UNIT 2: IT Profession, Code of Ethics, and the Issues Flashcards
Positive Impacts:
Global Connectivity
Access to Information
Empowerment of Social Movements
Positive Impacts:
______: Technology connects people worldwide, facilitating international business, collaboration, and cultural exchange.
Global Connectivity
Positive Impacts:
Example: Platforms like Zoom and Microsoft Teams facilitate remote work and global meetings.
Global Connectivity
Positive Impacts:
______: The internet provides access to educational resources, news, and diverse cultural content, fostering a more informed society.
Access to Information
Positive Impacts:
Example: MOOCs like Coursera and Khan Academy provide learning opportunities to a global audience.
Access to Information
Positive Impacts:
______: Social media platforms enable rapid organization and awareness for social causes.
Social media amplifies voices and mobilizes support for social and political causes.
Empowerment of Social Movements
Negative Impacts:
Digital Divide
Social Isolation
Cultural Homogenization
Negative Impacts:
______: Disparities in technology access between different regions or socioeconomic groups hinder educational and economic opportunities.
Digital Divide
Negative Impacts:
Example: Rural areas often have less access to high-speed internet compared to urban centers.
Digital Divide
Negative Impacts:
______: Increased screen time is associated
with reduced social interactions and mental health
issues.
Social Isolation
Negative Impacts:
Example: Studies have linked excessive social media use to increased feelings of loneliness and depression.
Social Isolation
Negative Impacts:
______: Global media often promotes dominant cultures, potentially overshadowing local traditions and languages.
Cultural Homogenization
Negative Impacts:
Example: Western media and entertainment can diminish the visibility of local cultural practices.
Cultural Homogenization
ACM stands for ______
Association for Computing Machinery
______ expresses the conscience of the computing profession, and it affirms an obligation of computing professionals both individually and collectively to use their skills for the benefit of society.
ACM Code of Ethics
Principles Overview of ACM:
• ______: Act in the public interest and aim to enhance the well-being of society.
• ______: Ensure trustworthiness and honesty in dealings with clients and employers.’
• ______: Maintain a high level of competence and integrity in professional work.
• ______: Foster a professional and supportive environment among peers.
• ______: Encourage ethical practices and responsible behavior within
management roles.
Public
Client and Employer
Professional
Colleagues
Management
IEEE stands for ______
Institute of Electrical and Electronic Engineers
The ______ establishes principles for professional conduct for software engineers. The code is intended to provide guidance to software engineers on their ethical responsibilities.
IEEE Code of Ethics
Key Elements of IEEE:
• ______: Avoid conflicts of interest and maintain transparency.
• ______: Perform only in areas of expertise and strive for continuous improvement.
• ______: Safeguard confidential information and avoid unauthorized disclosures.
• ______: Treat all individuals fairly and without bias
Integrity and Honesty
Professional Competence
Respect for Confidentiality
Fairness and Impartiality
Known as ______ - that is the etiquette of cyberspace and “etiquette” means the forms of required by good breeding or prescribed by authority to be required in social or official life.
Network Etiquette
In other words, ______ is a set of rules for behaving properly online.
netiquette
______, or ______, is concerned with the “proper” way to communicate in an online environment.
Netiquette, network etiquette
NETIQUETTE:
- Remember the GOLDEN RULE
- AVOID SLANG, ACRONYMS, AND TEXT TALK
- AVOID “SCREAMING” IN TYPED MESSAGES
- PROOFREAD YOUR MESSAGES BEFORE
SENDING THEM - EXERCISE GOOD JUDGMENT WHEN SHARING
INFORMATION WITH OTHERS ONLINE - RESPECT DIVERSITY IN VIEWPOINTS
GOLDEN RULE:
“MAKE A GOOD IMPRESSION”
If the material you share with others online came from another source, make every effort to gain permission from the original author or copyright holder. Copying someone else’s work and passing it off as your own is ______. It damages your reputation and could subject you to serious academic and legal
consequences.
plagiarism
10 Commandments of Computer Ethics:
Rule 1: Remember the Human
Rule 2: Adhere to the same standards of behavior online that you follow in real life
Rule 3: Know where you are in cyberspace
Rule 4: Respect other people’s time and bandwidth
Rule 5: Make yourself look good online writing
Rule 6: Share expert knowledge
Rule 7: Help keep flame wars under control
Rule 8: Respect other people’s privacy
Rule 9: Don’t abuse your power
Rule 10: Be forgiving of other people’s mistakes
Negative Practices in Social Media:
CYBERBULLYING
PRIVACY VIOLATIONS
SPREAD OF MISINFORMATION
______
- The use of technology to harass, threaten, embarrass, or target another person. Online threats and mean, aggressive, or rude texts, tweets, posts, or messages all count. So does posting personal information, pictures, or videos designed to hurt or embarrass someone else.
CYBERBULLYING
______ occur when someone’s personal information is accessed, used, or shared without their permission. This can include hacking, identity theft, surveillance, or leaking sensitive data.
Privacy Violations
______ is false or inaccurate information spread, regardless of intent to deceive.
Misinformation
When misinformation spreads widely, it is called the ______.
spread of misinformation