You are on page 1of 37

T H E IN F LU E N C E O F IT O N

A N D S O C IA L B E H A V IO R
CULTURE
CHAPTER 1 DISCUSSES THE POSITIVE AND NEGATIVE EFFECTS OF INFORMATION
AND COMMUNICATION TECHNOLOGY (ICT) ON INDIVIDUALS, ORGANIZATIONS,
AND SOCIETY. IT EMPHASIZES THE IMPORTANCE OF FOCUSING ON SELF-
REALIZATION AND SOCIAL INTERACTION FOR POSITIVE EFFECTS.
THE PHILIPPINES, ONCE KNOWN AS THE “TEXTING-CAPITAL OF THE WORLD,” HAS
BECOME THE “MOST SOCIAL NATION” IN A 2015 OPERA MINI STUDY. MOBILE PHONE
USERS ACCESS SOCIAL MEDIA MORE THAN ANY OTHER SITE, WITH THE
PHILIPPINES RANKING FIRST WITH AN 86% PAGE VIEW. SMARTPHONE ADOPTION
HAS GROWN FROM 41% TO 55%, WITH ANDROID BEING THE MOST POPULAR OS.
• TECHNOLOGICAL PROGRESS HAS INFLUENCED PEOPLE’S ATTITUDES AND
BEHAVIORS, NOT JUST IN THE PHILIPPINES. THE INVENTION OF THE TELEPHONE
IN THE 1800S LED TO LONG-DISTANCE COMMUNICATION, WHILE THE ADVENT OF
CARS AND TRANSPORTATION HAS INFLUENCED COMMUTING, CARPOOLING, AND
VACATION OPTIONS. THE RAPID EVOLUTION OF MOBILE TECHNOLOGY AND THE
INTERNET HAS SIGNIFICANTLY CHANGED COMMUNICATION, WITH ONLINE
COMMERCE REVOLUTIONIZING THE WAY CUSTOMERS BUY PRODUCTS AND
SERVICES.

• GILKEY (2015) HIGHLIGHTS THE NUMEROUS SMALL WAYS TECHNOLOGY


INFLUENCES BEHAVIOR, LEADING TO THE RISE OF “GENERATION WARS”
BETWEEN BABY BOOMERS, GEN X, AND MILLENNIALS, WITH SOCIAL MEDIA
HIGHLIGHTING THESE DISPARITIES.
E O N SO C IA L B E HAV IO R
INFLUENC
CYBERBULLYING
• Cyberbullying is a serious phenomenon involving unwanted, hostile behavior by
individuals to gain control over others, often resulting in personal traumas. Cyberbullies
may be anonymous attackers hiding behind their internet profiles. Internet profiles, also
known as internet identities, are created to establish social identities in online
communities and social media sites. However, some profiles intentionally mislead or
misinform people, such as creating a username that is randomly created or setting a
birthdate that is not allowed. This can lead to privacy breaches and violate facebook's
terms and conditions, as users must be at least 13 years old to create an account.
CYBERBULLYING
• IS A GROWING CONCERN, WITH INDIVIDUALS USING ONLINE PROFILES TO GAIN CONFIDENCE
AND AVOID FACE-TO-FACE CONFRONTATIONS. IT CAN BE DIFFICULT TO TRACE THE SOURCE OF
MESSAGES OR IMAGES, ESPECIALLY IF THEY ARE ANONYMOUS OR VIRAL. VICTIMS OF
CYBERBULLYING MAY EXPERIENCE SIMILAR TRAUMA AS REAL-LIFE VICTIMS, BUT ON A LARGER
SCALE. THE PHILIPPINES HAS ESTABLISHED LAWS LIKE THE CYBER CRIME PREVENTION ACT OR
REPUBLIC ACT 10175 TO COMBAT CYBERBULLYING. TO PREVENT CYBERBULLYING, INDIVIDUALS,
PARTICULARLY YOUTH, SHOULD TALK TO THEIR FAMILIES AND FRIENDS, AND INVOLVE PARENTS
AND TEACHERS IN THEIR SOCIAL MEDIA ACTIVITIES. THIS CAN HELP PREVENT UNTOWARD
INCIDENTS AND PROTECT YOUNG PEOPLE FROM CYBERBULLYING.
GUIDELINES IN COMPOSING AN EMAIL
NETIQUETTE FOR EMAIL SERVICES
TO ENSURE SAFE USE OF INSTANT MESSAGING APPLICATIONS, CONSIDER THESE GUIDELINES:

• 1. THINK CAREFULLY BEFORE ACCEPTING PRIVATE CONVERSATIONS, ESPECIALLY WITH STRANGERS


NOT ON YOUR FRIENDS LIST.

