Podcast
Questions and Answers
What is one reason individuals or firms create open source code despite not receiving direct payment?
What is one reason individuals or firms create open source code despite not receiving direct payment?
How does competitive intelligence differ from industrial espionage?
How does competitive intelligence differ from industrial espionage?
Which of the following is a tool for obtaining competitive intelligence data?
Which of the following is a tool for obtaining competitive intelligence data?
What is a primary purpose of developing open source code for a firm?
What is a primary purpose of developing open source code for a firm?
Signup and view all the answers
What is trademark infringement associated with?
What is trademark infringement associated with?
Signup and view all the answers
What is one primary function of a firewall in an organization?
What is one primary function of a firewall in an organization?
Signup and view all the answers
Which of the following describes compliance in the context of IT users?
Which of the following describes compliance in the context of IT users?
Signup and view all the answers
Why is it important to limit data access to employees?
Why is it important to limit data access to employees?
Signup and view all the answers
What role does the National Archives of the Philippines (NAP) play in records management?
What role does the National Archives of the Philippines (NAP) play in records management?
Signup and view all the answers
How can a firewall deter unauthorized web surfing?
How can a firewall deter unauthorized web surfing?
Signup and view all the answers
What aspect do local standards, such as those set by NAP, typically ensure in records management software?
What aspect do local standards, such as those set by NAP, typically ensure in records management software?
Signup and view all the answers
What must organizations do with commercial software to ensure compliance?
What must organizations do with commercial software to ensure compliance?
Signup and view all the answers
What is one of the key federal laws that impacts online freedom of expression?
What is one of the key federal laws that impacts online freedom of expression?
Signup and view all the answers
Which of the following speech types is NOT protected by the First Amendment?
Which of the following speech types is NOT protected by the First Amendment?
Signup and view all the answers
What does the term 'defamation' encompass?
What does the term 'defamation' encompass?
Signup and view all the answers
What do ethical decisions about freedom of expression often relate to?
What do ethical decisions about freedom of expression often relate to?
Signup and view all the answers
How does the internet challenge traditional concepts of freedom of expression?
How does the internet challenge traditional concepts of freedom of expression?
Signup and view all the answers
Which of the following establishes the right to freedom of expression in the United States?
Which of the following establishes the right to freedom of expression in the United States?
Signup and view all the answers
What defines 'obscenity' in a legal context?
What defines 'obscenity' in a legal context?
Signup and view all the answers
What must individuals be cautious about when expressing opinions online?
What must individuals be cautious about when expressing opinions online?
Signup and view all the answers
What impact does broad accessibility of the internet have on communication?
What impact does broad accessibility of the internet have on communication?
Signup and view all the answers
What is one purpose of the Communications Decency Act (CDA)?
What is one purpose of the Communications Decency Act (CDA)?
Signup and view all the answers
Which of the following is a method of internet censorship employed by governments?
Which of the following is a method of internet censorship employed by governments?
Signup and view all the answers
What does a strategic lawsuit against public participation (SLAPP) commonly target?
What does a strategic lawsuit against public participation (SLAPP) commonly target?
Signup and view all the answers
Why is anonymity on the internet particularly important in certain countries?
Why is anonymity on the internet particularly important in certain countries?
Signup and view all the answers
What is the primary function of an internet filter?
What is the primary function of an internet filter?
Signup and view all the answers
What can trigger a John Doe lawsuit?
What can trigger a John Doe lawsuit?
Signup and view all the answers
Which of the following is an example of a tactic used in internet censorship?
Which of the following is an example of a tactic used in internet censorship?
Signup and view all the answers
What might be a risk of anonymous expression on the internet?
What might be a risk of anonymous expression on the internet?
Signup and view all the answers
What is a possible government action involved in internet control?
What is a possible government action involved in internet control?
Signup and view all the answers
Why do businesses monitor online expressions from employees?
Why do businesses monitor online expressions from employees?
Signup and view all the answers
What constitutes hate speech that can be prosecuted under the law?
What constitutes hate speech that can be prosecuted under the law?
