Professional Ethics and Responsibilities

studied byStudied by 0 people
0.0(0)
Get a hint
Hint

Moral Absolutism

1 / 107

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

108 Terms

1

Moral Absolutism

Belief in universal moral laws, like against murder

New cards
2

several precautions can be taken to improve the safety and reliability of computer systems.

  1. Define Clear Objectives

  2. Thorough risk assessments

  3. Learn from incidents

  4. Monitor incidences

  5. Frequent Release cycles

  6. Robust testing methods 

  7. Continuous monitoring

  8. Recovery plan

  9. Training.

New cards
3

Each profession/industry has its code.

  1. Legal - American Bar Association

    1. Confidentiality

    2. Competence

    3. Professional Courtesy

  1. Medical- American Medical Association

    1. Trust

    2. Do no harm

    3. Privacy

  1. Teachers- AAE Advisory Board and Executive Committee of AAE

    1. Ethical conduct towards students 

    2. Ethical conduct towards practices and performance

    3. Ethical conduct towards Colleagues

    4. Ethical conduct towards parents and community

  1. Finance- Fiduciary Duty

    1. Thruthfulness

    2. Objectivity

    3. Integrity

  1. Business

  1. Honesty

  2. Fairness

  3. Leadership

  4. Integrity

  5. Compassion

  6. Respect

  7. Responsibility

  8. Loyalty

  9. Law Abiding

  10. Accountability

  11. Transparency

  12. Environmental Consciousness

 There are several things to include in a professional code of ethics.

  1. The work environment

  2. Conflicts of interest

  3. Company-asset protection

  4. Corruption

  5. Attendance

  6. Absence without notice

  7. Harassment

  8. Cell phone use

  9. Dress Code

New cards
4

The different phases of software engineering are:

  1. Analysis

  2. Requirements

  3. Design

  4. Development

  5. Testing

  6. Implement

New cards
5


Generally, there are three computing codes of Ethics.

  1. ACM Code of Ethics for Computing Professionals

  2. ACM/IEEE-S Software Engineering Code of Ethics

  3. The AMI Code of Professional Conduct.

New cards
6

10 Rules of Computer Ethics

  1. Don’t use a computer to harm someone else.

  2. Don’t interfere with someone else’s computer work.

  3. Don’t browse someone else’s files.

  4. Don’t steal using a computer.

  5. Don’t spread misinformation or give false witness.

  6. Don’t use software illegally (Copyright)

  7. Don’t use other people’s computer resources without permission.

  8. Don’t copy someone else’s intellectual property.

  9. Think about the social consequences of the code you write.

  10.  Use computers in a way that demonstrates consideration and respect.

New cards
7

there are several different types of privacy:

  1. Personally Identifiable Information (PII) (Contact)

  2. Personal Health Information (PHI) (Medical Records)

  3. Personally Identifiable Financial Information (PIFI) (Credit Cards)

  4. Student’s Records (Grades, Transcripts)

New cards
8

there are also different categories of privacy:

  1. Privacy of Person

  2. Privacy of Behaviour and Action

  3. Privacy of Communication

  4. Privacy of Data and Image

  5. Privacy of Thoughts and Feelings

  6. Privacy of Location and Space

  7. Privacy of Association

New cards
9

There are several laws in place for protection and privacy purposes:

  1. Children’s Online Protection Privacy Act (COPPA)

  2. Health Insurance Portability and Accountability Act (HIPPA)

  3. Gram-Leach-Bliley Act (GLBA)

  4. Fair Credit Report Act (FCRA)

  5. Family Education Rights and Privacy Act (FERPA)

  6. Privacy Act of 1974

New cards
10

There are also principles for ethical behavior as well.

