Radford University
Department of Information Technology
Student Outcome E

(E) An understanding of professional, ethical, legal, security, and social issues and responsibilities;

Level 5
The student:
  1. successfully identifies professional, ethical, legal, security and social issues from within a problem description.
  2. can apply the general principles underlying professional, ethical, legal, security and social issues to situations not discussed before.
  3. suggests a responsible course of action given a particular professional, ethical, legal, security or social issue.
  4. designs applications that appropriately address security and privacy issues.
  5. appropriately applies and uses individual and group/role based permissions and privileges.
  6. identifies key principles and techniques for backup and recovery of data.

Level 3
The student:
  1. successfully identifies somewhat obvious professional, ethical, legal, security and social issues from within a problem description.
  2. can discuss or describe the general principles underlying professional, ethical, legal, security and social issues but often has difficulty applying the principles to situations not discussed before.
  3. usually suggests a responsible course of action given a particular professional, ethical, legal, security or social issue.
  4. is capable of designing an applications that address security and privacy issues but often neglects to do so.
  5. uses permissions and privileges but not always in the most efficient manner
  6. recognizes the need for backup and recovery procedures but has difficulty designing or implementing more difficulty procedures.

Level 1
The student:
  1. fails to identify the professional, ethical, legal, security and social issues from within a problem description.
  2. can not discuss or describe the general principles underlying professional, ethical, legal, security and social issues.
  3. struggles to describe a responsible course of action given a particular professional, ethical, legal, security or social issue.
  4. can not design applications that appropriately address security and privacy issues.
  5. cannot implement or use permissions and privileges, has difficulty diagnosing or correcting permission related errors.
  6. fails to design or implement backup and recovery procedures.