Radford University
Department of Information Technology
Student Outcome E
(E) An understanding of professional, ethical, legal, security, and social issues and responsibilities;
|
Level 5
|
The student:
- successfully identifies professional, ethical, legal, security and social issues from within a problem description.
- can apply the general principles underlying professional, ethical, legal, security and social issues
to situations not discussed before.
- suggests a responsible course of action given a particular professional, ethical, legal, security or social issue.
- designs applications that appropriately address security and privacy issues.
- appropriately applies and uses individual and group/role based
permissions and privileges.
- identifies key principles and techniques for backup and recovery of
data.
|
Level 3
|
The student:
- successfully identifies somewhat obvious professional, ethical, legal, security and social issues
from within a problem description.
- can discuss or describe the general principles underlying professional, ethical, legal, security and social issues
but often has difficulty applying the principles to situations not discussed before.
- usually suggests a responsible course of action given a particular professional, ethical, legal, security or social issue.
- is capable of designing an applications that address security and privacy issues but often neglects to do so.
- uses permissions and privileges but not always in the most
efficient manner
- recognizes the need for backup and recovery procedures but has
difficulty designing or implementing more difficulty procedures.
|
Level 1
|
The student:
- fails to identify the professional, ethical, legal, security and social issues from within a problem description.
- can not discuss or describe the general principles underlying professional, ethical, legal, security and social issues.
- struggles to describe a responsible course of action given a particular
professional, ethical, legal, security or social issue.
- can not design applications that appropriately address security and privacy issues.
- cannot implement or use permissions and privileges, has difficulty
diagnosing or correcting permission related errors.
- fails to design or implement backup and recovery procedures.
|