BIC 21102: Ethics in Computing Chapter 1
30 Questions
3 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following are examples of advances in information technology in the past two decades? (Select all that apply)

  • Cloud (correct)
  • World Wide Web (correct)
  • IOT (correct)
  • Cell Phones (correct)
  • Email (correct)
  • Abacus

Ethics deals with involuntary choices or choices outside the moral realm.

False (B)

The use of IT in business requires balancing the needs of information users against the rights of the individuals whose information is being used.

True (A)

What is the name of the Act that was passed in 1966 and amended in 1974 to provide the public with access to certain government records?

<p>The Freedom of Information Act (FOIA)</p> Signup and view all the answers

What is the definition of 'Personal data' as defined by the PDPA?

<p>Any information collected or processed in connection to a commercial transaction by any equipment operating automatically that is capable of identifying a person.</p> Signup and view all the answers

What are the ethical dilemmas that arise from the growth of IT? (Select all that apply)

<p>Copyright Infringement (A), Pirated Software (B), Hackers &amp; Crackers (C), Phishing (D), Identity Theft (E), Spamming (F), Spyware (G)</p> Signup and view all the answers

The act of fraudulently using email to try and obtain personal data from the recipient, is called 'Phishing'.

<p>True (A)</p> Signup and view all the answers

What does 'Doxing' mean in the online context?

<p>The examination of Internet records to try and reveal the identity of an anonymous poster.</p> Signup and view all the answers

The digital divide refers to the unequal access to modern IT between certain groups of people.

<p>True (A)</p> Signup and view all the answers

What are the principal catalysts of the Information Age?

<p>Low-cost computers and high-speed communication networks (C)</p> Signup and view all the answers

What technologies can solve problems but also create new ones?

<p>Automobiles and refrigerators (B)</p> Signup and view all the answers

In what year was the Intel 4004, the world's first microprocessor, released?

<p>1971</p> Signup and view all the answers

Which organisation introduced the Altair 8800 computer?

<p>MITS, (Micro Instrumentation and Telemetry Systems)</p> Signup and view all the answers

What year was the IBM PC released?

<p>1981</p> Signup and view all the answers

The term "teletype" refers to a type of typewriter used for both output and input.

<p>True (A)</p> Signup and view all the answers

The first electronic television was invented by Philo Farnsworth in 1927.

<p>True (A)</p> Signup and view all the answers

What are the major milestones in networking?

<p>Electricity, the telegraph, the telephone, radio, television, and remote computing (D)</p> Signup and view all the answers

What are the major milestones in information storage and retrieval?

<p>Codex, newspaper, graphical user interface, networked hypertext, Gutenberg's press, hypertext, single computer hypertext systems, search engines (B)</p> Signup and view all the answers

What is the Personal Data Protection Act (PDPA) intended to achieve?

<p>All of the above. (D)</p> Signup and view all the answers

'Public Wi-Fi' can compromise user security.

<p>True (A)</p> Signup and view all the answers

What are the negative impacts of IT on society and social lives? (Select all that apply)

<p>Spyware (A), Spamming (B), Identity theft (C), Pirated software (D), Hackers and crackers (E), Phishing (F)</p> Signup and view all the answers

What are the key areas of concern regarding the "Digital Divide"?

<p>All of the above (D)</p> Signup and view all the answers

What does the Freedom of Information Act (FOIA) aim to achieve?

<p>To ensure public access to US government records.</p> Signup and view all the answers

The Official Secret Act in Malaysia has been replaced by the Freedom of Information Act.

<p>False (B)</p> Signup and view all the answers

What is the purpose of Internet filters?

<p>To block access to websites that contain material deemed inappropriate (A)</p> Signup and view all the answers

Doxing refers to using a public platform to expose private information about an individual.

<p>True (A)</p> Signup and view all the answers

What is the term for the use of works protected by copyright without permission?

<p>Copyright infringement</p> Signup and view all the answers

What is the term for duplicated software that is distributed without authorization?

<p>Pirated software</p> Signup and view all the answers

What is "AI" short for?

