Radford University
School of Computing and Information Sciences
Student Outcome 4

(4) Recognize professional responsibilities and make informed judgments in computing practice based on legal and ethical principles;

Level 5
The student:
  1. successfully identifies professional, ethical, legal, security and social issues from within a problem description.
  2. can apply the general principles underlying professional, ethical, legal, security and social issues to situations not discussed before.
  3. suggests a responsible course of action given a particular professional, ethical, legal, security or social issue.
  4. designs applications that appropriately address security and privacy issues.
  5. appropriately applies and uses individual and group/role based permissions and privileges.
  6. identifies key principles and techniques for backup and recovery of data.

Level 3
The student:
  1. successfully identifies somewhat obvious professional, ethical, legal, security and social issues from within a problem description.
  2. can discuss or describe the general principles underlying professional, ethical, legal, security and social issues but often has difficulty applying the principles to situations not discussed before.
  3. usually suggests a responsible course of action given a particular professional, ethical, legal, security or social issue.
  4. is capable of designing an applications that address security and privacy issues but often neglects to do so.
  5. uses permissions and privileges but not always in the most efficient manner
  6. recognizes the need for backup and recovery procedures but has difficulty designing or implementing more difficulty procedures.

Level 1
The student:
  1. fails to identify the professional, ethical, legal, security and social issues from within a problem description.
  2. can not discuss or describe the general principles underlying professional, ethical, legal, security and social issues.
  3. struggles to describe a responsible course of action given a particular professional, ethical, legal, security or social issue.
  4. can not design applications that appropriately address security and privacy issues.
  5. cannot implement or use permissions and privileges, has difficulty diagnosing or correcting permission related errors.
  6. fails to design or implement backup and recovery procedures.