Podcast
Questions and Answers
What is one reason individuals or firms create open source code despite not receiving direct payment?
What is one reason individuals or firms create open source code despite not receiving direct payment?
- To earn respect for solving a common problem elegantly (correct)
- To ensure exclusive ownership of the software developed
- To restrict access to their code for potential collaborators
- To avoid any form of public recognition
How does competitive intelligence differ from industrial espionage?
How does competitive intelligence differ from industrial espionage?
- Competitive intelligence focuses only on local businesses, whereas industrial espionage targets international firms
- Competitive intelligence involves ethical methods, while industrial espionage uses illegal means (correct)
- Competitive intelligence is obtained through public information, while industrial espionage uses confidential data
- Competitive intelligence is illegal, while industrial espionage is legal
Which of the following is a tool for obtaining competitive intelligence data?
Which of the following is a tool for obtaining competitive intelligence data?
- AutoCAD
- Microsoft Word
- Rapportive (correct)
- Adobe Illustrator
What is a primary purpose of developing open source code for a firm?
What is a primary purpose of developing open source code for a firm?
What is trademark infringement associated with?
What is trademark infringement associated with?
What is one primary function of a firewall in an organization?
What is one primary function of a firewall in an organization?
Which of the following describes compliance in the context of IT users?
Which of the following describes compliance in the context of IT users?
Why is it important to limit data access to employees?
Why is it important to limit data access to employees?
What role does the National Archives of the Philippines (NAP) play in records management?
What role does the National Archives of the Philippines (NAP) play in records management?
How can a firewall deter unauthorized web surfing?
How can a firewall deter unauthorized web surfing?
What aspect do local standards, such as those set by NAP, typically ensure in records management software?
What aspect do local standards, such as those set by NAP, typically ensure in records management software?
What must organizations do with commercial software to ensure compliance?
What must organizations do with commercial software to ensure compliance?
What is one of the key federal laws that impacts online freedom of expression?
What is one of the key federal laws that impacts online freedom of expression?
Which of the following speech types is NOT protected by the First Amendment?
Which of the following speech types is NOT protected by the First Amendment?
What does the term 'defamation' encompass?
What does the term 'defamation' encompass?
What do ethical decisions about freedom of expression often relate to?
What do ethical decisions about freedom of expression often relate to?
How does the internet challenge traditional concepts of freedom of expression?
How does the internet challenge traditional concepts of freedom of expression?
Which of the following establishes the right to freedom of expression in the United States?
Which of the following establishes the right to freedom of expression in the United States?
What defines 'obscenity' in a legal context?
What defines 'obscenity' in a legal context?
What must individuals be cautious about when expressing opinions online?
What must individuals be cautious about when expressing opinions online?
What impact does broad accessibility of the internet have on communication?
What impact does broad accessibility of the internet have on communication?
What is one purpose of the Communications Decency Act (CDA)?
What is one purpose of the Communications Decency Act (CDA)?
Which of the following is a method of internet censorship employed by governments?
Which of the following is a method of internet censorship employed by governments?
What does a strategic lawsuit against public participation (SLAPP) commonly target?
What does a strategic lawsuit against public participation (SLAPP) commonly target?
Why is anonymity on the internet particularly important in certain countries?
Why is anonymity on the internet particularly important in certain countries?
What is the primary function of an internet filter?
What is the primary function of an internet filter?
What can trigger a John Doe lawsuit?
What can trigger a John Doe lawsuit?
Which of the following is an example of a tactic used in internet censorship?
Which of the following is an example of a tactic used in internet censorship?
What might be a risk of anonymous expression on the internet?
What might be a risk of anonymous expression on the internet?
What is a possible government action involved in internet control?
What is a possible government action involved in internet control?
Why do businesses monitor online expressions from employees?
Why do businesses monitor online expressions from employees?
What constitutes hate speech that can be prosecuted under the law?
What constitutes hate speech that can be prosecuted under the law?
Which of the following accurately describes sexting?
Which of the following accurately describes sexting?
What is a primary concern of parents regarding online pornography?
What is a primary concern of parents regarding online pornography?
Which of the following is NOT a type of content associated with fake news?
Which of the following is NOT a type of content associated with fake news?
What does intellectual property refer to?
What does intellectual property refer to?
What is a potential limitation of using copyright laws to protect intellectual property?
What is a potential limitation of using copyright laws to protect intellectual property?
Which of the following factors could be considered in determining fair use of copyrighted material?
Which of the following factors could be considered in determining fair use of copyrighted material?
Which statement is true regarding threats made on the Internet?
Which statement is true regarding threats made on the Internet?
What is a common belief among free-speech advocates regarding adult pornography?
What is a common belief among free-speech advocates regarding adult pornography?
What action can be classified as malicious harassment under hate speech laws?
What action can be classified as malicious harassment under hate speech laws?
