Debates about ethical or practical conduct that form the foundation of good professional practice
Professional Issues in Computing
Encompass a wide range of ethical, legal, social, and technical concerns that arise within the field of computing
Professional Issues
Requires a combination of technical expertise, ethical awareness, and a commitment to ongoing learning and professional development
Technology
The combination of human knowledge and tools that create solutions that make our lives better and make us more productive
Positive Impact of Technology
Improved communication
Access to information
Medical Advancements
Negative Impacts of Technology
Job loss
Cyberbullying
Technology Addiction
Privacy
Freedom from intrusion, control of information about oneself, free from surveillance
Freedom from Intrusion
The right to privacy, the right to be left alone, not to invasion of privacy, the right of a party to maintain control over and confidentiality of information about itself
Control of Information about Oneself
The right to have some control over how your personal information is collected and used
Free from Surveillance
The right to be free from undue surveillance by government or anyone else
Privacy Risks
Unintentional uses of personal information
Unauthorized use or release by insiders
Theft of Information
Leakage of information
CIA Triad
Confidentiality, Integrity, Availability - the basis for the development of security systems
Confidentiality
Protection of data to unauthorized personnel and only authorized can access information or data
Integrity
The assurance that the information is trustworthy and accurate
Availability
The guarantee of reliable access to information
Protecting Privacy
Data Privacy
Data Security
Data Protection
Data Privacy
Compliance with data protection laws and regulations. Focus on how to collect, process, share, archive, and delete the data
Data Privacy
The rights of individual with respect to their personal information, General Data Protection Regulation, Data Privacy Act of 2012 RA 10173
Data Security
Measures that an organization is taking in order to prevent any third party from unauthorized access
Data Security
Ensures the integrity of the data, Multi factor authentication, Network security
Data Protection
The combination of data security and privacy
Data Protection
Data protection principles
Freedom of Speech
Right to speak write and share ideas and opinions without facing punishment from the government
John Stuart Mill: '"Free to speech is the freedom to express an opinion and he understands speech as an action to seek knowledge"'
Changing Communicating Paradigms
Regulatory paradigms, Print Media, Broadcast Media, Common Carriers, Consider new technologies of the past 20 years
Regulatory Paradigms
Communication technologies differ with respect to constitutional protections but also with respect to government regulation
Has protections but government controls structure of industry content like content regulations restriction of some words
Broadcast Media
GMA, TV 5, Kapamilya Channel
Common Carriers
Content not controlled and carrier not responsible for content
New Technologies of the Past 20 Years
Websites
Bulletin-Board Systems (BBS)
Social Media Platform
Article 3 of the 1987 Constitution provides that no law shall be passed abridging the freedom of speech, expression or the press
Section 5 of the 1987 Constitution states that no law shall be made respecting an establishment of religion or prohibiting the free exercise thereof
Constitutional Protections
Freedom of conscience and religion
Freedom of thought belief and opinion and expression including the press and other media communication
Freedom of peaceful assembly
Freedom of association
Offensive Speech
Political or religious speech, Pornography, Gender Bias, Racial slurs, Libellous statements, Alcohol advertisements, Gender identity / orientation, Serious disease, Describing group members as animals
For the purpose of this Act any publication a dominant characteristic of which is the undue exploitation of the following subjects namely crime horror cruelty and violence is cyberspace (Internet)
Anonymity and Identity Shielding
Allows users to hide or disguise their identifying information online. While this protects their privacy, it can make it difficult to hold them responsible for what they say and do online.
Limit or control how personal data is collected and stored, as well as who can access and use it. Identity shielding is to protect users from unwanted contact.