Social Issues Flashcards

1
Q
  • It is a group of network users who are linked by some specific area of interest such as genealogy.
A

Virtual Community

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is the attempt to suppress or regulate public access to material considered offensive or harmful.

A

Censorship

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Adherence to a code of ethics reminds professionals of the responsibilities and duties that they may be tempted to compromise to meet the pressures of day-to-day business.

A

High standards of practice and ethical behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

a person could be sentenced to 12 years imprisonment for posting online comments judged to be libellous. “The ‘cybercrime’ law rolls back protections for free speech in the Philippines.

A

Cybercrime Prevention Act of 2012 (Republic Act No. 101750)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

tells us what we ought to do and exhorts us to follow the right way

A

prescriptive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Two particular kinds of relativism are:

A
  1. subjective relativism
  2. cultural relativism
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

is a piece of software that prevents certain Web pages from being displayed by your browser.

A

Web filter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

consists of a worldwide collection of electronic documents.

A

World Wide Web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  • It states the principles and core values that are essential to the work of a particular occupational group.
A

Professional Code of Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

“Ethics is knowing the difference between what you have a right to do and what is right to do.”

A

Potter Stewart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

the preparation, collection, creation, transport, retrieval, storage, access, presentation and transformation of electronic information in all its forms including, but not limited to, voice, graphics, text, video, data and image.

A

Information Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

are software programs that are loaded onto mobile devices.

A

Mobile apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

“Happiness is the absence of pain”

A

Jeremy Bentham

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

aims to understand the nature and
dynamics of ethical principles and the way we learn and acquire moral beliefs.

A

Metaethics (DESCRIPTIVE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

is the name given to the ethical theory of the German philosopher Immanuel Kant (1724–1804).

A

Deontology or Kantianism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

seeks to set norms or standards that
regulate right and wrong or good and bad
conduct.

A

Normative Ethics (PRESCRIPTIVE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

proposed a theory that is in sharp contrast to Kantianism.

A

Jeremy Bentham (1748–1832) and John Stuart Mill (1806– 1873)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

right action and the greater good

A

theory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The governments of – and – make it difficult for ordinary citizens to use the Internet to communicate with the rest of the world.

A

Cuba and North Korea

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

“An act is morally right if it produces greatest happiness to the greatest number of people and it is morally wrong if it produces more pain to the greatest number of people concerned.”

A

John Stuart Mill

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

An act is morally right if it conforms to a justified

A

MORAL RULE.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

AN ACT PUNISHING ONLINE SEXUAL ABUSE OF EXPLOITATION OF CHILDREN, PENALIZING THE PRODUCTION, DISTRIBUTION, POSSESSION AND ACCESS OF CHILD SEXUAL ABUSE OR EXPLOITATION MATERIALS, AMENDING REPUBLIC ACT NO. 9160, OTHERWISE KNOWN AS THE “ANTI-MONEY LAUNDERING ACT OF 2001”, AS AMENDED AND REPEALING REPUBLIC ACT NO. 977, OTHERWISE KNOWN AS THE “ANTI-CHILD PORNOGRAPHY ACT OF 2009”

A

Republic Act No. 11930

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

one who develops or provides information technology products and/or services to the public

A

Information Technology Professional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

is based on the idea that good actions are those aligned with the will of God and bad actions are those contrary to the will of God.

