type
status
date
slug
summary
tags
category
icon
password
Remarks
Be prepared for a VERY VERY VERY VAGUEEE course arrangement.
Don’t rely on anybody except yourself and your reliable friends.
Imagine being in a jungle where you might face a tiger or just a mosquito. Even if it seems like only a mosquito is around, you should prepare fully. I would choose an atomic bomb for both, rather than relying on bare hands to face the unknown.
5% Quiz
15% Midterm
20% Assignment (Research Report)
60% Finals
About Quiz
Quiz is actually quite easy to prepare. Consider the fact that it is open-book, online test and you are free to refer to ChatGPT, which could reduce the error rate, in case the information obtained from Google/lecture notes is misleading.
The following is the quiz question that I personally faced, along with the answers. It should be sufficient to provide a reference about how does the question actually look like.
Quiz Questions and Answers - Semester Oct 2024
- CMA only applies to acts committed in Malaysia - False
- Copycat or reverse engineering is - Gaining access to trade secret information by research
- The edu.my domain is for educational establishments - True
- One of the following statements on the PDPA is correct - Data collected must be securely protected
- Domain name - is a websites equivalent to a physical address
- WWW.UTAR.edu.my vs WWW.UTARR.edu.my is an example of - Typo squatting
- Which of the following statements about Open-source licensing is false? - It contravenes copyright
- If a Malaysian commits an IT offence in Bangkok, on a Malaysian Company, what will be the possible outcome? - He is liable for the offence as if the offence is committed in Malaysia
- Who regulates Cyber Law in Malaysia? - MCMC
- Ethics are right/wrong actions from study and research and based on facts - True
- Which of the following statements about Syariah Law is wrong? - Muslims can file for divorce in the Civil courts
- Which of the following is not an example of Cyber Law? - Employment Act
- Drug Trafficking is an example of a Civil case - False
- Malaysia has two (2) different set of Laws. They are - Secular Law and Syariah Law
- Phishing attacks are examples of Cybercrime - True
- The CMA 1998 created the MCMC - True
- Digital Signature can be used on a Power of Attorney - False
- Offensive and indecent text messages are regulated by - MCMC
- The activity of SPAM is the sending of unsolicited messages - True
- Which of the following is accurate - Breach of ethics will result in a reprimand
- Which of the following statements on close source software is correct? - It is also called Proprietary software
- In Malaysia, the regulator involve in settling domain name disputes is - MYNIC
- An employer/employee dispute is an example of a civil law case - True
- Laws are based on - Bills passed in Parliament
- The Federal Constitution only applies to Kuala Lumpur and Selangor - False
- Smoking in a playground full of children is - Unethical
- One of the following about the PDPA is NOT TRUE - The Malaysian Government is also liable for data leakages
- The Penal Code is a set of Laws regulating - Criminal wrongs
- When a patient consults a Doctor, his medical condition is subject to - PDPA
- One of the following is NOT an example of Cyber Law - Companies Act
2024.11.11 20:21
About Midterm
Prepared by: Khor Yu Zhuang and Kow Chi Fhong
Disclaimer:
We have no clear idea about the exact requirements of this exam.
There are 8 case studies with instructions to prepare 3 legal issues and 2 ethical issues for each, but no additional references are provided.
We’re also unsure if any extra information will be given during the exam.
I didn’t ask my tutor for feedback or review my paper, as I feel it probably wouldn’t help and I was too lazy to follow up.
Even though you happen to score low, don’t be frustrated because we know it isn’t our problem. (This is not for you if you are too chill/lazy to prepare)
Hence, this is just a reference. We hope that this helps.
Best wishes,
20241207 1833
Acknowledgements:
We would like to extend our sincere gratitude to our lecturer for his valuable guidance and advice during the preparation process. We also express our appreciation to our course mate, Fong Jien Hung for providing insightful feedback, which greatly contributed to the improvement of this work.
Maybe it helps:
Refer to the MBOT Code of Ethics and relevant laws in Malaysia.
About Assignment
The assignment is about research report. You need to dive in a topic and do some research, within 25-30 pages. In fact, my assignment group realised that under Times New Roman and 2.0 spacing, it is almost impossible to fit the limit.
Assuming you want to score high and excel in this assignment, there is a lot of work to do. If you really need a copy of my assignment, try to contact me by either leaving a comment or send me a message through my Instagram.
Thanks to my assignment mates, we managed to get a 18/20 for this assignment. The following is the reason that I concluded, possibly contributing for the high marks.
- Points presented are special enough, comparing to others.
- Considering the load that the lecturer need to handle, I purposefully decompose the huge chunk to smaller paragraphs and name them under different titles for a clearer organisation. Each part links themselves, avoiding self-contradiction.
- Considering that lecturer possibly not having an even attention on every part of assignment, the front part costs more effort to demonstrate our hard work.
(Consider that I am quite lazy, so actually we are covering the bad parts with the good ones)
About Finals
Remark:
Too much content for me to memorise all. To tackle this exam, I recommend having a brief understanding first (at least first 3-5 chapters), then observe the latest 6-8 set of past year papers and conclude the frequent questions.
The following is the content that I put in most effort to memorise.
- Short Definition of each MBOT Code of Ethics and an example for each of the ethics
- Types of Cybercrime and some explanation regarding those frequent questions
- Benefits/Importance of IT Ethics (Guides professional conduct, promotes morality, define identity, prevent chaos)
- IT Examples of Not ethical but legal, Ethical but not legal, Ethical and Legal issues
- 4 ways of IP Protection
- 4 aspects of Fair Use
- Acts and Punishments (CCA CMA PDPA)(Remembering some important ones will do, refer to Midterm Case Study.pdf)
- Types of Hacker
- Roles and responsibility of Bank Negara and MCMC in cybercrime
- Why cybercrime still happen after warning
Of course, these are not sufficient. My friends and I realise that the finals are quite concentrated within first 5 chapters. This is basically correct, as I master only the first 5 chapters and the points mentioned above, I was able to get A’s in this exam.
I did read through chapter 6-10, but my memory is too bad (lack of enough repetition to remember them). Hence I only have bits of memory of Chapter 6-10 to assist me in answering.
Doing assignments seriously helps you answer KBAT questions faster. If a similar question appears in the finals, you save time brainstorming in the spot.
- Author:路红叶先生@YZ
- URL:http://preview.tangly1024.com/article/uccd3053-information-technology-professional-ethics
- Copyright:All articles in this blog, except for special statements, adopt BY-NC-SA agreement. Please indicate the source!
Relate Posts