Professional Documents
Culture Documents
A. Definition
B. Common Cyber Ethical Issues
A. Definition
Cyber Literacy means the ability to use computer technologies effectively and to
simultaneously understand the implications of those actions. It is also important to know where
to go to find reliable and accurate resources in cyberspace, otherwise known as cyber
intelligence. The word understanding is key here, as it goes beyond knowing how to use the
technology but to have a consciousness of one’s actions.
Media Literacy is the ability to identify different types of media and understand the messages
they are communicating, including who is the intended audience and what is the motivation
behind the message.
Information Literacy is a subset of media literacy; the ability to locate, access and evaluate
information from a variety of media sources.
Digital Literacy can be defined as the ability to locate, evaluate , create , and communicate
information on various digital forms.
Bawden (2008) collated the skills and competencies comprising digital literacy from
contemporary scholars on the matter into four groups:
1. underpinnings-this refers to those skills and competencies that support or enable
everything else within digital literacy, namely: traditional literacy and computer literacy
2. background knowledge –this largely refers to knowing where information on a particular
subject or topic can be found, how information is kept, and it is disseminated- a skill taken for
granted back in the day when information almost exclusively resided in the form of printed text.
3. central competencies-these are the skills and competencies that a majority of scholars
agree on a s being core to digital literacy today, namely:
e) Liability
Programmers or retailers possess the right to define express warranties. Thus, they have
to be realistic when they state any claims and predictions about the capabilities, quality
and nature of their software or hardware. They should consider the legal aspects of their
affirmative promises, their product demonstrations, and their product description. Every
word they say may be as legally effective as though stated in writing. Thus, to protect
against liability, all agreements should be in writing. A disclaimer of express warranties
can free a supplier from being held responsible for any informal, hypothetical statements
or predictions made during the negotiation stages.
f) Patent and Copyright Law
A patent can protect the unique and secret aspect of an idea. It is very difficult to obtain a
patent compared to a copyright. With computer software, complete disclosure is required;
the patent holder must disclose the complete details of a program to allow a skilled
programmer to build the program. Moreover, a United States software patent will be
unenforceable in most other countries.
g) Trade Secrets
A trade secret protects something of value and usefulness. This law protects the unique
and secret aspects of ideas, known only to the discoverer or his confidants. Once
disclosed the trade secret is lost as such and can only be protected under one of the
following laws. The application of trade secret law is very important in the computer
field, where even a slight head start in the development of software or hardware can
provide a significant competitive advantage.
h) Sabotage
The computer can be the object of attack in computer crimes such as the unauthorized use
of computer facilities, alternation or destruction of information, data file sabotage and
vandalism.
Evaluate
Based from your reading, answer the following questions.
Engage
2. Were you able to understand the video in just one view? Why or why not?
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________
__________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________