Podcast
Questions and Answers
What is the primary purpose of a Captive Market in BPO setup?
What is the primary purpose of a Captive Market in BPO setup?
Which of the following is a trend in the BPO industry?
Which of the following is a trend in the BPO industry?
What is the expected outcome of the BPO industry in the Philippines?
What is the expected outcome of the BPO industry in the Philippines?
What is the purpose of a Dedicated Development Center in BPO setup?
What is the purpose of a Dedicated Development Center in BPO setup?
Signup and view all the answers
What is the main issue concerning the BPO industry in the Philippines related to health?
What is the main issue concerning the BPO industry in the Philippines related to health?
Signup and view all the answers
What is the purpose of URL blocking using proxy?
What is the purpose of URL blocking using proxy?
Signup and view all the answers
What is a fundamental human right that is essential for the development and fulfillment of every person?
What is a fundamental human right that is essential for the development and fulfillment of every person?
Signup and view all the answers
What is the purpose of free debate on new legislation?
What is the purpose of free debate on new legislation?
Signup and view all the answers
Why may public authorities restrict the right to freedom of expression?
Why may public authorities restrict the right to freedom of expression?
Signup and view all the answers
What is the result of free speech and media in a society?
What is the result of free speech and media in a society?
Signup and view all the answers
What is the purpose of media scrutiny in a society?
What is the purpose of media scrutiny in a society?
Signup and view all the answers
What is a circumstance in which an authority may be allowed to restrict freedom of expression?
What is a circumstance in which an authority may be allowed to restrict freedom of expression?
Signup and view all the answers
What is the main purpose of filtering in the context of undesirable content?
What is the main purpose of filtering in the context of undesirable content?
Signup and view all the answers
What type of filter is responsible for filtering out inappropriate links from search results?
What type of filter is responsible for filtering out inappropriate links from search results?
Signup and view all the answers
What is the minimum age requirement for a movie rated R-13?
What is the minimum age requirement for a movie rated R-13?
Signup and view all the answers
What is the purpose of the Movie and Television Review and Classification Board (MTRCB)?
What is the purpose of the Movie and Television Review and Classification Board (MTRCB)?
Signup and view all the answers
What is child pornography considered a form of?
What is child pornography considered a form of?
Signup and view all the answers
What is the main issue with content filtering?
What is the main issue with content filtering?
Signup and view all the answers
What is referred to as engagement in sexual activity without meeting each other?
What is referred to as engagement in sexual activity without meeting each other?
Signup and view all the answers
Which type of cybersex user might use cybersex to enhance their sexual experiences?
Which type of cybersex user might use cybersex to enhance their sexual experiences?
Signup and view all the answers
What is a characteristic of the Discovery Group of cybersex users?
What is a characteristic of the Discovery Group of cybersex users?
Signup and view all the answers
Which type of cybersex user may use dating sites to meet multiple partners in a manipulative or dishonest way?
Which type of cybersex user may use dating sites to meet multiple partners in a manipulative or dishonest way?
Signup and view all the answers
What is a consequence of the Predisposed Group's cybersex use?
What is a consequence of the Predisposed Group's cybersex use?
Signup and view all the answers
What is the term for the most extreme end of the continuum of sexual problems?
What is the term for the most extreme end of the continuum of sexual problems?
Signup and view all the answers
What is the primary method used in 'phishing' to obtain personal information?
What is the primary method used in 'phishing' to obtain personal information?
Signup and view all the answers
Which type of invasion of privacy involves collecting information under false pretenses?
Which type of invasion of privacy involves collecting information under false pretenses?
Signup and view all the answers
What is the purpose of employers monitoring workplace activities?
What is the purpose of employers monitoring workplace activities?
Signup and view all the answers
What is the term for stealing credit card bills and junk mail directly from a victim's mailbox?
What is the term for stealing credit card bills and junk mail directly from a victim's mailbox?
Signup and view all the answers
What is the consequence of an invasion of privacy?
What is the consequence of an invasion of privacy?
Signup and view all the answers
What is the term for obtaining personal information by watching someone fill out forms, enter passcodes, or provide credit card numbers?
