BIC 21102: Ethics in Computing Chapter 1
30 Questions
2 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following are examples of advances in information technology in the past two decades? (Select all that apply)

  • Cloud (correct)
  • World Wide Web (correct)
  • IOT (correct)
  • Cell Phones (correct)
  • Email (correct)
  • Abacus
  • Ethics deals with involuntary choices or choices outside the moral realm.

    False

    The use of IT in business requires balancing the needs of information users against the rights of the individuals whose information is being used.

    True

    What is the name of the Act that was passed in 1966 and amended in 1974 to provide the public with access to certain government records?

    <p>The Freedom of Information Act (FOIA)</p> Signup and view all the answers

    What is the definition of 'Personal data' as defined by the PDPA?

    <p>Any information collected or processed in connection to a commercial transaction by any equipment operating automatically that is capable of identifying a person.</p> Signup and view all the answers

    What are the ethical dilemmas that arise from the growth of IT? (Select all that apply)

    <p>Copyright Infringement</p> Signup and view all the answers

    The act of fraudulently using email to try and obtain personal data from the recipient, is called 'Phishing'.

    <p>True</p> Signup and view all the answers

    What does 'Doxing' mean in the online context?

    <p>The examination of Internet records to try and reveal the identity of an anonymous poster.</p> Signup and view all the answers

    The digital divide refers to the unequal access to modern IT between certain groups of people.

    <p>True</p> Signup and view all the answers

    What are the principal catalysts of the Information Age?

    <p>Low-cost computers and high-speed communication networks</p> Signup and view all the answers

    What technologies can solve problems but also create new ones?

    <p>Automobiles and refrigerators</p> Signup and view all the answers

    In what year was the Intel 4004, the world's first microprocessor, released?

    <p>1971</p> Signup and view all the answers

    Which organisation introduced the Altair 8800 computer?

    <p>MITS, (Micro Instrumentation and Telemetry Systems)</p> Signup and view all the answers

    What year was the IBM PC released?

    <p>1981</p> Signup and view all the answers

    The term "teletype" refers to a type of typewriter used for both output and input.

    <p>True</p> Signup and view all the answers

    The first electronic television was invented by Philo Farnsworth in 1927.

    <p>True</p> Signup and view all the answers

    What are the major milestones in networking?

    <p>Electricity, the telegraph, the telephone, radio, television, and remote computing</p> Signup and view all the answers

    What are the major milestones in information storage and retrieval?

    <p>Codex, newspaper, graphical user interface, networked hypertext, Gutenberg's press, hypertext, single computer hypertext systems, search engines</p> Signup and view all the answers

    What is the Personal Data Protection Act (PDPA) intended to achieve?

    <p>All of the above.</p> Signup and view all the answers

    'Public Wi-Fi' can compromise user security.

    <p>True</p> Signup and view all the answers

    What are the negative impacts of IT on society and social lives? (Select all that apply)

    <p>Spyware</p> Signup and view all the answers

    What are the key areas of concern regarding the "Digital Divide"?

    <p>All of the above</p> Signup and view all the answers

    What does the Freedom of Information Act (FOIA) aim to achieve?

    <p>To ensure public access to US government records.</p> Signup and view all the answers

    The Official Secret Act in Malaysia has been replaced by the Freedom of Information Act.

    <p>False</p> Signup and view all the answers

    What is the purpose of Internet filters?

    <p>To block access to websites that contain material deemed inappropriate</p> Signup and view all the answers

    Doxing refers to using a public platform to expose private information about an individual.

    <p>True</p> Signup and view all the answers

    What is the term for the use of works protected by copyright without permission?

    <p>Copyright infringement</p> Signup and view all the answers

    What is the term for duplicated software that is distributed without authorization?

    <p>Pirated software</p> Signup and view all the answers

    What is "AI" short for?

    <p>Artificial intelligence</p> Signup and view all the answers

    What is the main concern regarding the "Rise of Robots" and automation?

