lo1 This issue concerning whether morality exists independently of humans -metaphysical issues
This involves arriving at moral standards that regulate right and wrong conduct. In a sense, it is a search for an ideal litmus test of proper behavior -Normative Ethics
Known as moral philosophy, seeks to address questions of morality: right vs. wrong, good vs. bad, etc. -ethics
Principle of honesty means does not deceive others. -true
It is the study of the origin and meaning of ethical concepts -Metaethics
Principle of autonomy means acknowledge a person's freedom over his/her actions or physical body. -true
Three strategies of Normative Ethics are:-Virtue Theories,Nonconsequentialist ,Consequentialist Theories
This issue concerning the underlying mental basis of our moral judgments and conduct -psychological issues
It can be defined as broad preferences concerning appropriate courses of action or outcomes
-values
This is an evaluation of an attitude object, ranging from extremely negative to extremely positive -attitude
lo2 Orientation that requires that employees identify with and commit to specified conduct. -Compliance orientation
These are often established by professional organizations to help guide in performing their job functions according to sound and consistent ethical principles. -Professional Ethics
In what year did IEEE Code of Ethics adopted by the American Institute of Electrical Engineers (AIEE)? -1921
In what year did Board of Directors approved “IEEE Code of Ethics for Engineers”? -1974
Corporate or business ethics with most comprehensive document and it consists of general statements that serve as principles and the basis for the rules of conduct. -Codes of ethics
Software engineers shall ensure that their __________ and related modifications meet the highest professional standards possible. -Product
Software engineers shall act in a manner that is in the best interests of their _________ consistent with the public interest.
-Client and Employer
Software engineers shall act consistently with the __________ interest. -public
Represents employee ethics with formal statements that describe what an organization expects of its employees. -Codes of conduct -
Serves the general public and addresses stakeholder interests. -Statement of values
These are formal statements of what an organization expects in the way of ethical behavior. -Code of Ethics
In what year did Board of Directors approved revision to the IEEE Code of Ethics? -2006
Software engineers shall maintain integrity and independence in their professional __________. -Judgment May be centralized (perhaps temporarily) so that top level managers can ensure that ethical decisions are made. -decentralized organization
Orientation that focuses more on an abstract core of ideals such as respect and responsibility. -Values Orientation
In what year did IEEE endorsed “Canons of Ethics of Engineers” after AIEE/IRE merger?
-1963
May be decentralized (perhaps temporarily) so that top level managers can ensure that ethical decisions are made. -decentralized organization
Software engineering managers and leaders shall subscribe to and promote an ethical approach to the management of software development and maintenance. -Management
It is a program that create firm's ethical climate and helps ensure that all employees understand the organization's values and comply with the policies and codes of conduct. -Ethical Programs
In what year did Board of Directors approved simplified IEEE Code of Ethics? -1974
lo3 Some common issues of computer ethics include intellectual property rights such as copyrighted electronic content, privacy concerns, and how computers affect society. -True
It is sending unsolicited bulk and/or commercial messages over the Internet. -Spamming It is a legal concept, enacted by most governments, giving the creator of original work exclusive rights to it, usually for a limited time. -Copyright
It is concerned with standards of conduct as they pertain to computers. It deals with how computing professionals should make decisions regarding professional and social conduct.
-Computer ethics
Branch of intellectual property which includes literary and artistic works such as novels, poems and plays, films, musical works, artistic works such as drawings, paintings, photographs, sculptures, and architectural designs. -Copyright
While it may be possible to access someone's personal information on a computer system, computer ethics would advise that such an action is ethical. -False
It is usually divided into two branches, namely industrial property which broadly speaking protects inventions and copyright, which protects literary and artistic works. -Intellectual property
Ethics, in the classical sense, refers to the rules and standards governing the conduct of an individual with others. -True
Any computer document produced either by an individual in his private home or in his office should remain private. -File Privacy
He was concerned by the unregulated copying of books and ed the Licensing of the Press Act 1662 by Act of Parliament. - Charles II of England
Branch of intellectual property which includes inventions (patents), trademarks, industrial designs, commercial names, designations and geographic indications (location specific brands) etc. -Industrial property
It is about proper ways in which to use a network and to determine whether information is reliable, while emphasizing four important points given in next slides. -Netiquette
It is morally bad when someone reproduces a copy of the software and sells it for profit, produces exactly the same or similar version without giving proper credit to the original author, or simply produces it and distributes it to others. -Software piracy
As technology and computers became more and more a part of our everyday lives, and since the introduction of the World Wide Web, the definition of ethics has evolved, too. A new type of ethics known as computer ethics has emerged. -False
It is morally bad when it is intended for malicious purposes like to steal information or destroying of data. -Creation of worms and computer viruses
lo4 It is the ability to responsible, creatively, and effectively use appropriate technology to improve and enhance learning in all subject areas and experiences. -Technology Literacy
It is a phrase used to describe the use of Internet based attacks in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses. -Cyber Terrorism
It refers to the gap between those that have (or lack) access to computers and the Internet. -Digital Divide This is altering raw data just before a computer processes it and then changing it back after the processing is completed.
