1/74
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Social Issues in IT
Refer to the ways that information technology affects people, communities, and society as a whole̶both positively and negatively.
Professional Issues in IT
Refer to the responsibilities, standards, and ethical behavior expected of individuals working in the field of IT.
Difference between Social and Professional Issues in IT
A. Social Issues = How technology affects people and society.
B. Professional Issues = How IT professionals should act responsibly and ethically in their jobs.
10 Social Issues in IT
1. Data Privacy and Security;
2. Digital Divide;
3. Cyberbullying and Online Harassment;
4. Ethical Use in Technology; 5. Intellectual Property and Piracy;
6. Digital Addiction;
7. Misinformation and Fake News;
8. Social Media and Mental Health;
9. Digital Identity & Authentication (Identity theft);
10. Children's Online Safety.
10 Professional Issues in IT
1. Workload;
2. Talent Shortage & Skill Gaps;
3. Digital Transformation;
4. Hiring Processes;
5. Budget;
6. Leadership Support;
7. Career Growth;
8. Career Path;
9. Tech Hype vs Reality;
10. Continuous Learning / Upskilling.
4 Importance of ethical and responsible behavior in IT
1. It builds trust with clients and stakeholders
2. minimizes harm to society
3. protects privacy and personal data
4. reduces the risk of legal and financial repercussions.
Why study ethics in IT?
Because we build systems that impact lives. Ethics help us make good decisions when there's no easy answer. It provides a framework for thinking, not just feeling.
Six main ethical theories
1. Utilitarianism
2. Deontology
3. Virtue Ethics
4. Rights-Based Ethics
5. Justice & Fairness
6. Ethical Relativism.
Utilitarianism
The theory that the greatest good for the greatest number should be achieved. Focus: Consequences of actions. Example: Releasing software with a minor bug vs delaying it.
Deontology
Follow the rules and duties.
Focus: The action itself, not the outcome. Example: A programmer refuses to write privacy-violating code because it breaches duty.
Virtue Ethics
What would a good person do? Focus: Character of a person. Example: A developer acts with integrity and responsibility by reporting and fixing a security flaw.
Rights-Based Ethics
Everyone has fundamental rights that must be respected.
Focus: Duties to protect rights. Example: A company has a duty to protect a user's right to privacy even if it means less revenue.
Justice and Fairness
It is about fair and equal distribution of benefits and burdens.
Focus: Equality and fairness.
Example: An algorithm that gives loans to one group but not another is unjust.
Ethical Relativism
Morality is based on culture or personal beliefs, not universal rules. Focus: Context determines right and wrong.
Example: Censorship may be justified depending on cultural norms.
7 steps to ethical decision-making
1. State the Problem
2. Gather Facts
3. Identify the Stakeholders
4. List Alternatives
5. Apply the Theories
6. Make & Justify a Decision
7. Monitor the Outcome.
Conclusion about ethical decision-making
There's no single right answer. Ethical frameworks give us a way to think, not just react. Professionals must make responsible choices.
Information Technology
The use of technology to manage information. Systems for storing, processing, and sharing data. Tools that solve problems through digital means.
Life before IT advancement
Communication: letters, telegrams, landlines.
Work: manual processes, typewriters, ledgers.
Education: books, libraries only.
Life: slow information, limited global reach.
3 Theoretical perspectives on technology and society
1. Technological Determinism
2. Social Constructivism
3. Actor-Network Theory.
Technological Determinism
Technology has the power to change society on its own.
Social Constructivism
Technology is a product of human choices and social values. Success depends on social negotiation.
Actor-Network Theory (ANT)
Society is a web of human and non-human relationships. Focuses on the connections between people, tech, and other objects.
4 Social Impacts of IT
1. Communication (instant global contact)
2. Privacy (data security issues)
3. Work-Life Balance (remote work)
4. Education (online learning and digital gaps).
4 Cultural Impacts of IT
1. Cultural Exchange
2. Identity Formation
3. Information Access
4. Preservation of Culture.
4 Economic Impacts of IT
1. Productivity (automation, efficiency)
2. New Business Models (e-commerce)
3. Job Market Changes (tech skills demand)
4. Globalization (international trade).
Digital Divide
The gap between people who have access to technology and the internet and those who do not.
4 Causes of the Digital Divide
1. Poverty
2. Location (urban vs rural)
3. Lack of digital skills
4. Poor infrastructure.
3 Types of Digital Divide
1. Access Divide
2. Skills Divide
3. Usage Divide.
4 Implications of the Digital Divide
1. Education gap
2. Limited job opportunities
3. Economic inequality
4. Social exclusion
Solutions to Combat Digital Divide
1. Affordable internet and devices
2. ICT training programs
3. Better infrastructure
4. Government + private efforts.
Legal Frameworks in IT
System of laws.
Regulatory Frameworks in IT
Rules and guidelines from agencies.
Purpose: Order, fairness, safety, accountability.
