MIDTERM_AQUINO Flashcards
It is a set of beliefs about right and wrong behavior within a society.
ETHICS
conforms to generally accepted standards, many of which are almost universal.
Ethical behavior
It is a set of guidelines which are designed to set out acceptable behavior of a group, association and profession.
Professional Code of Ethics?
does not provide a complete guide to ethical behavior. Just because an activity is not defined as illegal does not mean it is ethical.
Law
I will promote public knowledge, understanding and appreciation of Information and Communications technology
Code of Ethics for the Filipino ICT Professionals
I will consider the general welfare and public welfare and public good in the performance of my work.
Code of Ethics for the Filipino ICT Professionals
I will advertise goods or professional services in a clear and truthful manner.
Code of Ethics for the Filipino ICT Professionals
Code of Ethics for the Filipino ICT Professionals
-I will promote public knowledge, understanding and appreciation of Information and Communications technology.
-I will consider the general welfare and public welfare and public good in the performance of my work.
-I will advertise goods or professional services in a clear and truthful manner.
-I will comply and strictly abide by the intellectual property laws, patent laws and other related laws in respect of Information and Communications Technology.
-I will accept the full responsibility for the work undertaken and utilize my skills with competence and professionalism.
I will comply and strictly abide by the intellectual property laws, patent laws and other related laws in respect of Information and Communications Technology.
Code of Ethics for the Filipino ICT Professionals
I will accept the full responsibility for the work undertaken and utilize my skills with competence and professionalism.
Code of Ethics for the Filipino ICT Professionals
Thou shalt not use a computer to harm other people.
Ten Commandments of Computer Ethics defined by Computer Ethics Institute:
Thou shalt not interfere with other people’s computer work.
Ten Commandments of Computer Ethics defined by Computer Ethics Institute:
Thou shalt not snoop around in other people’s computer files.
Ten Commandments of Computer Ethics defined by Computer Ethics Institute:
Thou shalt not use a computer to steal
Ten Commandments of Computer Ethics defined by Computer Ethics Institute:
Thou shalt not use a computer to bear false witness
Ten Commandments of Computer Ethics defined by Computer Ethics Institute:
Thou shalt not copy or use proprietary software for which you have not paid (without permission).
Ten Commandments of Computer Ethics defined by Computer Ethics Institute:
Thou shalt not use other people’s computer resources without authorization or proper compensation
Ten Commandments of Computer Ethics defined by Computer Ethics Institute:
Thou shalt not appropriate other people’s intellectual output.
Ten Commandments of Computer Ethics defined by Computer Ethics Institute:
Thou shalt think about the social consequences of the program you are writing or the system you are designing.
Ten Commandments of Computer Ethics defined by Computer Ethics Institute:
Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans.
Ten Commandments of Computer Ethics defined by Computer Ethics Institute:
Ten Commandments of Computer Ethics defined by Computer Ethics Institute:
- Thou shalt not use a computer to harm other people.
- Thou shalt not interfere with 3. other people’s computer work.
- Thou shalt not snoop around in other people’s computer files.
- Thou shalt not use a computer to steal.
- Thou shalt not use a computer to bear false witness
- Thou shalt not copy or use proprietary software for which you have not paid (without permission).
- Thou shalt not use other people’s computer resources without authorization or proper compensation.
- Thou shalt not appropriate other people’s intellectual output.
- Thou shalt think about the social consequences of the program you are writing or the system you are designing.
- Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans.
With tools like the internet, hackers have found it very easy to hack into any computer or system as long as it is connected on internet
Security
As much as Information Communication Technology has enabled us to share and find relevant information online, it has also exploited our freedom of privacy
Privacy Issues
Information and Communications Technology has made it easy for users to access any information or artifact at any given time.
Copyright Infringement