشتلا مظن

Course Information

Course Code Course No Credit Units

Lec. Lab. Tot. Contact Hours

1

Lec. Lab.

CS 322 670252 2 1 3 2 2

1

Every contact hour equals minimum 50 minutes.

Track University Requirement College Requirement Program Requirement

Core Elective Program

Computer Science (CS)

Computer Information Systems (CIS) Cyber Security and Digital Forensics (CYS)

Artificial Intelligence (AI)

Level 7 Prerequisite 670249 - CS 314

Course Description

This course introduces the fundamentals of the modern operating systems design and implementation. It covers the different techniques used by the operating system to achieve its goals as resource manager. The topics provide the student with the basic concepts, structures, and algorithms that work as intermediary software between the user and the hardware. The course also discusses how applications interact with the operating system and how the operating systems interact with the machine. Some of the existing operating systems will be highlighted as examples to explain how the topics taught in the course are applied in these systems.

Course Learning Outcomes (CLOs)

After successful completion of this course, students will be able to:

1. Explain how to use the Linux operating system commands.

2. Identify the processes and threads of a process 3. Compare various processor scheduling algorithms

4. Compare various process/thread synchronization methods.

5. Evaluate structure/organization of modern file systems

6. Evaluate modern memory management techniques used in Operating Systems Grading

(assessment strategies)

Quiz(zes) 10% Assignment(s)

Project(s) Lab 25%

Mid-term(I) 20% Mid-term (II)

Participation 5% Final 40%

Textbook:

• Abraham Silberschatz, Peter B. Galvin, Greg Gagne, “Operating Systems Concepts", 10

th

Edition”, 2018 Wiley.

• Abraham Silberschatz, Peter B. Galvin, Greg Gagne, “Operating Systems Concepts", 9th

Edition”, 2013 Wiley.

11/19/2020 64

Reference Book:

1. W. Stallings, “Operating Systems: Internals and Design Principles”, Prentice Hall. Latest Edition.

2. Jean Bacon, Tim Harris “Operating Systems”, Addison-Wesley, Latest Edition Lab Book:

• “Linux Essentials”, Roderick W. Smith, Sybex, 2012.

Brief list of topics to be covered

• Operating System Concepts & Structure

• Processes

• Threads

• Process Synchronization

• CPU Scheduling

• Deadlock

• Main Memory

• Virtual Memory

• File System

11/19/2020 65