  1. Inform people when you collect information.

  2. Collect the Data you only need.

  3. Offer a way for people to opt-out.

  4. Keep data only as long as needed.

  5. Maintain the accuracy of data.

  6. Protect the security of data.

  7. Develop Policies for Responding to law enforcement requests for data.

New cards
11

There are advantages and disadvantages to protecting freedom of speech. Advantages include:

  1. Expression of Truth

  2. Self-governance

  3. Accountability

  4. Social Interaction

  5. Money and Entertainment

  6. Peaceful Change

  7. Free to express oneself.

New cards
12

the disadvantages to free speech include:

  1. Conflict

  2. Misinformation

  3. That does not mean saying whatever

  4. Violence incitement

  5. Mob mentality

  6. Verbal Abuse

New cards
13

Additionally, there are some actions and exceptions that the amendment does not protect, such as:

  1. Pornography

  2. Commercial Speech

  3. Defamation

  4. Fighting words

  5. Violence Incitement 

  6. National Security

  7. Obscenity 

  8. Perjury

  9. Plagiarism

  10.  Blackmail

  11.  Crime Solitication

New cards
14

net neutrality three main components:

  1. No blocking - the internet provider can’t block chosen content.

  2. No throttling - the internet provider can’t throttle legal internet traffic.

  3. No pay-for-reference - the internet provider can’t sell ‘fast lane’ service to those that pay more.

New cards
15

The different types of trade secrets are:

  1. Financial Data

  2. Customer Lists’s

  3. Source Code

  4. Supplier’s List

  5. Pricing Information

New cards
16

 Nevertheless, the rights can be stolen, known as IP theft. There are three types.

  1. Hacking- Cybercriminals are gaining unauthorized access to sensitive information and IP.

  2. Privilege Abuse- The higher the level of access rights, the higher the risk of IP theft.

  3. Human Error- Usually due to carelessness, lack of cybersecurity awareness, and fatigue.

New cards
17

there are 4 ways to help protect IP.

  1. Document discoveries- This can help legitimize ownership.

  2. Use a Digital Rights management system (DRMS)

  3. Strong Nondisclosure Agreements- Any information part of the agreement can’t be disclosed.

  4. Strong Access Credentials- Security Training, Team Separation, and Frequent Password updates.

New cards
18


There are several reasons people Hack, such as:

  1. Money

  2. Corporate Espionage

  3. Political Espionage

  4. Revenge

  5. Notoriety

  6. Spamming

  7. Hacktivism

  8. Vulnerability Testing

New cards
19

Regarding civil violations, they are:

  1. Damage or deletion of computer data

  2. Spam

  3. Computer Trespass

  4. Buying or selling passwords

New cards
20

Criminal acts include:

  1. Obtaining national security information

  2. Access without permission

  3. Victim Defraud

  4. Extortion

New cards
21

The 5 most common types of Identity theft are:

  1. Financial Identity theft- Done for Financial Benefit

  2. Medical Identity theft- Done to gain healthcare services

  3. Synthetic Identity theft- Done to get loans and passports 

  4. Criminal Identity theft- Done to avoid criminal penalties

  5. Child Identity Theft- Done for financial gain

New cards
22

there are 14 different ways to protect oneself from these threats. They are:

  1. Freeze Credit

  2. Two-Factor Authentication

  3. Strong Passwords

  4. Banking apps

  5. Update operating systems

  6. Secure Wifi

  7. Secure physical mail

  8. Destroy confidential documentation

  9. Think before sharing

  10.  Keep personal information personal

  11.  Antivirus software

  12.  Wipe electronics

  13.  Don’t trust default

  14.  Biometrics

New cards
23

some of the negative benefits are:

  1. Communicating and messaging breakdown

  2. Increased Employee stress

  3. Distractions and interruptions

  4. Disconnectedness and lowered workplace satisfaction

  5. Pressure and health issues

New cards
24


Every employee is entitled to 10 specific rights. There is also a lot of legislation enforcing these rights.

  1. Privacy Rights- Personal possessions are considered private

  2. Harassment-free workplace- No form of discrimination for any reason

  3. Safe Workplace- Free from hazards etc.

  4. Whistleblowing- An employee reporting employer violations.

  5. Retaliation Protections

  6. Reasonable Accommodations

  7. Fair Pay

  8. Overtime Wages

  9. Job-Protected Leave

  10.  File a complaint or lawsuit

New cards
25

 employers still have no problem monitoring employees, and there are several ways employees are monitored.

