midterm Flashcards

(81 cards)

1
Q

refer to challenges, conflicts, or concerns that
affect individuals and communities in a
society

A

SOCIAL ISSUES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

relate to ethical, legal, and workplace
concerns within a specific Profession

A

PROFESSIONAL ISSUES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

refer to the ethical, moral, and societal
concerns that arise in the workplace and
society due to advancements in technology,
changes in cultural norms, and evolving legal
frameworks.
* are crucial for maintaining ethical standards,
ensuring professional integrity, and promoting
social well-being.

A

SOCIAL AND PROFESSIONAL ISSUES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

KEY SOCIAL AND PROFESSIONAL ISSUES

A
  • Workplace Ethics
  • Discrimination
  • Privacy Concerns
  • Impact of Technology
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  • involve a set of moral
    principles that guide behavior in a
    professional setting.
  • ensure fairness, accountability, and
    professionalism.
A

WORKPLACE ETHICS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Employees and
employers should be truthful in their
interactions and avoid deceptive practices

A

Key aspect of workplace ethics
* Honesty and Integrity:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Sensitive information should
be protected to maintain trust within the
organization.

A

Key aspect of workplace ethics
*Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Employees should avoid
situations where personal interests conflict
with professional responsibilities.

A

Key aspect of workplace ethics
*Conflict of Interest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Organizations have a duty to contribute
positively to society by engaging in
sustainable and ethical practices.

A

Key aspect of workplace ethics
* Corporate Social Responsibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

occurs when
individuals are treated unfairly based on
characteristics such as gender, race, age,
religion, or disability.

A

Discrimination in the workplace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Employers
should provide equal chances for hiring,
promotions, and benefits to all employees.

A

Key elements of discrimination and workplace diversity
* Equal Opportunity Employment:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Organizations
should actively promote a diverse workforce
and inclusive culture.

A

Diversity and Inclusion:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Measures should
be in place to prevent and address
harassment in the workplace.

A

Anti-Harassment Policies:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

is a significant concern in both
personal and professional settings. With the
increasing use of digital platforms,
individuals and organizations must protect
sensitive data.

A

PRIVACY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

While employers may
monitor employee activities to enhance
productivity, excessive surveillance can
infringe on privacy rights.

A

KEY PRIVACY ISSUES
*Employee Monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Organizations must ensure
that customer and employee data is stored
securely and used ethically

A

KEY PRIVACY ISSUES
*Data Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Employees should
be aware of the risks associated with sharing
professional and personal information online.

A

Social Media and Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The rise
of artificial intelligence and automation has
led to job losses in certain sectors, requiring
workforce adaptation and reskilling.

A

IMPACT OF TECHNOLOGY*
Automation and Job Displacement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Increased reliance on
digital platforms has heightened the risk of
cyberattacks and data breaches.

A

IMPACT OF TECHNOLOGY*

Cybersecurity Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The shift to
remote work due to technological
advancements presents concerns about
work-life balance, employee monitoring, and
digital collaboration.

A

IMPACT OF TECHNOLOGY*
Remote Work Challenges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

in professional settings involves assessing
situations based on moral principles and
potential outcomes.

A

ETHICAL DECISION-MAKING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

refers to the rules created by an external
source

A

ETHICS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

refers to the right of our own principles.

A

MORALS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

created by law enforcements to
provide balance of society and protection to
the citizens.

