It's Easy to Enrol

Select a Learning Method

 

£1,220.00 Payment plans available.

Enable Javascript to automatically update prices.

Courses can be started at any time from anywhere in the world!

Qualification - Certificate In Electronic Journalism

Course CodeVIT007
Fee CodeCT
Duration (approx)600 hours
QualificationCertificate

ONLINE COURSE ELECTRONIC JOURNALISM

 

Why choose this course?

This unique course is designed for those with English as a second language but who want to develop their English skills for online publication and journalism. From this course you will gain improved skills in English grammar and writing, freelance writing, the knowledge to create a web site and a broad understanding of the modern publishing industry. The publishing industry has changed greatly over recent decades, embracing IT not only for writing, but also production and increasingly for publishing. This is a very good course for anyone seeking a start in today's publishing industry.

Modules

Core ModulesThese modules provide foundation knowledge for the Qualification - Certificate In Electronic Journalism.
 Freelance Writing BWR102
 Html - Writing An Internet Website VIT102
 Publishing I BWR107
 Advanced Freelance Writing (Applied Writing) BWR201
 
Elective ModulesIn addition to the core modules, students study any 2 of the following 4 modules.
 Digital Photography (Short Course) BPH202
 Graphic Design BIT205
 Internet Marketing BIT204
 Technical Writing (Advanced) BWR301
 

Note that each module in the Qualification - Certificate In Electronic Journalism is a short course in its own right, and may be studied separately.


How Can Intellectual Property be Protected?

The publishing industry today creates, manages and often publishes in an electronic format. In doing so, there are may advantages that publishing did not enjoy in the past; but there are also vulnerabilities that didn't exist before.
In an electronic format; work becomes vulnerable; and may become accessible in ways that printed material was not accessible.

More Risk but More Opportunity

There is no doubt that anything you write and publish in a digital format is subject to being plaigarized (more today than ever). At the same time though; the opportunities for electronic journalism are stronger because of digital publishing. Writers and publishers who embrace digital publishing are still protected by laws that grant them ownership of their work; and in the places where that ownership counts most, they are still able to enforce their position. Don't be scared by the risks -to do so only limits your career or business opportunities.

Information security is a very broad topic and covers a lot of categories. The easiest way to define information security is by restricting access from unauthorised people to confidential data, so that they cannot read, modify or delete data not intended for them.

ETHICAL ISSUES

When we think about ethics, we think about having an understanding of what is right and wrong – that is a ‘society’ accepted proper course of action in a given situation. Ethics and ethical standards can be applied to any situation.  

Ethics in business are specifically about developing business or company values. The ethics of any business are a guide to what is appropriate and what is not within the scope of that particular business. Ethics of IT professionals are extremely important for a number of factors, mostly because of the nature of data and information which can be accessed. The next part of this lesson is an outline of ethics which are relevant to IT professionals.

Ethical issues facing IT professionals
There are many ethical issues facing IT professionals nowadays, most of them involve data privacy and data security, but others are ownership, control and accuracy.

Some examples include:

  • Given that network and system administrators in most organisations would generally have access to the e-mails of all the employees, is it okay for them to read some of those emails, just because they can? Would it be okay to read those emails as a security measure, to make sure that employees are not disclosing confidential and private company information to unauthorised people?
  • If the system administrators read emails from the employees working in their company, should they disclose this policy to them or not? If they should, is it better to do it before or after they’ve read their private emails?
  • Are system administrators allowed to monitor and keep a log of the websites visited by the employees?
  • Some network and system administrators might decide to install key logger and screen capture software on all or selected computers on the network to capture and save all what the employees type and view. Is it ethical to do so? Should they notify the users that they are being watched?
  • Is it okay for system administrators to access documents, files and personal photos of other employees when they are stored on their work computers or on the file servers?

Legal issues facing IT professionals
There are multiple threats to information systems. The most important ones are listed below:

  • Collecting and using information in an illegal way,
  • Developing and distributing software which can break information systems,
  • Having information leaks in visual channels, electric channels, radio channels, and other technical channels,
  • Damaging or stealing computer systems or other IT equipment,
  • Intercepting data in computer networks and lines of communication,
  • Accessing database information by unauthorised personnel,
  • Distributing data in such a way as to cause an infringement of the legal restrictions set for information distribution.

The necessity to have adequate information legislation in place is crucial to the successful application of information technology in organisations and businesses. Although current laws are not able to cover all the problems related to information technology, successful information legislation should be developed in order to address and regulate the legal relationship of information collection, processing, saving and usage, therefore it is vital for governments and legal agencies to realise efficient measures which ensure information security maintenance.

There are many components involved in developing complete information security for information systems. The most important component in information security is the protection of information captured, stored and flowing in computer systems and computer networks. As a result, criminal laws and legislative laws should be able to endorse the protection of information on computer systems and networks, and these laws must be subject to constant reviews and improvements. Such reviews and improvements are required because of the ever-changing nature of information systems and information security and the emergence of more sophisticated types of attacks.

Information security is not only limited to taking measures to protect information; it also includes a wide range of actions (technical actions, organisational actions, etc.) such as:

  • establishing and improving the information system,
  • developing, using and improving the means for a better information security,
  • efficiently monitoring information security and reporting any infringements,
  • developing protected and secure telecommunication systems,
  • standardising the means for information security and data protection.

With sufficient financing and adequate legislative actions and laws, it is possible to achieve higher information security. High level security can also be achieved by fulfilling complex actions deemed necessary by stakeholders.




Meet some of our academics

Dr. Sherif SakrResearch Scientist and University Lecturer in Computer Science and Engineering. Sherif has a PhD in Computer Science, MSc, BSc.
Josiane JoubranCSC consultant with IBM, Software QA Engineer, Course Writer and Tutor. Josiane is an I.T professional with extensive experience with computer hardware and engineering in Lebanon and Australia. Josiane has a B.Eng., Grad.Dip.I.T., Master Info.Tech., MCP, MCSE.