Professional Documents
Culture Documents
SESSION 2 MANAGEMENT
ETHICAL CONSIDERATION IN LEADERSHIP - MANAGERS are people who do
AND MANAGEMENT things RIGHT.
- Management is about controlling
MANAGEMENT complexity in an effort to bring
- Process of coordinating actions and order and consistency.
allocating resources to achieve
organizational goals. MORAL DECISION
- Without breaks - Ability to produce a reasonable and
- On the go defensible answer to an ethical
- Art of getting things done through question.
PEOPLE. - Choice made based on a person’s
1. Have an assigned position (in an ethics, manners, character and what
organization). they believe is proper behavior.
2. Have legitimate source of power
DECISIONS good standing with their peers by
- Tend to not only affect one’s well- following the rules determined by
being, but also the well-being of the group. This leads to competition
others. for power and influence among peer
groups.
JAMES REST (REST AND NARVAEZ 1994)
4. LAW AND ORDER STAGES
MORAL SENSITIVITY - What is moral is defined by the laws
- The ability to interpret a situation in that the majority makes (which
moral and ethical terms. essentially control the competing
interests of the peer groups). There
MORAL JUDGMENT is little recognition that the rights of
- The ability to determine a course of any minority can be overlooked by
action in the context of what is just. the majority.
5. THOU SHALT NOT USE COMPUTER 9. THOU SHALT THINK ABOUT THE
TO BEAR FALSE WITNESS SOCIAL CONSEQUENCES OF THE
- Do not contribute to the spread of PROGRAM YOU WRITE OR THE
misinformation using computer SYSTEM YOU DESIGN
technology - Before developing a software, think
- Spread of information has become about the social impact it can have.
viral today, because of the internet. - It is the programmers’ responsibility
- This also means that false news or to understand his target
rumors can spread speedily through audience/user and the effect it may
social networking sites or emails. have on them.
Being involved in the circulation of
incorrect information is unethical. 10. THOU SHALT USE A COMPUTER IN
WAYS THAT SHOW
6. THOU SHALT NOT COPY OR USE CONSIDERATIONA AND RESPECT
PROPRIETARY SOFTWARE FOR - In using computers for
WHICH YOU HAVE NOT PAID communication, be respectful and
- Refrain from copying software or courteous with the fellow members.
buying pirated copies. Pay for - The communication etiquette we
software unless it is free. follow in the real world applies to
- Like any other artistic or literary communication.
work, software is copyrighted.
7. THOU SHALT NOT USE OTHER WHAT IS COMPUTER VIRUS?
PEOPLE’S COMPUTER RESOURCES - Small software program that are
WITHOUT AUTHORIZATION OR designed to spread from one
PROPER COMPENSATION computer to another and to
interfere with computer operation.
- It is a specific form of fraud in which
SPREAD OF VIRUS cybercriminals steal personal data,
- Viruses are most easily spread including passwords, data about the
through bank accounts, credit cards, debit
E-mail attachments cards, social security, and other
Instant messaging messages sensitive information.
Funny images - Through information theft, criminals
Audio and videos files can steal money.
Downloading files from internet
Greeting cards 3. E-MAIL BOMBING
- Also known as “spamming.”
STEPS TO HELP AVOID VIRUSES - It uses electronic messaging
- Use an internet firewall systems, most commonly emails in
- Subscribe to industry standard sending messages that hos malware,
antivirus software fake links of websites and other
- Never open an e-mail attachment malicious programs.
from someone you don’t know - Unsolicited bulk messages from
- Scan each and every attachment unfamiliar organizations, companies,
- Rules to be followed, while surfing and groups are sent to large
net numbers of users.
- It offers deals, promos, and other
COMPUTER CRIME attractive components to deceive
- IT infrastructure others.
- Illegal access
- Illegal interruption 4. PHISHING
- Data interference - A technique of extracting
- System interference confidential information such as
- Misuse of devices credit card numbers and username
- Electronic fraud password combos by masquerading
as a legitimate enterprise.
DIFFERENT TYPES OF CYBER CRIME - They use “email spoofing” to extract
1. HACKING confidential information such as
- An act committed by an intruder by credit card numbers, social security
accessing your computer system number, passwords, etc.
without your permission.
- Hacking involves the partial or 5. REQUEST RANSOM / VIRUS
complete acquisition of certain DISSEMINATION
functions within a system, network, - Ransomware is one of the most
or website. It also aims to access to destructive malware-based attacks
important data and information - Viruses are computer programs that
breaching privacy. attach themselves to or infect a
2. INFORMATION THEFT system or files, and have a tendency
to circulate to other computers on a
network.
OTHER COMMON CYBER CRIMES SECURITY IN THE DIGITAL WORLD
1. Child pornography - Keep your information secure.
2. Cyberbullying - Put the necessary controls on your
3. Software piracy home network to protect your
family from cybercrime.
TYPES OF COMPUTER CRIMINALS - Prevent identity theft when
1. INSIDERS shopping online or using contactless
Trusted employees accidentally payment
misplacing information - Keep your children safe when using
Careless employees remiss of the internet.
policies and procedures
Disgruntled employees or ex- ETHICAL DILEMMAS
employees intent on damaging 1. Privacy
your business. 2. Information accuracy
Malicious insiders with 3. Access to information
legitimate access to critical 4. Intellectual property rights
systems and information. 5. Plagiarism
6. Netiquette
2. OUTSIDERS
Organized criminals or criminal SESSION 5
groups. CONTINUING EDUCATION PROGRAMS ON
Professional hackers – whether ETHICOMORAL PRACTICE IN NURSING
malicious or not. - From the moment a newly
Amateur hackers – sometimes graduated nurse enters the clinical
known as “script kiddies.” environment, he or she must be
ready to deliver quality patient care
REASONS FOR COMPUTER CRIME while navigating complex
1. FINANCIAL GAIN relationships with patients, families,
- The primary motivation for the physicians, nurses, and other
majority of attacks. members of the healthcare team.
ORGANIZATIONS
1. Philippine Nurses Association, INC.
2. National Association of Neonatal
Nurses
3. Psychiatric Mental Health Nurses
Association of the Philippines, INC.
4. Philippine Red Cross
5. Occupational Health Nurses
Association of the Philippines