0% found this document useful (0 votes)
35 views

Livit Q3

IT trends issues and challenges, Science, culture, and ethics of information technology The document discusses key topics in information technology including: 1) IT trends, issues, and challenges such as data security, social media liabilities, and automation. 2) The science, culture, and ethics of IT including how technology shapes culture and the elements of professional ethics. 3) Common ethical issues for IT professionals and users including privacy violations, software piracy, and inappropriate sharing of information.

Uploaded by

CupCake Babies
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views

Livit Q3

IT trends issues and challenges, Science, culture, and ethics of information technology The document discusses key topics in information technology including: 1) IT trends, issues, and challenges such as data security, social media liabilities, and automation. 2) The science, culture, and ethics of IT including how technology shapes culture and the elements of professional ethics. 3) Common ethical issues for IT professionals and users including privacy violations, software piracy, and inappropriate sharing of information.

Uploaded by

CupCake Babies
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

_____________________________________

LIVIT Q3 Reviewer Copyright Infringement


IT trends issues and challenges, Science, Green technology
culture, and ethics of information technology Internet addiction

PPT1: IT trends issues and challenges Challenges


information technology Mobile payments
- building communications networks for a Data security
company, safeguarding data n information Social media liabilities
creating n administering databases Remote automation and control
Big data (extremely large data sets that may be
benefits of it analyzed computationally to
- remote accessibility reveal patterns, trends, and associations,
- creation of new jobs especially relating to human behavior and
- application of it in education interactions)
- application of it in health sector
- advancement of economics
- communicating news PPT2: science, culture, and ethics of
- entertainment information technology
- effective communication science - systematic studies of outside of
- globalization natural and physical world; experimentation;
- accurate n speedy processing of explanation on everything
information
facets of science:
it trends science is everywhere (medicine, ocean, sky)
cloud computing science as a body of knowledge and a process
- internet for storing n managing data on science is exciting
remote servers science is useful
science is ongoing
mobile applications science is a global human endeavor
- provide users w quality service n science as a direct source of new technological
experience ideas
science as a source of engineering
Smart technology
- uses AI, machine learning, and big technology- art to create/develop a tool to
data analysis increase quality of life
technology as a source of scientific challenges
Automation (research n development)
- faster pace Instrumentation and measurement techniques -
(scientists development of instruments for
AI research n development)
- developing computer programs to
complete tasks nature of science n technology
technical knowledge (know-how) - includes
IT issues: ranges of basic skills such as advancement in
Cyberbullying agriculture, development of chemical
industries, medical technology, software
engineering, etc. Ethics in IT
understanding of the attributes or elements - Violation of privacy from personal life in
knowledge and understanding of the workplace
intelligence of workers Pirating music and movies
Unsolicited emails (spam)
Culture - encompasses the social behavior and Plagiarizing in academic papers
norms found in human societies complex Cookies or spyware to track activity
whole which includes knowledge, belief, art, Hackers of financial institutions stealing
morals, law, customs and habits is social customer information
heredity, which is transmitted from one
generation to another way of life IT professionals
Profession is a calling that requires specialized
8 elements of culture knowledge and often long and intensive
1. Language academic preparation. The United States Code
2. Religion of federal regulations defines a “professional
3. Daily Life employee” as one who is engaged in the
4. Economy performance of work:
5. Government
6. Arts “requiring knowledge of an advanced type in a
7. History field of science or learning... ; requiring the
8. Social Groups consistent exercise of discretion and judgment
in its performance;which is predominantly
Technology shapes culture: 5 ways intellectual and varied in character (as
technology changed the way we work distinguished from routine mental, manual,
1. Mobility mechanical, or physical work); and
2. The Cloud which is of such character that the output
3. AR & VR innovation produced, or the result accomplished by such
4. Customer Data work cannot be standardized in relation to a
5. Social Impact given period.”

Ethics of IT Professional Relationships


Ethics is a set of beliefs about right and wrong
behavior within a society. Ethical behavior
conforms to generally accepted norms
Morality - social conventions about right and
wrong that are widely shared
Virtue - habit that inclines people to do what is
acceptable
vice - a habit of unacceptable behaviour
integrity - in accordance with a personal code
of principles.

Morals, Ethics, & Laws


Morals are one’s personal beliefs about right
and wrong, while the term ethics describes
standards or codes of behavior expected of an • Between IT Workers and Employers
individual by a group. Law is a system of • Between IT Workers and Clients
rules that tells us what we can and cannot do. • Between IT Workers and Suppliers
• Between IT Workers and Other Professionals
• Between IT Workers and IT Users
• Between IT Workers and Society

Professional Code of Ethics - states the


principles and core values that
are essential to the work of a particular
occupation

Ethical decision making


High standards of practice and ethical behavior
- Adherence to a code of ethics reminds
professionals of the responsibilities and duties
that they may be tempted to compromise
Trust and respect from the general public - IT professional malpractice
Public trust is built on the expectation that a Negligence
professional will behave ethically. Duty of care
Evaluation benchmark - A code of ethics Reasonable person standard (evaluate how an
provides an evaluation benchmark that a objective, careful, and conscientious person
professional can use as a means of would have acted in the same circumstances)
self-assessment. Reasonable professional standard
Breach of the duty of care (failure to act as a
Professional Organization reasonable person would act)
Professional malpractice (liability for breach)

Common ethical issues for IT users


Software piracy
Inappropriate use of computing resources
Inappropriate sharing of information
Certifications
Certification indicates that a professional Supporting ethical practices of IT users
possesses a particular set of skills, knowledge, Establishing guidelines for use of company
or abilities, in the opinion of the certifying software
organization. Defining and limiting the appropriate use of IT
Elements - individual’s career aspirations, resources
existing skill level, and accessibility to Structuring information systems to protect data
training. and information
Installing and maintaining a corporate firewall
Vendor Certifications
Many IT vendors; such as Cisco, IBM, 10 commandments of computer ethics
Microsoft, SAP, and Oracle, offer 1. Thou shall not use a computer to harm
certification programs for those who use their other people.
products. Workers who 2. Thou shall not interfere with other
successfully complete a program can represent people’s computer files.
themselves as certified 3. Thou shall not snoop around in other
users of a manufacturer’s product. people’s computer files.
4. Thou shall not use a computer to steal.
5. Thou shall not use a computer to bear
false witness.
6. Thou shall not copy or use proprietary
software for which you have not paid.
7. Thou shall not use other people’s
computer resources without
authorization or proper compensation.
8. Thou shall not appropriate other
people’s intellectual output.
9. Thou shall think about the social
consequences of the program you are
writing or the system you are
designing
10. Thou shall always use a computer in
ways that ensure consideration and
respect for your fellow humans.

You might also like