BTM 200 – Notes Chapter 1 (Ethics) PDF

Title BTM 200 – Notes Chapter 1 (Ethics)
Course Business Technology Management
Institution Concordia University
Pages 3
File Size 80.7 KB
File Type PDF
Total Downloads 9
Total Views 142

Summary

These Notes will carry you throughout the first chapter quiz....


Description

BTM 200 – Fundamentals of Information Technology Chapter 1 – Morals and Ethics - “If you have nothing to hide, then you have nothing to worry about. “ o The “nothing to hide” argument is very frequently declared by those who do in fact have certain things to hide. The nothing to hide concept is not at all any threat to privacy unless someone uncovers something that makes the statement faulty. - There are seven types of privacy: o A) Privacy of the person - encompasses the right to keep body functions and body characteristics (such as genetic codes and biometrics) private o B) Privacy of Behaviour and Actions - includes sensitive issues such as sexual preferences and habits, political activities and religious practices; o C) Privacy of Communication - aims to avoid the interception of communications, including mail interception, the use of bugs, directional microphones, telephone or wireless communication interception or recording and access to email messages; o D) Privacy of Data and Image - includes concerns about making sure that individuals’ data is not automatically available to other individuals and organisations and that people can “exercise a substantial degree of control over that data and its use”; o E) Privacy of thoughts and feelings - refers to the right not to share their thoughts or feelings or to have those thoughts or feelings revealed. Individuals should have the right to think whatever they like; o F) Privacy of location and space - means individuals have the right to move about in public or semi-public space without being identified, tracked or monitored; o G) Privacy of association (including group privacy) is concerned with people’s right to associate with whomever they wish, without being monitored. - The term "cloud computing" is the delivery of computing as a service rather than a product, typically over the internet (Storage is stored in something called the “cloud”, a broad term generally used to describe infrastructure that is accessed remotely “i.e. the internet”). - Computer abuse is the act of using a computer in a harmful and unauthorised way (Sharing copywriter posts, using a work

computer for your own personal sake during company time, expose personally identifiable information “PII”, ect.). o Go to website posted in chapter 1 for more examples. - Laws are enforced to establish formal standards that apply to all. They are introduced by official agencies such as the government. o It is impossible to cover every possibility with a law so therefore ethics comes into play as a general guideline to manage the law for people to follow). - Terms for chapter 1: 

Protection – Copyright



No Right/Wrong – Amoral (The lack of awareness or interest in the consequences)



Social Justice – Fair



Blocking – Censorship



Ethics – Morals (Conforming to established ideas of write and wrong)



No Universal Moral Truth – Relativism (Moral principles dictated by cultural tastes)



Happiness – Utilitarianism (Actions are judge solely by consequences. Actions that lead to greater happiness are superior to actions that do not. The greater good is more important than an individual’s happiness)



Refusal – Civil Disobedience



Privacy – Identity Chip



Illegal Activity – Whistleblower (Illegal does not mean unethical, and unethical does not mean illegal)



Divine Command – God is all knowing and he is the one who set the rules that should not be broken.

Unit 2 –

Chapter 4 – Hardware: The CPU and Storage -...


Similar Free PDFs