Professional Practices
Professional Practices
Structure of organization
2. Departmentalization
grouping of activities, tasks, and roles into departments according to function
4. Span of Control
refers to the number of employees a manager directly oversees.
6. Formalization
degree to which rules, policies, and procedures are standardized.
7. Communication Channels
the paths through which information flows within an organization.
8. Coordination Mechanisms
help align tasks across departments, ensuring that teams work together to achieve common goals.
1. Business Structure
Defines the legal ownership and operational framework of a business.
Page | 1
2. Organizational Structure
Determines how roles, responsibilities, and communication are arranged within the
enterprise.
Business structures:
1. Sole Proprietorship
A business owned and operated by a single individual.
2. Partnership
A business owned by two or more individuals.
3. Corporation
A business that is legally separate from its owners. It protects owners from personal liability and can
raise money by selling shares.
5. Nonprofit Organization
An organization formed for charitable, educational, or social purposes
6. Cooperative
A business owned and operated by a group of individuals for their mutual benefit.
7. Franchise
A business model where a franchisee pays for the rights to operate a business under the franchisor's
brand and system.
Organizational structures:
2. Flat Structure
Minimal levels of management to enhance agility and employee autonomy
Page | 2
3. Matrix Structure
Dual-reporting setup, combining project and functional management.
4. Divisional Structure
Organized by product lines, markets, or geographic regions—each operating semi-
independently.
6. Functional Structure
Groups employees by specialization (e.g., marketing, finance) to maximize departmental
efficiency.
7. Project-Based Structure
Temporary teams formed around specific projects, disbanded upon completion.
Lecture 11
Software house organization
Page | 3
2. Tools and Technologies
Tools like code repositories, project management software (e.g., Jira), testing environments, and
communication tools (e.g., Slack).
1. Product-Based Structure
Focus on long-term product development
2. Project-Based Structure
Temporary team setups for specific client projects
3. Matrix Structure
Combination of functional and project-based team
Page | 4
Lecture 12
Organizational behavior
Organizational Behavior (OB) explores how individuals act within organizations and how this
behavior influences workplace dynamics. OB is vital for project success, emphasizing people
management and behavioral understanding.
Importance of OB
Staff Selection:
Staff Development:
Staff Motivation:
Motivational needs progress from basic (food, safety) to higher levels (recognition, self-
actualization).
Page | 5
Stress and Stress Management:
• Moderate stress can enhance engagement; excessive stress reduces productivity and
health.
• Causes role ambiguity and role conflict. Effects emotional (e.g., anxiety), and physical
(e.g., fatigue) strains.
• Management Techniques: Imagery, Relaxation, and Meditation, Cognitive Behavioral
Approaches (e.g., time management, journaling), Systemic Approaches (e.g., job
redesign, environment changes).
Lecture 13
Health and safety at work
Employer responsibility:
• Must conduct risk assessments, provide training, and follow safety legislation.
• Must install safety mechanisms (e.g., guards) and respond promptly to incidents.
Page | 6
General duties:
Lecture 14
HRM and Software Engineering
HRM in Software:
Managing people through training, development, and a supportive workplace, balancing
business goals with employee well-being. Aligns employee goals with company strategy.
Encourages commitment, independence, and teamwork. Promotes flexible job roles and shared
management responsibility. Optimizes use of employee skills.
3. Teamwork Approach
Everyone works together towards shared goals, with individual efforts rewarded.
Page | 7
HR tasks are part of every manager’s role, not limited to the HR department.
• Long-Term HR Planning: Predicts future staffing needs and prepares resources to meet
current and future goals.
• Strategic Alignment: Ensures HR activities like hiring, training, and promotions support
the company's overall strategy.
• Useful Tools: Uses software systems to manage recruitment, staffing, and skill
development efficiently.
Challenges:
• Development Environments: Ensuring access to efficient and user-friendly tools for
coding, testing, and debugging.
• HR Alignment: Integrating HR practices with the goals of software development and data
management.
• Flexibility with Advanced Technology: Balancing the need for adaptable software with
the rapid pace of technological advancements.
Page | 8
Training and Skills Development:
• Problems: Skills gaps, poor communication/business knowledge in grads, IT job
stereotypes.
• Solutions: Blend CS with business education, industry training, and practical skills focus.
• Promote flexible, realistic career paths.
Lecture 15
Finance and accounting
Finance and Accounting involve managing an organization’s funds to ensure financial stability
and success. For newly graduated software engineers, understanding these basics is essential,
especially when launching a startup.
Page | 9
The need for capital:
Starting a software company requires initial capital, as expenses occur before income is
generated (e.g., delayed client payments).
Source of funds:
1. Grant
Free funding (no repayment) with restricted use. Example: Gov’t grant for AI tool development.
