SPI: Midterms

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/74

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

75 Terms

1
New cards

Social Issues in IT

Refer to the ways that information technology affects people, communities, and society as a whole̶both positively and negatively.

2
New cards

Professional Issues in IT

Refer to the responsibilities, standards, and ethical behavior expected of individuals working in the field of IT.

3
New cards

Difference between Social and Professional Issues in IT

A. Social Issues = How technology affects people and society.

B. Professional Issues = How IT professionals should act responsibly and ethically in their jobs.

4
New cards

10 Social Issues in IT

1. Data Privacy and Security;

2. Digital Divide;

3. Cyberbullying and Online Harassment;

4. Ethical Use in Technology; 5. Intellectual Property and Piracy;

6. Digital Addiction;

7. Misinformation and Fake News;

8. Social Media and Mental Health;

9. Digital Identity & Authentication (Identity theft);

10. Children's Online Safety.

5
New cards

10 Professional Issues in IT

1. Workload;

2. Talent Shortage & Skill Gaps;

3. Digital Transformation;

4. Hiring Processes;

5. Budget;

6. Leadership Support;

7. Career Growth;

8. Career Path;

9. Tech Hype vs Reality;

10. Continuous Learning / Upskilling.

6
New cards

4 Importance of ethical and responsible behavior in IT

1. It builds trust with clients and stakeholders

2. minimizes harm to society

3. protects privacy and personal data

4. reduces the risk of legal and financial repercussions.

7
New cards

Why study ethics in IT?

Because we build systems that impact lives. Ethics help us make good decisions when there's no easy answer. It provides a framework for thinking, not just feeling.

8
New cards

Six main ethical theories

1. Utilitarianism

2. Deontology

3. Virtue Ethics

4. Rights-Based Ethics

5. Justice & Fairness

6. Ethical Relativism.

9
New cards

Utilitarianism

The theory that the greatest good for the greatest number should be achieved. Focus: Consequences of actions. Example: Releasing software with a minor bug vs delaying it.

10
New cards

Deontology

Follow the rules and duties.

Focus: The action itself, not the outcome. Example: A programmer refuses to write privacy-violating code because it breaches duty.

11
New cards

Virtue Ethics

What would a good person do? Focus: Character of a person. Example: A developer acts with integrity and responsibility by reporting and fixing a security flaw.

12
New cards

Rights-Based Ethics

Everyone has fundamental rights that must be respected.

Focus: Duties to protect rights. Example: A company has a duty to protect a user's right to privacy even if it means less revenue.

13
New cards

Justice and Fairness

It is about fair and equal distribution of benefits and burdens.

Focus: Equality and fairness.

Example: An algorithm that gives loans to one group but not another is unjust.

14
New cards

Ethical Relativism

Morality is based on culture or personal beliefs, not universal rules. Focus: Context determines right and wrong.

Example: Censorship may be justified depending on cultural norms.

15
New cards

7 steps to ethical decision-making

1. State the Problem

2. Gather Facts

3. Identify the Stakeholders

4. List Alternatives

5. Apply the Theories

6. Make & Justify a Decision

7. Monitor the Outcome.

16
New cards

Conclusion about ethical decision-making

There's no single right answer. Ethical frameworks give us a way to think, not just react. Professionals must make responsible choices.

17
New cards

Information Technology

The use of technology to manage information. Systems for storing, processing, and sharing data. Tools that solve problems through digital means.

18
New cards

Life before IT advancement

Communication: letters, telegrams, landlines.

Work: manual processes, typewriters, ledgers.

Education: books, libraries only.

Life: slow information, limited global reach.

19
New cards

3 Theoretical perspectives on technology and society

1. Technological Determinism

2. Social Constructivism

3. Actor-Network Theory.

20
New cards

Technological Determinism

Technology has the power to change society on its own.

21
New cards

Social Constructivism

Technology is a product of human choices and social values. Success depends on social negotiation.

22
New cards

Actor-Network Theory (ANT)

Society is a web of human and non-human relationships. Focuses on the connections between people, tech, and other objects.

23
New cards

4 Social Impacts of IT

1. Communication (instant global contact)

2. Privacy (data security issues)

3. Work-Life Balance (remote work)

4. Education (online learning and digital gaps).

24
New cards

4 Cultural Impacts of IT

1. Cultural Exchange

2. Identity Formation

3. Information Access

4. Preservation of Culture.

25
New cards

4 Economic Impacts of IT

1. Productivity (automation, efficiency)

2. New Business Models (e-commerce)

3. Job Market Changes (tech skills demand)

4. Globalization (international trade).

26
New cards

Digital Divide

The gap between people who have access to technology and the internet and those who do not.

27
New cards

4 Causes of the Digital Divide

1. Poverty

2. Location (urban vs rural)

3. Lack of digital skills

4. Poor infrastructure.

28
New cards

3 Types of Digital Divide

1. Access Divide

2. Skills Divide

3. Usage Divide.

29
New cards

4 Implications of the Digital Divide

1. Education gap

2. Limited job opportunities

3. Economic inequality

4. Social exclusion

30
New cards

Solutions to Combat Digital Divide

1. Affordable internet and devices

2. ICT training programs

3. Better infrastructure

4. Government + private efforts.

31
New cards

Legal Frameworks in IT

System of laws.

32
New cards

Regulatory Frameworks in IT

Rules and guidelines from agencies.

Purpose: Order, fairness, safety, accountability.