A

Divine Command Theory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
* It is set of guidelines which are designed to set out acceptable behaviour of member.
Professional Code of Ethics
26
introduced computer ethics in mid-1970’s
* Walter Maner
27
Christian means righteousness before God. Love of God and neighbor.
Judeo
28
a group deciding for itself not to publish material. In some countries a publisher may censor itself in order to avoid persecution.
Self-censorship
29
has also built one of the world’s most sophisticated Web filtering systems.
China
30
* Utilitarian principle should be applied to a particular act in a particular situation or a circumstance.
Act Utilitarianism
31
has three forms: o Government monopolization o prepublication review o licensing and registration
Direct Censorship
32
Types of Ethics
Normative Ethics (PRESCRIPTIVE) Metaethics (DESCRIPTIVE) Applied Ethics
33
holds that each person decides right and wrong for himself/herself.
Subjective Relativism
34
is based upon the principle of utility, also called the Greatest Happiness Principle.
Utilitarianism
35
Act only from moral rules that you can at the same time will to be universal moral laws.
CATEGORICAL IMPERATIVE (FIRST FORMULATION)
36
spam came to describe pesky, unwanted emails through a Monty Python sketch that first hit the television screen in 1970.
 SPAM E-MAIL
37
Act so that you always treat both yourself and other people as ends in themselves, and never only as a means to an end.
CATEGORICAL IMPERATIVE (SECOND FORMULATION)
38
is the theory that there are no universal moral norms of right and wrong.
Relativism
39
Public trust is built on the expectation that a professional will behave ethically.
Trust and respect from the general public
40
- Greek Traditions of Ethics
"good life" happiness
41
prevents Chinese citizens from accessing certain Internet content by blocking messages coming from blacklisted sites.
Great Firewall of China
42
Both Plato and Aristotle agreed that humans should strive for ?
Happiness
43
Many parents and guardians believe they ought to protect their children from exposure to pornographic and violent materials.
 Children and Inappropriate Content
44
is the philosophy that each person should focus exclusively on his or her self-interest.
Ethical Egoism
45
The moral value of an action depends upon the underlying moral rule.
Deontology or Kantianism
46
the underlying principles of morality
systematic study
47
“No law shall be passed abridging the freedom of speech, of expression, or of the press, or the right of the people peaceably to assemble and petition the government for redress of grievances.”
1987 Philippine Constitution Article III Bill of Rights Section 4
48
is a worldwide collection of networks that connects millions of businesses, government agencies, educational institutions and individuals.
Internet
49
actual application of the ethical or moral theories for the purpose of deciding which ethical or moral actions are appropriate in a given situation.
Applied Ethics
50
is derived from the Greek word ethos (character) and from the Latin word mores (customs)
Ethics
51
is a venue that fosters sharing of intellectual resources, the pursuit of dreams and visions, and friendship and cooperation among ICT professionals and practitioners.
Philippine Computer Society
52
is the most prominent organization dedicated toward the promotion of ethical computer use in the United States. Its primary function is to study, publicize, and coordinate the intersection of information technology innovations, business interests, regulations and other public policies, and ethics.
Computer Ethics Institute (CEI)
53
* It is a field of applied ethics that addresses ethical issues in the use, design and management of information technology and in the formulation of ethical policies for its regulation in society.
Computer Ethics
54
rightness or wrongness of human action
practice
55
A code of ethics provides an evaluation benchmark that a professional can use as a means of self-assessment. Peers of the professional can also use the code for recognition or censure
Evaluation benchmark
56
does not prohibit acting to help someone else, but assisting another is the right thing to do if and only if it is in the helper’s own long-term best interest.
Ethical Egoism
57
Five characteristics of the Internet make censorship more difficult:
1. Unlike traditional one-to-many broadcast media, the Internet supports many-to-many communications. 2. The Internet is dynamic. 3. The Internet is huge. 4. The Internet is global. 5. It is hard to distinguish between children and adults on the Internet.
58
Adherence to professional code of ethics means that practitioners use a common set of core values and beliefs as a guideline for ethical decision making.
Ethical Decision Making
59
is one of the world's best known and most widely read and studied philosophers. He was the student of Socrates and the teacher of Aristotle, and he wrote writings on ethics in the middle of the fourth century B.C.E. in ancient Greece.
Plato
60