• 2. IN GROUP CHATS, ONLY INCLUDE THOSE IN YOUR FRIENDS LIST.


• 3. AVOID PROVIDING PERSONAL INFORMATION, INCLUDING PHOTOS OR SELFIES.
• 4. SAVE OR BACK UP CONVERSATIONS WHEN UNSURE.
• 5. LOG OUT OF YOUR ACCOUNT AT ALL TIMES, ESPECIALLY IN PUBLIC PLACES.6. CUSTOMIZE YOUR
ACCOUNT SETTINGS TO SWITCH BETWEEN PUBLIC AND PRIVATE.
PROFESSIONAL ETHICS

• IT PROFESSIONALS, AS FRONTLINERS, SUPPORT, AND BACKEND OF ICT, MUST STRICTLY ADHERE TO


ETHICAL PRACTICES, DESPITE NETIQUETTE AFFECTING ALL NETIZENS.
• THE ASSOCIATION OF COMPUTING MACHINERY (ACM) HAS IDENTIFIED 24 IMPERATIVES OF
PROFESSIONAL CONDUCT FOR IT PROFESSIONALS, COVERING VARIOUS ISSUES THEY MAY
ENCOUNTER WHILE USING, CREATING, AND IMPLEMENTING ICT. THE CODE OUTLINES
FUNDAMENTAL ETHICAL CONSIDERATIONS, SPECIFIC CONSIDERATIONS FOR LEADERSHIP
ROLES, AND PRINCIPLES INVOLVING COMPLIANCE.
1. GENERAL MORAL IMPERATIVES
1.1 CONTRIBUTE TO SOCIETY AND HUMAN WELL BEING
THE ACM MEMBERS ARE EXPECTED TO CONTRIBUTE TO SOCIETY AND HUMAN WELL-BEING BY
PROTECTING HUMAN RIGHTS AND RESPECTING CULTURAL DIVERSITY. THEY MUST MINIMIZE
NEGATIVE CONSEQUENCES OF COMPUTING SYSTEMS, INCLUDING HEALTH AND SAFETY THREATS.
THEY MUST ALSO ENSURE A SAFE SOCIAL AND NATURAL ENVIRONMENT, AND AVOID HARM TO
OTHERS, INCLUDING INJURY OR NEGATIVE CONSEQUENCES LIKE LOSS OF INFORMATION OR
PROPERTY. COMPLIANCE WITH THESE PRINCIPLES IS CRUCIAL FOR IT PROFESSIONALS TO
UPHOLD ETHICAL STANDARDS AND PROMOTE A HEALTHY WORK ENVIRONMENT.
1.2 AVOID TO HARM OTHERS
THE PRINCIPLE OF RESPONSIBLE COMPUTING TECHNOLOGY USAGE PROHIBITS ACTIONS THAT
CAUSE HARM TO USERS, THE PUBLIC, EMPLOYEES, AND EMPLOYERS. HARMFUL ACTIONS MAY
INCLUDE INTENTIONAL DESTRUCTION OF FILES AND PROGRAMS, LOSS OF RESOURCES, OR
UNNECESSARY EXPENDITURE OF HUMAN RESOURCES
1.3 BE HONEST AND TRUSTWORTHY
HONESTY IS CRUCIAL FOR TRUST AND EFFECTIVE ORGANIZATION. A COMPUTING PROFESSIONAL
SHOULD DISCLOSE SYSTEM LIMITATIONS AND PROBLEMS WITHOUT DECEPTIVE CLAIMS. THEY
MUST BE HONEST ABOUT THEIR QUALIFICATIONS AND POTENTIAL CONFLICTS OF INTEREST.
MEMBERS OF VOLUNTEER ORGANIZATIONS LIKE ACM MUST EXERCISE CARE NOT TO
MISREPRESENT ACM OR ITS POSITIONS AND POLICIES, AS THEIR ACTIONS MAY BE INTERPRETED
AS REPRESENTING A LARGER GROUP OF PROFESSIONALS.
1.4 BE FAIR TAKE ACTION AND NOT TO DISCRIMINATE
