3: INFORMATION PRIVACY AND IT ETHICS Flashcards

1
Q

It refers to the inequalities that exist between groups of people in relation to access, use and knowledge of information and communication technologies (ICTs)

A

Digital Divide

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

refers to the growing gap between the underprivileged members of society, especially the poor, rural, elderly, and handicapped portion of the population who do not have access to computers or the internet

A

Digital Divide

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

multidimensional phenomenon that encompasses the following three distinct facets; global, social and democratic divide

A

Digital Divide

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Causes of digital divide

A

education, income levels, geographic restrictions, motivation and general interest, and digital literacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

outcomes generated by the digital divide

A

impact on economy, education, social domains, and society.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

narrowing the digital gap

A

○ increase digital literacy
○ develop relevant and local content in addition to telecommunications infrastructure
○ establish workable partnerships between all information and communication technology stakeholders
○ promote innovations geared towards overcoming the digital divide

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

we mean a branch of moral philosophy –a sense of rightness or wrongness of actions, motives and the results of these actions

A

Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

It identifies good or evil, just or unjust, fair or unfair practices, about moral duty.

A

Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

It is well-based standards that a person should do, concerning rights, obligations, fairness, benefits to society and so on.

A

Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

refer to the important and enduring beliefs or principles, based on which an individual makes judgements in life.

A

Moral Values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

It is at the center of our lives which act as a standard of behavior.

A

Moral Values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

They severely affect the emotional state of mind of an individual.

A

Moral Values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

They can be personal values, cultural values or corporate values

A

Moral Values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

structure of standards and practices that influences how people lead their lives. Unline laws that legally mandate what is right or wrong

A

Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

best action is the one that leas to the greatest amount of happiness for the greatest nukber of people

A

Utilitarianism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

creator of utilitarianiasm

A

Jeremy Bentham and John Stuart Mill

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

highest good was the good will

A

Kantianism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

intention behind an action rather than itsconsequences that make that action good

A

Kantianism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Moral behaviour is a duty. Persons of good will do their duty because it is their duty and for no other reasons

A

Kantianism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

set of moral standards that govern the use of computers

A

Computer Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

society’s views about the use of computers, both hardware and software

A

Computer Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Common issues of computer ethics

A

Privacy concerns, intellectual property rights and effects on the society

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

the science of information feedback systems.

A

Cybernetics, 1940-1950

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

published his monumental book, the “The Human Use of Human Beings”

A

Norbert Wiener, 1940-1950

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Who perceptively foresaw revolutionary social and ethical consequences?

A

Norbert Wiener, 1940-1950

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

This book is a comprehensive foundation which remains today a powerful basis for “Computer Ethics” research and analysis.

A

The Human Use of HumanBeings, 1940-1950

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Who began to examine unethical and illegal uses of computers by computer professionals?

A

Donn Parker, 1960

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

published book Communications of the ACM in 1968.

A

Rules of Ethics in Information Processing, 1960

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Who went on to produce books, articles, speeches and workshops that relaunched the field of computer ethics?

A

Donn Parker, 1960

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Who was shocked at the reactions people had to his simple computer program?

A

Joseph Weizenbaum, late 1960’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

a book plus the courses he offered at MIT and the many speeches he gave around the country in the 1970s, inspired many thinkers and projects in computer ethics.

A

Weizenbaum’s book, late 1960’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is the impact of the Weizenbaum’s book to the people?

A

inspired many thinkers and projects in computer ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Who began to use the term “computer Ethics” to refer to that field of inquiry dealing with ethical problems aggravated, transformed, or created by computer technology?

A

Walter Maner,mid 1970’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What did Walter Maner began?

A

began to use the term “computer Ethics”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

It refers to that field of inquiry dealing with ethical problems aggravated, transformed, or created by computer technology

A

Computer Ethics

36
Q

What did Walter Maner self-published and disseminated?

A

Starter Kit in Computer Ethics., mid 1970’s

37
Q

What happened during the mid 1980’s?

A
  • Proliferation of computer-enabled crime, and computer failures
  • Major law suits regarding Software ownership, because of the work of Parker, Weizenbaum, Maner, etc.
  • Invasions of privacy via computer databases.
  • Books in computer ethics
38
Q

When did the increase in the number of computer professionals organization happen?

A

mid 1990s

39
Q

Primary Computer Ethics Issues

A

Privacy, Accuracy, Property, Cybercrime, and Access

40
Q

responsibility to protect data about individuals.

A

Privacy

41
Q

the responsibility of data collectors to authenticate information and ensure its accuracy.

A

Accuracy

42
Q

who owns information and software and how they can be sold and exchanged.

A

Property

43
Q

crime that involves a computer and a network.

A

Cybercrime

44
Q

the responsibility of data collectors to control access and determine what information a person has the right to obtain about others and how the information can be used.

A

Access

45
Q

means Malicious software. It was created to impair a computer system.