is the ethical theory that the meaning of “right” and “wrong” rests with a society’s actual moral guidelines.
Cultural Relativism
61
An action is right (or wrong) to the extent that it increases (or decreases) the total happiness of the affected parties
PRINCIPLE OF UTILITY (GREATEST HAPPINESS PRINCIPLE)
62
It is an obligation-based theory which emphasizes the type of action than the consequences of that action.
Deontology or Kantianism
63
who once observed that “the unexamined life is not worth living,” must be regarded as one of the greatest teachers of ethics.
Socrates
64
* The principle at issue should be used to test moral rules, and then such rules can be utilized in judging what is right and wrong under the circumstance.
Rule Utilitarianism
65
adherents of applied ethics
CASUISTS
66
What is the term that refers to norms, standards, and legal rules regarding appropriate behavior in research?
Research Ethics
67
What ethical principle involves researchers reporting data honestly without falsification?
Honesty
68
Which ethical principle requires researchers to avoid bias and maintain objectivity in their work?
Objectivity
69
What principle mandates researchers to protect participants' personal information?
Confidentiality
70
What ethical principle emphasizes the need for researchers to continually improve their knowledge and skills?
Competence
71
Which principle dictates that researchers must honor agreements and promises?
Integrity
72
What ethical principle underlines compliance with laws and institutional policies by researchers?
Legality
73
What is the process called that involves obtaining approval for carrying out research involving human subjects?
Ethical Approval
74
What term describes qualitative research methods focusing on online communities?
Netnography
75
What is the responsibility of software engineers in ensuring their products meet safety and ethical standards?
Principle 1: Public (of the Software Engineers Code of Ethics)
76
What is the acronym for the critical principles of information security focusing on confidentiality, integrity, and availability?
CIA Triad
77
What is the common framework for managing an organization’s information security known as?
Information Security Management System (ISMS)
78
What are the four main principles of cryptography?
Confidentiality, Integrity, Non-repudiation, Authentication
79
Which document provides guidance for establishing an Information Security Management System?
ISO 27001
80
What is the act of reporting organizational misconduct by an insider known as?
Whistleblowing
81
What forms the basis for responsible conduct in research, involving shared knowledge and resources?
Maturity and Openness
82
What principle promotes the need for researchers to respect copyright and intellectual property?
Respect to Intellectual Property
83
What should researchers avoid to maintain ethical standards during online research?
Deception
84
What type of risks must researchers identify and communicate to participants before involving them in a study?
Perceived Risks
85
Which term describes the process of assessing internal and external risks in an organization?
Risk Assessment
86
What is the ratio used in qualitative risk assessments to determine risk?
Risk Assessment Score = Probability x Impact
87
What principle refers to the duty of software engineers to promote ethical practices in software management?
Management (of the Software Engineers Code of Ethics)
88
What are the weak points in an organization that can be exploited by threats?
Vulnerabilities
89
What is the potential for loss or damage to an asset when a threat exploits a vulnerability called?
Risk
90
What provides an additional layer of protection in network security, segregating untrusted traffic from the internal network?
Demilitarized Zone (DMZ)
91
What is the term for licensing that determines who can legally practice a profession?
Certification and Licensing
92
In software engineering, what principle emphasizes fair treatment of colleagues?
Colleagues (of the Software Engineers Code of Ethics)
93
What is the strategy of handling risks by distributing the responsibility to third parties, often via insurance?
Transference
94
The act of taking steps to lessen the impact of a risk is known as what?
Mitigation
95
To ensure compliance with international data protection standards.
National Privacy Commission
96
are there to promote good research practice and to act as a safeguard to protect researchers as well as their participants.
* Ethics
97
Researchers need to publish in order to advance knowledge and scholarships and not just to advance one’s own career.
RESPONSIBLE PUBLICATION
98
Researchers ought to avoid all forms of discrimination against colleagues and students on the basis sex, race, ethnicity and other factors.
NON-DISCRIMINATION
99
Researchers should respect human dignity, privacy and autonomy at all times
HUMAN SUBJECT PROTECTION
100
* Researchers should respect ANIMAL RIGHTS at all times.
ANIMAL CARE
101
* Researchers should conduct research NOT only for the advancement of their career but for the good of the society as a whole.
SOCIAL RESPONSIBILITY
102
