IT0025 - M1 - Social and Professional Issues

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 21

IT0025 - M1 - Social and Professional Issues

 The Business Software Alliance (BSA) is a trade group that


M1 - Ethics for IT Professionals and IT Users represents the world’s largest software and hardware
manufacturers.
ST1 - IT Worker Relationships That Must Be Managed o Its mission is to stop the unauthorized copying
of software produced by its members.
Intended Learning Outcome
–Distinguish a professional from other kinds of workers, and is an Trade secret
IT worker considered a professional;  Information used in business.
–Discuss why communication is important in the workplace; and  Generally unknown to the public
–Explain codes of ethics, professional organizations, certification,  Company has taken strong measures to keep confidential
and licensing affect the ethical behavior of IT professionals.
Whistle-blowing
IT Professionals  Attracts attention to a negligent, illegal, unethical,
abusive, or dangerous act that threatens the public
Profession is a calling that requires. interest.
 Special knowledge
 Long and intensive academic preparation Relationships Between IT Professionals and Clients
 In relationships between IT workers and clients, each party
Are IT Workers Professionals? agrees to provide something of value to the other.
 Mobile application developers  This relationship is usually documented in contractual
 Programmers terms.
 Systems analysts  The client makes decisions about a project on the basis of
 Database administrators information, alternatives, and recommendations
 Network administrators provided by the IT worker.
 Problems can also arise during a project if IT workers find
Legal perspective themselves unable to provide full and accurate reporting
 IT workers are not recognized as professionals because of the project’s status.
they are not licensed by the state or federal government.  Such situation has the potential to undermine the
 IT workers are not liable for malpractice because they do objectivity of an IT worker due to a conflict of interest - a
not meet the legal definition of a professional. conflict between the IT worker’s (or the IT firm’s) self-
interest and the client’s interests.
Professional Relationships That Must Be Managed
- IT professionals have many different relationships with: Fraud
 Crime of obtaining goods, services, or property through
deception or trickery.

Misrepresentation
 is the misstatement or incomplete statement of a
material fact.
 the other party to enter into a contract, that party may
have the legal right to cancel the contract or seek
reimbursement for damages.

Breach of Contract
 one party fails to meet the terms of a contract

Relationships Between IT Professionals and Suppliers

Develop good relationships with suppliers


Relationships Between IT Professionals and Employers  Deal fairly with them
 An IT worker and an employer typically agree on  Do not make unreasonable demands
fundamental aspects of this relationship before the
worker accepts an employment offer. Bribery
 IT workers must set an example and enforce policies  Providing money, property, or favors to someone in
regarding the ethical use of IT. business or government to obtain a business advantage.
 Software piracy is an area in which IT workers may be
tempted to violate laws and policies.

1
IT0025 - M1 - Social and Professional Issues
Distinguishing between bribes and gifts Here are the skills that employers mostly seek in new hires, ranked
in terms of priority.
Bribes Gifts  Oral communication
Are made in secret, as they are Are made openly and publicly,  Listening
neither legally nor morally as a gesture of friendship or  Written communication
acceptable goodwill  Public speaking
Are often made indirectly Are made directly from donor  Adaptability
through a third party to recipient
Encourage an obligation for Come with no expectation of a How do you improve communication?
the recipient to act favorably future favor for the donor  Start using the right tools for your business
toward the donor  Encourage two-way communication
 Tell people what they are doing right
Relationships Between IT Workers and Other Professionals  Specific and descriptive feedback
 Professionals owe each other adherence to profession’s  Schedule a compulsory check-in
code of conduct.
 Ethical problems between members of the IT profession
o resume inflation - Communication can be formal, informal, internal or external. And
o Inappropriate sharing of corporate information within an organization, it is important to develop a healthy and
beneficial communication process.
Relationships Between IT Professionals and IT Users
 IT user refers to a person who uses a hardware or - Effective Communication is the key to achieving long-term
software product; the IT workers who develop, install, success, so make sure you follow the above outline strategies.
service, and support the product.
How to develop your Professional Communication Skills?
IT professionals’ duty  Ask for feedback: If you carry out a presentation, ask
 Understand users’ needs and capabilities yourself how you think you could improve next time.
 Deliver products and services that best meet those needs  Learn from others: If you look up to someone who has
 Establish an environment that supports ethical behavior good communication skills, watch what they do and learn
by users from them.
 Try active listening: A good communicator listens.
Relationships Between IT Workers and Society  Enroll in a course: To really become a better
 Society expects members of a profession to provide communicator, you should consider enrolling in a course
significant benefits and to not cause harm through their that can refresh your skills and develop new ones.
actions.
 The actions of an IT worker can affect society. Encouraging the Professionalism of IT Workers
- IT workers of all types can improve their profession’s reputation
Effective Professional Communication for professionalism by
 Communication is one of the major concerns in the 1. subscribing to a professional code of ethics;
workplace. 2. joining and participating in professional organizations;
 According to the statistics, 57% of employees report not 3. obtaining appropriate certifications, and;
being given clear directions and 69% of managers are not 4. supporting government licensing where available
comfortable communicating with the employees in
general. Professional Codes of Ethics
 From the statistics, it is clear that there is a need to  A professional code of ethics states the principles and core
improve communication in the workplace. values that are essential to the work of a particular
 Communication in the workplace is one of the signs of a occupational group.
high-performance culture.  Codes of ethics created by professional organizations
 Exchanging information and ideas within an organization have two main parts:
is called workplace communication. o The first outlines what the organization aspires
 However, effective communication occurs when a to become.
message is sent and received accurately. o Lists rules and principles by which members of
the organization are expected to abide.
Why is communication so important in the workplace? Benefits for individual, profession, and society
 It avoids confusion  Improves ethical decision making
 It provides purpose  Promotes high standards of practice and ethical behavior
 It builds a positive company culture  Enhances trust and respect from the general public
 It creates accountability  Provides an evaluation benchmark