A

LAWS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
These are the major influences in a person’s own version of “right”.
* Family * Religious institutions * Educational institutions * Professional organizations * Government
26
When faced with an ethical dilemma, the objective is to make a judgement based on well- reasoned, defensible ethical principles. * The risk is poor judgement. * A low-quality decision can have a wide range of negative consequences.
ETHICAL DECISION MAKING
27
* He is a philosopher who established Deontology, Absolutism and Kantian Ethics
IMMANUEL KANT’S PRINCIPLES
28
According to Deontology, our ethical methods and values should arise outside ourselves. They do not depend on humans for their existence.
IMMANUEL KANT’S PRINCIPLES
29
Judge your actions by considering the outcome of your action be made a universal law.
IMMANUEL KANT’S PRINCIPLES* Principle of Consistency:
30
Always consider human being as ends in themselves, never as means to an end.
IMMANUEL KANT’S PRINCIPLES* Principle of Respect
31
Actions performed out of a sense of duty are morally praiseworthy actions.
IMMANUEL KANT’S PRINCIPLES* Principle of Duty
32
We have responsibilities and duties * Some things are right and some are wrong regardless whether we agree or not * Doing right will not necessarily be to our advantage.
IMMANUEL KANT’S PRINCIPLES
33
No real distinction between truth and opinion. Right and wrong are relative to individual or community opinion. No standards or rules of behavior can be reasonably applied at all times and all places. * Actions must be judged as moral depending on the time and culture in which they take place. * What is considered moral can change considerably overtime within a culture.
RELATIVISM
34
Attempts to determine whether an action is moral by considering the consequences. * Actions are moral if they create the greatest happiness for the greatest number of people
UTILITARIANISM
35
TWO TYPES OF ETHICAL CHOICES
Right vs wrong Right vs right
36
– choosing right from wrong is the easiest
Right vs wrong
37
situation contains shades of gray, choosing the lesser of two evils. Make a defensible decision
Right vs right
38
Actions can be:
Ethical and legal * Ethical but legal * Not ethical but legal * Not ethical and illegal
39
Is a secret weapon that is frequently underestimated.
IT CULTURE
40
BEHAVIOR OF IT TEAMS IN BUSINESS OPERATIONS AND STRATEGY:
Reactive Siloed Inflexible
41
– IT teams are constant _______ with the rapid change of business and technology through the ability to execute on time and under budget.
* Reactive
42
organizational misalignment, governance gaps and conflicting business agendas often create a chasm between business needs and IT delivery
Siloed
43
- many IT teams take pride in their
inflexible
44
THREE TYPES OF IT CULTURES CAN CO-EXIST IN HEALTH ORGANIZATIONS:
Stability Partnership Courage
45
the primary cultural belief is that the business must operate efficiently and without disruptions
Stability
46
collaboration and teamwork welcomes and engages the workforce and business partners.
Partnership
47
technology can transform the business and drive company growth and performance.
courage
48
as the capability measurement in terms of technology adaptation of a large-scale population in a period of time.
TECHNOLOGY DIFFUSION
49
FOLLOWING ACTORS THAT PLAYS THE MAIN ROLE OF THE DEVELOPED THEORY:
Innovators Early adopters Early majority Late majority Laggards
50
People who are open to risks and the first to try new ideas
Innovators
51
People who are interested in trying new technologies and establishing their utility in society.
Early adopters
52
Those who pave the way for use of an innovation within mainstream society and are part of the general population
Early majority
53
Another part of the general population—the set of people who follow the early majority into adopting the innovation as part of their daily life.
Late majority
54
People who lag the general population in adopting innovative products and new ideas. This is primarily because they are risk-averse and set in their ways of doing things
Laggards
55
are an act performed by a knowledgeable computer user, sometimes referred to as a hacker that illegally browses or steals a company’s or individual’s private information.
COMPUTER AND INTERNET CRIMES
56
making or distributing child pornography
Child Pornography
57
copyright infringement occurs when there is a violation of any of the exclusive economic or moral rights granted to the copyright owner.
Copyright Violation
58
breaking or deciphering codes designed to protect data
Cracking
59
Hacking, threats, and blackmailing towards a business or person
Cyber Terrorism
60
covers social bullying aiming to belittle another individual or group or gender-based bullying that humiliates another on the basis of perceived or actual sexual orientation and gender identity
Cyberbullying or Cyberstalking
61
- Setting up a domain of another person or company with the sole intention of selling it to them later at a premium price.
Cybersquatting
62
Overloading a system with so many requests it cannot serve normal requests.
Denial of Service Attack
63
Intellectual property rights under the IP Code are as follows: * Copyright and related rights * Trademarks and service marks * Geographic indications * Industrial designs * Patents * Layout designs of ICs * Protection of undisclosed information
Intellectual Property Theft
64
is an attempt by cybercriminals posing as legitimate institutions, usually via email, to obtain sensitive information from targeted individuals.
Phishing
65
the action or crime of making a false spoken statement damaging to a person's reputation.
Slander
66
the act of illegally using, copying or distributing software without ownership or legal rights.
Software piracy
67
send the same message indiscriminately to (large numbers of recipients) on the internet.
Spamming
68
involves a cybercriminal masquerading as a trusted entity or device to get you to do something beneficial to the hacker.
Spoofing
69
- is a social engineering attack that purposely uses misspelled domains for malicious purposes.
Typosquatting
70
any person, not being authorized by all the parties to any private communication or spoken word, to tap any wire or cable, or by using any other device or arrangement, to secretly overhear, intercept, or record such communication
Wiretapping
71
when someone has posted or emailed something that is untrue and damaging about someone else on the Internet.
TYPES OF INTERNET CRIMES Cyberlibel
72
presenting someone else's work or ideas as your own, with or without their consent, by incorporating it into your work without full acknowledgement.
TYPES OF INTERNET CRIMES Plagiarism
73
is bullying that takes place over digital devices like cell phones, computers, and tablets. Methods of Cyberbullying o Harassment o Impersonation o Inappropriate Photographs o Video Shaming
TYPES OF INTERNET CRIMES Cyberbullying
74
ability of a person to determine for themselves when, how, and to what extent personal information about them is shared with or communicated to others.
PRIVACY
75
a security method that transforms readable data (plaintext) into an unreadable format (ciphertext) to protect it from unauthorized access
DATA ENCRYPTION
76
is the basic building block of data security and is the simplest and most important way to ensure a computer system’s information can’t be stolen and read by someone
ENCRYPTION
77
It protects emails, bank accounts, transactions, and messages.
NATIONAL PRIVACY COMMISSION
78
makes use of code or symbols via paper, pen, or mechanical devices in order to protect secrets.
CRYPTOGRAPHY
79
* is one of the simplest and most widely-known encryption techniques. * plaintext is replaced by a letter some fixed number of positions further down the alphabet.
Caesar’s Cipher (Caesar’s Code / Caesar Shift)
80
It is a simple letter substitution cipher that replaces a letter with the 13th letter after it, in the alphabet.
ROT13
81
COMPANIES WHO PROVIDE DATA ENCRYPTION SYSTEMS
Netrust Philippines Corporation. NTT Data Philippines Sprout Solutions