* It is a common practice of using Internet information, especially free information on the World Wide Web or Internet-based resources
Internet Research
103
Good Internet Research Practice (4)
1. Ethical Process 2. Informed Consent 3. Harm 4. Public Vs Private Platforms
104
is a qualitative method for collecting data often used in the social and behavioral sciences.
Ethnography
105
can automate data mining and analysis, streamline manual research processes, and improve the accuracy and speed of research.
AI-powered tools
106
Examples of models that have been used in social science and humanities research within the broad field of Internet research:
Neural Networks * NLP (Natural Language Processing) Model * ChatGPT * Quantilope * Speak * Appen * Naive Bayes * Support Vector Machines (SVM)
107
is a member based, academic association dedicated to the promotion of critical and scholarly Internet research independent from traditional disciplines and existing across academic borders.
Association of Internet Researchers
108
"Scientific Research? only when not at the cost of ethics - and first of all, those of the researchers themselves"
- Alecksandr Solzhenitsyn
109
VISION: “To be the leading provider of technical information, community services, and personalized services to the world’s computing professionals.”
* IEEE Computer Society (IEEE-CS)
110
VISION: “will continue to be the premiere global computing society.”
* Association for Computing Machinery (ACM)
111
is someone engaged in the development or maintenance of software, or someone who teaches in this area.
software engineer
112
CODE OF ETHICS 8 PRINCIPLES:
* PRINCIPLE 1: PUBLIC * PRINCIPLE 2: CLIENT AND EMPLOYER * PRINCIPLE 3: PRODUCT * PRINCIPLE 4: JUDGMENT * PRINCIPLE 5: MANAGEMENT * PRINCIPLE 6: PROFESSION * PRINCIPLE 7: COLLEAGUES * PRINCIPLE 8: SELF
113
Two Types of Whistle Blowing:
1. Internal Whistle Blowing 2. External Whistle Blowing
114
"Across professions, consistency is a direct product of work ethic."
- Harsha Bhogle
115
is composed of the people, property and information within an organization (anything of value).
* Asset
116
is anything can exploit a vulnerability, intentionally or accidentally, obtain and damage, destroy an asset.
* Threat
117
Three Vital Principles of Information Security
1. Confidentiality 2. Integrity 3. Availability
118
– is the process of identifying, assessing, monitoring and limiting risk into an acceptable level.
Risk Management
119
– where risks are identified and assessed. It is the first step in risk management process.
Risk Assessment
120
- is the likelihood that a risk will occur.
Probability
121
is the negative impact of a risk if it occur
Impact
122
RISK RESPONSE CATEGORIES
* Avoidance * Acceptance * Mitigation * Transference * Residual Risk
123
ACCESS CONTROL CATEGORIES AND TYPES (7)
1. Preventive Controls 2. Detective Controls 3. Corrective Controls 4. Recovery Controls 5. Deterrent Controls 6. Compensating Controls 7. Physical and Logical Controls
124
Background check before approving tenant ensure a qualified tenant.
1. Preventive Controls
125
Sends an alert during or after an attack.
2. Detective Controls
126
Correct a damaged system or process * Anti-virus can quarantine and delete malicious software from a computer system.
3. Corrective Controls
127
* Needed to restore functionality * Restoring corrupted data with a data back-up
4. Recovery Controls
128
Add additional security by compensating other control’s weaknesses. * Defense in depth * Multiple layers of security
6. Compensating Controls
129
includes implementing different access control methods with technology you can touch
Physical security
130
include those elements that are implemented through technological means. Password policies, logical access control lists, etc.
Logical security methods
131
can stop a network attack by blocking it.
* Intrusion Prevention System (IPS)
132
alerting network administrators of an attack.
* Network Intrusion Detection System (IDS)
133
are the foundation of a defense-in-depth network security strategy.
Firewalls
134
is a perimeter network that protects and adds an extra layer of security to an organization’s internal local area network from untrusted traffic.
demilitarized zone
135
– is the practice of developing and using coded algorithms to protect and obscure transmitted information so that it may only be read by those with the permission and ability to decrypt it.
Cryptography
136
provides companies of any size and from all sectors of activity with guidance for establishing, implementing, maintaining and continually improving an information security management system.
ISO 27001 standard
137
is responsible for performing tasks such as risk assessment, risk treatment, security controls, security monitoring, security incident management, security audit, security review, and security improvement.
ISMS team
138
exists to ensure compliance of the country with international standards set for data protection.
National Privacy Commission
139
"There's no silver bullet with cybersecurity; a layered defense is the only viable option"
- James Scott