2
IT0025 - M1 - Social and Professional Issues
Professional Organizations CompTIA A+ Performing computer and
 No universal code of ethics for IT professionals. network maintenance,
 No single, formal organization of IT professionals has troubleshooting, and
emerged as preeminent. installation including
addressing security issues
IT Professional Organizations Project Management Leading and directing projects
Institute’s Project
Organization URL for code of ethics Management Professional
Association for www.acm.org/about/code-of-ethics (PMP)
Computing Machinery
Institute of Electrical Seeri.etsu.edu/Codes/TheSECode.ht Common Industry Certifications
and Electronics m
Engineers Computer Category Certification Certifying
Society (IEEE-CS) organization
Association of www.aitp.org/?page=Ethics Security CompTIA Security+ Computer
Information Technology
Technology Industry
Professionals (AITP) Association
SysAdmin, Audit, www.sans.org/security- Security Certified Security International
Network, Security resources/ethics.php Analyst Council of E-
(SANS) Institute commerce
Consultants (EC)
Certification Forensics Certified The International
 Indicates a professional possesses a particular set of Computer Society of Forensic
skills, knowledge, or abilities in the opinion of a certifying Examiner Computer
organization. Examiners
 Can also apply to products. Governance Certified in the ISAGA
 On the other hand, because certification is no substitute Governance of
for experience and doesn’t guarantee that a person will Enterprise IT
perform well on the job. Project Project Project
 IT employees are motivated to learn new skills, and management Management Management
certification provides a structured way of doing so. Professional Institute

Vendor Certifications Government Licensing


 Some certifications substantially improve IT workers’ - In the United States, a government license is government-issued
salaries and career prospects. permission to engage in an activity or to operate a business.
 Require passing a written exam.
 Workers are commonly recertified as newer technologies Case for licensing IT professionals
become available.  Encourage IT professionals to follow the highest
standards of the profession
Industry Association Certifications  Practice a code of ethics
 Require a certain level of experience and a broader  Violators would be punished
perspective than vendor certifications.

Certifications in high demand

Certification Subject Matter


Microsoft Certified Designing and optimizing
Technology Specialist solutions based on Microsoft
products and technologies.
Cisco Certified Internetwork Managing and
Expert troubleshooting large
networks
Cisco Certified Network Configuring and designing
Professional Security firewalls and the security
settings on routers and
switches

3
IT0025 - M1 - Social and Professional Issues
ST2 - IT Professional Malpractice  Applications from the Google Play store without paying
for them, and then use the software or sell it to others.
Intended Learning Outcomes  The software piracy rate for that same game from Apple’s
 Explain the common ethical issues of the IT users; and App store is closer to 60 percent.
 Understand the ethical practices of the users.  Software piracy can have a negative impact on future
software development if professional developers
- For most IT workers, becoming licensed as a software engineer is become discouraged watching revenue from legitimate
optional because they practice under the “industrial exemption” sales sink while the sales of pirated software and games
clause of their state’s licensing laws that permits them to work skyrocket.
internally for an organization without licensure so long as they are
not making final decisions to release product to the public or Inappropriate Use of Computing Resources
offering engineering services directly to the public (for example,  Some employees use their computers to surf popular
software engineering consultant). websites that have nothing to do with their jobs,
participate in chat rooms, view pornographic sites, and
 Negligence has been defined as not doing something that play computer games.
a reasonable man would do, or doing something that a  These activities eat away at a worker’s productivity and
reasonable man would not do. waste time.
 Duty of care refers to the obligation to protect people  A survey by the Fawcett Society found that one in five
against any unreasonable harm or risk. men admit to viewing porn at work, while a separate
 Courts consistently reject attempts to sue individual study found that 30 percent of mobile workers are
parties for computer-related malpractice. viewing porn on their web-enabled phones
 The courts decide whether parties owe a duty of care by  Organizations typically fire frequent pornography
applying a reasonable person standard to evaluate how offenders and take disciplinary action against less
an objective, careful, and conscientious person would egregious offenders.
have acted in the same circumstances.
 A breach of the duty of care is the failure to act as a Inappropriate Sharing of Information
reasonable person would act.  Every organization stores vast amounts of information
 Professionals who breach the duty of care are liable for that can be classified as either private or confidential.
injuries that their negligence causes.  Private data describe individual employees—for
 This liability is commonly referred to as professional example, their salary information, attendance data,
malpractice. health records, and performance ratings.
 For example, a CPA who fails to use reasonable care,  An IT user who shares this information with an
knowledge, skill, and judgment when auditing a client’s unauthorized party, even inadvertently, has violated
books is liable for accounting malpractice. someone’s privacy or created the potential that company
information could fall into the hands of competitors.
Common Ethical Issues for IT Users
Ethical Practices of IT Users
Software piracy  The growing use of IT has increased the potential for new
 Inappropriate use of computing resources ethical issues and problems; thus, many organizations
o Private data have recognized the need to develop policies that protect
o Confidential Information against abuses.
 Sometimes IT users are the ones who commit software  Adherence to a policy can improve services to users,
piracy. increase productivity, and reduce costs.
 A common violation occurs when employees copy
software from their work computers for use at home. Supporting the Ethical Practices of IT Users
 The increasing popularity of the Android smartphone  The growing use of IT has increased the potential for new
operating system has created a serious software piracy ethical issues and problems; thus, many organizations
problem. have recognized the need to develop policies that protect
 Some IT end users have figured out how to download against abuses.