  1. Web Activity

  2. Email

  3. Computer Monitoring

  4. GPS

  5. Phone

  6. Video 

  7. Keylogger

New cards
26

There are benefits to monitoring employees such as:

  1. Productivity

  2. Time theft reduction

  3. Enforcement of Company policy

  4. Software Waste Reduction

  5. Cybersecurity Improvement

there are also downsides to doing this such as:

  1. Destroys Trust

  2. Provides inaccurate information

  3. Sensitive Data

  4. Resource Requirements

  5. Legal Issues

New cards
27

Regarding the legality of monitoring employees, it’s a bit of a gray area. Ultimately, it depends on:

  1. The Laws of the country

  2. Monitoring policies

  3. Whether the employee is informed or not

New cards
28

the best monitoring policies are:

  1. Create a clear monitoring policy

  2. Comply with legal requirements

  3. Notify Employees

  4. Block Undesired Content

  5. Monitoring, not Surveillance

  6. Respect employee privacy

New cards
29

There are three different types of digital divide:

  1. Technology

  2. Internet Access

  3. Digital Literacy

New cards
30

There are a lot of causes/divisions for digital divide, such as:

  1. Infrastructure

  2. Wealth and Income

  3. Social

  4. Gender

  5. Age 

  6. Socioeconomic

  7. Geographic

  8. Racial, Cultural, and Language

  9. Motivation

Due to these several causes, there are several consequences, like:

  1. Lack of Information Access

  2. Educational inequities

  3. Limited Employment Opportunities

  4. Economic Obstacles

  5. Social Isolation

New cards
31

The categories of people affected by the digital divide are schoolchildren, residents, employers/the workforce, and healthcare patients. In addition, statistics show households with a lower average income have less technology adoption. However, there are solutions, such as:

  1. Increase affordability

  2. Empowering Users

  3. Improve Online content relevance

  4. Internet Infrastructure development

  5. Address Internet access gender gap

New cards
32

Another big question is how to verify if information is credible or not. One way is to ask 5 questions:

  1. WHO is the author?

  2. WHAT is the content?

  3. WHERE was it published?

  4. WHEN was it published?

  5. HOW is it presented?

Another way is with the following acronym:

C- Currency- See how up-to-date the information is.

R- Relevance- See how appropriate the information is for the subject of research.

A- Authority- Find the author’s qualifications and credibility.

A- Accuracy- See how correct the information is.

P- Purpose- Look for the reason the information exists.

New cards
33

However, responding to these risks can be challenging. Some obstacles are:

  1. Lack of assigned responsibility and accountability.

  2. Lack of experienced and available experts.

  3. Difficulty in obtaining the necessary data.

  4. Inability to accurately track and manage the scope costs of failure.

New cards
34

Below are a few different examples of system failures.

  1. A- Ariane 5 Disaster (1995)

  2. B- Therac-25 Case (1985-1987)

  3. C- Denver Airport Case (1990)

New cards
35

Additionally, one can tell the type of information based on the URL. Some examples are:

  1. .com - commercial

  2. .edu - education

  3. .gov - government

  4. .org - non-profit, or interest organization

  5. .net - network

New cards
36

technology has tremendously impacted the workplace. Some positive benefits are:

  1. Job Loss

  2. Old Technology

  3. Absenteeism

  4. Bridging the Communication Gap

  5. Accuracy and Efficiency 

  6. Connectivity

  7. Cost Savings

  8. Organization

New cards
37


The Fair Use doctrine is an exception to this act, where there is no problem using copyrighted work without the holder’s permission. These exceptions are

  1. Scholarly works

  2. Criticism

  3. News Reports

  4. Teaching

New cards
38

principles for Data Ethics:

  1. Ownership

  2. Transparency

  3. Privacy 

  4. Intention

  5. Outcomes

New cards
39

Additionally, in the modern age, with the surge of the internet, internet privacy has become a major issue. Some examples are

