Technology and Ethics. 1.3. Course Overview. TestOut IT Fundamentals Pro.
[Audio] Summarize key objectives covered in this section..
[Audio] Review key terms and definitions.. Key Terms.
[Audio] Review key terms and definitions.. Key Terms.
[Audio] Review key terms and definitions.. Key Definitions.
[Audio] Review key terms and definitions.. Key Definitions.
[Audio] Review key terms and definitions.. Key Definitions.
[Audio] Review key terms and definitions.. Key Definitions.
[Audio] Video Title Slide. Technology and Ethics.
[Audio] Example one: A college student decides to humiliate a former friend by posting embarrassing photos on social media..
[Audio] Example two: An IT specialist violates the privacy of a fellow employee by viewing her confidential personnel files..
[Audio] Example three: An engineering team endangers the lives of hospital patients by releasing a software product before it's been thoroughly tested. The team is rewarded with a performance bonus for meeting their product release deadline..
[Audio] Example four: A high school student hacks into her school's academic records database and changes the grades of fellow classmates..
[Audio] Example five: The IT staff at a hospital shares genetic information about specific patients with a life insurance company..
[Audio] In addition to being unethical, some of these unethical actions are also illegal and can have serious consequences both for the victims and the perpetrators. But whether or not specific laws have been passed to discourage unethical actions, it's still our responsibility to treat other people with dignity and respect. Computer ethics require you to do more than simply avoid unlawful acts. They describe personal behaviors that show responsibility and trust, even when no one is watching..
[Audio] 1. The principle of confidentiality means that we protect data and information we're not authorized to share. 2. The principle of human dignity means respecting and honoring the inherent worth and right to privacy of other people. 3. The principle of civility means observing rules of "netiquette" that promote courtesy and respect in online settings. 4. The principle of digital property rights means recognizing and respecting the intellectual property of others, including online data, login information, creative works, and other digital assets..
[Audio] Information technology professionals often develop a code of ethics for themselves and their organizations. Even if you don't become an IT professional, you'll be required to make moral decisions in a variety of situations. Developing a personal code of ethics can help you to identify values, principles, and rules of behavior to keep you, your family, and your colleagues safe..
[Audio] Potential answers may include the following: Why is it important for me to live by a code of ethics? Ethical behavior builds responsibility and trust. It also shows respect for oneself and other human beings. How have I seen technology used for good? How have I seen it misused? Technology can improve healthcare, communication, productivity, and our overall quality of life. On the negative side, technology can be used to violate the privacy, rights, and dignity of other people. To what degree should governments use technology to monitor their citizens? Governments should only monitor citizens when they have legitimate reason to suspect criminal activity. Any other monitoring typically amounts to a violation of privacy, racial profiling, or some other injustice..