4
IT0025 - M1 - Social and Professional Issues
 Adherence to a policy can improve services to users,  Information security (infosec) group’s responsibilities
increase productivity, and reduce costs. include managing the processes, tools, and policies
necessary to prevent, detect, document, and counter
Ethical Practices of IT Users threats to digital and nondigital information, whether it
 Establishing Guidelines for Use of Company Software is in transit, being processed, or at rest in storage.
 Defining the Appropriate Use of IT Resources
 Structuring Information Systems to Protect Data and Structuring Information Systems to Protect Data and Information
Information  Organizations must implement systems and procedures
 Installing and Maintaining a Corporate Firewall that limit data access to just those employees who need
it.
Establishing Guidelines for Use of Company Hardware and Software  For example, sales managers may have total access to
 Company IT managers must provide clear rules that sales and promotion databases through a company
govern the use of home computers and associated network, but their access should be limited to products
software. for which they are responsible.
 Some companies negotiate contracts with software
manufacturers and provide PCs and software so that IT Installing and Maintaining a Corporate Firewall
users can work at home.  A firewall is hardware or software (or a combination of
 The goal should be to ensure that employees have legal both) that serves as the first line of defense between an
copies of all the software they need to be effective, organization’s network and the Internet; a firewall also
regardless of whether they work in an office, on the road, limits access to the company’s network based on the
or at home. organization’s Internet usage policy.
 A firewall can be configured to serve as an effective
Defining an Acceptable Use Policy deterrent to unauthorized web surfing by blocking access
 An acceptable use policy (AUP) is a document that to specific objectionable websites.
stipulates restrictions and practices that a user must
agree to in order to use organizational computing and Compliance
 Compliance means to be in accordance with established
network resources.
policies, guidelines, specifications, or legislation.
 It is an essential information security policy—so  Records management software, for example, may be
important that most organizations require that developed in compliance with the U.S. Department of
employees sign an acceptable use policy before being Defense’s Design Criteria Standard for Electronic
granted a user or network ID. Management Software applications (known as DoD
5015) that defines mandatory functional requirements
An effective acceptable use policy is clear and concise and contains for records management software used within the
Department of Defense.
the following five key elements:
 Commercial software used within an organization should
be distributed in compliance with the vendor’s licensing
1. Purpose of the AUP - Why is the policy needed and what agreement.
are its goals?
2. Scope - Who and what is covered under the AUP?
3. Policy - How are both acceptable use and unacceptable
use defined; what are some examples of each?
4. Compliance - Who is responsible for monitoring
compliance and how will compliance will be measured?
5. Sanctions - What actions will be taken against an
individual who violates the policy.

 Members of the legal, human resources, and


information security groups are involved in creating the
AUP.
 It is the organization’s information security group that is
responsible for monitoring compliance to the AUP.

5
IT0025 - Social and Professional Issues
 Some of the key issues are: controlling access to
M2 - Freedom of Expression information on the Internet, Internet censorship, strategic
lawsuits against public participation, anonymity in the
Intended Learning Outcomes internet, john doe lawsuits, hate speech, pornography
 Know the legal basis for the protection of freedom of and fake news.
speech;  Some of the key issues are: controlling access to
 Discuss some key federal laws that affect online freedom information on the Internet, Internet censorship,
of expression, and how do they impact organizations; defamation, hate speech, and pornography.
 Know how the Internet present new challenges in the
area of freedom of expression; and (1) Controlling Access to Information on the Internet
 Understand the issues related to the use of information  One of the main reasons to support control of access
technology. to information in the internet is the children’s
capability of accessing the Internet.
First Amendments Rights
 The Internet enables a worldwide exchange of news, The Communications Decency Act (CDA)
ideas, opinions, rumors, and information.  This act aimed at protecting children from online
 Its broad accessibility, open discussions, and anonymity pornography. The CDA imposed $250,000 fines and
make the Internet a remarkable communications prison terms of up to two years for the transmission
medium. of ―indecent‖ material over the Internet.
 People must often make ethical decisions about how to  An Internet filter is software that can be used to
use such remarkable freedom and power. block access to certain websites that contain
 The right to freedom of expression is one of the most material deemed inappropriate or offensive.
important rights for free people everywhere.
 In other words, the First Amendment protects (2) Internet Censorship
Americans’ rights to freedom of religion, freedom of  is the control or suppression of the publishing
expression, and freedom to assemble peaceably. or accessing of information on the Internet.
 Government entities may pressure “upstream”
- The Supreme Court has held that the following types of speech Internet service providers
are not protected by the First Amendment and may be forbidden o limit access to certain websites
by the government. o allow access to only some content or
modified content at certain websites
Obscene Speech o reject the use of certain keywords in
 An obscenity is any statement or act which strongly search engines
offends the prevalent morality of the time, is a profanity, o track and monitor the Internet
or is otherwise taboo, indecent, abhorrent, or disgusting, activities of individuals.
or is especially inauspicious.
(3) Strategic Lawsuit Against Public Participation
Defamation  A strategic lawsuit against public participation
 also called calumny, vilification, traducement, slander (SLAPP) is employed by corporations, government
(for transitory statements), and libel (for written, officials, and others against citizens and community
broadcast, or otherwise published words). groups who oppose them on matters of public
 The two different types of defamation are: Slander and interest.
Libel
 Although people have the right to express opinions, they (4) Anonymity on the Internet
must exercise care in their Internet communications to  Anonymous expression is the expression of opinions
avoid possible charges of defamation. by people who do not reveal their identity.
 Anonymity is even more important in countries that
Freedom of Expression: Key Issues don’t allow free speech.
 Information Technology has provided amazing new ways  Doxing involves doing research on the Internet to
to communicate with people around the world. obtain someone’s private personal.