  1. Identity theft

  2. Mobile Apps and Privacy

  3. Location Tracking

  4. Search Engines User Tracking

  5. Cookies

  6. Social Media Data Mining

  7. Harassment, Cyberbullying, Impersonation

  8. Electronic Surveilance

  9. Spyware

New cards
40

There are several necessities for computer ethics. This is because it can help prevent:

  • Misuse of Information

  • Theft of IP

  • Loss of Jobs

  • Being unethical

New cards
41

Utilitarianism

Theory judging actions based on outcomes

New cards
42

Consequentialism

Theory judging actions by their consequences

New cards
43

Ethical and Psychological Egoism

Psychological egoism says actions are done out of self-interest, whereas Ethical egoism says nearly the same thing, but puts an ethical/moral judgment, to act in one’s self-interest.

New cards
44

Deontology

Theory using rules to distinguish right from wrong

New cards
45

Computer Ethics

Principles governing computer use to prevent misuse

New cards
46

Privacy

Right to be safe from intrusion and control personal information

New cards
47

Personally Identifiable Information (PII)

Contact information that can identify an individual

New cards
48

Personal Health Information (PHI)

Medical records that identify an individual

New cards
49

Personally Identifiable Financial Information (PIFI)

Financial data like credit card information identifying an individual

New cards
50

10 Rules of Computer Ethics

Guidelines including not harming others or stealing using a computer

New cards
51

Freedom of Speech

Right to express ideas without government censorship

New cards
52

1st Amendment

Guarantees freedom of speech, religion, press, assembly, and petition

New cards
53

Advantages of Freedom of Speech

Include expression of truth, self-governance, and social interaction

New cards
54

Disadvantages of Freedom of Speech

Include conflict, misinformation, and violence incitement

New cards
55

Actions not protected by 1st Amendment

Include pornography, defamation, and violence incitement

New cards
56

Net Neutrality

Principle ensuring equal internet access without interference

New cards
57

Intellectual Property (IP)

Legally protected assets like patents, copyrights, and trademarks

New cards
58

Patents

Exclusive rights to inventions for a 20-year duration

New cards
59

Trademark

Symbol or design identifying goods and services

New cards
60

Servicemark

Symbol indicating service differentiation, e.g., SM(SM)

New cards
61

Registered Trademark

Symbol indicating official registration, e.g., ®

New cards
62

Trade Secrets

Confidential information like financial data or source code

New cards
63

Copyright

Legal rights over original works of authorship

New cards
64

Digital Millenium Communications Act (DMCA)

Enacted in 1998 to protect copyright owners' control

New cards
65

Fair Use Doctrine

Exception to DMCA allowing use without permission for scholarly works, criticism, news, or teaching

New cards
66

IP Theft

Stealing intellectual property, including hacking, privilege abuse, and human error

New cards
67

Hacking

Unauthorized access to sensitive information and IP by cybercriminals

New cards
68

Privilege Abuse

IP theft due to higher access rights posing risks

New cards
69

Human Error

IP theft from carelessness, lack of cybersecurity awareness, or fatigue

New cards
70

Ways to Protect IP

Document discoveries, DRMS, Nondisclosure Agreements, Access Credentials

New cards
71

Computer Crime

Using a computer for criminal offenses, like hacking

New cards
72

Hacktivism

Hacking for social or political motives

New cards
73

White Hat Hackers

Ethical security professionals fixing vulnerabilities

New cards
74

Black Hat Hackers

Cybercriminals with malicious hacking intent

New cards
75

Gray Hat Hackers

Hackers breaching systems without malicious intent

New cards
76

Computer Fraud and Abuse Act (CFAA)

Legislation forbidding unauthorized computer access

New cards
77

Identity Theft

Using someone's data for economic gain, e.g., financial or medical identity theft

New cards
78

Phishing

Obtaining personal information through deceptive emails

New cards
79

Vishing

Obtaining personal information through deceptive voicemails

New cards
80

Smishing

Obtaining personal information through deceptive text messages

New cards
81

Pharming

Obtaining personal information through fake websites

New cards
82

DDoS Attack

Overloading a system to disrupt services

New cards
83

Ways to Protect Against Identity Theft

Freeze Credit, Two-Factor Authentication, Strong Passwords, etc.

