Upload
aris-azhar
View
218
Download
0
Embed Size (px)
Citation preview
7/30/2019 SPI CONFIRM KELUA
1/7
This copy is legit for Mohd Aris Bin Mohd Azhar
1
Explain ethics , compare it with etiquette
Greek ethos which means character.
Philosophical study of morality, examine into peoples moral
believe and behavior
A system of accepted beliefs which control behaviour, based on
moral. It stresses on idealistic standards ofright and wrong.
ETHICS ETIQUETTE
essentially states what is considered
ethical, and what is considered
unethicalin terms of how the
business is conducted in relation to
what is best for human beings, the
community, the environment, and so
on
Conducting business affairs in a
polite manner. It can be compared, in
some ways, to dinner table etiquette
Describe and compare the frameworks/ethical principles that can be
used for moral decisions
7/30/2019 SPI CONFIRM KELUA
2/7
This copy is legit for Mohd Aris Bin Mohd Azhar
2
Social contract theory
A negative right (absolute right) duty to guarantee that you will be left
alone to exercise your rights, guaranteed without exception. E.g. Freedom
to observe religion practice
A positive right (limited right) obligates other to do something on your
behalf, but may be restricted based on circumstances. E.g. Rights to free
education. Government, teachers, admins must facilitate this right.
Provided you meet the requirement set.
o Identify issues that come with networking especially the
use of world wide web.
o Describe ways privacy can be compromised through the
usage of technology
o Identify and describe the need for professional code of
ethics
Professionals need to gain trust from the public on the competenceand integrity, an affiliation to a professional society helps to achieve
this
Professional society:
establishes code of ethics for practice and also for moral decision
makings in relation to the practice
supports their members
also ensure that professional standards are up held
7/30/2019 SPI CONFIRM KELUA
3/7
This copy is legit for Mohd Aris Bin Mohd Azhar
3
o Describe whistleblowing from the stance of organization
and moral
It is when an employee decides to inform on illegal and/or unethical
practices in the office.
A whistleblower is a person who believes that his or her organization is
engaged in or willfully permits unethical, unlawful or otherwise
reprehensible activities.
Whistleblowers bring attention to the objectionable activity and
attempt to effect change.
o Discuss how Information Technology and automation
affect workplace
IT and automation leads to widespread unemployment. (auto pay,
takyah kje dah.)
IT and automation leads to job creation. Provide an example to
describe this notion
o Discuss the changes in workplace and the impact to the
society
o Apply the ethical principles on the issues to establish
morality of the action
Chapter 2 Key Terms
Society
A large group of people who live together in an organized way, making decisions
about how to do things and sharing the work that needs to be done
7/30/2019 SPI CONFIRM KELUA
4/7
This copy is legit for Mohd Aris Bin Mohd Azhar
4
Chapter 3 Key Terms
Email SPAM
Email spam, 3 important attributes
anonymity: the senders identity and address are concealed
mass mailing: spam email is sent to a large number of recipients and in high quantities
unsolicited: the individuals receiving spam would otherwise not have opted to receive it
Pornography
Printed or visual material containing the explicit description or display ofsexual organs or activity.
Web Filters
A Web filter is a program that can screen an incoming Web page to determine whether some or
all of it should not be displayed to the user.
Identity Theft
Identity theft is a form ofstealing someone's identity in which someone pretends to be
someone else by assuming that person's identity, typically in order to access resources or
obtain credit and other benefits in that person's name
Online Predators
Internet-initiated sex crimes against minors are the illegal targeting via the internet of
people who are under the legal age of consent in that country, in order to solicit sex or to
initiate a sexual relationship.
Internet Addiction
more broadly, Internet overuse, problematic computer useorpathological computer use, is
excessive computer use that interferes with daily life
7/30/2019 SPI CONFIRM KELUA
5/7
This copy is legit for Mohd Aris Bin Mohd Azhar
5
Chapter 4 & 5 Key Terms
Intellectual Property
Intellectual property (IP) is a legal concept which refers to creations of the mind forwhich exclusive rights are recognized. Under intellectual property law, owners are granted
certain exclusive rights to a variety of intangible assets, such as musical, literary, and artistic
works; discoveries and inventions; and words, phrases, symbols, and designs
Copyrights
Copyright is a legal concept, enacted by most governments, giving the creator of an original
work exclusive rights to it, usually for a limited time
Patents
It consists of a set of exclusive rights granted by a sovereign state to an inventor or their assigneefor a limited period of time, in exchange for the public disclosure of the invention.
Trademarks
Trade-mark is a recognizable sign, design or expression which identifies products or services of
a particular source from those of others
Trade secrets
A trade secret is a formula, practice, process, design, instrument, pattern, or compilation
of information which is not generally known or reasonably ascertainable, by which
a business can obtain an economic advantage over competitors or customers
Software Piracy
Soft lifting: Users share theirsoftware with other users who are not authorized to have access by the
End-User License Agreement (EULA)
Uploading & Downloading: Data sent or received is to be stored permanently, or at least
stored more than temporarily
Software Counterfeiting: fake copies ofsoftware are produced in such a way that they appear to be
authentic
OEM: Manufacturers who resell another company's product under their own name and branding
Hard disk loading: Hardware dealers; brick-and-mortar orInternet vendors, install an unauthorized
copy ofcommercial software onto a computer system.
Renting: Use of software for a limited time of use with payment
7/30/2019 SPI CONFIRM KELUA
6/7
This copy is legit for Mohd Aris Bin Mohd Azhar
6
o Licensing
Freeware: software that is available for use at no cost or for an optional fee
Free Software: software that ensures that the end users have freedom in using, studying,
sharing and modifying that software.
Shareware: software that is provided to users without payment on a trial basis and is often
limited by any combination of functionality, availabilityreminding the user to purchase it
Nagware: shareware that reminds (or nags) the user to register it by paying a fee. It usually
does this by popping up a message when the user starts the program, or intermittently while
the user is using the application.
Crippleware : software program that cannot be fully utilized until the user registers or, in
the case of shareware , purchases the program.
Chapter 6 Key Terms
Privacy: Privacy is the ability of an individual or group to seclude themselves or information
about themselves and thereby reveal themselves selectively.
Public Record: Public records are documents or pieces of information that are not considered
confidential.
Public Information: Public relations (PR) is the practice of managing the flow
of information between an individual or an organization and the public.
Personal Information: Information that can be used to uniquely identify, contact, or locate a
single person or can be used with other sources to uniquely identify a single individual.
Types of information disclosure
Statutory: Required, permitted, or enacted by statute: "the courts did award statutory
damages to each of the plaintiffs".
Involuntary: By rights disclosed for public
Voluntary: Self-disclose to public
Data mining : Data processing using sophisticated data search capabilities and statistical
algorithms to discover patterns and correlations in large preexisting databases; a way to
discover new meaning in data
7/30/2019 SPI CONFIRM KELUA
7/7
This copy is legit for Mohd Aris Bin Mohd Azhar
7
Ownership of transaction info
opt-in : Sign up
opt-out : Sign out
Dumpster diving: Practice of sifting through commercial or residential waste to find items thathave been discarded by their owners
shoulder surfing : Using direct observation techniques, such as looking over someone's
shoulder, to get information. It is commonly used to obtain passwords, PINs, security codes, and
similar data.
Encryption: the activity of converting data or information into code
Chapter 8 Key Terms
Telework: Toworkfromhomeoroutside the traditional office or workplace, using a computer and
telephone connection