click below
click below
Normal Size Small Size show me how
FINALS_SOCIALPROF
| Question | Answer |
|---|---|
| are there to promote good research practice and to act as a safeguard to protect researchers as well as their participants. | Ethics |
| a term that refers to the norms, standards, and legal rules regarding appropriate behaviour in the conduct and publication of research. | research ethics |
| It provides guidelines for the responsible conduct of research. | Ethics in Research |
| Researchers ought to honestly report data and results of the study, including the methods and procedures employed in data gathering as well as publication status. | HONESTY |
| Researchers should uphold objectivity and scientific rigor at all times. | OBJECTIVITY |
| Researchers should always uphold the principle of confidentiality by not disclosing the personal information of the participants. | CONFIDENTIALITY |
| Researchers are supposed to be knowledgeable and experts in their own discipline or field of specialization. | COMPETENCE |
| Researchers ought to keep their promises and honour agreements. | INTEGRITY |
| Researchers always has legal dimension. | LEGALITY |
| Knowledge is supposed to be free. | MATURITY AND OPENNESS |
| Researchers ought to honor copyrights, patents and other forms of intellectual property. | RESPECT TO INTELLECTUAL PROPERTY |
| Researchers need to publish in order to advance knowledge and scholarships and not just to advance one’s own career. | RESPONSIBLE PUBLICATION |
| Researchers ought to avoid all forms of discrimination against colleagues and students on the basis sex, race, ethnicity and other factors. | NON-DISCRIMINATION |
| Researchers should respect human dignity, privacy and autonomy at all times. | HUMAN SUBJECT PROTECTION |
| Researchers should respect ANIMAL RIGHTS at all times. | ANIMAL CARE |
| Researchers should conduct research NOT only for the advancement of their career but for the good of the society as a whole. | SOCIAL RESPONSIBILITY |
| It is researching the internet and other digital data. | Internet Research |
| It is conducting the interview using the technology. | Internet Mediated Research |
| Good Internet Research Practice | Ethical Process Informed Consent Harm Public Vs Private Platforms |
| is a qualitative method for collecting data often used in the social and behavioral sciences. | Ethnography |
| Is a research method used to study online communities and cultures. | Netnography |
| It has been a requirement set by ethics committee to sign some form of informed consent sheet. | Informed Consent |
| Participants should be informed of the nature of the perceived risk to their participation in the research study. | Harm |
| Searching for data on platforms that need membership approval | Public VS Private Data Sites |
| can automate data mining and analysis, streamline manual research processes, and improve the accuracy and speed of research. | AI-powered tools |
| Is a member-based, academic association dedicated to the promotion of critical and scholarly Internet research independent from traditional disciplines and existing across academic borders. | Association of Internet Researchers |
| allow a profession to determine who will be allowed to practice the profession. | Certification and licensing |
| IEEE Computer Society (IEEE-CS) | “To be the leading provider of technical information, community services, and personalized services to the world’s computing professionals.” |
| ACM | Association for Computing Machinery |
| who sets up a joint during 1993in steering committee to explore the establishment of software engineering as a profession. | EEE-CS and ACM |
| someone engaged in the development or maintenance of software, or someone who teaches in this area. | software engineer |
| Software Engineers Code of Ethics | ABILITY TO HARM PUBLIC |
| PRINCIPLE 1 | PUBLIC - software engineers shall approve software only if they have a well-founded belief that it is safe, meets specifications, passes appropriate tests, and does not diminish quality of life, diminish privacy, or harm the environment. |
| PRINCIPLE 2 | CLIENT AND EMPLOYER - Software engineers shall not knowingly use software that is obtained or retained either illegally or unethically. |
| PRINCIPLE 3 | PRODUCT - Software engineers shall ensure proper and achievable goals and objectives for any project on which they work or propose. |