A

Malware

46
Q

These are the common malware

A

viruses, spyware, worms, and trojan horses

47
Q

software that tracks your online movements, mines the information stored on your computer, or uses your computer for some task you know nothing about.

A

Spyware

48
Q

also known as information privacy or data privacy (Republic Act 10173 – Data Privacy Act of 2012),

A

Data Protection

49
Q

Philippine Law for data protection

A

Republic Act 10173 – Data Privacy Act of 2012

50
Q

is the process of safeguarding data which intends to influence a balance between individual privacy rights while still authorizing data to be used for business purposes.

A

Data protection

51
Q

a way of keeping the user’s identity masked through various applications

A

Anonymity

52
Q

Terminologies and issues on privacy

A

Malware, Spyware, Data Protection, Anonymity

53
Q

Terminologies and issues on Intellectual Property Rights (IPR)

A

Copyright, Intellectual Property, Plagiarism, Software License, Infringement, Piracy, Trade Secret

54
Q

form of intellectual property that gives proprietary publication, distribution, and usage rights for the author

A

Copyright

55
Q

means that whatever idea the author created cannot be employed or disseminated by anyone else without the permission of the author.

A

Copyright

56
Q

creations protected by law.

A

Intellectual Property

57
Q

an act of copying and publishing another person’s work without proper citation. It’s like stealing someone else’s work and releasing it as your own work.

A

Plagiarism

58
Q

allows the use of digital material by following the license agreement. Ownership remains with the original copyright owner, and users are just granted licenses to use the material based on the agreement.

A

Software License

59
Q

copying of copyrighted pictures or text from web pages.

A

Infringement

60
Q

illegal software copying

A

Piracy

61
Q

work or products belonging to a business, not in public domain

A

Trade Secret

62
Q

legal document granting owner exclusive monopoly on an invention for 17 yrs.

A

Patent

63
Q

Types of Software License

A

Public Domain, Freeware, Shareware, All Rights Reserved

64
Q

Terminologies and issues on cybercrime

A

Cybercrime, Fraud, Hacking

65
Q

a crime where a computer is the object of the crime or is used as a tool to commit an offense.

A

Cybercrime

66
Q

Catergories of Cybercrime

A
  • Crimes that target networks or devices
  • Crimes using devices to participate in criminal activities
67
Q

Crimes using devices to participate in criminal activities

A

phishing emails, cyberstalking, and identity theft.

68
Q

Crimes that target networks or devices

A

viruses, malware, dos attacks.

69
Q

general term used to describe a cybercrime that intends to deceive a person to gain essential data or information.

A

Fraud

70
Q

can be done by altering, destroying, stealing, or suppressing any information to secure an unlawful or unfair gain.

A

Fraud

71
Q

involves the partial or complete acquisition of specific functions within a system, network, or website.

A

Hacking

72
Q

aims to access to essential data and information, breaching privacy

A

Hacking

73
Q

What do most hackers attack?

A

corporate and government accounts.

74
Q

Most common types of cybercrime acts

A

Identity Theft, Scam, Virus, Ransomware, DDOS Attack, Botnet, Spamming, Phishing, Cyberstalking, Cyberbullying, Child Pornography

75
Q

specific form of fraud in which cybercriminals steal personal data, including passwords, data about the bank account, credit cards, debit cards, social security, and other sensitive information.

A

Identity Theft

76
Q

can be done by offering computer repair, network troubleshooting, and IT support services, forcing users to shell out hundreds of money for cyber problems that do not even exist.

A

Scam

77
Q

mostly, highly-skilled programs send viruses, malware, and Trojan, among others, to infect and destroy computers, networks, and systems.

A

Virus

78
Q

one of the most destructive malware-based attacks. It enters your computer network and encrypts files and information through public-key encryption.

A

Ransomware

79
Q

one of the most popular methods of hacking. It temporarily or completely interrupts servers and networks that are successfully running.

A

DDOS Attack or Distributed Denial of Service Attack

80
Q

Full term of DDOS Attack

A

Distributed Denial of Service Attack

81
Q

are controlled by remote attackers called “bot herders” in order to attack computers by sending spams or malware.

A

Botnet

82
Q

These are remote attackers that control the botnet

A

bot herders

83
Q

uses electronic messaging systems, most commonly emails in sending messages that host malware, fake links of websites, and other malicious programs.

A

Spamming

84
Q

They use “email spoofing” to extract confidential information such as credit card numbers, social security numbers, passwords, etc.

A

Phising

85
Q

The stalker will virtually follow the victim, including his or her activities. Most of the victims of cyberstalking are women and children being followed by men and pedophiles.

A

Cyberstalking

86
Q

one of the most rampant crimes committed in the virtual world. It is a form of bullying carried over to the internet.

A

Cyberbullying

87
Q

this cybercrime involves the exploitation of children in the porn industry.

A

Child Pornography