0% found this document useful (0 votes)
7 views11 pages

ITSCPO-REVIEWER-MIDTERM

The document discusses the importance of integrity and ethical behavior in professional settings, highlighting the distinction between morals, ethics, and laws. It emphasizes the significance of ethical practices in technology, including the need for clear responsibility and consideration of the human impact of technology. Additionally, it addresses the social impact of information technology, including communication advancements and the digital divide, while outlining ethical challenges related to privacy and surveillance.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views11 pages

ITSCPO-REVIEWER-MIDTERM

The document discusses the importance of integrity and ethical behavior in professional settings, highlighting the distinction between morals, ethics, and laws. It emphasizes the significance of ethical practices in technology, including the need for clear responsibility and consideration of the human impact of technology. Additionally, it addresses the social impact of information technology, including communication advancements and the digital divide, while outlining ethical challenges related to privacy and surveillance.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 11

ITSCPO MIDTERM REVIEWER MO 1

MODULE 1: SOCIAL AND


PROFESSIONAL ISSUES
The Importance of Integrity
ETHICS
A person who acts with INTEGRITY acts in
 code of behavior accordance with a PERSONAL CODE OF
 set of formal guidelines or rules PRINCIPLES.
established by an organization,
One approach to acting with integrity is
institution, or society to dictate how
to extend to all people the sane respects
individuals should act.
and consideration that you expect to
ETHICAL BEHAVIOR receive from them.
 conforms to generally accepted Ethical dilemmas are not as simple as
norms. right versus wrong but involve choices
 acting in accordance with moral between right vs right.
principles, such as honesty, integrity,
The Difference between Morals,
fairness, and respect for others.
Ethics and Laws
MORAL ETHICS
 Morals are personal beliefs.
 personal principles  Ethics are the rules or guidelines.
 what is right and what is wrong  Laws are rules created by
 statements of what you believe to be governments or authorities.
rules of right conduct.
In both the United States and the
 usually shaped by culture, religion,
Philippines, laws are made by legislative
upbringing, and personal experiences.
bodies, but the processes and structures
 standards an individual or a group
differ slightly due to the different political
holds regarding what is good or bad
systems.
behavior.
VIRTUE
 habit that inclines people to do what is
acceptable.
Aristotle
The Significance…
- ethical virtues are learned through
Laws in both the U.S. and the Philippines
practice, and living a virtuous life
are made through a democratic process
leads to eudaimonia (a flourishing life
where elected representatives debate,
or "happiness")
amend, and vote on proposed legislation.
Aristotle and the Doctrine of the
While the specifics of each system differ,
Mean:
both aim to create laws that serve the
 Courage is the mean between public good and reflect the will of the
cowardice (deficiency) and people.
recklessness (excess).
The Dilemma...
 Generosity is the mean between
stinginess (deficiency) and Laws are not STATIC: (it means that laws
extravagance (excess). are not fixed)
VICE New laws are constantly being introduced
and existing laws repealed or modified.
 habit of unacceptable behavior.
 immoral, unethical, or undesirable. The Advantage...
Common examples of vices include: Laws are not static because they can
evolve, adapt, and change over time in
1. Smoking (as it's harmful to health)
response to new circumstances, societal
2. Greed or excessive materialism
needs, or emerging issues.
Gambling (leading to financial
problems) Laws may be amended, repealed, or
3. Lying or dishonesty added to as society develops, new
4. Excessive drinking or substance abuse problems arise, or better solutions are
discovered.
Example…
ITSCPO MIDTERM REVIEWER MO 2

Republic Act No. 10173, also known as 4. Don’t Forget Non-Technical


the Data Privacy Act of 2012. People and Their Needs
The Data Privacy Act of 2012 was created considering their interests, we can make
to address the increasing concerns about better decisions to protect everyone and
data privacy and security in the digital avoid problems. Showing empathy helps
age. us do a better job
Ethics in Information Technology 5. Think About the Bigger Picture
The growth of the Internet and social we need to think not only about how it
networks; the ability to capture, store, works now but also about how it will be
and analyze vast amount of personal used in the future.
data; and a greater reliance on
6. Be Aware of the Gap Between
information systems in all aspects of life
What Users Expect and What
have increased the risk that information
the Technology Can Actually Do
technology will be used unethically.
When creating technology, we need to
Examples that raise public concern
consider that users may expect more
about the ethical use of information
than the product can actually do.
technology:
7. Don’t Fall for the Hype About
Governments around the world have
Technology
implemented various systems that
enable the surveillance of their citizens Sometimes, the media and companies
make it seem like tech can fix everything,
Many employees have their email and
which can lead to unrealistic
internet access monitored while at work
expectations and problems. Not all issues
Millions of people have downloaded need a tech solution, and by focusing
music and movies at no charge only on tech, we might miss better,
simpler answers.
Websites plant cookies or spyware on
visitors’ hard drives to track their online 8. Make Responsibility for Ethics
purchases and activities. Clear
Hackers break into databases of financial In teams, it can be unclear who is
and retail institutions to steal customer responsible for ethics, and everyone
information might think someone else will handle it.
To avoid this, we need to clearly define
Importance of Ethical Practices in
who is in charge of ethical decisions from
Technology
the beginning. Everyone should know
1. Keeping Ethics a Priority, Not who is managing risks and preventing
Just a Requirement: harm.