Flashcards
Data Access Control
Data Access Control
Restricting data access to only authorized employees.
Corporate Firewall
Corporate Firewall
Hardware or software that protects a company's network from outside threats.
Firewall Configuration
Firewall Configuration
Adjusting firewall settings to control internet access.
Compliance
Compliance
Signup and view all the flashcards
Records Management Software
Records Management Software
Signup and view all the flashcards
Electronic Records Management Systems (ERMS)
Electronic Records Management Systems (ERMS)
Signup and view all the flashcards
Vendor Licensing Agreements
Vendor Licensing Agreements
Signup and view all the flashcards
Communications Decency Act (CDA)
Communications Decency Act (CDA)
Signup and view all the flashcards
Internet Filter
Internet Filter
Signup and view all the flashcards
Internet Censorship
Internet Censorship
Signup and view all the flashcards
Strategic Lawsuit Against Public Participation (SLAPP)
Strategic Lawsuit Against Public Participation (SLAPP)
Signup and view all the flashcards
Anonymity on the Internet
Anonymity on the Internet
Signup and view all the flashcards
Doxing
Doxing
Signup and view all the flashcards
John Doe Lawsuit
John Doe Lawsuit
Signup and view all the flashcards
Upstream Internet Service Provider (ISP)
Upstream Internet Service Provider (ISP)
Signup and view all the flashcards
Open Source Code
Open Source Code
Signup and view all the flashcards
Competitive Intelligence
Competitive Intelligence
Signup and view all the flashcards
Rapportive
Rapportive
Signup and view all the flashcards
Crunchbase
Crunchbase
Signup and view all the flashcards
Trademark
Trademark
Signup and view all the flashcards
Intellectual Property
Intellectual Property
Signup and view all the flashcards
Copyright
Copyright
Signup and view all the flashcards
Patent
Patent
Signup and view all the flashcards
Trade Secret
Trade Secret
Signup and view all the flashcards
Fair Use
Fair Use
Signup and view all the flashcards
Factors of Fair Use
Factors of Fair Use
Signup and view all the flashcards
Protecting Intellectual Property
Protecting Intellectual Property
Signup and view all the flashcards
Strength of IP Protections
Strength of IP Protections
Signup and view all the flashcards
Limitations of IP Laws
Limitations of IP Laws
Signup and view all the flashcards
Benefits of IP Protection
Benefits of IP Protection
Signup and view all the flashcards
Freedom of Expression
Freedom of Expression
Signup and view all the flashcards
Obscene Speech
Obscene Speech
Signup and view all the flashcards
Defamation
Defamation
Signup and view all the flashcards
Slander
Slander
Signup and view all the flashcards
Libel
Libel
Signup and view all the flashcards
First Amendment Rights
First Amendment Rights
Signup and view all the flashcards
Internet Challenges for Freedom of Expression
Internet Challenges for Freedom of Expression
Signup and view all the flashcards
Ethical Decisions in Online Communication
Ethical Decisions in Online Communication
Signup and view all the flashcards
Impact of Federal Laws on Online Freedom
Impact of Federal Laws on Online Freedom
Signup and view all the flashcards
Study Notes
Social and Professional Issues
-
Module 1 is about Ethics for IT Professionals and IT Users
-
Module 1, Subtopic 1 is about IT Worker Relationships That Must Be Managed
-
IT workers have relationships with: Society, Employers, Clients, Suppliers, and Other Professionals
-
IT workers are not legally recognized as professionals in all jurisdictions
-
IT workers are not liable for malpractice because they do not meet the legal definition of a professional
-
IT workers should set an example and follow policies regarding ethical use of IT.
-
Areas of concern for ethics are software piracy, trade secrets, whistle-blowing
-
Module 1, Intended Learning Outcomes: Distinguish a professional from other kinds of workers, Discuss importance of communication in the workplace, Explain codes of ethics, professional organizations, certification, and licensing affect ethical behavior of IT professionals
-
Module 1, Subtopic 1: (Detailed overview, but not listed)
-
Module 1 contains various examples of IT worker professionals
-
Module 1 discusses legal and professional perspectives
-
Module 2 is about Freedom of Expression
-
Module 2, Intended Learning Outcomes: Know legal basis for freedom of speech, Discuss key federal laws affecting online freedom of expression, Know how Internet presents new challenges in freedom of expression, Understand issues related to use of information technology.
-
First Amendment rights: freedom of religion, expression, and assembly (important for free people everywhere)
-
The Internet enables worldwide exchange of news, ideas, opinions, rumors, and information
-
Obscene speech may not be protected by the First Amendment.
-
Defamation, including slander and libel, is not protected by the First Amendment.
-
Key issues for freedom of expression: controlling access to information, internet censorship, strategic lawsuits against public participation (SLAPP), anonymity, John Doe lawsuits, hate speech, pornography, and fake news.