1
IT0025 - Social and Professional Issues
(5) John Doe Lawsuits
 Businesses must monitor and respond to both the
public expression of opinions that might hurt their
reputations and the public sharing of confidential
company information.
 When anonymous employees reveal harmful
information online, the potential for broad
dissemination is enormous.
 An aggrieved party can file a John Doe lawsuit
against a defendant whose identity is temporarily
unknown because he or she is communicating
anonymously or using a pseudonym.

(6) Hate Speech


 Persistent or malicious harassment aimed at a
specific person is hate speech, which can be
prosecuted under the law.
o A threatening private message sent over
the Internet to a person
o A public message displayed on a website
describing intent to commit acts of hate-
motivated violence against specific
individuals
o libel directed at a particular person are all
actions that can be prosecuted

(7) Pornography on the Internet


 Many people, including some free-speech
advocates, believe that there is nothing illegal or
wrong about purchasing adult pornographic
material made by and for consenting adults.
 On the other hand, most parents, educators, and
other child advocates are concerned that children
might be exposed to online pornography.
 Sexting—sending sexual messages, nude or
seminude photos, or sexually explicit videos over a
cell phone—is a fast-growing trend among teens and
young adults.

(8) Fake News


 Blogsss
 Fake news sites
 Social media sites

2
IT0025 - Social and Professional Issues
Software Copyright Protection
M3 - Intellectual Property  The use of copyrights to protect computer software
raises many complicated issues of interpretation. -
ST1 - What is Intellectual Property? Registering a copyright for a software program is a simple
process.
Objectives
-Understand how to protect Intellectual Property; The Prioritizing Resources and Organization for Intellectual Property
-Explain the factors that can be used in deciding whether a use of Act of 2008
copyrighted material is fair; and
-Understand the strength and limitations of using copyright,  The Prioritizing Resources and Organization for
patent, trade secret laws to protect intellectual property. Intellectual Property (PRO-IP) Act of 2008 (Public Law 110-
403) created the position of Intellectual Property
Intellectual Property Enforcement Coordinator within the Executive Office of
 is a term used to describe works of the mind—such as art, the President
books, films, formulas, inventions, music, and  One of its programs, called Computer Hacking and
processes—that are distinct and owned or created by a Intellectual Property (CHIP), is a network of over 150
single person or group. experienced and specially trained federal prosecutors
who focus on computer and intellectual property crimes.
Copyright Law
 protects authored works, such as art, books, film, and General Agreement on Tariffs and Trade
music; patent law protects inventions; and trade secret  The General Agreement on Tariffs and Trade (GATT) was a
law helps safeguard information that is critical to an multilateral agreement governing international trade.
organization’s success.  GATT however, copyright protection varies greatly from
country to country, and an expert should be consulted
Copyrights when considering international usage of any intellectual
 A copyright is the exclusive right to distribute, display, property.
perform, or reproduce an original work in copies or to
prepare derivative works based on the work The WTO and the WTO TRIPS Agreement (1994)
 Copy right protection is granted to the creators of original  The WTO is a global organization that deals with the rules
works of authorship in any tangible medium of of international trade based on WTO agreements that are
expression. negotiated and signed by representatives of the world’s
 Copyright infringement is a violation of the rights secured trading nations.
by the owner of a copyright.  The goal of the WTO is to help producers of goods and
 Infringement occurs when someone copies a substantial services, exporters, and importers conduct their business
and material part of another’s copyrighted work without globally
permission.
The World Intellectual Property Organization Copyright Treaty
Copyright Term (1996)
 Copyright law guarantees developers the rights to their  The World Intellectual Property Organization (WIPO),
works for a certain amount of time. Since 1960, the term headquartered in Geneva, Switzerland, is an agency of
of copyright has been extended 11 times from its original the United Nations established in 1967.
limit of 28 years.  WIPO is dedicated to “the use of intellectual property as
a means to stimulate innovation and creativity.
Eligible Works  WIPO has strongly advocated for the interests of
 The types of work that can be copyrighted include intellectual property owners. Its goal is to ensure that
architecture, art, audiovisual works, choreography, intellectual property laws are uniformly administered.
drama, graphics, literature, motion pictures, music,
pantomimes, pictures, of copyright, fair contracts, and
free speech.