ethics should be a top priority in 9. Use Technology Carefully


technology work, not just something we
Technology isn’t automatically good just
do to follow the law.
because it exists. It’s how we use it that
2. Remember the People Behind matters.
the Technology
Technology is only useful if we use it the
it’s easy to forget that everything we right way.
create affects people’s lives.
10. Plan for Disasters and
3. Consider All the Risks: Before, Crises
During, and After Technology
People often focus on the positive side of
Use
a project, which is natural, but this can
When working on technology, we often lead to problems if things go wrong. Not
focus only on our part, like following planning for the worst-case scenario can
ethical guidelines. But we also need to cause failure or disasters that could have
think about what happens after the been avoided.
product leaves our hands.
ITSCPO MIDTERM REVIEWER MO 3

Professionalism and Responsibilities - Social Media & Online


of IT Practitioners Communities
1. The balance between anticipating Technological Advancements and
the consequences of actions and Their Influence on Communication:
the challenge of determining Dependency on Communication
responsibility. Device
2. In-between possibilities to take
1. People depend on mobile
action and their suitableness.
devices daily.
3. Problem awareness and public
perception Communication: Calls, texts, emails,
4. Obligation for precaution and strict and social media keep people connected.
liability
Work & Productivity: Apps for
meetings, documents, and task
management allow them to work
MODULE 2: SOCIAL IMPACT OF
remotely.
INFORMATION TECHNOLOGY
Entertainment: Streaming videos,
Technological Advancements and
music, and gaming provide instant
Their Influence on Communication:
entertainment.
Positive Effects of Technology on
Communication Navigation & Travel: GPS and maps
help with directions and travel planning.
 New Forms of Communication
Shopping & Payments: Mobile
Social Media: are websites and
banking, online shopping, and digital
applications focusing on communication,
wallets make transactions easy.
community-based input, interaction,
content-sharing and collaboration. Health & Fitness: Apps track steps,
workouts, sleep, and even medical
Instant Messaging: a type of online
conditions.
communication that allows people to
send messages to each other in real- Instant Access to Information: News,
time. weather, and search engines provide
real-time updates.
Video Calls: is free high quality video
calling app focused on security and low 2. Less face-to-face interaction.
internet data usage. It's simple and
Increase in use of Digital Communication
works on smartphones and tablets.
Employees collaborate virtually instead
 Reduced Communication Costs of meeting in offices.
spending less on communication within Students attend virtual classes instead of
an organization or between people. This traditional classrooms.
can be done by using digital tools like:
People order food, groceries, and
- Use Online Tools services online
- Cloud-Based Solutions
Increase in digital interactions often
- Internet-Based Calls
replace face-to-face socializing.
- Automation (Chatbots & auto-
replies) 3. Technology modifies human
- Remote Work & Virtual Meetings emotions and relationships.
Instant Communication - While it
 Global Connectivity: increases connectivity, it can also lead to
shallow conversations, where people
ability of people, businesses, and
prioritize quick replies over deep,
organizations to communicate and
meaningful discussions.
collaborate across the world in real time
through digital technology, the internet, Social Media Influence - Excessive use
and communication tools like: can lead to comparison culture, where
people feel pressured to meet unrealistic
- Internet & Digital Communication
standards, affecting self-esteem and
- Video Conferencing
emotional well-being.
- Cloud-Based Collaboration
- Mobile Networks & 5G
ITSCPO MIDTERM REVIEWER MO 4

Digital Overload & Distraction - can o Mobile phones allow instant


distract people from real-world calling to emergency hotlines
interactions, leading to less meaningful (e.g., 911, 112, 999).
face-to-face conversations o Many smartphones have built-in
emergency dialing features.
Online Relationships - lack emotional
o GPS tracking helps responders
depth and trust, as people may hide their
true selves behind digital identities. locate people in distress faster.