-
Module 3 is about Intellectual Property
-
Module 3, Subtopic 1 is about Intellectual Property
-
Discusses copyright, patent, trade secret laws
-
Protecting intellectual property is crucial for an organization's success
-
The main parts of codes of ethics created by professional organizations include aspirations and rules/principles expected of members.
-
Copyright protects creative work (film, music, etc.)
-
Module 3, Subtopic 2 is about Current Intellectual Property Issues
-
Includes plagiarism, reverse engineering, open source code, competitive intelligence, and trademark infringement.
-
Plagiarism is stealing someone else's ideas or words and claiming them as one's own
-
Reverse engineering is the process of deconstructing something to understand how it works or improve it.
-
Open source code is freely available code, frequently and widely used
-
Competitive intelligence is legally obtaining information to gain an advantage over rivals.
-
A trademark is a recognizable symbol for a business' goods or services
-
Cybersquatting is wrongly registering domain names for popular products to sell later.
-
Module 4 is about Privacy
-
Module 4, Subtopic 1 is about Privacy Protection and the Law
-
Privacy, anonymity, violations of privacy
-
How personal information gets revealed through technology.
-
Ways to protect privacy: technology (spam filters), markets (choosing email providers), choosing not to open emails with unpleasant or unfamiliar headers.
-
Different types of privacy harm: information collection, processing, intrusions, information dissemination.
-
The use of information technology needs to balance the needs of users of the information with the rights and desires of the people whose information is being used
-
The Fourth Amendment protects against unreasonable searches and seizures
-
Systems that gather data: automatic license plate readers, computer scanning systems, cookies, drones, etc.
-
Module 5 is about Cyberattacks and Cybersecurity
-
Module 5, Subtopic 1 is about The Threat Landscape
-
Important to protect business data, customer data, and employee information.
-
Cyber-crime is an activity done using computers and the internet to achieve harmful results, especially criminal ones.
-
Cyber security involves technologies and processes to prevent unauthorized access.
-
Categories of cyber-crime: the computer as a target, the computer as a weapon
-
Exploits: ransomware, viruses (code), worms (self-replicating), trojan horses (hidden malicious code), blended threats, email spam, phishing, spear phishing, smishing, vishing, cyberespionage, cyberterrorism.
-
Challenges to prevent computer attacks: increasing complexity of cyber systems, bringing your own device (BYOD), growing reliance on commercial software with known vulnerabilities
-
Increasing sophistication of individuals seeking to cause harm.
-
Types of individuals behind cyber attacks: Black hat hackers, Crackers, Malicious insiders, Industrial Spies, Cybercriminals, Hacktivists, Cyberterrorists.
-
Module 6 is about Risk and Responsibility
-
Module 6, Subtopic 1 is about Computer Liability
-
Hardware reliability-fails due to physical deterioration, follows bathtub curve: burn-in period, useful life, wear-out period
-
Reliability measures (time of failure, interval between, cumulative, in time intervals)
-
Computer liability-barriers to digital communication: physical, emotional, identity, semantic, accessibility, attention, credibility
-
Strategies for keeping computer files safe: Regularly backing up, using external drives, storing in the cloud, controlling and encrypting files.
-
Analysis of factors affecting failures of critical computer systems and why problems arise-how to improve systems
-
Key areas for improving design: solid requirements, realistic schedules, adequate testing, sticking to basic requirements, communication, and roles in the design process
-
What do computer scientists do: develop new algorithms, languages, methods for working with computers, test systems and design, build models/theories, present findings to public, improve hardware/software performance
-
Module 7 is about Ethical Decisions in Software Development
-
Module 7, Subtopic 1 is about Software Quality
-
High-quality software is needed in the business system
-
Software defects (errors) affect the quality of the system.
-
Quality management and principles to ensure high-quality software
-
Different types of software product liability, including negligence and breach of warranty.
-
Module 8 is about the Impact of Information Technology on Productivity and Quality of Life
-
Labor productivity-a measure of economic performance comparing amount of goods and services produced to labor hours.
-
Additional factors affecting productivity: business cycle (expansion/contraction), outsourcing, regulations (hiring, firing, etc.)
-
The use of IT in the business world and effect on standards of living and business productivity
-
Impact of IT use on health care costs
-
IT components in the healthcare industry: Computerized patient records, Clinical decision support, Computerized provider order entry, and Telehealth
-
Module 9 is about Social Media
-
Discusses the importance of social networking sites
-
Includes common features and popularity of platforms.
-
Social media as an application for business operations
-
Social Media Marketing-raising awareness, getting customers, driving traffic to the site, using ads and reviews to market
-
Social Media in the hiring process to research candidates
-
Improving customer service using social media
-
Social shopping platforms
-
Social media ethical issues, including: Cyber abuse, Cyber harassment, and Cyberstalking. Strategies to avoid such behavior and dangers on social media sites like warnings to friends or not revealing personal information
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.