1
IT0025 - Social and Professional Issues
The Digital Millennium Copyright Act (1998) manufacture,” permits its owner to exclude others from
 The DMCA (Public Law 105-304) was signed into law in making, using, or selling the design in question.
1998 and implements two 1996 WIPO treaties: the WIPO  Patent infringement, or the violation of the rights secured
Copyright Treaty and the WIPO Performances and by the owner of a patent, occurs when someone makes
Phonograms Treaty. unauthorized use of another’s patent

The act is divided into the following five sections: Trade Secrets
1. Title I (WIPO Copyright and Performances and
Phonograms Treaties Implementation Act of 1998) Trade Secret
a. This section implements the WIPO treaties by  business information
making certain technical amendments to the  has required effort or cost to develop,
U.S law in order to provide appropriate  has some degree of uniqueness or novelty, is generally
references and links to the treaties. unknown to the public, and is kept confidential.
2. Title II (Online Copyright Infringement Liability Limitation
Act) Trade Secret Laws
a. This section enables website operators that  Protection laws very greatly from country to country.
allow users to post content on their website
(e.g., music, video, and pictures) to avoid Uniform Trade Secrets Act
copyright infringement liability if certain “safe  was drafted in the 1970s to bring uniformity to all the
harbor” provisions are followed. United States in the area of trade secret law.
3. Title III (Computer Maintenance Competition Assurance
Act)
a. This section permits the owner or lessee of a
computer to make or authorize the making of a
copy of a computer program in the course of
maintaining or repairing that computer.
4. Title IV (Miscellaneous provisions)
a. This section adds language to the Copyright Act
confirming the Copyright Office’s authority to
continue to perform the policy and
international functions that it has carried out
for decades under its existing general authority.
5. Title V (Vessel Hull Design Protection Act)
a. This section creates a new form of protection
for the original design of vessel hulls.

Patents
 A patent permits its owner to exclude the public from
making, using, or selling a protected invention, and it
allows for legal action against violators.
 A utility patent is “issued for the invention of a new and
useful process, machine, manufacturer, or composition
of matter, or a new and useful improvement.
 It generally permits its owner to exclude others from
making, using, or selling the invention for a period of up
to twenty years from the date of patent application filing,
subject to the payment of maintenance fees.”
 A design patent, which is “issued for a new, original, and
ornamental design embodied in or applied to an article of

2
IT0025 - Social and Professional Issues
ST2 - Current Intellectual Property Issues  As a result, organizations that want to change database
vendors are faced with rewriting existing applications
Intended Learning Outcome using the new vendor’s database programming language.
- Understand some of the current issues associated with the  Using reverse engineering, a developer can use the code
protection of intellectual property of the current database programming language to
recover the design of the information system application.
Current Intellectual Property Issues  Next, code-generation tools can be used to take the
 Plagiarism is the act of stealing someone’s ideas or words design and produce code (forward engineer) in the new
and passing them off as one’s own. database programming language. This reverse-
 The explosion of electronic content and the growth of the engineering and code generating process greatly reduces
web have made it easy to cut and paste paragraphs into the time and cost needed to migrate the organization’s
term papers and other documents without proper applications to the new database management system.
citation or quotation marks.
Open-Source Code
Partial list of plagiarism detection services and software  Program whose source code is made available for use or
modification, as users or other developers see fit.
Name of Service Website Provider  A considerable amount of open-source code is available,
iThenticate www.ithenticate.com iParadigms and an increasing number of organizations use open
Turnitin www.turnitin.com iParadigms source code.
SafeAssign www.safeassign.com Blackboard  For example, much of the Internet runs on open source
Glatt Plagiarism www.plagiarism.com Glatt Plagiarism code; when you access a web page, send a text, or post a
Services Services status update, you are likely using an open source
program such as Linux, Apache HTTP, PHP, Perl, Python,
 The following list shows some of the actions that schools or Ruby.
can take to combat student plagiarism:
o Help students understand what constitutes  A common use of open source software is to move data
plagiarism and why they need to cite sources from one application to another and to extract,
properly. transform, and load business data into large databases.
o Show students how to document web pages  Two frequently cited reasons for using open source
and materials from online databases. software are that it provides a better solution to a specific
o Schedule major writing assignments so that business problem and that it costs less.
portions are due over the course of the term,  Open-source software is used in applications developed
thus reducing the likelihood that students will for Apple’s iPhone, Android smartphones, and other
get into a time crunch and be tempted to mobile devices.
plagiarize to meet the deadline.
o Make clear to students that instructors are Commonly used open source software
aware of Internet paper mills.
o Ensure that instructors both educate students Open-source web Open-source Open-source
about plagiarism detection services and make browsers database accounting
them aware that they know how to use these management applications
services. systems
o Incorporate detection software and services Chrome MySQL GnuCash
into a comprehensive antiplagiarism program. Firefox PostgreSQL SQL Ledger
Opera SQLite X Tuple PostBooks
Reverse Engineering Chromium MongoDB Compiere
 The process of taking something apart in order to Midori Cubrid Turbo Cash
understand it, build a copy of it, or improve it. QupZilla MariaDB KashFlow
 It was originally applied to computer hardware but is now
commonly applied to software as well.

3
IT0025 - Social and Professional Issues
Reasons that firms or individual developers create open source Trademark Infringement
code, even though they do not receive money for it, include the  A logo, package design, phrase, sound, or word that
following: enables a consumer to differentiate one company’s
 Some people share code to earn respect for solving a products from another’s.
common problem in an elegant way.
 Some people have used open-source code that was Cybersquatting
developed by others and feel the need to pay back by  registered domain names for famous trademarks or
helping other developers. company names to which they had no connection, with
 A firm may be required to develop software as part of an the hope that the trademark’s owner would eventually
agreement to address a client’s problem. buy the domain name for a large sum of money.

