Business Process Outsourcing

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What is the primary purpose of a Captive Market in BPO setup?

  • To run core business activities at cheaper costs (correct)
  • To handle one-off projects
  • To manage business activities with irregular frequencies
  • To provide dedicated development center

Which of the following is a trend in the BPO industry?

  • Better information security (correct)
  • Decreased use of cloud-based software
  • Decreased demand for social media outsourcing
  • Increased use of offshore outsourcing

What is the expected outcome of the BPO industry in the Philippines?

  • It will decline in the coming years
  • It will overtake OFW remittances (correct)
  • It will remain stagnant
  • It will be replaced by artificial intelligence

What is the purpose of a Dedicated Development Center in BPO setup?

<p>To provide dedicated development center for business cases with hanging requirements (A)</p> Signup and view all the answers

What is the main issue concerning the BPO industry in the Philippines related to health?

<p>The health issues of employees (D)</p> Signup and view all the answers

What is the purpose of URL blocking using proxy?

<p>To block access to websites based on the words found in URLs (B)</p> Signup and view all the answers

What is a fundamental human right that is essential for the development and fulfillment of every person?

<p>Freedom of expression (B)</p> Signup and view all the answers

What is the purpose of free debate on new legislation?

<p>To ensure public support and increase respect for the law (C)</p> Signup and view all the answers

Why may public authorities restrict the right to freedom of expression?

<p>To protect national security, territorial integrity, or public safety (A)</p> Signup and view all the answers

What is the result of free speech and media in a society?

<p>The government addresses public concerns (D)</p> Signup and view all the answers

What is the purpose of media scrutiny in a society?

<p>To reveal political strengths and expose corruption (C)</p> Signup and view all the answers

What is a circumstance in which an authority may be allowed to restrict freedom of expression?

<p>If someone expresses views that encourage racial or religious hatred (D)</p> Signup and view all the answers

What is the main purpose of filtering in the context of undesirable content?

<p>To match specific character strings and screen out unwanted content (A)</p> Signup and view all the answers

What type of filter is responsible for filtering out inappropriate links from search results?

<p>Search-engine filter (D)</p> Signup and view all the answers

What is the minimum age requirement for a movie rated R-13?

<p>13 years old (A)</p> Signup and view all the answers

What is the purpose of the Movie and Television Review and Classification Board (MTRCB)?

<p>To classify and review tv programs, movies, and home videos (D)</p> Signup and view all the answers

What is child pornography considered a form of?

<p>Child sexual exploitation (D)</p> Signup and view all the answers

What is the main issue with content filtering?

<p>Legitimate content may be blocked (B)</p> Signup and view all the answers

What is referred to as engagement in sexual activity without meeting each other?

<p>Virtual Prostitution (C)</p> Signup and view all the answers

Which type of cybersex user might use cybersex to enhance their sexual experiences?

<p>Appropriate User (B)</p> Signup and view all the answers

What is a characteristic of the Discovery Group of cybersex users?

<p>They use the internet to explore sexuality that normal life hasn’t offered them (A)</p> Signup and view all the answers

Which type of cybersex user may use dating sites to meet multiple partners in a manipulative or dishonest way?

<p>Discovery Group (D)</p> Signup and view all the answers

What is a consequence of the Predisposed Group's cybersex use?

<p>Work life and real relationships may suffer (B)</p> Signup and view all the answers

What is the term for the most extreme end of the continuum of sexual problems?

<p>Lifelong Sexually Compulsive Group (A)</p> Signup and view all the answers

What is the primary method used in 'phishing' to obtain personal information?

<p>Using email to trick people (D)</p> Signup and view all the answers

Which type of invasion of privacy involves collecting information under false pretenses?

<p>Deception (A)</p> Signup and view all the answers

What is the purpose of employers monitoring workplace activities?

<p>To mitigate risks like theft, data breaches, and inappropriate behavior (C)</p> Signup and view all the answers

What is the term for stealing credit card bills and junk mail directly from a victim's mailbox?

<p>Mail Theft (B)</p> Signup and view all the answers

What is the consequence of an invasion of privacy?