33
New cards

4 Main IT-related Laws and Regulations

1. Data Privacy Act (2012)

2. Cybercrime Prevention Act (2012)

3. E-Commerce Act (2000)

4. General Data Protection Regulation (EU)

34
New cards

Data Privacy Act of 2012 (RA 10173)

A Philippine law that safeguards personal information and regulates its collection, storage, use, and sharing by government and private organizations.

35
New cards

8 Data Subject Rights

1. right tot be informed

2. right to damages

3. right to access

4. right to file a complaint

5. right to object

6. right to rectify

7. right to erasure or blocking

8. right to data portability

36
New cards

Penalties for Violating the Data Privacy Act of 2012

Fines from 500,000 to 5,000,000 and prison terms from 1 to 6 years for serious violations.

37
New cards

3 Examples of Data Privacy Act Violations

1. Leaking hospital patient records

2. selling customer contact data

3. mishandling student records leading to exposure.

38
New cards

Cybercrime Prevention Act of 2012

Law against crimes using computers, the internet, and digital devices. Protects data, systems, and users from cyber threats.

39
New cards

3 Main Categories of Cybercrimes

1. Against Data & Systems (hacking, DDoS, malware)

2. Computer-related Offenses (fraud, forgery, identity theft)

3. Content-Related Offenses (cybersex, child pornography, cyber libel).

40
New cards

penalties for cybercrime prevention act of 2012

enforced by cicc under dict, and the violator will faced fines and imprisonment depending on crime

41
New cards

E-Commerce Act of 2000 (RA 8792)

Law that regulates electronic commerce in the Philippines. Recognizes e-documents, e-signatures, and online transactions.

42
New cards

Purposes of the E-Commerce Act

To promote and regulate e-commerce, enhance legal recognition of e-documents, and ensure trust and security in digital platforms.

43
New cards

GDPR (General Data Protection Regulation)

An EU law on data privacy and protection (2018). It gives individuals control over their data and applies globally if handling EU citizens' data.

44
New cards

Key Rules of GDPR

1. Consent required before data use

2. right to access/delete data

3. organizations must secure data

4. heavy fines for violations (€20M or 4% of global revenue).

45
New cards

Intellectual Property Rights

Legal rights protecting creations of the mind; give creators control over use, sharing, and selling.

46
New cards

5 Types of Intellectual Property

1.Copyright

2. Patents

3. Trademarks

4. Trade Secrets

5. Licensing.

47
New cards

5 Common Copyright Issues in IT

1. Software piracy

2. illegal downloads/sharing

3. plagiarism

4. unauthorized use

5. digital distribution without consent.

48
New cards

Data Breach

Unauthorized access to personal or sensitive data (e.g., hacking, leaks, lost databases).

49
New cards

Data Breach Laws Requirements

Organizations must protect data, report breaches (e.g., within 72 hours), inform affected individuals, and face penalties for violations.

50
New cards

Examples of Data Breach Laws

GDPR (EU) and Data Privacy Act of 2012 (Philippines).

51
New cards

Privacy

the rights to control one's personal information and be free from unwarranted intrusion

52
New cards

Data Protection

the mechanisms to enforce and secure that right

53
New cards

confidentiality

is keeping digital information private and accessible only to authorized users

54
New cards

consent (Data Protection Principles)

individuals must give explicit and informed ____ before their data is collected, processed, or shared

55
New cards

Transparency (Data Protection Principles)

individuals must be informed about data collection and processing activities' purpose, scope, and nature.

56
New cards

minimalism (Data Protection Principles)

other term for data minimization

57
New cards

minimalism (Data Protection Principles)

data controllers must collect and retain only the data that is relevant and necessary for the intended purpose

58
New cards

accuracy (Data Protection Principles)

data must be ____, up to date and kept complete to ensure that it is reliable for its intended purpose

59
New cards

security (Data Protection Principles)

data must be appropriately secured against unauthorized access, theft, or loss

60
New cards

retention (Data Protection Principles)

data must be _______ only for as long as necessary and disposed of securely after its _____ period has ended

61
New cards

6 Data Protection Principles

1. consent

2. transparency

3. minimalism

4. accuracy

5. security

6. retention

62
New cards

7 principles of GDPR

1. Lawfulness, fairness and transparency

2. Purpose limitation

3. Data minimization

4. Accuracy

5. Storage limitation

6. Integrity and confidentiality

7. Accountability

63
New cards

Lawfulness, fairness and transparency

process data legally, ethically, and with clear communication

64
New cards

purpose limitation

use data only for specific purpose it was collected

65
New cards

data minimization

collect only the data that is necessary

66
New cards

accuracy

ensure data is correct and up to date

67
New cards

storage limitation

keep data only for as long as needed

68
New cards

integrity and confidentiality

protect data with robust security measures

69
New cards

accountability

take responsibility and document compliance efforts

70
New cards

California Consumer Privacy Act (CCPA)

is a US law that aims to give Californian residents more control over their personal data

71
New cards

4 key rights under CCPA

1. right to know

2. right to delete

3. right to opt out

4. right to non-discrimination

72
New cards

Health Insurance Portability and Accountability Act (HIPAA)

a US law regulating individuals' medical information and protect their privacy rights

73
New cards

5 HIPAA RULES

1. privacy rule

2. security rule

3. breach notification rule

4. omnibus rule

5. enforcement rule

74
New cards

Family Educational Rights and Privacy Act (FERPA)

is a US law regulating students' educational records, which grants parents and students over their educational records

75
New cards

5 best measures & practices to protect data

1. develop a data privacy and security policy

2. implement strong access controls

3. regularly update and patch software

4. employee training and awareness

5. monitor and audit data access