Reasons that firms or individual developers create open source


code, even though they do not receive money for it, include the
following:
 If the firm is paid for the employees’ time spent to
develop the software rather than for the software itself.
 A firm may develop open-source code in the hope of
earning software maintenance fees if the end user’s
needs change in the future.
 A firm may develop useful code but may be reluctant to
license and market it, and so might donsate the code to
the general public.

Competitive Intelligence
 Legally obtained information that is gathered to help a
company gain an advantage over its rivals.
 Competitive intelligence is not the same as industrial
espionage, which is the use of illegal means to obtain
business information not available to the general public.

A wide array of software applications, databases, and social media


tools are available for companies—and individuals—looking for
competitive intelligence data, including the following:
 Rapportive is software that can be added to your email
application or web browser to provide you with rich
contact profiles that show you what people look like,
where they are based, and what they do.
 Crunchbase is a free database of technology of over
110,000 companies, people, and investors.
 CORI (http://cori.missouri.edu/pages/ksearch.htm) is an
online database of more than 690,000 contract
documents.
 ThomasNet.com is an excellent source for identifying
suppliers and sources for products.
 WhoGotFunded.com is a comprehensive website of data
about what organizations have received funding and for
what purposes.

4
17/20 ● It is an effort by an employee to
● A trade secret is information, attract attention to a negligent,
generally unknown to the public, illegal, unethical, abusive, or
that a company has taken strong dangerous act by a company
measures to keep confidential. that threatens the public
○ True interest.
○ False ○ Duty of Care
○ Breach of the duty
● Government License ○ Whistle Blowing
substantially improve IT ○ Negligence
workers’ salaries and career
prospects. ● Many people believe that the
○ True licensing and certification of IT
○ False workers would increase the
reliability and effectiveness of
● Client often have special information systems.
information based on their ○ True
expertise or position within the ○ False
offending organization Link:
○ True https://media.lanecc.edu/users/
○ False rossj/LCCWebs/JerryClassPages/
Link: Jerry/CS160New/CourseTechnol
https://www.slideshare.net/mar ogy/0-619-06277-0_02_op.pdf
kjhonoxillo/ethics-for-it-
workers-and-it-users ● Which of the following is not
one of the five key elements of
● The client makes decision about an acceptable use policy (AUP)?
a project on the basis of ○ Purpose of the AUP, why
information, alternatives, and it is needed and what are
recommendations provided by its goals
the IT user. ○ Scope of who and what is
○ True covered under the AUP.
○ False ○ Background and make-
up of the infosec
● Bribery is information, generally organization that
unknown to the public, that a enforces the AUP
company has taken strong ○ Definition of the actions
measures to keep confidential. that will be taken against
○ True an individual who
○ False violates the policy
● Which of the following key ● What does SLAPP stand for?
elements in AUP that actions will ○ strategic law against
be taken against an individual public participation
who violates the policy? ○ strategic lawsuit against
○ Policy public participation
○ Scope ○ strategic lawsuit against
○ Sanctions private participation
○ compliance ○ strategic law against
public participants
● It refers to the obligation to
protect people against any ● Which of these is NOT protected
unreasonable harm or risk. by the First Amendment?
○ Duty of Care ○ A protest march against
○ Professional Malpractice illegal immigration
○ Breach of the duty ○ A threat against
○ Negligence someone
○ A cartoon that makes fun
● A threatening private message of a religion
sent over the Internet to a ○ A text message criticizing
person. a public official
○ Libel
○ Hate Speech ● Freedom of speech is
○ Obscene Speech guaranteed to all U.S. citizens by
○ Slander the ______ Amendment.
○ Third
● It is a written defamatory ○ First
statement. ○ Fourth
○ Libel ○ Second
○ Obscene Speech
○ Slander ● A threatening private message
○ Hate Speech sent over the Internet to a
person.
● A Drexel University survey of ○ Anonymity on the
college students revealed that Internet
64 percent had sent received ○ Hate Speech
sexually explicit text messages ○ John Doe Lawsuits
or images when they were ○ Obscene Speech
under age 18.
○ True
○ False

● Anonymity is even more


important in countries that don’t
allow free speech.
○ True
○ False
● It is the control or suppression ● The term IT Professional refers
of the publishing or accessing of to a person who uses a
information on the Internet. hardware or software product;
○ John Doe Lawsuits the term distinguishes end users
○ Internet Censorship from the IT workers who
○ SLAPP develop, install, service, and
○ Controlling Access to support the product.
Information on the ○ True
Internet ○ False

