Professional Issues

Subdecks (1)

Cards (90)

  • Professional Issues
    Debates about ethical or practical conduct that form the foundation of good professional practice
  • Professional Issues in Computing
    Encompass a wide range of ethical, legal, social, and technical concerns that arise within the field of computing
  • Professional Issues
    • Requires a combination of technical expertise, ethical awareness, and a commitment to ongoing learning and professional development
  • Technology
    The combination of human knowledge and tools that create solutions that make our lives better and make us more productive
  • Positive Impact of Technology

    • Improved communication
    • Access to information
    • Medical Advancements
  • Negative Impacts of Technology
    • Job loss
    • Cyberbullying
    • Technology Addiction
  • Privacy
    Freedom from intrusion, control of information about oneself, free from surveillance
  • Freedom from Intrusion
    The right to privacy, the right to be left alone, not to invasion of privacy, the right of a party to maintain control over and confidentiality of information about itself
  • Control of Information about Oneself

    The right to have some control over how your personal information is collected and used
  • Free from Surveillance
    The right to be free from undue surveillance by government or anyone else
  • Privacy Risks
    • Unintentional uses of personal information
    • Unauthorized use or release by insiders
    • Theft of Information
    • Leakage of information
  • CIA Triad
    Confidentiality, Integrity, Availability - the basis for the development of security systems
  • Confidentiality
    Protection of data to unauthorized personnel and only authorized can access information or data
  • Integrity
    The assurance that the information is trustworthy and accurate
  • Availability
    The guarantee of reliable access to information
  • Protecting Privacy
    • Data Privacy
    • Data Security
    • Data Protection
  • Data Privacy
    Compliance with data protection laws and regulations. Focus on how to collect, process, share, archive, and delete the data
  • Data Privacy
    • The rights of individual with respect to their personal information, General Data Protection Regulation, Data Privacy Act of 2012 RA 10173
  • Data Security
    Measures that an organization is taking in order to prevent any third party from unauthorized access
  • Data Security
    • Ensures the integrity of the data, Multi factor authentication, Network security
  • Data Protection
    The combination of data security and privacy
  • Data Protection
    • Data protection principles
  • Freedom of Speech
    Right to speak write and share ideas and opinions without facing punishment from the government
  • John Stuart Mill: '"Free to speech is the freedom to express an opinion and he understands speech as an action to seek knowledge"'
  • Changing Communicating Paradigms
    Regulatory paradigms, Print Media, Broadcast Media, Common Carriers, Consider new technologies of the past 20 years
  • Regulatory Paradigms
    Communication technologies differ with respect to constitutional protections but also with respect to government regulation
  • Print Media
    • Newspapers (Philippine Daily Inquirer, Manila Bulletin, SunStar, Manila Times)
    • Magazines (Top gear Ph, YES!, FHM)
  • Broadcast Media
    Has protections but government controls structure of industry content like content regulations restriction of some words
  • Broadcast Media

    • GMA, TV 5, Kapamilya Channel
  • Common Carriers

    Content not controlled and carrier not responsible for content
  • New Technologies of the Past 20 Years

    • Websites
    • Bulletin-Board Systems (BBS)
    • Social Media Platform
  • Article 3 of the 1987 Constitution provides that no law shall be passed abridging the freedom of speech, expression or the press
  • Section 5 of the 1987 Constitution states that no law shall be made respecting an establishment of religion or prohibiting the free exercise thereof
  • Constitutional Protections
    • Freedom of conscience and religion
    • Freedom of thought belief and opinion and expression including the press and other media communication
    • Freedom of peaceful assembly
    • Freedom of association
  • Offensive Speech
    Political or religious speech, Pornography, Gender Bias, Racial slurs, Libellous statements, Alcohol advertisements, Gender identity / orientation, Serious disease, Describing group members as animals
  • For the purpose of this Act any publication a dominant characteristic of which is the undue exploitation of the following subjects namely crime horror cruelty and violence is cyberspace (Internet)
  • Anonymity and Identity Shielding
    Allows users to hide or disguise their identifying information online. While this protects their privacy, it can make it difficult to hold them responsible for what they say and do online.
  • Types of Anonymity
    • Total Anonymity
    • Partial Anonymity
  • Technical Approaches to Anonymity
    Virtual Private Networks, Pseudonym or alias, Virtual representation (an avatar), Fake profile
  • Positive Use Cases of Anonymity
    Limit or control how personal data is collected and stored, as well as who can access and use it. Identity shielding is to protect users from unwanted contact.