4 Main IT-related Laws and Regulations
1. Data Privacy Act (2012)
2. Cybercrime Prevention Act (2012)
3. E-Commerce Act (2000)
4. General Data Protection Regulation (EU)
Data Privacy Act of 2012 (RA 10173)
A Philippine law that safeguards personal information and regulates its collection, storage, use, and sharing by government and private organizations.
8 Data Subject Rights
1. right tot be informed
2. right to damages
3. right to access
4. right to file a complaint
5. right to object
6. right to rectify
7. right to erasure or blocking
8. right to data portability
Penalties for Violating the Data Privacy Act of 2012
Fines from 500,000 to 5,000,000 and prison terms from 1 to 6 years for serious violations.
3 Examples of Data Privacy Act Violations
1. Leaking hospital patient records
2. selling customer contact data
3. mishandling student records leading to exposure.
Cybercrime Prevention Act of 2012
Law against crimes using computers, the internet, and digital devices. Protects data, systems, and users from cyber threats.
3 Main Categories of Cybercrimes
1. Against Data & Systems (hacking, DDoS, malware)
2. Computer-related Offenses (fraud, forgery, identity theft)
3. Content-Related Offenses (cybersex, child pornography, cyber libel).
penalties for cybercrime prevention act of 2012
enforced by cicc under dict, and the violator will faced fines and imprisonment depending on crime
E-Commerce Act of 2000 (RA 8792)
Law that regulates electronic commerce in the Philippines. Recognizes e-documents, e-signatures, and online transactions.
Purposes of the E-Commerce Act
To promote and regulate e-commerce, enhance legal recognition of e-documents, and ensure trust and security in digital platforms.
GDPR (General Data Protection Regulation)
An EU law on data privacy and protection (2018). It gives individuals control over their data and applies globally if handling EU citizens' data.
Key Rules of GDPR
1. Consent required before data use
2. right to access/delete data
3. organizations must secure data
4. heavy fines for violations (€20M or 4% of global revenue).
Intellectual Property Rights
Legal rights protecting creations of the mind; give creators control over use, sharing, and selling.
5 Types of Intellectual Property
1.Copyright
2. Patents
3. Trademarks
4. Trade Secrets
5. Licensing.
5 Common Copyright Issues in IT
1. Software piracy
2. illegal downloads/sharing
3. plagiarism
4. unauthorized use
5. digital distribution without consent.
Data Breach
Unauthorized access to personal or sensitive data (e.g., hacking, leaks, lost databases).
Data Breach Laws Requirements
Organizations must protect data, report breaches (e.g., within 72 hours), inform affected individuals, and face penalties for violations.
Examples of Data Breach Laws
GDPR (EU) and Data Privacy Act of 2012 (Philippines).
Privacy
the rights to control one's personal information and be free from unwarranted intrusion
Data Protection
the mechanisms to enforce and secure that right
confidentiality
is keeping digital information private and accessible only to authorized users
consent (Data Protection Principles)
individuals must give explicit and informed ____ before their data is collected, processed, or shared
Transparency (Data Protection Principles)
individuals must be informed about data collection and processing activities' purpose, scope, and nature.
minimalism (Data Protection Principles)
other term for data minimization
minimalism (Data Protection Principles)
data controllers must collect and retain only the data that is relevant and necessary for the intended purpose
accuracy (Data Protection Principles)
data must be ____, up to date and kept complete to ensure that it is reliable for its intended purpose
security (Data Protection Principles)
data must be appropriately secured against unauthorized access, theft, or loss
retention (Data Protection Principles)
data must be _______ only for as long as necessary and disposed of securely after its _____ period has ended
6 Data Protection Principles
1. consent
2. transparency
3. minimalism
4. accuracy
5. security
6. retention
7 principles of GDPR
1. Lawfulness, fairness and transparency
2. Purpose limitation
3. Data minimization
4. Accuracy
5. Storage limitation
6. Integrity and confidentiality
7. Accountability
Lawfulness, fairness and transparency
process data legally, ethically, and with clear communication
purpose limitation
use data only for specific purpose it was collected
data minimization
collect only the data that is necessary
accuracy
ensure data is correct and up to date
storage limitation
keep data only for as long as needed
integrity and confidentiality
protect data with robust security measures
accountability
take responsibility and document compliance efforts
California Consumer Privacy Act (CCPA)
is a US law that aims to give Californian residents more control over their personal data
4 key rights under CCPA
1. right to know
2. right to delete
3. right to opt out
4. right to non-discrimination
Health Insurance Portability and Accountability Act (HIPAA)
a US law regulating individuals' medical information and protect their privacy rights
5 HIPAA RULES
1. privacy rule
2. security rule
3. breach notification rule
4. omnibus rule
5. enforcement rule
Family Educational Rights and Privacy Act (FERPA)
is a US law regulating students' educational records, which grants parents and students over their educational records
5 best measures & practices to protect data
1. develop a data privacy and security policy
2. implement strong access controls
3. regularly update and patch software
4. employee training and awareness
5. monitor and audit data access