● A threatening private message ● A gift may be considered a bribe


sent over the Internet to a if it is not declared.
person, what kind of freedom ○ True
expression is? ○ False
○ Hate Speech
○ Anonymity in the ● It refers to the obligation to
Internet protect people against any
○ John Doe Lawsuits unreasonable harm or risk.
○ SLAPP ○ Negligence
________________________________ ○ Duty of care
14/20 ○ Gift
● Gifts come with no expectation ○ Breach of duty
of a future favor for the donor.
○ True ● A(An) states the principles and
○ False core values that are essential to
the work of a particular
● A trade secret is information, occupational group.
generally unknown to the public, ○ Professional Malpractice
that a company taken strong ○ Code of Ethics
measures to keep confidential. ○ Professional code of
○ True ethics and Professional
○ False Malpractice
○ Professional code of
● IT workers can develop good ethics
relationships with employers by
dealing fairly with them and not ● Which of the key elements of
making unreasonable demands. acceptable user policy that
○ True responsible for monitoring
○ False compliance and how will
compliance will be measured?
○ Policy
○ Sanctions
○ Compliance
○ Purpose of the AUP
● It indicates that a professional ○ John Doe Lawsuits
possesses a particular set of ○ SLAPP
skills, knowledge, or abilities.
○ Government License ● Persistent or malicious
○ Negligence harassment aimed at an ethnic,
○ Certification or religious group can be
○ Gift prosecuted as hate speech.
○ True
● Which of the key elements of ○ False
acceptable user policy that
determines who and what is ● Making either an oral or a
covered under the AUP? written statement of alleged fact
○ Sanctions that is false and harms another
○ Scope person is ______ .
○ Purpose of the AUP ○ Defamation
○ Compliance ○ Obscene Speech
○ Hate Speech
● Writers discuss news and ○ Freedom of Expression
editorial content produced by
other journalists and encourage ● These sites attempt to imitate
reader participation. real news sites, often modifying
○ Forum real news stories in such a way
○ Social media Sites as to entice viewers into clicking
○ Blogs on them.
○ Fake news sites ○ Fake news
○ Blogs
○ Forum
● A Drexel University survey of ○ Social media
college students revealed that
64 percent had sent received ● It states their opinion and
sexually explicit text messages supporting facts without
or images when they were presenting the other side of an
under age 18. argument.
○ True ○ Fake news sites
○ False ○ Social media sites
○ Forum
○ Blogs

● Freedom of speech is
guaranteed to all U.S. citizens by
● A threatening private message the ______ Amendment.
sent over the Internet to a ○ Third
person, what kind of freedom ○ First
expression is? ○ Fourth
○ Hate Speech ○ Second
○ Anonymity in the
Internet
● Anonymity is even more ● A group that is responsible for
important in countries that don’t monitoring compliance to the
allow free speech. AUP.
○ True ○ Internet security
○ False ○ Data security
○ Information security
________________________________ ○ Data privacy
_
● The courts decide whether
● Suppliers strive to maintain parties owe a duty of care by
positive relationships with their applying a reasonable person
customers in order to make and standard to evaluate how an
increase sales. objective, careful, and
○ True conscientious person would
○ False have acted in the same
circumstances.
● Bribery are made in secret, as ○ True
they neither legally nor morally ○ False
acceptable.
○ True ● It involves in the collection,
○ False reporting, analysis, and
dissemination of news, opinions,
● IT workers have a relationship and photos.
with clients who may be ○ Forum
affected by their actions. ○ Fake news
○ True ○ Blogs
○ False ○ Social Media

● IT-related certifications may or ● The Supreme Court has ruled


may not include a requirement that the Fourth Amendment also
to adhere to a code of ethics, protects the right to speak
whereas such a requirement is anonymously.
standard with licensing. ○ True
○ True ○ False
○ False
● It involves doing research on the
● It is a document that stipulates INternet to obtain someone’s
restrictions and practices that a private personal information
user must agree to in order to ○ Obscene Speech
use organizational computing ○ Freedom of Expression
and network resources. ○ Defamation
○ Accept use policy ○ Doxing
○ Accept user policy
○ Acceptable use policy ● IT workers have a duty to
○ Accept use policy understand a user’s needs and
capabilities and to deliver
products and services that best
meet those needs - subject, of ● __________ has been defined as
course, to budget and time not doing something that a
constraints. reasonable man would do, or
○ True doing something that a
○ False reasonable man would not do.
○ Breach of Duty
● Client must set an example and ○ Fraud
enforce policies regarding the ○ Duty of Care
ethical used of IT. ○ Negligence
○ True
○ False ● It is a written, broadcast, or
otherwise published words.
● Gifts are made directly from ○ Hate Speech
donor to recipient ○ Slander
○ True ○ Obscene Speech
○ False ○ Libel