2. Loan
Borrowed money to repay with interest. Example: Bank loan for office setup.
3. equity
Selling shares to investors for capital. Investors get ownership and profit share. Example:
Investor receives 20% equity for funding.
A financial plan showing expected income and expenses (typically yearly). Helps manage money
and predict financial health.
Page | 10
Sales and order intake:
Sales:
Revenue from selling services/products. Crucial for covering costs and sustaining business.
Order intake:
Costing:
Costing determines all expenses for delivering a product/service.
Types:
Overheads:
Pricing:
Pricing determines how much to charge for products/services. It must cover all costs (production,
operations), Ensure profitability, Stay competitive.
Page | 11
Annual statements:
Balance sheet:
Legal rules:
Lecture 16
Accountability and auditing
Accountability:
It means being answerable for actions, decisions, and results. Critical in professional settings,
especially in software engineering.
Example: A software engineer introduces a bug. Accountability means explaining the error,
fixing it, and preventing recurrence.
Page | 12
Pillars of Accountability:
1. Responsibility – Duty to complete tasks ethically and correctly.
Example: Finishing coding tasks on time.
2. Answerability – Justifying decisions or actions when questioned.
Example: Explaining undetected bugs.
3. Trustworthiness – Being dependable and worthy of confidence.
Example: Securely managing sensitive data.
4. Liability – Legal/financial responsibility for consequences.
Example: Company paying for damages from a faulty product.
Page | 13
2. Error of Clerical – Simple recording mistakes.
Example: Typing $1,500 instead of $15,000.
3. Error of Omission – Missing entries.
Example: Forgetting to record a client’s payment.
4. Error of Commission – Entering wrong figures or into the wrong account.
Example: Payment logged under the wrong customer.
5. Error of Duplication – Recording the same transaction twice.
Example: Double-entering a sales invoice.
Types of Auditing:
Internal Auditing:
External Auditing:
Lecture 16
Information Security
InfoSec refers to the tools, policies, and procedures used to protect all forms of information (digital
and physical) from unauthorized access, theft, or damage. It includes areas like network security,
auditing, and testing.
Page | 14
Information Security vs Cybersecurity:
Information Security: Broad scope; protects all types of data (digital & physical).
Cybersecurity: Focused on defending digital data from cyber threats (e.g., hacking, malware).
Expanded Principles:
Key responsibilities:
• Security Operations
• Cyber Risk and Intelligence
• Data Loss and Fraud Prevention
Page | 15
• Security Architecture
• Identity and Access Management
• Program Management
• Investigations and Forensics
• Governance
Centralized team and tools that monitor and respond to security threats.
Types:
International Regulations:
Page | 16
2. Advanced Persistent Threats (APT)
Long-term, targeted attacks by skilled hackers aiming to steal or damage data.
3. Insider Threats
Employees or trusted users who misuse access to harm the organization.
4. Crypto jacking
Unauthorized use of company systems to mine cryptocurrency, reducing performance.
5. Distributed Denial of Service (DDoS)
Overloading systems with traffic to crash websites or services.
6. Ransomware
Malicious software that encrypts files and demands payment for decryption.
7. Man-in-the-Middle (MitM) Attacks
Intercepting communication between two parties to steal or alter data.
8. Unsecure or Poorly Secured Systems
Systems lacking strong protections, making them easy targets for attackers.
9. Malware on Endpoints
Malicious software on devices (e.g., computers, phones) that can spread across networks.
10. Lack of Encryption
Data sent or stored without encryption, making it vulnerable to interception or theft.
11. Security Misconfiguration
Improperly set up security controls, exposing systems to attacks.
12. Active Attacks
Direct actions to steal, damage, or manipulate data (e.g., hacking into a server).
13. Passive Attacks
Eavesdropping or monitoring data without altering it, often to gather sensitive
information.
1. Firewalls: Filter and control incoming and outgoing network traffic based on predefined
security rules.
2. SIEM (Security Information and Event Management): Monitors and analyzes real-time
security alerts from various systems to detect and respond to threats.
3. DLP (Data Loss Prevention): Prevents unauthorized access, transfer, or leakage of
sensitive data.
4. IDS (Intrusion Detection System) / IPS (Intrusion Prevention System): IDS detects
suspicious activity and alerts admins; IPS takes immediate action to block threats.
5. EDR (Endpoint Detection and Response): Detects, investigates, and responds to threats
on endpoint devices like laptops or smartphones.
6. CSPM (Cloud Security Posture Management): Continuously monitors cloud
infrastructure to ensure it complies with security best practices.
7. VPN (Virtual Private Network): Encrypts internet connections to allow secure and
private access to a network from remote locations.
Page | 17