Signup and view all the answers
Which of the following accurately describes sexting?
Which of the following accurately describes sexting?
Signup and view all the answers
What is a primary concern of parents regarding online pornography?
What is a primary concern of parents regarding online pornography?
Signup and view all the answers
Which of the following is NOT a type of content associated with fake news?
Which of the following is NOT a type of content associated with fake news?
Signup and view all the answers
What does intellectual property refer to?
What does intellectual property refer to?
Signup and view all the answers
What is a potential limitation of using copyright laws to protect intellectual property?
What is a potential limitation of using copyright laws to protect intellectual property?
Signup and view all the answers
Which of the following factors could be considered in determining fair use of copyrighted material?
Which of the following factors could be considered in determining fair use of copyrighted material?
Signup and view all the answers
Which statement is true regarding threats made on the Internet?
Which statement is true regarding threats made on the Internet?
Signup and view all the answers
What is a common belief among free-speech advocates regarding adult pornography?
What is a common belief among free-speech advocates regarding adult pornography?
Signup and view all the answers
What action can be classified as malicious harassment under hate speech laws?
What action can be classified as malicious harassment under hate speech laws?
Signup and view all the answers
Study Notes
Social and Professional Issues
-
Module 1 is about Ethics for IT Professionals and IT Users
-
Module 1, Subtopic 1 is about IT Worker Relationships That Must Be Managed
-
IT workers have relationships with: Society, Employers, Clients, Suppliers, and Other Professionals
-
IT workers are not legally recognized as professionals in all jurisdictions
-
IT workers are not liable for malpractice because they do not meet the legal definition of a professional
-
IT workers should set an example and follow policies regarding ethical use of IT.
-
Areas of concern for ethics are software piracy, trade secrets, whistle-blowing
-
Module 1, Intended Learning Outcomes: Distinguish a professional from other kinds of workers, Discuss importance of communication in the workplace, Explain codes of ethics, professional organizations, certification, and licensing affect ethical behavior of IT professionals
-
Module 1, Subtopic 1: (Detailed overview, but not listed)
-
Module 1 contains various examples of IT worker professionals
-
Module 1 discusses legal and professional perspectives
-
Module 2 is about Freedom of Expression
-
Module 2, Intended Learning Outcomes: Know legal basis for freedom of speech, Discuss key federal laws affecting online freedom of expression, Know how Internet presents new challenges in freedom of expression, Understand issues related to use of information technology.
-
First Amendment rights: freedom of religion, expression, and assembly (important for free people everywhere)
-
The Internet enables worldwide exchange of news, ideas, opinions, rumors, and information
-
Obscene speech may not be protected by the First Amendment.
-
Defamation, including slander and libel, is not protected by the First Amendment.
-
Key issues for freedom of expression: controlling access to information, internet censorship, strategic lawsuits against public participation (SLAPP), anonymity, John Doe lawsuits, hate speech, pornography, and fake news.
-
Module 3 is about Intellectual Property
-
Module 3, Subtopic 1 is about Intellectual Property
-
Discusses copyright, patent, trade secret laws
-
Protecting intellectual property is crucial for an organization's success
-
The main parts of codes of ethics created by professional organizations include aspirations and rules/principles expected of members.
-
Copyright protects creative work (film, music, etc.)
-
Module 3, Subtopic 2 is about Current Intellectual Property Issues
-
Includes plagiarism, reverse engineering, open source code, competitive intelligence, and trademark infringement.
-
Plagiarism is stealing someone else's ideas or words and claiming them as one's own
-
Reverse engineering is the process of deconstructing something to understand how it works or improve it.
-
Open source code is freely available code, frequently and widely used
-
Competitive intelligence is legally obtaining information to gain an advantage over rivals.
-
A trademark is a recognizable symbol for a business' goods or services
-
Cybersquatting is wrongly registering domain names for popular products to sell later.
-
Module 4 is about Privacy
-
Module 4, Subtopic 1 is about Privacy Protection and the Law
-
Privacy, anonymity, violations of privacy
-
How personal information gets revealed through technology.