<p>Artificial intelligence</p> Signup and view all the answers

What is the main concern regarding the "Rise of Robots" and automation?

<p>All of the above (D)</p> Signup and view all the answers

Flashcards

Ethics in Computing

The study of moral choices and actions related to computer technology.

Ethics

The philosophical study of morality; examining moral beliefs and behaviour.

Morality

A society's rules of conduct, defining what is considered right or wrong.

Information Age

An era of unprecedented access to information, driven by inexpensive computers and networks.

Signup and view all the flashcards

Technology and Values

The complex relationship between people and technology.

Signup and view all the flashcards

Control over new technologies

People's capacity to influence the development and use of new technologies.

Signup and view all the flashcards

Milestone in Computing

Significant steps in the history of computers.

Signup and view all the flashcards

Abacus

An ancient calculating tool.

Signup and view all the flashcards

Mechanical Calculators

Early calculating machines from the 17th century.

Signup and view all the flashcards

Punch Cards

Cards with punched holes representing data, used in early computers.

Signup and view all the flashcards

Tabulators

Machines used to process data from punch cards.

Signup and view all the flashcards

ENIAC

One of the first electronic general-purpose computers.

Signup and view all the flashcards

UNIVAC

One of the first commercially successful computers.

Signup and view all the flashcards

Microprocessors

Small integrated circuits that act as the central processing units (CPUs) of computers.

Signup and view all the flashcards

Cell Phones

Portable devices for communication.

Signup and view all the flashcards

Email

Electronic mail.

Signup and view all the flashcards

World Wide Web

A system of interconnected hypertext documents.

Signup and view all the flashcards

Cloud

A system of remote servers holding data.

Signup and view all the flashcards

IOT

Internet of Things

Signup and view all the flashcards

Fortran

Early high-level computer programming language.

Signup and view all the flashcards

COBOL

Computing language for business applications.

Signup and view all the flashcards

Ethics

The philosophical study of morality, examining people's moral beliefs and actions.

Signup and view all the flashcards

Morality

A society's rules of conduct, defining what behaviors are considered right or wrong.

Signup and view all the flashcards

Information Age

An era of vast information access due to low-cost computers and high-speed networks.

Signup and view all the flashcards

Technology and Values

The complex relationship between people and the technologies they use.

Signup and view all the flashcards

Control over technology

People's power to influence the development and adoption of new technology.

Signup and view all the flashcards

Ethics in Computing

The study of moral choices related to technology and computers.

Signup and view all the flashcards

Abacus

An ancient calculating tool.

Signup and view all the flashcards

Mechancial Calculators

Early computing devices from the 1700s.

Signup and view all the flashcards

Punch Cards

Cards with holes representing data, used in early computers.

Signup and view all the flashcards

Tabulators

Machines that processed data from punch cards.

Signup and view all the flashcards

ENIAC

One of the first electronic general-purpose computers.

Signup and view all the flashcards

UNIVAC

One of the first commercially successful computers.

Signup and view all the flashcards

Microprocessors

Small integrated circuits acting as the brain of computers.

Signup and view all the flashcards

Cell Phones

Portable devices for voice and data communication.

Signup and view all the flashcards

Email

Electronic mail for fast message sending.

Signup and view all the flashcards

World Wide Web

A system of interconnected documents linked on the internet.

Signup and view all the flashcards

Cloud

Remote servers holding data for online access.

Signup and view all the flashcards

IOT

Internet of Things; connecting physical objects to the internet.

Signup and view all the flashcards

Fortran

Early high-level programming language.

Signup and view all the flashcards

COBOL

Programming language for business applications.

Signup and view all the flashcards

Society

An organized group of people with defined rules.

Signup and view all the flashcards

Rapid Technological Change

Fast advancement in technology.

Signup and view all the flashcards

Harmful Exploitation

Selfishly using technology to harm others.

Signup and view all the flashcards

Moral Choices

Voluntary decisions about right and wrong behavior.

