UHB 20102 Essential Academic English
Prerequisite: Pass UHB 10102 English for Higher Education
Synopsis
This course enhances students’ English skills, emphasizing listening and reading skills necessary for
academic contexts. The course provides opportunities for students to learn the strategies to help them
understand information from documents, lectures and presentations and develop analytical listening to
differentiate between facts and opinions. This course also provides opportunities for students to develop
skills to critically respond to academic materials such as journal articles.
References
1. Bowen, E. (2010). Listening in: Broadcasts, Speeches and Interviews. Edinburgh: Edinburgh
University Press.
2. Fairbairn, G. J. (2011). Reading, Writing and Reasoning: A Guide for Students. Maidenhead: Open
University Press. [LB2395 .F34] 2011
3. Lewis, J. (2002). Reading for Academic Success: Reading and Strategies. Boston: Houghton Mifflin.
[LB2395.3 .L48] 2002
4. Metcalfe, M. (2006). Reading Critically at University. Los Angeles: Sage. [LB2395.3 .M47] 2006
5. Shipside, S. (2007). Effective Communication: Get your Message Across and Learn How to Listen.
London: Dorling Kindersley. [HF5718 .S54] 2007
6. Smith, L. C. (2005). Exploring Content 1: Reading for Academic Success. White Plains, NY:
Longman. [PE1122 .S64] 2004
7. Wright, L. (2001). Critical thinking: An Introduction to Analytical Reading and Reasoning. Oxford:
Oxford University Press. [B809.2 .W74] 2001.
UHB 30102 English for Technical Purpose
Prerequisite: Pass UHB 10202 Essential Academic English
Synopsis
This course aims to prepare students with the skills to write reports and express ideas or opinions
competently. Students will be equipped with persuasive strategies that can be applied to writing technical
reports. The course will also enable them to practice these techniques by drafting and collaborating to
produce assigned tasks. The students are also expected to orally present their proposals and written
reports before an audience or panel of examiners.
References
1. Bogdan, R. C. (2007). Qualitative Research for Education: An Introduction to Theory and Methods
(5th ed.). Bostan, MA: Pearson. [LB1028 .B63] 2007
2. Chandra, S. (2013). Research Methodlogy. Oxford, U.K.: Alpha Sceince Intl Ltd. [H62 .C42] 2013
3. Grix, J. (2010). Information Skill: Findings and using the Right Resources. New York: Palgrave
Macmillan
4. Farquhar, J. (2012). Case Study Research for Business. London, England: Sage. [HD30.3 .F37]
2012
5. Hittleman, J. (2006). Interpreting Educational Research: An Introduction dor Consumers of
Research (4th ed.) Upper Saddle River, NJ: Pearson. [LB1028 .H57] 2006
6. Newby, P. (2014). Research Methods for Education (2nd ed.). Abingdon: Routledge. [LB1028. N48]
2014
7. Neville, C. (2010). The Complete Guide to Referencing and Avoiding Plagiarism. Maidenhead: Open
University Press. [PN171.F56 .N48] 2010
8. Scruggs, T. E. (2006). Applications of Research Methodology. Oxford: Elsevier. [LC4704 .A66] 2006
9. Sekaran, U. (2013). Research Methods for Business: A Skill-Building Approach (6th ed.). Chichester,
West Sussex: Wiley. [HD30.4 .S44] 2013
50
10. Somekh, B. (2006). Action Research: A Methodology for Change and Development. Berkshire:
Open University Press. [LB1028.24 .S65] 2006
UHB 40102 English for Occupational Purposes
Prerequisite: Pass UHB 10302 English for Technical Purpose
Synopsis
This course employs a task-based learning approach and focuses on developing students’ delivery of
speech in oral interactions, job interviews and presentations. Particularly emphasis will be given to
promote the mastery of self-directed learning, team-work, research, oral presentations, reasoning and
creativity. This course also enables students to acquire the knowledge and skills necessary for
conducting and participating in meetings, which includes writing documents and event proposals based
on specific themes. Students will also be expected to interview techniques.
