SPI CONFIRM KELUA

Embed Size (px)

Citation preview

  • 7/30/2019 SPI CONFIRM KELUA

    1/7

    This copy is legit for Mohd Aris Bin Mohd Azhar

    1

    Explain ethics , compare it with etiquette

    Greek ethos which means character.

    Philosophical study of morality, examine into peoples moral

    believe and behavior

    A system of accepted beliefs which control behaviour, based on

    moral. It stresses on idealistic standards ofright and wrong.

    ETHICS ETIQUETTE

    essentially states what is considered

    ethical, and what is considered

    unethicalin terms of how the

    business is conducted in relation to

    what is best for human beings, the

    community, the environment, and so

    on

    Conducting business affairs in a

    polite manner. It can be compared, in

    some ways, to dinner table etiquette

    Describe and compare the frameworks/ethical principles that can be

    used for moral decisions

  • 7/30/2019 SPI CONFIRM KELUA

    2/7

    This copy is legit for Mohd Aris Bin Mohd Azhar

    2

    Social contract theory

    A negative right (absolute right) duty to guarantee that you will be left

    alone to exercise your rights, guaranteed without exception. E.g. Freedom

    to observe religion practice

    A positive right (limited right) obligates other to do something on your

    behalf, but may be restricted based on circumstances. E.g. Rights to free

    education. Government, teachers, admins must facilitate this right.

    Provided you meet the requirement set.

    o Identify issues that come with networking especially the

    use of world wide web.

    o Describe ways privacy can be compromised through the

    usage of technology

    o Identify and describe the need for professional code of

    ethics

    Professionals need to gain trust from the public on the competenceand integrity, an affiliation to a professional society helps to achieve

    this

    Professional society:

    establishes code of ethics for practice and also for moral decision

    makings in relation to the practice

    supports their members

    also ensure that professional standards are up held

  • 7/30/2019 SPI CONFIRM KELUA

    3/7

    This copy is legit for Mohd Aris Bin Mohd Azhar

    3

    o Describe whistleblowing from the stance of organization

    and moral

    It is when an employee decides to inform on illegal and/or unethical

    practices in the office.

    A whistleblower is a person who believes that his or her organization is

    engaged in or willfully permits unethical, unlawful or otherwise

    reprehensible activities.

    Whistleblowers bring attention to the objectionable activity and

    attempt to effect change.

    o Discuss how Information Technology and automation

    affect workplace

    IT and automation leads to widespread unemployment. (auto pay,

    takyah kje dah.)

    IT and automation leads to job creation. Provide an example to

    describe this notion

    o Discuss the changes in workplace and the impact to the

    society

    o Apply the ethical principles on the issues to establish

    morality of the action

    Chapter 2 Key Terms

    Society

    A large group of people who live together in an organized way, making decisions

    about how to do things and sharing the work that needs to be done

  • 7/30/2019 SPI CONFIRM KELUA

    4/7

    This copy is legit for Mohd Aris Bin Mohd Azhar

    4

    Chapter 3 Key Terms

    Email SPAM

    Email spam, 3 important attributes

    anonymity: the senders identity and address are concealed

    mass mailing: spam email is sent to a large number of recipients and in high quantities

    unsolicited: the individuals receiving spam would otherwise not have opted to receive it

    Pornography

    Printed or visual material containing the explicit description or display ofsexual organs or activity.

    Web Filters

    A Web filter is a program that can screen an incoming Web page to determine whether some or

    all of it should not be displayed to the user.

    Identity Theft

    Identity theft is a form ofstealing someone's identity in which someone pretends to be

    someone else by assuming that person's identity, typically in order to access resources or

    obtain credit and other benefits in that person's name

    Online Predators

    Internet-initiated sex crimes against minors are the illegal targeting via the internet of

    people who are under the legal age of consent in that country, in order to solicit sex or to

    initiate a sexual relationship.

