Skip to content

Latest commit

 

History

History
106 lines (92 loc) · 4.95 KB

704-Management-and-Ethical-Practices.org

File metadata and controls

106 lines (92 loc) · 4.95 KB

<<<704>>> MANAGEMENT AND ETHICAL PRACTICES

CO PO MAPPING

PO1PO2PO3PO4PO5PO6PO7PO8PO9PO10PO11PO12PSO1PSO2PSO3
K3K4K5K5K6-------K5K3K6
CO1K2000010233233031
CO2K3000010233233031
CO3K3000010333213031
CO4K3002010333213031
CO5K2001010333213031
Score003050131515109150155
Course Mapping001010333223031

{{{credits}}}

LTPC
3003

COURSE OBJECTIVES

  • To train basic and applied fields of Management
  • To improve the Managerial skills
  • To prepare the students to the management world
  • To create an awareness on Engineering Ethics and Human Values.
  • To learn technical, legal, and ethical issues involved in computer security

{{{unit}}}

UNIT IOVERVIEW OF MANAGEMENT & PLANNING9

Organization – Role of managers – Evolution of management thought – Managing globally – Strategies for international business. Planning process – Types of plans – Decision Making – Types of decision – Decision making Process – Rational decision making process – Decision making under different conditions.

{{{unit}}}

UNIT IIORGANIZING AND DIRECTING9

Nature and purpose of organizing – Line and staff authority – Departmentation – Centralization and decentralization – Delegation of authority – Staffing – Selection and recruitment – Orientation – Performance appraisal; Motivation and Satisfaction – Motivation theories leadership – Leadership theories – Hurdles to effective communication.

{{{unit}}}

UNIT IIIETHICS IN ENGINEERING9

Senses of engineering ethics – Variety of moral issues – Types of inquiry – Moral dilemmas – Moral autonomy – Kohlberg’s theory – Gilligan’s theory – Consensus and controversy – Models of professional roles - Theories about right action – Self-interest – Customs and religion – Uses of ethical theories - Ethics of AI and Machine Learning

{{{unit}}}

UNIT IVSAFETY, RESPONSIBILITIES AND RIGHTS9

Safety and Risk: Assessment of safety and risk – Risk benefit Analysis and reducing risk - Respect for authority – Collective bargaining – Confidentiality – Conflicts of interest – Occupational crime – Professional rights – Employee rights – Intellectual Property Rights (IPR) – Discrimination.

{{{unit}}}

UNIT VCYBERSECURITY ETHICS9

Introduction – Controlling Access Flow – Protecting Privacy – Dealing with Intrusion – Managing Distributed Resources – Encouraging Exploration – Fostering Responsibility – Asserting Ownership – Three Ethical Frameworks

\hfill Total Periods: 45

COURSE OUTCOMES

After the completion of this course, students will be able to:

  • Describe basic and applied fields of Management (K2)
  • Describe and practice Managerial skills (K3)
  • Describe and practice Engineering Ethics and Human Values (K3).
  • Describe and use safety, responsibility, and rights (K3)
  • Describe ethical issues in cypersecurity (K2).

REFERENCES

  1. Hellriegel, Slocum, Jackson, “Management -A Competency Based Approach”, Thomson South Western, 10th edition, 2007.
  2. Harold Koontz, Heinz Weihrich, Mark V Cannice, “Management-A global & Entrepreneurial Perspective”, Tata Mcgraw Hill, 12th edition, 2007.
  3. Stephen P Robbins, Mary Coulter, “Management”, Prentice Hall of India,8th edition.
  4. Mike W Martin, Roland Schinzinger, “Ethics in Engineering”, Tata McGraw Hill, New Delhi, 2003.
  5. Govindarajan M, Natarajan S, Senthil Kumar V S, “Engineering Ethics”, Prentice Hall of India, New Delhi, 2004.
  6. Mary Manjikian, “Cybersecurity Ethics An Introduction”, Routledge Taylor & Francis Group, 2018.
  7. George Ledin, “Compuer Security, Ethics and Society”, McGraw-Hill, 2010.
  8. http://www.cs.bath.ac.uk/~jjb/web/ai.html