References
1. Allen, J. G. (2004). The Complete Q and A Job Interview Book (4th ed.). Hoboken, NJ: John Wiley.
[HF5549.5.16 .A44] 2004
2. Badger, I. (2003). Everyday Business Writing. Essex: Pearson. [PE1115 .B327] 2003
3. Corfield, R. (2008). Preparing the Perfect Job Application: Aplication Forms and Letters Made Easy.
New Delhi: Kogan Page. [HF5383 .C67] 2008
4. Haynes, Marion E. (2009). Meeting Skills for Leaders: Make Meetings more Productive (4th ed.).
Rochester, NY: Axzo Press. [HD30.3 .H39] 2009
5. Leigh, Judith. (2004). CV’s and Job Application. New York: Oxford Univeristy Press. [HF5383 L44]
2004
6. Molinsky, Steven J., & Bliss, Bill. (1994). Day by Day: English for Employment Communication (1st
ed.): Longman. [PE1128 .M67] 1994
7. Peberdy, Duncan. (2009). Brilliant Meetings: What to Know, Do and Say to Have Fewer, Better
Meetings. Harlow: Prentice Hill. [HF5734.5 .P42] 2009
8. Wendleton, Kate. (2014). Mastering the Job Interview and Winning the Game (5th ed.). Boston:
Cengage Learning. [HF5549.5.16 .W46] 2014
9. Wrathall, Jeff. (2011). Event Management: Theory and Practice. North Ryde, N.S.W: McGraw-Hill.
[GT3405 .W72] 2011
BIS 30703 Information Security Project Management 10103
Prerequisite Course(s): Taken BIS10103 Fundamentals of Information Security
Synopsis
Students are divided into several groups and each gropu is supervised by one supervisor. Each group
is required to submit a proposal for the supervisor evaluation. Each group is required to produce a
potential application to be commercialized, with the supervisor approval. All applications are evaluated
by several examiners.
References
1. Schwalbe, K., 2016. Information Technology Project Management. 8th Ed. Boston, Cengage
Learning. Call Number: HD30.2 .S38 2014.
2. Smith, D., 2019. Information Security Best Practices While Managing Projects. Wite Paper. The
SANS Institute.
3. Pruitt, M., 2013. Security Best Practices for IT Project Managers.
4. Sneadaker, S & Rogers, R., 2006. Syngress IT security project management handbook: the first and
last word on managing IT security project. Massachusetts. Syngress Publishing. Inc.
5. Kamath, S. (2014). Project management handbook FDOT. The Office of Design.
51
6. Harold, F. T. & Micki, F., 2004. Information security management handbook. New York: Auerbach
Publications.
7. Jan, H. E., Les, L., Rossouw, V. S. & Gurpreet, D., 2001. Advances in information security
management & small systems security. London: Kluwer Academic Publishers.
8. Jan, K., 2006. Information security architecture: an intergrated approach to security in
organization. 2nd ed. New York: Auerbach Publications.
BIC21102 Professional Ethics and Occupational Safety
Prerequisite Course(s): None
Synopsis
This course discusses topics related to professional ethics in computing. Topics include introduction to
professional ethics in computing, professional ethics and responsibilities, personality in computing
ethics, security and control, copyright and intellectual property, freedom of speech, politeness, filtering
and pornography, and cyber laws in Malaysia.
References
1. Reynolds, G., 2013. Ethics in information technology 5th ed. Boston, MA: Course Technology. Call
Number: HC79.I55.R49 2015.
2. Quinn, M. J., 2010. Ethics for the information age. 4th ed. Boston: Addison Wesley Call Number:
QA76.9.M65 .Q74 2011.
3. Baase. S., 2008. A gift of fire: social, legal and ethical issues for computer and the Internet. 3rd ed.
Upper Saddle River, NJ: Prentice Hall.
4. MacKinnon, B., 2015. Ethics: theory and contemporary issues 8th ed. California: Wadsworth
Publishing. Call Number: BJ1012.M324 2015.
5. Occupational Safety and Health Act and Regulations. MDC Publishers Printer Sdn. Bhd. 2001. Call
Number KPG1390.M34 2001 rw.
6. Factories and Machinery Act and Regulations. MDC Publishers Printer Sdn. Bhd. 2001. Call
Number: KPG1390.A4 2001 rw.
7. Furaker, B., 2012. Commitment to work and job satisfaction: studies of work orientations. Call
Number: HD4905.C65 2012.
52
Career and Further Education Prospect
With a Bachelor of Computer Science in Information Security, the student may pursue various
professional Information Security reers including:
Information Security Engineer
Information Security Analyst
Network Security Engineer
Forensics Specialist
Chief Security Officer
Information Security Manager
Penetration Tester
OS/Application Hardening Expert
Mobile Hacking Expert
Cryptographer
Cyber Law Associates
Database Security Analyst
Secure Code Analyst.
and many other Information Security or Computer Science related jobs. These jobs are said to be the
fastest growing occupation in the next decade. Students also can further their study in Master of
Computer Science by research, coursework or mix-mode in related higher learning education institution.
53
Source: Malaysian Qualification Framework
54
Source: Malaysian Qualification Framework
55
Centre for Academic Development and Training
Universiti Tun Hussein Onn Malaysia
86400 Batu Pahat, Johor Darul Ta’zim
www.uthm.edu.my
lvi