    <p>All of the above</p> Signup and view all the answers

    Study Notes

    Introduction to Professional Ethics in Computing

    • Course title: BIC 21102
    • Chapter 1 covers the introduction to the course
    • Content includes ethics, computers, privacy, impact of information technology on society and social issues, computer impact and control, information access issues

    Ethics

    • Ethics is the philosophical study of morality, beliefs, and behavior.
    • It's a rational, systematic analysis of conduct that can cause benefit or harm to others.
    • People need to explain why they hold certain opinions about right and wrong behavior in society.
    • Ethics includes the study of what it means to "do the right thing."
    • Every society establishes rules of conduct, outlining what people should and shouldn't do.
    • Society is rapidly changing as technology advances, increasing possibilities for exploitation by some individuals.
    • Decisions about technology usage (e.g. phishing, pornography) require moral judgments: "good", "bad" or "neutral".
    • Ethics focuses on voluntary, moral decisions people make.

    Information Age

    • Characterized by unprecedented information access.
    • Principal catalysts include low-cost computers and high-speed communication networks.
    • Advances in past two decades include cell phones, email, the World Wide Web, cloud computing, and the Internet of Things (IoT).

    Technology and Values

    • A dynamic interplay between technology and society.
    • Progress in technology prompts shifts in societal norms and challenges.
    • Technology can create new solutions and at the same time new problems, with benefits often accompanied by drawbacks.
    • Examples include transportation (cars), food preservation (refrigerators) and communication (low cost global connectivity); with associated consequences such as traffic jams, food spoilage and job displacement.

    Control over New Technologies

    • Individuals have agency in adopting new technologies.
    • Societal factors, such as government policies and laws, can play a role in shaping the rate at which new technologies are developed.
    • Examples include decisions related to nuclear power and intellectual property laws.

    Milestones in Computing

    • A timeline of key developments in computing, from early aids to manual calculation (abacus) to modern computers and programming languages.
    • Key achievements include the development of mechanical calculators, punch card tabulators, ENIAC, UNIVAC, the microprocessor (1969), and the IBM PC (1980).

    Milestones in Networking

    • A timeline of key developments in networking, from the early telegraph and telephone systems to modern applications.
    • Key achievements include the telegraph, telephone, typewriter, radio, ARPANET, internet (TCP/IP), E-mail, NFSNET, and Broadband.

    Milestones in Information Storage and Retrieval

    • A timeline of key developments in information storage and retrieval, from early forms of documentation to modern data storage.
    • Key achievements include the codex (an early book form) Gutenberg's press, newspapers, graphical user interfaces, networked hypertext, world wide web, single computer hypertext systems, and search engines.

    Summary of IT Timeline

    • Obsolete technologies and evolving trends in information technology are presented in specific YouTube links
    • The impact of IT on society is discussed with YouTube links included.

    Privacy Definition

    • The PDPA (Personal Data Protection Act 2010) protects personal data in Malaysia from misuse.
    • Personal data is defined as any information collected or processed for commercial transactions by automatic equipment.
    • This includes names, addresses, phone numbers, email addresses, identification documents and banking details.

    Privacy Protection and the Law

    • Balancing the needs of those using information with the rights of the people whose information is collected is important.
    • Data collection is necessary to improve business decisions, but data collection practices must be ethically sound.
    • Privacy is a key concern for those who use the internet.

    Recent History of Privacy Protection (U.S.)

    • Laws such as the Communications Act of 1934, the Freedom of Information Act (FOIA), and the Fair Credit Reporting Act of 1970 regulate data collection practices and provide access to information in the U.S.
    • The Children's Online Privacy Protection Act (COPPA) was implemented to address child online privacy concerns.