What is the term for obtaining personal information by watching someone fill out forms, enter passcodes, or provide credit card numbers?
Signup and view all the answers
Study Notes
BPO Industry
- 8 subsectors:
- Knowledge Process Outsourcing and Back Offices
- Animation
- Call Centers
- Software Development
- Game Development
- Engineering Design
- Medical Transcription
- BPO Setups:
- Captive Markets (preferred for core or crucial business activities)
- Offshoring/Third Party Outsourcing (for business activities with irregular frequencies or one-off projects)
- Project Based Outsourcing (used for business activities with irregular frequencies or one-off projects)
- Dedicated Development Center (used in business cases when there are hanging requirements)
Trends and Issues in the Industry
- Better Information security
- Strategic balanced-shore outsourcing
- Social and Professional Issues in IT:
- Health Issues
- Political Issues (revision and approval of RA 7916)
- Economic Issues (BPO industry is expected to overtake OFW remittances)
- DNS tampering and URL blocking using proxy
Freedom of Expression
- Key blockings: blocks access to websites based on the words found in URLs or blocks searches involving blacklisted terms
- Search Results Removals: companies that provide Internet search services cooperate with governments to omit illegal or undesirable websites from search results
- Fundamental human right
- Limited by censorship, restrictive press legislation, and harassment of journalists, bloggers, and others who voice their opinions
Social and Professional Issues in IT
- Individual Level: freedom of expression is the key to the development and fulfillment of every person
- National Level: freedom of expression is necessary for good government, economic, and social progress
- Public authorities may restrict this right to:
- Protect national security, territorial integrity, or public safety
- Prevent disorder or crime
- Protect health or morals
- Protect the rights and reputations of other people
- Prevent the disclosure of information received in confidence
- Maintain the authority and impartiality of judges
Using Digital Technologies for Freedom of Expression
- Virtual Prostitution: engagement in sexual activity without meeting each other
- Cybersex: sexual acts that are derived from surfing media sites that would titillate the sexual mind to satisfy the erotic needs
- Types of Cybersex Users:
- Recreational Users
- Inappropriate Users
- Problematic Users (Discovery Group, Predisposed Group, and Lifelong Sexually Compulsive Group)
Filtering
- Types of Filtering:
- Browser Based Filters
- Email Filters
- Search-Engine Filters
- Problems with Filtering: legitimate content, like sex education or medical information, may be blocked if it resembles pornographic material
Television and Films
- Movie and Television Review and Classification Board (MTRCB) - responsible for classification and review of TV programs, movies, and home videos
- Films Description:
- G (General Patronage) – All ages
- PG (Parental Guidance) – Below 13 years old must be accompanied by a parent or a supervising adult
- R-13 – 13 years old and above
- R-16 – 16 years old and above
- R-18 – 18 years old and above
- X – Not suitable for public execution
Child Pornography and Technology
- Form of child sexual exploitation
- Law prohibits the production, distribution, importation, reception, or possession of any image of child pornography
- Child pornography purveyors use encryption and anonymous networks on the Dark Web to hide illicit images
Identity Theft and Monitoring
- Mail Theft: stealing credit card bills and junk mail directly from a victim's mailbox or from public mailboxes on the street
- Dumpster Driving: retrieving personal paperwork and discarded mail from trash dumpsters
- Shoulder Surfing: obtaining personal information by watching someone fill out forms, enter passcodes, or provide credit card numbers
- Phishing: using email to trick people into giving personal information
- Monitoring: employers monitor workplace activities to mitigate risks like theft, data breaches, and inappropriate behavior
Invasion of Privacy
- A circumstance where an individual or organization knowingly intrudes upon a person
- Occurs when the person has a reasonable expectation of privacy, such as in a bathroom or locker room
- Types of Invasion of Privacy:
- Deception
- Violation of Confidentiality
- Intrusion & Misappropriation
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
This quiz covers different types of business process outsourcing, including knowledge process outsourcing, call centers, software development, and more. Test your knowledge of outsourcing subsectors and their applications.