Empowerment Lesson 2
Empowerment Lesson 2
EMPOWERMENT TECHNOLOGY
Section: _____________________________
Learning Objectives
1. Define computer ethics and know the ethical issues related to the use of computer
2. Apply online safety, security, ethics, and etiquette standards and practices in ICT
Review/Lesson Preview
From our previous class, we have discussed about the current state of ICT in the Philippines, online systems and
its functions, and the current trends in both online systems and ICT devices. Below are questions for our review.
1. What are the six (6) components of ICT?
1.___________________________ 2. _________________________ 3.________________________
4.___________________________ 5. _________________________ 6.________________________
While there is no official list of netiquette rules or guidelines, the general idea is to respect others online. What is
ethics?
Ethics or moral philosophy is a branch of philosophy that involves systematizing, defending, and recommending
concepts of right and wrong conduct.
ALUBIJID NATIONAL COMPREHENSIVE HIGH SCHOOL
SENIOR HIGH SCHOOL
OPEN HIGH SCHOOL
EMPOWERMENT TECHNOLOGY
Computer Ethics
Computer ethics are a set of moral standards that govern the use of computers. It is society's views about the use
of computers, both hardware and software.
Computer ethics essentially protect individuals online from predation: they prevent breach of privacy, identify
theft, interference with work and unlawful use of proprietary software, among other events. Computer ethics
govern the behavior of users online, and date back to 1992.
Without the study of ethics, there can be no government and no laws. Without an ethical system in place, all
actions are equally acceptable and no one is safe from his neighbor. Ethics seeks to protect parties that cannot
speak for themselves. It is a major factor in industries that deal with human and their actions.
.
ALUBIJID NATIONAL COMPREHENSIVE HIGH SCHOOL
SENIOR HIGH SCHOOL
OPEN HIGH SCHOOL
EMPOWERMENT TECHNOLOGY
EMPOWERMENT TECHNOLOGY
Notice that cyber security (right set) includes everything and everyone that can be accessed through cyberspace. So, one could
argue that everything in this world is vulnerable through ICT. However, going by the definition of cyber security, we should
protect which is to be protected, because of the security challenges posed by the use of ICT.
Cybersecurity: The ability to protect or defend the use of cyberspace from cyber attacks.
Information Security (1): The protection of information and information systems from unauthorized access, use,
disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity, and availability.
Information Security (2): Protecting information and information systems from unauthorized access, use, disclosure,
disruption, modification, or destruction in order to provide —
1) integrity, which means guarding against improper information modification or destruction, and includes ensuring
information non-repudiation and authenticity;
2) confidentiality, which means preserving authorized restrictions on access and disclosure, including means for
protecting personal privacy and proprietary information; and
3) availability, which means ensuring timely and reliable access to and use of information.
EMPOWERMENT TECHNOLOGY
Independent Learning:
Directions: Choose the letter that will best answer the ff. questions. Write the letter of your choice.
Case Study:
"The Captain Knows BEST"
Fred Fredson, an experienced consultant, is working on a contract with the U.S. Navy to develop a critical system. The
system will manage the processing of some very dangerous materials.
The exposure of two sailors to these materials and their subsequent deaths led Captain Birk to request the redesign of the
system used to manage these materials. The only one in his area with any computer training, he saw a way to use computer
technology to significantly reduce the dangers of this process.
Fred is one of a small number of people who have worked with the type of computer used to manage this process. During
several meetings with Captain Birk, Fred has gathered the external requirements for the system. Fred then designs the
system which he believes will best control the process.
Captain Birk requests that he be shown Fred's internal software design for the system. Fred, who has taken great pains to
develop a system that can be proven to be highly reliable and clearly demonstrated to do what has been requested, welcomes
the opportunity to show the details of his work. Fred arranges a meeting with the captain.
At the meeting, halfway into Fred's presentation, Fred is interrupted by the captain who says that the design of the software
is not the way he wants it. The captain then describes how he wants the software designed. Fred is greatly concerned
because he believes that there is no adequate way to test the software if it follows the captain's design.
ALUBIJID NATIONAL COMPREHENSIVE HIGH SCHOOL
SENIOR HIGH SCHOOL
OPEN HIGH SCHOOL
EMPOWERMENT TECHNOLOGY
Fred tries gently to point this out to the captain. But the subtle reasons for this are missed by the captain who accuses Fred
of merely having an egotistical commitment to his own design. The meeting ends acrimoniously with the captain saying that
if Fred does not agree to the new design then the contract will be cancelled.
Fred calls you and asks for your help. He relates his belief that if the contract is cancelled that the navy will not deal with
this problem again until there is another death. Fred reminds you of his expertise in testing. He assures you that he designed
the software so that the testing would yield a very high level of confidence that the software would be safe and would resolve
the problem that led to the two deaths. He further assures you that even though you could not prove that the captain's design
was wrong, Fred could not think of any tests that could demonstrate the reliability of the captain's design. Fred could
provide no assurance that the captain's design was reliable and would not at a later date cause significant problems if it were
adopted.
He knows that you have been concerned with ethical and legal issues and asks for your advice.
Write down your advice below:
______________________________________________________________________________________________________
______________________________________________________________________________________________________
______________________________________________________________________________________________________
______________________________________________________________________________________________________
______________________________________________________________________________________________________
______________________________________________________________________________________________________
Closure Activity:
1. Using the internet read about “Cyberbullying” and in 300 words write your personal insights about
the topic.
OR READ THE CYBERBULLYING REFERENCE AT THE END OF THIS LESSON
Feedback:
_____________________________________________________________________________________________
____________________________________________________________________________________________
References:
https://www.dinwiddie.k12.va.us/app/uploads/2018/12/Cyberbullying.pdf
https://techterms.com/definition/netiquette
https://teachcomputerscience.com/computer-ethics/
https://www.cisoplatform.com/profiles/blogs/understanding-difference-between-cyber-security-information
ALUBIJID NATIONAL COMPREHENSIVE HIGH SCHOOL
SENIOR HIGH SCHOOL
OPEN HIGH SCHOOL
EMPOWERMENT TECHNOLOGY
https://www.researchgate.net/topic/Computer-Ethics
CYBERBULLYING REFERENCE
ALUBIJID NATIONAL COMPREHENSIVE HIGH SCHOOL
SENIOR HIGH SCHOOL
OPEN HIGH SCHOOL
EMPOWERMENT TECHNOLOGY
ALUBIJID NATIONAL COMPREHENSIVE HIGH SCHOOL
SENIOR HIGH SCHOOL
OPEN HIGH SCHOOL
EMPOWERMENT TECHNOLOGY
ALUBIJID NATIONAL COMPREHENSIVE HIGH SCHOOL
SENIOR HIGH SCHOOL
OPEN HIGH SCHOOL
EMPOWERMENT TECHNOLOGY
ALUBIJID NATIONAL COMPREHENSIVE HIGH SCHOOL
SENIOR HIGH SCHOOL
OPEN HIGH SCHOOL
EMPOWERMENT TECHNOLOGY