AI & Personalization - Personalized


content can create filter bubbles, where  Real-Time Communication &
people are only exposed to information Alerts
that reinforces their beliefs, reducing o Governments and organizations
diverse perspectives and critical thinking. send emergency alerts (e.g.,
Technological Advancements and weather warnings, evacuation
Their Influence on Communication: notices).
The Rise of Mobile Phones o Social media and messaging
apps help people update loved
Mobile phones have transformed the way ones and coordinate safety
people communicate, work, and access plans.
information. o Emergency response teams use
 Evolved from Army Ground mobile communication for fast
Devices 50 Years Ago decision-making and resource
allocation.

 Navigation & Safety Apps


o GPS-based apps provide
evacuation routes and real-time
traffic updates during disasters.
o Safety apps like Google Maps,
What3Words, and emergency
locator apps help people find
shelters and assistance.
o Personal safety apps allow users
to send SOS alerts with location
tracking to emergency contacts.
 Over 5 Billion Users Worldwide
 Traditional Telephony Is
Becoming Obsolete
 Disaster Response & Recovery
a. Mobile Phones Are Everywhere
o Mobile payments and banking
b. It's Cheaper to Use the Internet
apps help affected individuals
c. Better Internet Means More
receive financial aid and
Options
donations.
d. People Just Aren't Using
o Medical apps provide first-aid
Landlines
instructions and virtual health
e. Everything Is Connected Now
consultations.
f. Remote Work and Business
o Drones controlled via mobile
Changes
apps assist in search and rescue
g. The Technology Is Changing
operations.
h. Landlines Aren’t Always Reliable

Technological Advancements and


Technological Advancements and
Their Influence on Communication:
Their Influence on Communication:
Communication in Information
Mobile Phones in Emergency
Technology (IT)
Situations
refers to the exchange of data,
 Immediate Access to
messages, and information between
Emergency Services
systems, devices, and people using
digital tools and networks.
ITSCPO MIDTERM REVIEWER MO 5
ITSCPO MIDTERM REVIEWER MO 6

plays an important role in business, 2. Human-to-Machine


education, healthcare, and daily life by Communication - refers to the
allowing a fast, secure, and efficient interaction between humans and
interactions. computers, devices, or systems using
various input methods.
Key Elements of Human-to-Machine
Types of IT Communication
Communication:
1. Human-to-Human Communication
User (Human): The person providing
- exchange of information, ideas,
input or commands.
emotions, and meanings between
individuals through verbal, nonverbal, Machine/System: The device, software, or
and written means. AI responding to human input.
Key Elements of Human-to-Human Interface: The medium that facilitates
Communication: interaction (e.g., keyboard, touchscreen,
voice recognition).
Sender: The person delivering the
message. Feedback Mechanism: The response
provided by the machine (e.g., display
Message: The content being
output, sound, action).
communicated.
Types of Human-to-Machine
Channel: The medium through which
Communication:
communication occurs (e.g., face-to face,
phone, email).  Text-Based Interaction: Typing
commands in a search engine,
Receiver: The person receiving and
chatbot, or command-line interface.
interpreting the message.
 Voice Interaction: Using voice
Feedback: The response from the assistants like Siri, Alexa, or Google
receiver, which helps clarify Assistant.
understanding.  Gesture-Based Communication:
Interacting with devices using hand
Context: The situation or environment
movements (e.g., touchscreens,
where communication takes place.
motion sensors like Microsoft Kinect).
Noise: Any barriers (physical,  Haptic Feedback: Vibration responses
psychological, or cultural) that may in gaming controllers or smartphones.
distort the message.  Brain-Computer Interfaces (BCI):
Advanced systems that interpret brain
signals to control devices (e.g.,
Types of Human-to-Human medical prosthetics,
Communication: neurotechnology).

 Verbal Communication: Spoken words


(e.g., F2F communication, phone calls, 3. Machine-to-Machine (M2M)
& video calls) Communication
 Nonverbal Communication: Body
language, facial expressions, gestures, refers to the automated exchange of data
tone of voice & touch. between devices, systems, or machines
 Written Communication: Texts, emails, without human intervention.
letters, reports, social media & instant
Key Components of M2M Communication:
messaging.
 Interpersonal Communication: 1on1 User (Human): Collect real-time data
communication, small group (e.g., temperature, pressure, motion).
communication, & public speaking
Connectivity: Machines communicate via
 Virtual Communication: Online
wired (Ethernet, fiber optics) or wireless
Forums/Chats, webinars and online
(Wi-Fi, Bluetooth, 5G, LPWAN) networks.
meetings.
 Nonverbal Cues in Digital Actuators: Perform actions based on
Communication: Emojis and Stickers processed data (e.g., adjusting
temperature, triggering an alarm).
ITSCPO MIDTERM REVIEWER MO 7

