CTPRFISS-Lecture04 PDF - Social and Professional Issues

Document Details

GrandSanAntonio

Uploaded by GrandSanAntonio

National University

Tags

information technology social issues computer ethics cybersecurity

Summary

This is a course manual for "Social and Professional Issues" in Information Technology. It covers a range of topics, including the history of computing, computer applications, and the legal and ethical responsibilities of computer professionals, providing an overview of information technology and its social impact from a professional perspective.

Full Transcript

VER 1.0 Course MANUAL SOCIAL AND PROFESSIONAL ISSUES This course studies the social impact, implications, and effects of computers, and the responsibilities of computer professionals in directing the emerging technology pertaining to Information Systems....

VER 1.0 Course MANUAL SOCIAL AND PROFESSIONAL ISSUES This course studies the social impact, implications, and effects of computers, and the responsibilities of computer professionals in directing the emerging technology pertaining to Information Systems. Specific topics include an overview of the history of computing, computer applications and their impact, the computing profession, the legal and ethical responsibilities of professionals, and careers in computing. INFORMATION TECHNOLOGY JULIE ANNE ANGELES-CRYSTAL ROGER C. PRIMO JR. MARK JAMES G. CAYABYAB JOHN IVAN C. MAURAT ELSIE V. ISIP SOCIAL AND PROFESSIONAL ISSUES Table of Contents 01 Topic 1 ORIENTATION 02 Topic 2 OVERVIEW OF ETHICS 03 Topic 3 ETHICS FOR IT WORKER AND IT USERS 04 Topic 4 CYBER ATTACKS AND CYBERSECURITY 05 Topic 5 PRIVACY 06 Topic 6 FREEDOM OF EXPRESSION 07 Topic 7 INTELLECTUAL PROPERTY 08 Topic 8 ETHICAL DECISION IN SYSTEMS DEVELOPMENT SOCIAL AND PROFESSIONAL ISSUES Table of Contents 09 Topic 9 IMPACT OF INFORMATION TECHNOLOGYON SOCIETY 10 Topic 10 SOCIAL MEDIA 11 Topic 11 ETHICS OF IT ORGANIZATION LESSON 3 SOCIAL PROFESSIONAL ISSUES CYBERATTACKS AND CYBERSECURITY Learning Outcomes: Understand the factors contributing to the prevalence of computer incident and determine its effects. Implementing a strong security program to prevent cyberattacks Actions done in the event of a successful security intrusion. 1 2 CYBERATTACKS AND CYBERSECURITY 3 CYBERATTACKS AND CYBERSECURITY 4 CYBERATTACKS AND CYBERSECURITY 5 CYBERATTACKS AND CYBERSECURITY 5 CYBERATTACKS AND CYBERSECURITY 5 CYBERATTACKS AND CYBERSECURITY 5 CYBERATTACKS AND CYBERSECURITY 5 CYBERATTACKS AND CYBERSECURITY 5 CYBERATTACKS AND CYBERSECURITY 5 CYBERATTACKS AND CYBERSECURITY 5 CYBERATTACKS AND CYBERSECURITY 5 CYBERATTACKS AND CYBERSECURITY 5 CYBERATTACKS AND CYBERSECURITY 5 CYBERATTACKS AND CYBERSECURITY 5 CYBERATTACKS AND CYBERSECURITY 5 CYBERATTACKS AND CYBERSECURITY 5 CYBERATTACKS AND CYBERSECURITY 5 CYBERATTACKS AND CYBERSECURITY 5 CYBERATTACKS AND CYBERSECURITY 5 CYBERATTACKS AND CYBERSECURITY 5 CYBERATTACKS AND CYBERSECURITY 5 CYBERATTACKS AND CYBERSECURITY 5 CYBERATTACKS AND CYBERSECURITY 5 CYBERATTACKS AND CYBERSECURITY 5 CYBERATTACKS AND CYBERSECURITY 5 CYBERATTACKS AND CYBERSECURITY 5 REFERENCES Blokdyk, G. (2020). Ethics and Information Technology: complete self- assessment guide. Coekelbergh, M. (2020). AI ethics. Doss, A. (2020). Cyberprivacy: who has your da t a or why you should care. Ess, C. (2020). Digital m edia ethics. Reynold, G. (2019). Ethics in information technology (6th ed.). Cengage Learning. 18

Use Quizgecko on...
Browser
Browser