● IT workers may have access to ● An aggrieved party can file a


corporate databases of private _________ lawsuit against a
and confidential information defendant whose identity is
about employees, customers, temporarily unknown because
suppliers, new products plans, he or she is communicating
promotions, budgets. anonymously or using a
○ True pseudonym.
○ False ○ CDA
○ Internet of Things
● It is an area in which IT workers ○ John Doe
may be tempted to violate laws ○ SLAPP
and policies.
○ Internet Firewall ● An _________ is software that
○ Trade Secret Laws can be used to block access to
○ Trade Secret certain websites that contain
○ Software Piracy material deemed inappropriate
or offensive.
● A survey by the _____ found ○ Doxing
that one in five men admit to ○ Internet Filter
viewing porn at work, while a ○ SLAPP
separate study found that 30 ○ Upstream
percent of mobile workers are
viewing porn on their web- ● The right to freedom of
enabled phones. expression is restricted when
the expressions, whether spoken
○ Fawset Society or written, are untrue harm to
○ Fauset Society another person.
○ Fawsett Society ○ Libel
○ Fawcett Society ○ Defamation
○ Slander
○ Obscene Speech ○ firewall
○ firmware
● Businesses must monitor and ○ fire alarm
respond to both the public
expression of opinions that ● It defines mandatory functional
might hurt their reputations and requirements for records
the public sharing of confidential management software used
company information. within the Department of
○ Internet Censorship Defense
○ SLAPP ○ Department of Defense’s
○ CDA Development
○ John Doe Lawsuits ○ Department of
Defense’s Design
● Citizen journalists are on the ○ Department of
spot and able to report on Developers Design
breaking news stories before ○ Department of
traditional news reporters. Development’s Design
○ Forum
○ Fake news sites ● It is an oral defamatory
○ Social media sites statement.
○ Blogs ○ Obscene Speech
○ Slander
● Bribes encourage an obligation ○ Libel
for the recipient to act favorably ○ Hate Speech
toward the donor.
○ True ● It is a fast-growing trend that
○ False can lead to many problems for
both senders and receivers.
● IT Workers strive to maintain ○ SLAPP
positive relationships with their ○ Anonymous expression
customers in order to make and ○ Sexting
increase sales. ○ Anonymity
○ True
○ False ● It is the legal term for the act of
harming a person’s reputation
● Gifts are made openly and by telling one or more other
publicly, as a gestures of people something that is untrue
friendship or goodwill. and damaging about that
○ True person.
○ False ○ Defamation
○ Obscene Speech
● A __________ can be configured ○ Slander
to serve as an effective ○ Libel
deterrent to unauthorized web
surfing by blocking access to 15/20
specific objectionable websites. ● Gift is the act of providing
○ filter money, property, or favors to
someone in business or ○ $150,000
government in order to obtain a ● School-sponsored prayer is
business advantage. prohibited in public schools.
○ True That means students can’t pray
○ False (bribery) in school at all, in any way.
● A _________ is hardware or ○ True
software (or a combination of ○ False
both) that serves as the first line ●
of defense between an
organization’s network and the
Internet.
○ negligence 19 / 20
○ firmware ● Gifts are often made indirectly
○ firewall through a third party.
○ compliance ○ True
● Which of the following is not an ○ False (Bribes)
acceptable use policy element? ● Experienced professionals can
○ Policy also serve as mentors and help
○ Computing develop new members of the
○ Scope profession
○ Sanctions ○ True
● Professionals who breach the ○ False
duty of care are liable for ● Readers of online news simply
injuries that their negligence glance at headlines or skim an
causes. article without ever realizing it is
○ Professional code of fake or distorted news.
ethics ○ Social Media sites
○ Negligence ○ Fake news sites
○ Professional Malpractice ○ Blogs
○ Breach of the duty ○ Forum
● This act aimed at protecting ● A ______ is employed by
children from online corporations, governments
pornography. officials, and others against
○ CDA citizens and community groups
○ Internet Censorship who oppose them on matters of
○ Controlling Access to public interest.
Information on the ○ John Doe Lawsuits
Internet ○ CDA
○ SLAPP ○ SLAPP
● The CDA imposed ○ Internet Censorship
______________ fines and ● A threatening private message
prison terms of up to two years sent over the internet to a
for the transmission of indecent person, a public message
material over the Internet. displayed on a website
○ $50,000 describing intent to commit acts
○ $100,000 of hate-motivated violence
○ $250,000 agains specific individuals.
○ Libel ○ Department of Defense’s
○ Hate Speech Development
○ Obscene Speech ○ Department of
○ Slander Developers Design
● It is government-issued ○ Department of
permission to engage in an Development’s Design
activity or to operate a business. ○ Department of
○ Business permit Defense’s Design
○ Certification ● Bribes are made openly and
○ Government License publicly, as a gesture of
○ Policy friendship or goodwill.
● It is responsibilities include ○ True
managing the processes, tools ○ False (Gifts)
and policies necessary to ● IT workers are not recognized as
prevent, detect, document, and professionals because they are
counter threats to digital and not licensed by the state or
nondigital information, whether federal government.
it is in transit, being processed, ○ True
or at rest in storage. ○ False
○ Data security ● It is the expression of opinions
○ Internet privacy by people who do not reveal
○ Information security their identity
○ Data Privacy ○ Doxing
● Persistent or malicious ○ SLAPP
harassment aimed at ethnic, ○ Defamation
racial, or religious group can be ○ Anonymous
prosecuted as hate speech. ● What does CDA stand for?
○ True ○ Communications Deceit
○ False Act
● Indicates a professional ○ Communications Decent
possesses a particular set of Act
skills, knowledge, or abilities in ○ Communications
the opinion of a certifying Decency Act
organization ○ Communicating Deceit
○ Certification Act
○ Professional code of ● _________ cases are based on
ethics serious allegations of
○ Government License wrongdoing, such as libel or
○ Professional malpractice disclosure of confidential
● Company IT managers must information
provide clear rules that govern ○ SLAPP
the use of home computers and ○ Anonymity
associated software. ○ CDA
○ True ○ John Doe Lawsuits
○ False ● DoD is also known as _____
● What does DoD stand for? ○ DoD 5051
○ DoD 5016
○ DoD 5017
○ DoD 5018
● IT workers, who develop, install,
service, and support the product
○ True
○ False
● Persistent or malicious
harassment aimed at a specific
person is __________.
○ Free Speech
○ Hate Speech
○ Obscene Speech
○ Defamation
● Clients may have access to
corporate databases of private
and confidential information
about employees, customers,
suppliers, new products plans,
promotions, budgets.
○ True
○ False
● IT workers have a relationship
with members of society who
may be affected by their actions.
○ True
○ False
● _____ who breach the duty of
care are liable for injuries that
their negligence causes.
○ Professionals

You might also like