THE TEXT EMPHASIZES THE IMPORTANCE OF FAIRNESS AND NON-DISCRIMINATION, STATING THAT
DISCRIMINATION BASED ON FACTORS LIKE RACE, SEX, RELIGION, AGE, DISABILITY, OR NATIONAL
ORIGIN IS A VIOLATION OF ACM POLICY. IT ALSO HIGHLIGHTS THE POTENTIAL FOR INEQUITIES DUE
TO INFORMATION AND TECHNOLOGY MISUSE, EMPHASIZING THE NEED FOR A FAIR SOCIETY.
1.5 HONOR PROPERTY RIGHTS INCLUDING COPYRIGHTS PATENT.
THE TEXT EMPHASIZES THE IMPORTANCE OF HONORING PROPERTY RIGHTS, INCLUDING
COPYRIGHTS AND PATENTS, AND PROHIBITING THE UNAUTHORIZED DUPLICATION OF MATERIALS,
EVEN WHEN SOFTWARE IS NOT PROTECTED, AS SUCH VIOLATIONS ARE CONTRARY TO
PROFESSIONAL BEHAVIOR.
1.6 GIVE PROPER CREDIT FOR INTELLECTUAL PROPERTY
COMPUTER PROFESSIONALS ARE OBLIGATED TO MAINTAIN THE INTEGRITY OF INTELLECTUAL
PROPERTY, ENSURING THAT THEY DO NOT TAKE CREDIT FOR OTHERS' IDEAS OR WORK, EVEN IF IT
IS NOT EXPLICITLY PROTECTED.
1.7 RESPECT THE PRIVACY OF OTHERS
THE RAPID GROWTH OF COMPUTING AND COMMUNICATION TECHNOLOGY HAS INCREASED THE
POTENTIAL FOR PRIVACY VIOLATIONS. PROFESSIONALS MUST ENSURE THE INTEGRITY OF DATA
BY ENSURING ACCURACY, PROTECTING IT FROM UNAUTHORIZED ACCESS, AND ALLOWING
INDIVIDUALS TO REVIEW THEIR RECORDS TO CORRECT INACCURACIES. THIS INCLUDES
ESTABLISHING PROCEDURES FOR INDIVIDUALS TO REVIEW THEIR RECORDS.
1.8 HONOR CONFIDENTIALITY
THE PRINCIPLE OF HONESTY APPLIES TO INFORMATION CONFIDENTIALITY, INCLUDING EXPLICIT
PROMISES AND IMPLICIT DISCLOSURES. THE ETHICAL CONCERN IS TO RESPECT ALL OBLIGATIONS
TO EMPLOYERS, CLIENTS, AND USERS, UNLESS REQUIRED BY LAW OR OTHER PRINCIPLES. THIS
APPLIES TO MORE SPECIFIC PROFESSIONALS.
2. MORE SPECIFIC PROFESSIONAL RESPONSIBILITIES
AS AN ACM COMPUTING PROFESSIONAL, I WILL…
2.1 STRIVE TO ACHIEVE THE HIGHEST EQUALITY, EFFECTIVENESS AND DIGNITY IN BOTH THE PROCESS AND
PRODUCTS OF PROFESSIONAL WORK
EXCELLENCE IN PROFESSIONAL COMPETENCE RELIES ON INDIVIDUALS TAKING RESPONSIBILITY
FOR ACQUIRING AND MAINTAINING IT. PROFESSIONALS MUST SET STANDARDS AND STRIVE TO
ACHIEVE THEM THROUGH INDEPENDENT STUDY, ATTENDING SEMINARS, CONFERENCES,
COURSES, AND BEING INVOLVED IN PROFESSIONAL ORGANIZATIONS.
2.2 ACQUIRE AND MAINTAIN PROFESSIONAL COMPETENCE
ACM MEMBERS MUST RESPECT AND OBEY LOCAL, STATE, PROVINCIAL, NATIONAL, AND