Cloud/Database: Stores and processes and may resist learning digital


large volumes of machine-generated skills.
data.  Disability barriers – Many
websites, apps, and devices are
Digital Divide and Strategies for
not accessible to people with
Inclusivity
disabilities.
refers to the gap between individuals and
Ethical Challenges in Privacy and
communities who have access to digital
Surveillance
technology and those who do not.
Privacy and surveillance are key ethical
This divide is influenced by factors such
concerns in the digital age, as
as income, education, infrastructure.
governments, corporations, and
Strategies for Digital Inclusivity: individuals collect and analyze vast
amounts of personal data.
1. To make technology more
accessible to everyone, we need to Key Ethical Challenges:
make devices and internet access
Invasion of Privacy: Excessive data
cheaper.
collection, especially without clear
2. We need to invest in better
necessity, infringes on individuals’
infrastructure in a remote areas.
personal space and autonomy.
3. Governments and businesses can
work together to make technology Lack of Consent: Many users are unaware
more accessible to everyone. of how their data is collected, stored, and
4. Inclusive design means creating shared.
technology that everyone,
Mass Surveillance: When citizens are
including people with disabilities,
monitored without their knowledge or
can use easily.
consent, it can lead to potential abuses
5. Public access points are places
of power, such as unwarranted tracking
where people can use the internet
of activists, journalists, or political
and computers for free.
opponents.
Digital Divide
Data Security Risks: The more data that
the gap between people who can easily is collected, the higher the risk of
access technology and the internet, and breaches.
those who don’t have that same access,
Discrimination and Bias: Many
often due to factors like cost, location, or
surveillance technologies, including facial
limited resources.
recognition and predictive policing, have
Causes of the Digital Divide: been shown to reflect and reinforce
societal biases.
1. Economic barriers mean that the
high prices of things like Chilling Effect: When people know they
computers, smartphones, and are being watched, they may self-censor
internet services make it hard for their actions, opinions, and speech.
some people to afford technology.
2. Educational Gaps – Lack of Digital
Literacy and Skills MODULE 3: LEGAL & REGULATORY
3. Geographical Differences – Rural ISSUES IN IT
and Remote Areas Often Have
What is IT Law?
Limited Internet Access
4. Infrastructure Limitations – Poor branch of law that addresses issues
Technological Infrastructure in related to information technology,
Some Regions including cybersecurity, privacy,
5. Social and Cultural Factors – intellectual property, data protection, and
Gender, Age, and Disability Can e commerce.
Impact Digital Access
 Gender inequality – In some It covers areas such as:
cultures, women have less The Republic Act No. 10173, also known
access to digital tools and as the Data Privacy Act of 2012, is a law
education. in the Philippines that protects the
 Age gap – Older adults often privacy of individuals' personal data.
struggle with new technology
ITSCPO MIDTERM REVIEWER MO 8

The Republic Act No. 10175, also known For Individual Developers
as the Cybercrime Prevention Act of (Freelancers or Personal Creators)
2012, is a law in the Philippines aimed at
If you, as a developer or programmer,
addressing crimes committed through
create a piece of software, app, or code
the internet and other digital platforms
on your own (without a company
Republic Act No. 8293, also known as the involved), the copyright lasts for your
Intellectual Property Code of the lifetime + 70 years.
Philippines (IP Code), is the law that
For Works Created by Developers as
governs the protection of intellectual
Part of Employment (Employee
property (IP) rights.
Work)
Republic Act No. 8792, also known as the
as part of your job, the copyright
E Commerce Act of 2000, is the law that
typically belongs to the employer (the
regulates electronic commerce. It sets
company) instead of you. Copyright lasts
the legal framework for online business
for 95 years from the date of creation or
transactions, that the digital transactions
120 years from the date of publication—
are safe, secure, and valid under
whichever is shorter.
Philippine law.
For Open Source Software Created
by Developers
Intellectual property
The copyright term for open-source code
describe works of the mind - such as art, is the same as for any other work:
books, films, formulas, inventions, music, lifetime + 70 years for the creator, unless
and processes specified otherwise.
It is protected through this laws: What Happens After the Copyright
Term Ends?
Copyright Law: protects authored works ,
such as art, books, film, and music Once the copyright term expires:
Patent Law: protects inventions  The work is no longer protected by
copyright.
Trade Secret Law: helps protects
 It becomes part of the public
information that is critical to an
domain, meaning anyone can use it
organization’s success
however they want, without
Intellectual Property Laws needing permission or paying any
royalties.
Copyright Law: exclusive right to
distribute, display, perform, or reproduce
an original work in copies or to prepare
Eligible Works
derivative works based on the work.
In IT, eligible works under copyright are
Copyright Protection: granted to the
those creative works that meet specific
creators of original works of authorship in
requirements and are protected by
any tangible medium of expression.
copyright law.
Copyright Infringement: violation of the
rights secured by the owner of a
copyright.

