cis_20250325113725 Flashcards

1
Q

refer to challenges, conflicts, or concerns that
affect individuals and communities in a
society

A

SOCIAL ISSUES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

relate to ethical, legal, and workplace
concerns within a specific Profession

A

PROFESSIONAL ISSUES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

refer to the ethical, moral, and societal
concerns that arise in the workplace and
society due to advancements in technology,
changes in cultural norms, and evolving legal
frameworks.
* are crucial for maintaining ethical standards,
ensuring professional integrity, and promoting
social well-being.

A

SOCIAL AND PROFESSIONAL ISSUES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  • involve a set of moral principles that guide behavior in a professional setting.
  • ensure fairness, accountability, and professionalism.
A

WORKPLACE ETHICS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

KEY SOCIAL AND PROFESSIONAL ISSUES

A
  • Workplace Ethics
  • Discrimination
  • Privacy Concerns
  • Impact of Technology
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Key aspect of workplace ethics

A

*Honesty and Integrity
* Confidentiality
* Conflict of Interest
* Corporate Social Responsibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Employees and employers should be truthful in their
interactions and avoid deceptive practices

A

Key aspect of workplace ethics
* Honesty and Integrity:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Sensitive information should be protected to maintain trust within the organization.

A

Key aspect of workplace ethics
*Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Employees should avoid situations where personal interests conflict
with professional responsibilities.

A

Key aspect of workplace ethics
*Conflict of Interest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Organizations have a duty to contribute positively to society by engaging in sustainable and ethical practices.

A

Key aspect of workplace ethics
* Corporate Social Responsibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

occurs when individuals are treated unfairly based on
characteristics such as gender, race, age, religion, or disability.

A

Discrimination in the workplace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Key elements include of discrimination and workplace diversity :

A
  • Equal Opportunity Employment
  • Diversity and Inclusion
  • Anti-Harassment Policies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Employers should provide equal chances for hiring,
promotions, and benefits to all employees.

A
  • Equal Opportunity Employment:
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Organizations should actively promote a diverse workforce
and inclusive culture.

A

Diversity and Inclusion:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Measures should be in place to prevent and address
harassment in the workplace.

A

Anti-Harassment Policies:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

is a significant concern in both personal and professional settings. With the increasing use of digital platforms, individuals and organizations must protect sensitive data.

A

PRIVACY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Key privacy issues include:

A
  • Employee Monitoring
  • Data Protection
  • Social Media and Privacy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Organizations must ensure that customer and employee data is stored securely and used ethically

A

*Data Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

While employers may monitor employee activities to enhance
productivity, excessive surveillance can infringe on privacy rights.

A

*Employee Monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Employees should be aware of the risks associated with sharing
professional and personal information online.

A

Social Media and Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The rise of artificial intelligence and automation has led to job losses in certain sectors, requiring workforce adaptation and reskilling.

A

IMPACT OF TECHNOLOGY*
Automation and Job Displacement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Increased reliance on digital platforms has heightened the risk of
cyberattacks and data breaches.

A

IMPACT OF TECHNOLOGY*
Cybersecurity Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The shift to remote work due to technological advancements presents concerns about work-life balance, employee monitoring, and digital collaboration.

A

IMPACT OF TECHNOLOGY*
Remote Work Challenges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

AI systems
should be designed to prevent biases and ensure
transparency in decision-making.