-
Ways to protect privacy: technology (spam filters), markets (choosing email providers), choosing not to open emails with unpleasant or unfamiliar headers.
-
Different types of privacy harm: information collection, processing, intrusions, information dissemination.
-
The use of information technology needs to balance the needs of users of the information with the rights and desires of the people whose information is being used
-
The Fourth Amendment protects against unreasonable searches and seizures
-
Systems that gather data: automatic license plate readers, computer scanning systems, cookies, drones, etc.
-
Module 5 is about Cyberattacks and Cybersecurity
-
Module 5, Subtopic 1 is about The Threat Landscape
-
Important to protect business data, customer data, and employee information.
-
Cyber-crime is an activity done using computers and the internet to achieve harmful results, especially criminal ones.
-
Cyber security involves technologies and processes to prevent unauthorized access.
-
Categories of cyber-crime: the computer as a target, the computer as a weapon
-
Exploits: ransomware, viruses (code), worms (self-replicating), trojan horses (hidden malicious code), blended threats, email spam, phishing, spear phishing, smishing, vishing, cyberespionage, cyberterrorism.
-
Challenges to prevent computer attacks: increasing complexity of cyber systems, bringing your own device (BYOD), growing reliance on commercial software with known vulnerabilities
-
Increasing sophistication of individuals seeking to cause harm.
-
Types of individuals behind cyber attacks: Black hat hackers, Crackers, Malicious insiders, Industrial Spies, Cybercriminals, Hacktivists, Cyberterrorists.
-
Module 6 is about Risk and Responsibility
-
Module 6, Subtopic 1 is about Computer Liability
-
Hardware reliability-fails due to physical deterioration, follows bathtub curve: burn-in period, useful life, wear-out period
-
Reliability measures (time of failure, interval between, cumulative, in time intervals)
-
Computer liability-barriers to digital communication: physical, emotional, identity, semantic, accessibility, attention, credibility
-
Strategies for keeping computer files safe: Regularly backing up, using external drives, storing in the cloud, controlling and encrypting files.
-
Analysis of factors affecting failures of critical computer systems and why problems arise-how to improve systems
-
Key areas for improving design: solid requirements, realistic schedules, adequate testing, sticking to basic requirements, communication, and roles in the design process
-
What do computer scientists do: develop new algorithms, languages, methods for working with computers, test systems and design, build models/theories, present findings to public, improve hardware/software performance
-
Module 7 is about Ethical Decisions in Software Development
-
Module 7, Subtopic 1 is about Software Quality
-
High-quality software is needed in the business system
-
Software defects (errors) affect the quality of the system.
-
Quality management and principles to ensure high-quality software
-
Different types of software product liability, including negligence and breach of warranty.
-
Module 8 is about the Impact of Information Technology on Productivity and Quality of Life
-
Labor productivity-a measure of economic performance comparing amount of goods and services produced to labor hours.
-
Additional factors affecting productivity: business cycle (expansion/contraction), outsourcing, regulations (hiring, firing, etc.)
-
The use of IT in the business world and effect on standards of living and business productivity
-
Impact of IT use on health care costs
-
IT components in the healthcare industry: Computerized patient records, Clinical decision support, Computerized provider order entry, and Telehealth
-
Module 9 is about Social Media
-
Discusses the importance of social networking sites
-
Includes common features and popularity of platforms.
-
Social media as an application for business operations
-
Social Media Marketing-raising awareness, getting customers, driving traffic to the site, using ads and reviews to market
-
Social Media in the hiring process to research candidates
-
Improving customer service using social media
-
Social shopping platforms
-
Social media ethical issues, including: Cyber abuse, Cyber harassment, and Cyberstalking. Strategies to avoid such behavior and dangers on social media sites like warnings to friends or not revealing personal information
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz focuses on the principles of open source code creation, competitive intelligence, and compliance in IT. It also examines the roles of firewalls and record management within organizations. Test your understanding of these crucial aspects in the context of information technology.