Copyright Term
The copyright term is the amount of time
a creator’s work is protected by copyright
law.
Why Does Copyright Have a Term?
to give creators a reward for their work
Software and Computer Code
by letting them control and profit from it
for a certain period. Programs, apps, and software that are
written by developers or programmers
How Long Does Copyright Last?
(Eligible Work).
ITSCPO MIDTERM REVIEWER MO 9

Mobile Apps creator’s sales. Because of this, it’s


less likely to be considered fair use.
Applications for smartphones and tablets
(Eligible Works)
Websites and Web Applications
Websites, web pages, and the code
behind them (HTML, CSS, JavaScript, etc.)
(Eligible Work).
Databases
Databases that store collections of
information, like spreadsheets or digital
catalogs (Eligible Works).

Software Copyright Protection


Fair Use Doctrine
software copyright protection is governed
was developed over the years as courts
by Republic Act No. 8293, also known as
worked to maintain that balance.
the Intellectual Property Code of the
allows the portions of copyrighted Philippines (IP Code). Software copyright
materials to be used without permission protection in the country:
under certain circumstances.
1. Software as a Copyrightable
concept that an idea cannot be Work
copyrighted but the expression of an idea 2. Exclusive Rights of the
can be key to understanding copyright Copyright Owner
protection.
The copyright holder has exclusive
established four factors for courts to rights to:
consider:
- Reproduce the software.
1. the purpose and character of - Modify or adapt the software.
the use; - Distribute copies to the public.
- This looks at how you’re using the - Rent, lease, or lend the
material. If it's for education, software.
research, news reporting, or - Publicly display or perform the
criticism, it's more likely to be fair software.
use. 3. Penalties for Software Piracy
2. the nature of the copyrighted
work;
- This considers what kind of work is The World Intellectual Property
being used. Factual works (like Organization Copyright Treaty 1996
news articles or research) are more
The WIPO Copyright Treaty (WCT) of 1996
likely to fall under fair use than
was adopted on December 20, 1996, in
creative works (like novels, music,
Geneva, Switzerland, by the World
or movies) since creative works are
Intellectual Property Organization (WIPO).
more protected.
It was introduced to address the growing
3. the portion of the copyrighted
challenges of copyright protection in the
work used;
digital age, especially with the rise of the
- This examines how much of the
internet and digital technology.
original work is used. Using a small
part— especially if it's not the  Protecting Digital Works
“heart” or most important part of  Fighting Online Piracy
the work—is more likely to be fair  Supporting Digital Protection Tools
use than copying a large or crucial  Holding Online Platforms Accountable
portion.  Encouraging Global Cooperation
4. the effect of the use on the
value of the copyrighted work.
- If you use something in a way that
lets people get it for free instead of
buying the original, it can hurt the
ITSCPO MIDTERM REVIEWER MO 10

What is Patent
legal document that is granted to an
inventor by the patent office to protect
the subject matter seeking protection.
valuable assets that enable one to
publicly share their invention without fear
of being misused.

DIFFERENT TYPES OF PATENTS


- Inventions
- Utility Models What is Trademark
- Industrial Designs
Republic Act No. 8293, otherwise known
as the Intellectual Property Code of the
Philippines, defines a trademark as “any
visible sign capable of distinguishing
goods”
word, a group of words, sign, symbol,
logo or a combination thereof that
identifies and differentiates the source of
the goods or services of one entity from
those of others.
Benefits of Trademark
A trademark protects a business’ brand
identity in the marketplace.
Registration of it gives the owner the
exclusive rights to prevent others from
using or exploiting the mark in any way.
a protective mark may also bring another
stream of income to the owner through
licensing or franchising.
Examples of famous trademarks include
APPLE, BARBI, FORD, GOOGLE, LEVI'S,
TACO BELL, NIKE, PEPSI, and WALMART.
ITSCPO MIDTERM REVIEWER MO 11

You might also like