INTERNATIONAL LAWS UNLESS THERE’S A COMPELLING ETHICAL BASIS NOT TO DO SO. THEY MUST
ALSO FOLLOW THE POLICIES AND PROCEDURES OF THEIR ORGANIZATIONS. HOWEVER,
COMPLIANCE MUST BE BALANCED WITH ACKNOWLEDGING THAT SOME LAWS MAY BE IMMORAL OR
INAPPROPRIATE. VIOLATION OF A LAW MAY BE ETHICAL IF IT HAS AN INADEQUATE MORAL BASIS
OR CONFLICTS WITH OTHER LAWS.
2.3 KNOW AND RESPECT EXISTING LAWS PERTAINING TO PROFESSIONAL WORK
PROFESSIONAL WORK, PARTICULARLY IN THE COMPUTING PROFESSION, RELIES ON
PROFESSIONAL REVIEW AND CRITICISM, WITH INDIVIDUALS OFTEN SEEKING PEER REVIEW AND
PROVIDING CRITICAL EVALUATIONS OF OTHERS' WORK.
2.4 ACCEPT AND PROVIDE APPROPRIATE PROFESSIONAL REVIEW
COMPUTER PROFESSIONALS MUST PROVIDE THOROUGH EVALUATIONS OF COMPUTER SYSTEMS,
ANALYZING POTENTIAL RISKS AND PRESENTING ALTERNATIVES. THEY HAVE A RESPONSIBILITY TO
BE OBJECTIVE AND RELIABLE, AVOIDING CONFLICTS OF INTEREST. ANY SIGNS OF DANGER MUST
BE REPORTED TO THOSE RESPONSIBLE, AND ANY VIOLATIONS SHOULD BE REPORTED TO THE
APPROPRIATE AUTHORITIES.
2.5 GIVE COMPREHENSIVE AND THOROUGH EVALUATION OF COMPUTER SYSTEMS AND THEIR
IMPACTS, INCLUDING ANALYSIS OF POSSIBLE RISKS.
COMPUTER PROFESSIONALS MUST PROVIDE OBJECTIVE EVALUATIONS OF COMPUTER SYSTEMS,
ANALYZING POTENTIAL RISKS, AND PRESENTING SYSTEM DESCRIPTIONS AND ALTERNATIVES TO
ENSURE TRUST AND CREDIBILITY WITH EMPLOYERS, CLIENTS, AND THE PUBLIC.
2.6 HONOR CONTRACTS, AGREEMENTS, AND ASSIGNED RESPONSIBILITIES
HONORING CONTRACTS, AGREEMENTS, AND RESPONSIBILITIES IS CRUCIAL FOR COMPUTER
PROFESSIONALS, INCLUDING ENSURING SYSTEM PERFORMANCE, KEEPING PARTIES INFORMED
ABOUT PROGRESS, AND REQUESTING CHANGES IN ASSIGNMENTS AFTER SERIOUS
CONSIDERATION AND RISK DISCLOSURE.
2.7 IMPROVE PUBLIC UNDERSTANDING OF COMPUTING AND ITS CONSEQUENCES
PROFESSIONALS MUST SHARE TECHNICAL KNOWLEDGE WITH THE PUBLIC, PROMOTING
UNDERSTANDING OF COMPUTING'S IMPACTS AND LIMITATIONS, AND COUNTERING FALSE VIEWS
RELATED TO COMPUTING.
2.8 ACCESS COMPUTING AND COMMUNICATION RESOURCES ONLY WHEN AUTHORIZED TO DO SO
IMPERATIVE 1.2 PROHIBITS THEFT OR DESTRUCTION OF TANGIBLE AND ELECTRONIC PROPERTY,
INCLUDING UNAUTHORIZED ACCESS TO COMPUTING AND COMMUNICATION RESOURCES,
ADDRESSING TRESPASSING AND HARM TO OTHERS.
3. ORGANIZATIONAL LEADERSHIP IMPERATIVES