Signup and view all the flashcards

Involuntary Choices

Decisions not based on moral considerations.

Signup and view all the flashcards

Moral Realm

The sphere of right and wrong human behavior.

Signup and view all the flashcards

Information Technology

Use of computers and networks to store, process, and exchange information.

Signup and view all the flashcards

Phishing

A cybercrime using deceptive tactics to steal personal information.

Signup and view all the flashcards

Pornographic Websites

Websites that host explicit content.

Signup and view all the flashcards

Study Notes

Introduction to Professional Ethics in Computing

  • Course title: BIC 21102
  • Chapter 1 covers the introduction to the course
  • Content includes ethics, computers, privacy, impact of information technology on society and social issues, computer impact and control, information access issues

Ethics

  • Ethics is the philosophical study of morality, beliefs, and behavior.
  • It's a rational, systematic analysis of conduct that can cause benefit or harm to others.
  • People need to explain why they hold certain opinions about right and wrong behavior in society.
  • Ethics includes the study of what it means to "do the right thing."
  • Every society establishes rules of conduct, outlining what people should and shouldn't do.
  • Society is rapidly changing as technology advances, increasing possibilities for exploitation by some individuals.
  • Decisions about technology usage (e.g. phishing, pornography) require moral judgments: "good", "bad" or "neutral".
  • Ethics focuses on voluntary, moral decisions people make.

Information Age

  • Characterized by unprecedented information access.
  • Principal catalysts include low-cost computers and high-speed communication networks.
  • Advances in past two decades include cell phones, email, the World Wide Web, cloud computing, and the Internet of Things (IoT).

Technology and Values

  • A dynamic interplay between technology and society.
  • Progress in technology prompts shifts in societal norms and challenges.
  • Technology can create new solutions and at the same time new problems, with benefits often accompanied by drawbacks.
  • Examples include transportation (cars), food preservation (refrigerators) and communication (low cost global connectivity); with associated consequences such as traffic jams, food spoilage and job displacement.

Control over New Technologies

  • Individuals have agency in adopting new technologies.
  • Societal factors, such as government policies and laws, can play a role in shaping the rate at which new technologies are developed.
  • Examples include decisions related to nuclear power and intellectual property laws.

Milestones in Computing

  • A timeline of key developments in computing, from early aids to manual calculation (abacus) to modern computers and programming languages.
  • Key achievements include the development of mechanical calculators, punch card tabulators, ENIAC, UNIVAC, the microprocessor (1969), and the IBM PC (1980).

Milestones in Networking

  • A timeline of key developments in networking, from the early telegraph and telephone systems to modern applications.
  • Key achievements include the telegraph, telephone, typewriter, radio, ARPANET, internet (TCP/IP), E-mail, NFSNET, and Broadband.

Milestones in Information Storage and Retrieval

  • A timeline of key developments in information storage and retrieval, from early forms of documentation to modern data storage.
  • Key achievements include the codex (an early book form) Gutenberg's press, newspapers, graphical user interfaces, networked hypertext, world wide web, single computer hypertext systems, and search engines.

Summary of IT Timeline

  • Obsolete technologies and evolving trends in information technology are presented in specific YouTube links
  • The impact of IT on society is discussed with YouTube links included.

Privacy Definition

  • The PDPA (Personal Data Protection Act 2010) protects personal data in Malaysia from misuse.
  • Personal data is defined as any information collected or processed for commercial transactions by automatic equipment.
  • This includes names, addresses, phone numbers, email addresses, identification documents and banking details.

Privacy Protection and the Law

  • Balancing the needs of those using information with the rights of the people whose information is collected is important.
  • Data collection is necessary to improve business decisions, but data collection practices must be ethically sound.
  • Privacy is a key concern for those who use the internet.

Recent History of Privacy Protection (U.S.)

  • Laws such as the Communications Act of 1934, the Freedom of Information Act (FOIA), and the Fair Credit Reporting Act of 1970 regulate data collection practices and provide access to information in the U.S.
  • The Children's Online Privacy Protection Act (COPPA) was implemented to address child online privacy concerns.