| PRINCIPLE 4 | JUDGMENT - Software engineers shall maintain integrity andindependence in their professional judgment. |
| PRINCIPLE 5 | MANAGEMENT - Subscribe to and promote an ethical approach to the management |
| PRINCIPLE 6 | PROFESSION - advance the integrity and reputation of the profession consistent with the public interest. |
| PRINCIPLE 7 | COLLEAGUES - shall be fair to and supportive of their colleagues. |
| PRINCIPLE 8 | SELF - shall continually endeavor to improve their ability to create safe, reliable, and useful quality software |
| Is a person working within an organization who reports that organization’s misconduct. | whistle-blower |
| the whistle blower reports misconduct to another person within the organization. | Internal Whistle Blowing |
| the whistle blower reports misconduct to a person outside the organization, such as law enforcement or the media. | External Whistle Blowing |
| is a collection of hardware, software, data, and people that work together to collect, process, store, and disseminate information. | Information System |
| TPS | Transaction Processing Systems (TPS) |
| MIS | Management Information Systems (MIS) |
| DSS | Decision Support Systems (DSS) |
| ESS | Executive Support Systems (ESS) |
| ERP | Enterprise Resource Planning (ERP) Systems |
| CRM | Customer Relationship Management (CRM) Systems |
| SCM | Supply Chain Management (SCM) Systems |
| is composed of the people, property and information within an organization (anything of value). | Asset |
| is anything can exploit a vulnerability, intentionally or accidentally, obtain and damage, destroy an asset. | Threat |
| Security Threats: | Hackers Viruses and Malwares Cyber Attacks Natural Disaster |
| is a weakness of an asset that can be exploited by a threat. | Vulnerability |
| is the potential for loss, damage or destruction of an asset when a threat exploits a vulnerability. | Risk |
| is the practice of protecting information by mitigating information risks. | Information security |
| The CIA Triad | CONFIDENTIALITY INTEGRITY AVAILABILITY |
| Is the process of identifying, assessing, monitoring and limiting risk into an acceptable level. | Risk Management |
| where risks are identified and assessed. It is the first step in risk management process. | Risk Assessment |
| RISK RESPONSE CATEGORIES | AVOIDANCE ACCEPTANCE MITIGATION TRANSFERENCE RESIDUAL RISK |
| Access control | protects against a wide variety of threats |
| ACCESS CONTROL CATEGORIES AND TYPES | Preventive Controls Detective Controls Corrective Controls Recovery Controls Deterrent Controls Compensating Controls Physical and Logical Controls |
| Background check before approving tenant ensure a qualified tenant. | Preventive Controls |
| Sends an alert during or after an attack. | Detective Controls |
| Correct a damaged system or process | Corrective Controls |
| Needed to restore functionality | Recovery Controls |
| Deter users from performing actions. | Deterrent Controls |
| Add additional security by compensating other control’s weaknesses. | Compensating Controls |
| includes implementing different access control methods with technology you can touch | Physical and Logical Controls |
| are the foundation of a defense-in-depth network security strategy. | Firewall |
| is a perimeter network that protects and adds an extra layer of security to an organization’s internal local-area network from untrusted traffic. | DMZ – or demilitarized zone |
| is the practice of developing and using coded algorithms to protect and obscure transmitted information | Cryptography |
| Common Uses of Cryptography | Passwords Cryptocurrency Secure Web Browsing E-signature Authentication Secure communication |
| ISO 27001 | is the international standard that provides specification for an Information Security Management System or ISMS. |
| ISO 27001 standard | provides companies of any size and from all sectors of activity with guidance for establishing, implementing, maintaining and continually improving ISMS |
| is a way of protecting an organization's sensitive data from threats and vulnerabilities. | Information security management |
| esponsible for performing tasks such as risk assessment, risk treatment, security controls, security monitoring | ISMS team |
| exists to ensure compliance of the country with international standards set for data | NPC - or the National Privacy Commission |
| NLP | Natural Language Processing) |