<p>Legal responsibility (C)</p> Signup and view all the answers

What is the term for obtaining personal information by watching someone fill out forms, enter passcodes, or provide credit card numbers?

<p>Shoulder Surfing (B)</p> Signup and view all the answers

Flashcards are hidden until you start studying

Study Notes

BPO Industry

  • 8 subsectors:
    • Knowledge Process Outsourcing and Back Offices
    • Animation
    • Call Centers
    • Software Development
    • Game Development
    • Engineering Design
    • Medical Transcription
  • BPO Setups:
    • Captive Markets (preferred for core or crucial business activities)
    • Offshoring/Third Party Outsourcing (for business activities with irregular frequencies or one-off projects)
    • Project Based Outsourcing (used for business activities with irregular frequencies or one-off projects)
    • Dedicated Development Center (used in business cases when there are hanging requirements)
  • Better Information security
  • Strategic balanced-shore outsourcing
  • Social and Professional Issues in IT:
    • Health Issues
    • Political Issues (revision and approval of RA 7916)
    • Economic Issues (BPO industry is expected to overtake OFW remittances)
    • DNS tampering and URL blocking using proxy

Freedom of Expression

  • Key blockings: blocks access to websites based on the words found in URLs or blocks searches involving blacklisted terms
  • Search Results Removals: companies that provide Internet search services cooperate with governments to omit illegal or undesirable websites from search results
  • Fundamental human right
  • Limited by censorship, restrictive press legislation, and harassment of journalists, bloggers, and others who voice their opinions

Social and Professional Issues in IT

  • Individual Level: freedom of expression is the key to the development and fulfillment of every person
  • National Level: freedom of expression is necessary for good government, economic, and social progress
  • Public authorities may restrict this right to:
    • Protect national security, territorial integrity, or public safety
    • Prevent disorder or crime
    • Protect health or morals
    • Protect the rights and reputations of other people
    • Prevent the disclosure of information received in confidence
    • Maintain the authority and impartiality of judges

Using Digital Technologies for Freedom of Expression

  • Virtual Prostitution: engagement in sexual activity without meeting each other
  • Cybersex: sexual acts that are derived from surfing media sites that would titillate the sexual mind to satisfy the erotic needs
  • Types of Cybersex Users:
    • Recreational Users
    • Inappropriate Users
    • Problematic Users (Discovery Group, Predisposed Group, and Lifelong Sexually Compulsive Group)

Filtering

  • Types of Filtering:
    • Browser Based Filters
    • Email Filters
    • Search-Engine Filters
  • Problems with Filtering: legitimate content, like sex education or medical information, may be blocked if it resembles pornographic material

Television and Films

  • Movie and Television Review and Classification Board (MTRCB) - responsible for classification and review of TV programs, movies, and home videos
  • Films Description:
    • G (General Patronage) – All ages
    • PG (Parental Guidance) – Below 13 years old must be accompanied by a parent or a supervising adult
    • R-13 – 13 years old and above
    • R-16 – 16 years old and above
    • R-18 – 18 years old and above
    • X – Not suitable for public execution

Child Pornography and Technology

  • Form of child sexual exploitation
  • Law prohibits the production, distribution, importation, reception, or possession of any image of child pornography
  • Child pornography purveyors use encryption and anonymous networks on the Dark Web to hide illicit images

Identity Theft and Monitoring

  • Mail Theft: stealing credit card bills and junk mail directly from a victim's mailbox or from public mailboxes on the street
  • Dumpster Driving: retrieving personal paperwork and discarded mail from trash dumpsters
  • Shoulder Surfing: obtaining personal information by watching someone fill out forms, enter passcodes, or provide credit card numbers
  • Phishing: using email to trick people into giving personal information
  • Monitoring: employers monitor workplace activities to mitigate risks like theft, data breaches, and inappropriate behavior

Invasion of Privacy

  • A circumstance where an individual or organization knowingly intrudes upon a person
  • Occurs when the person has a reasonable expectation of privacy, such as in a bathroom or locker room
  • Types of Invasion of Privacy:
    • Deception
    • Violation of Confidentiality
    • Intrusion & Misappropriation

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Like This

Use Quizgecko on...
Browser
Browser