-Data Diddling
It focuses on how information and communication technology (ICT) affects individuals, communities and countries. - Digital inclusion
The computer is flooded with more requests than it can handle which cause it to crash. __________ attack is an example. -Denial of Service
It is an unlawful act wherein the computer is either a tool or a target or both. - Cybercrime
It refers to the receipt of unsolicited emails by customers of Financial Institutions, requesting them to enter their name, or other personal information to access their for some reasons. - Phishing
These are programs that attach themselves to a computer or a file and then circulate themselves to other files and to other computers on a network. -Viruses
Unauthorized access to any computer systems or networks is known as __________. That is accessing the information of others without proper authorization. -Hacking
It is the use of electronic messaging systems to send unsolicited bulk messages, especially advertising, indiscriminately. -Spamming
In these kinds of offences the hacker gains access and control over the website of another. He may even manipulate or change the information of the website. This may be done for fulfilling political objectives or for money.
-Web Jacking
It refers to sending large numbers of mail to the victim, which may be an individual or a company by ultimately resulting into crashing. - Email Bombing They do not need the host to attach themselves to. They merely make functional copies of themselves and do this repeatedly till they eat up all the available space on the computer’s memory. -Worms
In software field this means an unauthorized program, which ively gains control over another’s computer by representing itself as an authorized program. -Trojan Attacks Jeremy Bentham’s advice on pursuing pleasure is called _________.
-calculus He believed no one would knowingly operate against their best interests, and those that did were clearly ignorant of what their best interests were. -plato It includes things such as decorative clothing, exotic foods, etc. -vain desire Theory asserts that the empirical consequences of any given act have nothing to do with the moral worth of the act. -consequentialism It is a theory of moral philosophy that is based on the principle that an action is morally right if it produces a greater quantity of good or happiness than any other possible action. -utilitarianism He sought to rewrite utilitarianism in such a way that he would be able to demonstrate that Shakespeare outranked push-pins. -john stuart mil It says that no act is good or bad in and of itself; rather it is good or bad only in of its consequences. -consequentialism It breaks down even further into two subcategories: necessary (food, sleep, etc.) and unnecessary (sexual desires, etc.)
-natural desire It argues that every act is motivated by self-interest. Humanity doesn’t have a choice – we simply operate this way. – Psycho He is concerned that a utilitarian might actually conclude that a game of push-pin really was better than poetry. -john stuart mil He claimed that no act should be undertaken except for the pleasure which results, and no act should be rejected but for the pain it produces. -epicurus It argues that every act ought to be motivated by self-interest. It concludes that acting in self-interest is the best motivator. -psychological He is the father of utilitarianism. -jeremy He is a psychological egoist – believing that egoism is merely a biological fact. -thomas Lo5 This is altering raw data just before a computer processes it and then changing it back after the processing is completed. -data diddling It is the use of electronic messaging systems to send unsolicited bulk messages, especially advertising, indiscriminately. -spamming It is an unlawful act wherein the computer is either a tool or a target or both. -cybercrime It refers to sending large numbers of mail to the victim, which may be an individual or a company by ultimately resulting into crashing. -email bombing
These are programs that attach themselves to a computer or a file and then circulate themselves to other files and to other computers on a network. -Viruses It is the ability to responsible, creatively, and effectively use appropriate technology to improve and enhance learning in all subject areas and experiences.
-technology letiracy It focuses on how information and communication technology (ICT) affects individuals, communities and countries. – social It refers to the gap between those that have (or lack) access to computers and the Internet. -digital divide