Impacts of IT Towards Society and Social

  • Information technology encompasses devices used to create, store, manipulate, exchange, and disseminate data.
  • The costs of IT devices are decreasing, capabilities are increasing.
  • Increased use of IT brings challenges and issues (e.g., cybersecurity risks, digital divide, issues surrounding freedom of information).
  • Significant impacts in areas such as in public places, education, homes, business and government sectors, as well as negative impacts such as identity theft, piracy, spamming, social media scandals
  • Control over how technology is used is important to maintain societal values

Impacts on specific areas like Public Places

  • Wireless internet access points are more common and can cause security issues

Impacts on Education

  • Material is commonly found digitally rather than in printed format.
  • Reliance on printed materials continues to diminish.
  • There are many learning technologies.

Impacts on Business

  • Increased productivity through automation and globalization.
  • Technologies aid in creating worldwide business structures.
  • Telecommuting became more prominent and acceptable.
  • Monitoring workers to ensure compliance can be implemented.

Impacts on Government

  • Censorship, web filters, and DNS redirection can be employed.
  • Data collection and surveillance are prevalent.
  • Issues surround regulation of public and private databases (e.g. sex offender registries).
  • Implementing rules for privacy are relevant to law enforcement and privacy matters.

Impacts of IT Towards Society and Social (Negative Impacts)

  • Pirated software results from illegal distribution/ copying of software programs.
  • Piracy results in intellectual property violations.
  • Identity theft is the unauthorized use of personal information for malicious purposes.
  • Hackers and crackers seek to exploit vulnerabilities in information systems.

Cracking of Large Databases to Gain Personal Identity Information

  • There can be attacks on databases containing personal data,
  • Examples of past data breaches causing identity theft are given.

Phishing and Spyware

  • Phishing involves creating fake websites that trick users into revealing personal data through email.
  • Spyware secretly observes user actions, records data and typically transmits it back to a host computer or server.

Spamming

  • Unsolicited email messages are labeled as spam and are detrimental to recipients' time and efforts.
  • The CAN-SPAM Act was created to control email spam, but spamming continues despite guidelines.
  • Copyright infringement involves unauthorized use of copyrighted works.
  • Pirated software involves distributing unauthorized copies of software

Issues about Computer Impact and Control: Rise of Robot and AI

  • Experts suggest that robots and artificial intelligence could lead to significant job displacement for humans.
  • AI research in computer science focuses on developing machines showcasing intelligent behavior.
  • Development in processor speed has resulted in great strides in Artificial Intelligence.

Issues about Computer Impact and Control: Digital Divide

  • Some populations have access to modern information technologies while others do not.
  • Issues surrounding internet access may result in digital divides, separating groups.

Information Access Issues: Freedom of Information

  • Web access is valuable for obtaining updated information.
  • Privileged users with access to information may make unethical use of their access privileges.
  • Case studies provide examples of ethical failures involving leaked information.

Information Access Issues: Controlling Access to Information

  • Internet restrictions can exist to prevent inappropriate material access.
  • Controlling information on the Internet can be achieved via internet filters, as well as internet censorship.

Information Access Issues: Anonymity on the Internet

  • Anonymous expression allows for opinion sharing without revealing the person's identity.
  • However, anonymity is frequently misused for harmful purposes such as hate speech, cyberbullying, pornography, and online sexual predation.

Responsibility and Ethics on E-Access

  • Questions your ethical responsibilities towards technology, specifically regarding electronic access.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Description

This quiz focuses on the foundational concepts of ethics as they relate to computing. Chapter 1 of BIC 21102 introduces ethical theories, the impact of technology on society, and important issues surrounding privacy and information access. Explore the moral judgments necessary for navigating today's technological landscape.

More Like This

Ethics for the Information Age Chapter 1
44 questions
Ethics for the Information Age Chapter 1
43 questions
Ethics for the Information Age Chapter 1
43 questions
Ethics for the Information Age Chapter 1
30 questions
Use Quizgecko on...
Browser
Browser