New cards
84

Digital Divide

Disparities in access to technology and the internet due to factors like infrastructure, wealth, social issues, gender, age, socioeconomic status, geography, race, culture, language, and motivation

New cards
85

Consequences of Digital Divide

Effects include lack of information access, educational disparities, limited job opportunities, economic barriers, and social isolation

New cards
86

Solutions to Digital Divide

Ways to address disparities like increasing affordability, empowering users, improving online content, developing internet infrastructure, and bridging the gender gap in internet access

New cards
87

Neo-Luddism

Philosophy opposing technological advancement, fearing societal threats and potential collapse

New cards
88

Credibility Verification

Methods like checking author, content, publication source, date, presentation, currency, relevance, authority, accuracy, and purpose to assess information trustworthiness

New cards
89

Types of Information Sources

Categorization based on credibility, like government websites, peer-reviewed journals, news sources (high credibility), and blogs, business websites, web forums (lower credibility)

New cards
90

URL Indicators

Different domain extensions indicating website types, such as .com (commercial), .edu (education), .gov (government), .org (non-profit), .net (network)

New cards
91

System Failure

Extended malfunction in computer systems leading to software, data, and information loss, posing significant business risks

New cards
92

Causes of System Failures

Factors like hardware malfunctions (extreme temperatures, power surges) and software issues (poor management, programming errors) leading to system breakdowns

New cards
93

Precautions for System Reliability

Measures to enhance safety and reliability, including clear objectives, risk assessments, learning from incidents, frequent releases, robust testing, monitoring, recovery plans, and training

New cards
94

User Interface Characteristics

Traits of a good interface: simplicity, consistency, efficiency, clarity, and responsiveness

New cards
95

Software Engineering

Development technique for computer systems involving phases like analysis, requirements, design, development, testing, and implementation

New cards
96

Professional Ethics

Guidelines ensuring professionals maintain conduct standards, encompassing integrity, respect, responsibility, competence, and fairness

New cards
97

Code of Ethics vs. Code of Conduct

Distinguishing between general ethics (code of ethics) and specific behavioral guidelines (code of conduct) for professionals in different industries

New cards
98

Types of Codes of Conduct

Differentiating compliance-based (rule-driven) and value-based (morality-driven) codes of conduct in organizations

New cards
99

Professional Code of Ethics Elements

Inclusions like work environment, conflicts of interest, asset protection, corruption, attendance, absence policies, harassment, cell phone use, dress code, substance abuse, tobacco, and internet use

New cards
100

Computing Professionals

Individuals knowledgeable in computer technology, responsible for building and maintaining computer systems, with ethical codes like ACM, ACM/IEEE-S, and AMI

New cards

Explore top notes

note Note
studied byStudied by 10 people
... ago
5.0(1)
note Note
studied byStudied by 12 people
... ago
4.0(1)
note Note
studied byStudied by 5 people
... ago
4.0(1)
note Note
studied byStudied by 18 people
... ago
5.0(1)
note Note
studied byStudied by 13 people
... ago
5.0(1)
note Note
studied byStudied by 10 people
... ago
4.0(1)
note Note
studied byStudied by 23 people
... ago
5.0(1)
note Note
studied byStudied by 40070 people
... ago
4.8(312)

Explore top flashcards

flashcards Flashcard (201)
studied byStudied by 32 people
... ago
5.0(1)
flashcards Flashcard (64)
studied byStudied by 8 people
... ago
5.0(1)
flashcards Flashcard (22)
studied byStudied by 6 people
... ago
4.0(2)
flashcards Flashcard (42)
studied byStudied by 2 people
... ago
5.0(1)
flashcards Flashcard (91)
studied byStudied by 4 people
... ago
5.0(1)
flashcards Flashcard (35)
studied byStudied by 19 people
... ago
5.0(1)
flashcards Flashcard (32)
studied byStudied by 18 people
... ago
4.0(1)
flashcards Flashcard (45)
studied byStudied by 4 people
... ago
5.0(1)
robot