A

IMPACT OF TECHNOLOGY*
Ethical Use of Artificial Intelligence:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
in professional settings involves assessing situations based on moral principles and potential outcomes.
ETHICAL DECISION-MAKING
26
refers to the rules created by an external source
ETHICS
27
refers to the right of our own principles.
MORALS
28
created by law enforcements to provide balance of society and protection to the citizens.
LAWS
29
These are the major influences in a person’s own version of “right”.
* Family * Religious institutions * Educational institutions * Professional organizations * Government
30
When faced with an ethical dilemma, the objective is to make a judgement based on well- reasoned, defensible ethical principles. * The risk is poor judgement. * A low-quality decision can have a wide range of negative consequences.
ETHICAL DECISION MAKING
31
* He is a philosopher who established Deontology, Absolutism and Kantian Ethics
IMMANUEL KANT’S PRINCIPLES
32
Judge your actions by considering the outcome of your action be made a universal law.
IMMANUEL KANT’S PRINCIPLES* Principle of Consistency:
33
Always consider human being as ends in themselves, never as means to an end.
IMMANUEL KANT’S PRINCIPLES* Principle of Respect
34
Actions performed out of a sense of duty are morally praiseworthy actions.
IMMANUEL KANT’S PRINCIPLES* Principle of Duty
35
No real distinction between truth and opinion. Right and wrong are relative to individual or community opinion. No standards or rules of behavior can be reasonably applied at all times and all places. * Actions must be judged as moral depending on the time and culture in which they take place. * What is considered moral can change considerably overtime within a culture.
RELATIVISM
36
Attempts to determine whether an action is moral by considering the consequences. * Actions are moral if they create the greatest happiness for the greatest number of people
UTILITARIANISM
37
TWO TYPES OF ETHICAL CHOICES
Right vs wrong Right vs right
38
– choosing right from wrong is the easiest
Right vs wrong
39
situation contains shades of gray, choosing the lesser of two evils. Make a defensible decision
Right vs right
40
Actions can be:
* Ethical and legal * Ethical but legal * Not ethical but legal * Not ethical and illegal
41
BEHAVIOR OF IT TEAMS IN BUSINESS OPERATIONS AND STRATEGY:
Reactive Siloed Inflexible
42
– IT teams are constant _______ with the rapid change of business and technology through the ability to execute on time and under budget.
* Reactive
43
organizational misalignment, governance gaps and conflicting business agendas often create a chasm between business needs and IT delivery
Siloed
44
- many IT teams take pride in their
inflexible
45
THREE TYPES OF IT CULTURES CAN CO-EXIST IN HEALTH ORGANIZATIONS:
Stability Partnership Courage
46
the primary cultural belief is that the business must operate efficiently and without disruptions
Stability
47
collaboration and teamwork welcomes and engages the workforce and business partners.
Partnership
48
technology can transform the business and drive company growth and performance.
courage
49
as the capability measurement in terms of technology adaptation of a large-scale population in a period of time.
TECHNOLOGY DIFFUSION
50
FOLLOWING ACTORS THAT PLAYS THE MAIN ROLE OF THE DEVELOPED THEORY:
Innovators Early adopters Early majority Late majority Laggards
51
People who are open to risks and the first to try new ideas
Innovators
52
People who are interested in trying new technologies and establishing their utility in society.
Early adopters
53
Those who pave the way for use of an innovation within mainstream society and are part of the general population
Early majority
54
Another part of the general population—the set of people who follow the early majority into adopting the innovation as part of their daily life.
Late majority
55
People who lag the general population in adopting innovative products and new ideas. This is primarily because they are risk-averse and set in their ways of doing things
Laggards
56
are an act performed by a knowledgeable computer user, sometimes referred to as a hacker that illegally browses or steals a company’s or individual’s private information.
COMPUTER AND INTERNET CRIMES
57
making or distributing child pornography
Child Pornography
58
copyright infringement occurs when there is a violation of any of the exclusive economic or moral rights granted to the copyright owner.
Copyright Violation
59
breaking or deciphering codes designed to protect data
Cracking
60
Hacking, threats, and blackmailing towards a business or person
Cyber Terrorism
61
covers social bullying aiming to belittle another individual or group or gender-based bullying that humiliates another on the basis of perceived or actual sexual orientation and gender identity
Cyberbullying or Cyberstalking
62
- Setting up a domain of another person or company with the sole intention of selling it to them later at a premium price.
Cybersquatting
63
Overloading a system with so many requests it cannot serve normal requests.
Denial of Service Attack
64
Intellectual property rights under the IP Code are as follows: * Copyright and related rights * Trademarks and service marks * Geographic indications * Industrial designs * Patents * Layout designs of ICs * Protection of undisclosed information
Intellectual Property Theft
65
is an attempt by cybercriminals posing as legitimate institutions, usually via email, to obtain sensitive information from targeted individuals.
Phishing
66
the action or crime of making a false spoken statement damaging to a person's reputation.
Slander
67
the act of illegally using, copying or distributing software without ownership or legal rights.
Software piracy
68
send the same message indiscriminately to (large numbers of recipients) on the internet.
Spamming
69
involves a cybercriminal masquerading as a trusted entity or device to get you to do something beneficial to the hacker.
Spoofing
70
- is a social engineering attack that purposely uses misspelled domains for malicious purposes.
Typosquatting
71
any person, not being authorized by all the parties to any private communication or spoken word, to tap any wire or cable, or by using any other device or arrangement, to secretly overhear, intercept, or record such communication
Wiretapping
72
when someone has posted or emailed something that is untrue and damaging about someone else on the Internet.
TYPES OF INTERNET CRIMES Cyberlibel
73
presenting someone else's work or ideas as your own, with or without their consent, by incorporating it into your work without full acknowledgement.
TYPES OF INTERNET CRIMES Plagiarism
74
is bullying that takes place over digital devices like cell phones, computers, and tablets. Methods of Cyberbullying o Harassment o Impersonation o Inappropriate Photographs o Video Shaming
TYPES OF INTERNET CRIMES Cyberbullying
75
ability of a person to determine for themselves when, how, and to what extent personal information about them is shared with or communicated to others.
PRIVACY
76
a security method that transforms readable data (plaintext) into an unreadable format (ciphertext) to protect it from unauthorized access
DATA ENCRYPTION
77
is the basic building block of data security and is the simplest and most important way to ensure a computer system’s information can’t be stolen and read by someone
ENCRYPTION
78
It protects emails, bank accounts, transactions, and messages.
NATIONAL PRIVACY COMMISSION
79
makes use of code or symbols via paper, pen, or mechanical devices in order to protect secrets.
CRYPTOGRAPHY
80
* is one of the simplest and most widely-known encryption techniques. * plaintext is replaced by a letter some fixed number of positions further down the alphabet.
Caesar’s Cipher (Caesar’s Code / Caesar Shift)
81
It is a simple letter substitution cipher that replaces a letter with the 13th letter after it, in the alphabet.
ROT13
82
COMPANIES WHO PROVIDE DATA ENCRYPTION SYSTEMS
Netrust Philippines Corporation. NTT Data Philippines Sprout Solutions