    Impacts of IT Towards Society and Social

    • Information technology encompasses devices used to create, store, manipulate, exchange, and disseminate data.
    • The costs of IT devices are decreasing, capabilities are increasing.
    • Increased use of IT brings challenges and issues (e.g., cybersecurity risks, digital divide, issues surrounding freedom of information).
    • Significant impacts in areas such as in public places, education, homes, business and government sectors, as well as negative impacts such as identity theft, piracy, spamming, social media scandals
    • Control over how technology is used is important to maintain societal values

    Impacts on specific areas like Public Places

    • Wireless internet access points are more common and can cause security issues

    Impacts on Education

    • Material is commonly found digitally rather than in printed format.
    • Reliance on printed materials continues to diminish.
    • There are many learning technologies.

    Impacts on Business

    • Increased productivity through automation and globalization.
    • Technologies aid in creating worldwide business structures.
    • Telecommuting became more prominent and acceptable.
    • Monitoring workers to ensure compliance can be implemented.

    Impacts on Government

    • Censorship, web filters, and DNS redirection can be employed.
    • Data collection and surveillance are prevalent.
    • Issues surround regulation of public and private databases (e.g. sex offender registries).
    • Implementing rules for privacy are relevant to law enforcement and privacy matters.

    Impacts of IT Towards Society and Social (Negative Impacts)

    • Pirated software results from illegal distribution/ copying of software programs.
    • Piracy results in intellectual property violations.
    • Identity theft is the unauthorized use of personal information for malicious purposes.
    • Hackers and crackers seek to exploit vulnerabilities in information systems.

    Cracking of Large Databases to Gain Personal Identity Information

    • There can be attacks on databases containing personal data,
    • Examples of past data breaches causing identity theft are given.

    Phishing and Spyware

    • Phishing involves creating fake websites that trick users into revealing personal data through email.
    • Spyware secretly observes user actions, records data and typically transmits it back to a host computer or server.

    Spamming

    • Unsolicited email messages are labeled as spam and are detrimental to recipients' time and efforts.
    • The CAN-SPAM Act was created to control email spam, but spamming continues despite guidelines.
    • Copyright infringement involves unauthorized use of copyrighted works.
    • Pirated software involves distributing unauthorized copies of software

    Issues about Computer Impact and Control: Rise of Robot and AI

    • Experts suggest that robots and artificial intelligence could lead to significant job displacement for humans.
    • AI research in computer science focuses on developing machines showcasing intelligent behavior.
    • Development in processor speed has resulted in great strides in Artificial Intelligence.

    Issues about Computer Impact and Control: Digital Divide

    • Some populations have access to modern information technologies while others do not.
    • Issues surrounding internet access may result in digital divides, separating groups.

    Information Access Issues: Freedom of Information

    • Web access is valuable for obtaining updated information.
    • Privileged users with access to information may make unethical use of their access privileges.
    • Case studies provide examples of ethical failures involving leaked information.

    Information Access Issues: Controlling Access to Information

    • Internet restrictions can exist to prevent inappropriate material access.
    • Controlling information on the Internet can be achieved via internet filters, as well as internet censorship.

    Information Access Issues: Anonymity on the Internet

    • Anonymous expression allows for opinion sharing without revealing the person's identity.
    • However, anonymity is frequently misused for harmful purposes such as hate speech, cyberbullying, pornography, and online sexual predation.

    Responsibility and Ethics on E-Access

    • Questions your ethical responsibilities towards technology, specifically regarding electronic access.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    This quiz focuses on the foundational concepts of ethics as they relate to computing. Chapter 1 of BIC 21102 introduces ethical theories, the impact of technology on society, and important issues surrounding privacy and information access. Explore the moral judgments necessary for navigating today's technological landscape.

    More Like This

    IC 112 – Professional Ethics in Computing
    12 questions
    Ethics for the Information Age Chapter 1
    43 questions
    Ethics for the Information Age Chapter 1
    43 questions
    Ethics for the Information Age Chapter 1
    30 questions
    Use Quizgecko on...
    Browser
    Browser