You are on page 1of 2

Gov. Alfonso D.

Tan College
INSTITUTE OF ARTS AND SCIENCES

GE LITERA│Living in the Information Technology

UNIT ACTIVITIES:
TRENDS AND ISSUES IN COMPUTING

Activity 1
Essay
Direction: Explain the following Ethical Principle in the Information Society.( 5 pts. each).

1. Golden Rule: Do unto others as you would have them do unto you.

The golden rule is a moral guideline stating that you should treat people as you
would like to be treated. The golden rule, for example, states that if you want
people to treat you with respect, you must treat them with respect as well. To aid
in this, ask yourself, "How would I like to be treated in this situation?" when
considering a particular behavior toward someone. ", or "what would I feel if
someone treated me the way I'm about to treat this person?" ”.

2. Immanuel Kant’s Categorical Imperative; If an action is not right for everyone to


take, it is not right for anyone.

It is our responsibility to act in a way that we would want everyone else to act in
identical circumstances toward everyone else. The Categorical Imperative was
Kant's term for this. As if it were a universal law, act according to the maxim that
you would desire all other logical individuals to follow.

3. Descartes’ Rule of Change; If an action cannot be taken repeatedly, it is not right


to take at all.

This is the slippery-slope rule: a behavior may produce a modest but acceptable
change in the short term, but if continued, it will produce unacceptably large
changes in the long run.

4. Utilitarian Principle; Take the action that achieves the higher or greater value

Since this advises us to consider the varying amounts of good and harm that will
be created by our activity, utilitarianism is one of the most prevalent methods to
making ethical decisions, especially decisions having implications that affect
large groups of people. This rule presupposes you can rank values in order of
importance and understand the repercussions of various actions.

5. Risk Aversian Principle; Take the action that produces the least harm or potential
cost.

Certain actions have extremely high failure costs with extremely low chance (for
example, constructing a nuclear power plant in a city) or extremely high failure
costs with intermediate probability (for example, speeding and automobile
accidents). Avoid acts with extremely high failure costs; instead, concentrate on
lowering the likelihood of an accident occurring.

6. Ethical “No Free Lunch” Rule; Assume that virtually all tangible and intangible
objects are owned by someone unless there is a specific declaration otherwise.

If you find something helpful developed by someone else, it has worth, and you
should presume the creator wants payment for their efforts.
Gov. Alfonso D. Tan College
INSTITUTE OF ARTS AND SCIENCES

Activity 2

Act 4. A. Direction: Write down the meaning of the terms given below.( 5 pts.each)

Terms Meaning
Cyber attacks A cyberattack is any offensive maneuver
that targets computer information
systems, computer networks,
infrastructures, or personal computer
devices.
Cyberspace A global domain within the information
environment consisting of the
interdependent network of information
systems infrastructures including the
Internet, telecommunications networks,
computer systems, and embedded
processors and controllers.
Data breach A data breach is an incident where
information is stolen or taken from a
system without the knowledge or
authorization of the system's owner. A
small company or large organization may
suffer a data breach.
Botnets A botnet is a number of Internet-connected
devices, each of which runs one or more
bots. Botnets can be used to perform
Distributed Denial-of-Service (DDoS)
attacks, steal data, send spam, and allow
the attacker to access the device and its
connection.
Privacy Privacy is a fundamental human right that
underpins freedom of association, thought
and expression, as well as freedom from
discrimination.
Internet Protocol The Internet Protocol is the network layer
communications protocol in the Internet
protocol suite for relaying datagrams
across network boundaries. Its routing
function enables internetworking, and
essentially establishes the Internet.
Hackticist In Internet activism, hacktivism, or
hactivism, is the use of computer-based
techniques such as hacking as a form of
civil disobedience to promote a political
agenda or social change.

You might also like