THIS SECTION DISCUSSES THE DRAFT IFIP CODE OF ETHICS, ADDRESSING THE ISSUE OF
NEGLECTING ETHICAL OBLIGATIONS OF ORGANIZATIONS IN CODES OF PROFESSIONAL CONDUCT.
IT HIGHLIGHTS THE IMPORTANCE OF ADDRESSING THESE IMPERATIVES FROM THE PERSPECTIVE
OF ORGANIZATIONAL LEADERS, INCLUDING CORPORATIONS, GOVERNMENT AGENCIES,
EMPLOYERS, AND VOLUNTEER ORGANIZATIONS.
3.1 ARTICULATE SOCIAL RESPONSIBILITIES OF MEMBERS OF AN ORGANIZATIONAL UNIT AND
ENCOURAGE FULL ACCEPTANCE OF THOSE RESPONSIBILITIES
ORGANIZATIONS MUST FULFILL THEIR SOCIAL RESPONSIBILITY BY PROMOTING QUALITY AND
WELFARE, REDUCING HARM TO THE PUBLIC, AND ENCOURAGING FULL PARTICIPATION IN MEETING
THESE RESPONSIBILITIES.
3.2 MANAGE PERSONNEL AND RESOURCES TO DESIGN AND BUILD INFORMATION SYSTEMS THAT
ENHANCE THE QUALITY OF WORKING LIFE
ORGANIZATIONAL LEADERS MUST ENSURE COMPUTER SYSTEMS IMPROVE WORKING LIFE
QUALITY BY CONSIDERING PERSONAL AND PROFESSIONAL DEVELOPMENT, SAFETY, AND HUMAN
DIGNITY, WHILE ADHERING TO ERGONOMIC STANDARDS IN SYSTEM DESIGN AND WORKPLACE.
3.3 ACKNOWLEDGE AND SUPPORT PROPER AND AUTHORIZED USES OF AN ORGANIZATION’S
COMPUTING AND COMMUNICATION RESOURCES
LEADERSHIP MUST CLEARLY DEFINE APPROPRIATE AND INAPPROPRIATE USES OF
ORGANIZATIONAL COMPUTING RESOURCES, ENSURING MINIMAL RULES ARE ENFORCED AND
MINIMAL IN SCOPE.
3.4 ENSURE THAT USERS AND THOSE WHO WILL BE AFFECTED A SYSTEM HAVE THEIR NEEDS
CLEARLY ARTICULATED DURING THE ASSESSMENT AND DESIGN OF REQUIREMENTS; LATER, THE
SYSTEM MUST BE VALIDATED TO MEET REQUIREMENTS
SYSTEM USERS, POTENTIAL USERS, AND OTHERS IMPACTED BY A SYSTEM MUST BE ASSESSED
AND THEIR NEEDS INCORPORATED INTO THE STATEMENT OF REQUIREMENTS, ENSURING SYSTEM
VALIDATION COMPLIANCE.
3.5 ARTICULATE AND SUPPORT POLICIES THAT PROTECT THE DIGNITY OF USERS AND OTHERS
AFFECTED BY A COMPUTING SYSTEM
ETHICAL CONSIDERATIONS DICTATE THAT COMPUTER PROFESSIONALS SHOULD ENSURE
SYSTEMS ARE DESIGNED TO PROTECT PERSONAL PRIVACY AND ENHANCE DIGNITY, RATHER THAN
DELIBERATELY OR INADVERTENTLY DEMEANING INDIVIDUALS OR GROUPS.
3.6 CREATE OPPORTUNITIES FOR THE MEMBERS OF ORGANIZATIONS TO LEARN THE PRINCIPLES
AND LIMITATIONS OF COMPUTER SYSTEM
EDUCATIONAL OPPORTUNITIES ARE CRUCIAL FOR ORGANIZATIONAL MEMBERS TO IMPROVE THEIR
KNOWLEDGE AND SKILLS IN COMPUTING, INCLUDING UNDERSTANDING THE CONSEQUENCES AND
LIMITATIONS OF SPECIFIC SYSTEMS. THIS INCLUDES EDUCATING PROFESSIONALS ABOUT THE
DANGERS OF OVERSIMPLIFIED MODELS AND THE COMPLEXITY OF THE PROFESSION.
4. COMPLIANCE WITH THE CODE

4.1 UPHOLD AND PROMOTE THE PRINCIPLE OF THIS CODE


HE FUTURE OF COMPUTING RELIES ON TECHNICAL AND ETHICAL EXCELLENCE, WITH ACM
COMPUTING PROFESSIONALS ADHERING TO PRINCIPLES AND ENCOURAGING ADHERENCE AMONG
MEMBERS.
4.2 TREAT VIOLATIONS OF THIS CODE AS INCONSISTENT WITH MEMBERSHIP IN THE ACM
THE ACM CODE OF ETHICS AND PROFESSIONAL CONDUCT, DEVELOPED BY THE TASK FORCE FOR
THE REVISION, IS A VOLUNTARY COMMITMENT FOR PROFESSIONALS. IF A MEMBER ENGAGES IN
GROSS MISCONDUCT, MEMBERSHIP MAY BE TERMINATED. THE CODE, ADOPTED BY THE ACM
COUNCIL IN 1992, CAN BE PUBLISHED WITHOUT PERMISSION, PROVIDED IT REMAINS UNCHANGED
AND BEARS THE COPYRIGHT NOTICE.
END OF PRESENTATION

You might also like