Social and Professional Issues 2 Flashcards

1
Q
  • It is a set of moral principles that regulate the use of computers.
  • Is a part of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct
A

The Hacking Community’s Constitution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

THE HACKING COMMUNITY’S CONSTITUTION

A
    • That every individual should have the right to be free speech in cyber space.
    • That every individual should be free of worry when pertaining to oppressive governments that control the cyber space.
    • That democracy should exist in cyber space to set a clear example as to how a functioning element of society can prosper with equal rights and free speech to all.
    • That hacking is a tool that should and is used to test the integrity of networks that hold and safe guard out valuable information.
    • Those sovereign countries in the world community that do not respect respect democracy should be punished.
    • That art, music, politics and crucial social elements of all world societies can be achieved on the computer and in cyber space.
    • That cyber space should be a governing body in the world community, where people of all nations and cultures can express their ideas and beliefs has to how our world politics should be played.
    • That there should be no governing social or political class or party in cyber space.
    • That the current status of the internet is as clear example as to how many races, cultures, and people can communicate freely and without friction or conflicts. In free enterprise and friction free capitalism
    • In the open source movement fully, as no government should adopt commercial or priced software for it shows that a government may be biased to something that does not prompt the general welfare of the technology market and slows or stops the innovation of other smaller company’s products.
    • That technology can be wielded for the better placement of mankind and the environment we live in. That all sovereign countries in the world community should respect these principles and ideas released in this constitution
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

That hacking, cracking and phreaking are instruments that can achieve three crucial goals:

A
  • Direct Democracy in cyber space.
  • The belief that information should be free to all.
  • The idea that one can test and know the dangers and exploits of systems that store the individuals
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

deals with the procedures, values and practices that govern the process of consuming computing technology and its related disciplines without damaging or violating the moral values and beliefs of any individual, organization or entity

A

Computer Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Three Levels of Computer Ethics

A
    • Pop
    • Para
    • Theoretical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • Newspapers, magazines and TV news programs have engaged increasingly in computer ethics of this sort.
  • Every week, there are news stories about computer viruses, or software ownership law suits, or computer-aided bank robbery, or harmful computer malfunctions, or computerized weapons
A

POP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Someone who takes a special interest in computer ethics cases, collects examples, clarifies them, looks for similarities and differences, reads related works, attends relevant events, and so on, is learning “para” computer ethics

A

PARA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • it applies scholarly theories to computer ethics cases and concepts,
  • Someone proficient in computer ethics would be able not only to identify, clarify, compare and contrast computer ethics cases; she or he could also apply theories and tools from philosophy, social science or law in order to deepen our understanding of the issues
A

THEORETICAL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  • are websites and apps that allow users and organizations to connect, communicate, share information and form relationships
  • People can connect with others in the same area, families, friends, and those with the same interests
A

SOCIAL NETWORKING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  • enable individuals to maintain social connections, stay informed and access, as well as share a wealth of information
  • These sites also enable marketers to reach their target audiences
A

SOCIAL NETWORKING SITES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

first social networking site

A

SixDegrees.com, was launched in 1997

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Due to the lack of awareness and upon the danger of social networking, these active users are prone to be publicly targeted because of their profile pages which may contain personal information such as address and phone numbers

A

ETHICAL ISSUES OF SOCIAL NETWORKING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

FOUR ETHICAL ISSUES OF SOCIAL NETWORKING

A
    • Privacy
    • Free Speech
    • Data Leakage
    • Identity Theft
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  • can be violated, including social networks through intrusion, misuse of information;
  • Although terms and conditions where always made to be seen and agreed during the users registration process, most users ignore the policy and assume that everything is in good place without even realizing we might solely permit a gateway access to our personal information
A

PRIVACY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

possibly caused by the users minimal awareness and understanding of ethical privacy and protection value of the policies used by social networking sites

A

DATA LEAKAGE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

it is a dangerous weapon for specific group of people to manipulate the right to release an unethical sentiment such as racial or religious sentiment within the digital space

A

FREE SPEECH

17
Q

form of technique used by criminals to impersonate someone’s identity with the intention to commit a crime

A

IDENTITY THEFT