    Internet Addiction

    more broadly, Internet overuse, problematic computer useorpathological computer use, is

    excessive computer use that interferes with daily life

  • 7/30/2019 SPI CONFIRM KELUA

    5/7

    This copy is legit for Mohd Aris Bin Mohd Azhar

    5

    Chapter 4 & 5 Key Terms

    Intellectual Property

    Intellectual property (IP) is a legal concept which refers to creations of the mind forwhich exclusive rights are recognized. Under intellectual property law, owners are granted

    certain exclusive rights to a variety of intangible assets, such as musical, literary, and artistic

    works; discoveries and inventions; and words, phrases, symbols, and designs

    Copyrights

    Copyright is a legal concept, enacted by most governments, giving the creator of an original

    work exclusive rights to it, usually for a limited time

    Patents

    It consists of a set of exclusive rights granted by a sovereign state to an inventor or their assigneefor a limited period of time, in exchange for the public disclosure of the invention.

    Trademarks

    Trade-mark is a recognizable sign, design or expression which identifies products or services of

    a particular source from those of others

    Trade secrets

    A trade secret is a formula, practice, process, design, instrument, pattern, or compilation

    of information which is not generally known or reasonably ascertainable, by which

    a business can obtain an economic advantage over competitors or customers

    Software Piracy

    Soft lifting: Users share theirsoftware with other users who are not authorized to have access by the

    End-User License Agreement (EULA)

    Uploading & Downloading: Data sent or received is to be stored permanently, or at least

    stored more than temporarily

    Software Counterfeiting: fake copies ofsoftware are produced in such a way that they appear to be

    authentic

    OEM: Manufacturers who resell another company's product under their own name and branding

    Hard disk loading: Hardware dealers; brick-and-mortar orInternet vendors, install an unauthorized

    copy ofcommercial software onto a computer system.

    Renting: Use of software for a limited time of use with payment

  • 7/30/2019 SPI CONFIRM KELUA

    6/7

    This copy is legit for Mohd Aris Bin Mohd Azhar

    6

    o Licensing

    Freeware: software that is available for use at no cost or for an optional fee

    Free Software: software that ensures that the end users have freedom in using, studying,

    sharing and modifying that software.

    Shareware: software that is provided to users without payment on a trial basis and is often

    limited by any combination of functionality, availabilityreminding the user to purchase it

    Nagware: shareware that reminds (or nags) the user to register it by paying a fee. It usually

    does this by popping up a message when the user starts the program, or intermittently while

    the user is using the application.

    Crippleware : software program that cannot be fully utilized until the user registers or, in

    the case of shareware , purchases the program.

    Chapter 6 Key Terms

    Privacy: Privacy is the ability of an individual or group to seclude themselves or information

    about themselves and thereby reveal themselves selectively.

    Public Record: Public records are documents or pieces of information that are not considered

    confidential.

    Public Information: Public relations (PR) is the practice of managing the flow

    of information between an individual or an organization and the public.

    Personal Information: Information that can be used to uniquely identify, contact, or locate a

    single person or can be used with other sources to uniquely identify a single individual.

    Types of information disclosure

    Statutory: Required, permitted, or enacted by statute: "the courts did award statutory

    damages to each of the plaintiffs".

    Involuntary: By rights disclosed for public

    Voluntary: Self-disclose to public

    Data mining : Data processing using sophisticated data search capabilities and statistical

    algorithms to discover patterns and correlations in large preexisting databases; a way to

    discover new meaning in data

  • 7/30/2019 SPI CONFIRM KELUA

    7/7

    This copy is legit for Mohd Aris Bin Mohd Azhar

    7

    Ownership of transaction info

    opt-in : Sign up

    opt-out : Sign out

    Dumpster diving: Practice of sifting through commercial or residential waste to find items thathave been discarded by their owners

    shoulder surfing : Using direct observation techniques, such as looking over someone's

    shoulder, to get information. It is commonly used to obtain passwords, PINs, security codes, and

    similar data.

    Encryption: the activity of converting data or information into code

    Chapter 8 Key Terms

    Telework: Toworkfromhomeoroutside the traditional office or workplace, using a computer and

    telephone connection