3: INFORMATION PRIVACY AND IT ETHICS Flashcards

1
Q

It refers to the inequalities that exist between groups of people in relation to access, use and knowledge of information and communication technologies (ICTs)

A

Digital Divide

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

refers to the growing gap between the underprivileged members of society, especially the poor, rural, elderly, and handicapped portion of the population who do not have access to computers or the internet

A

Digital Divide

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

multidimensional phenomenon that encompasses the following three distinct facets; global, social and democratic divide

A

Digital Divide

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Causes of digital divide

A

education, income levels, geographic restrictions, motivation and general interest, and digital literacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

outcomes generated by the digital divide

A

impact on economy, education, social domains, and society.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

narrowing the digital gap

A

○ increase digital literacy
○ develop relevant and local content in addition to telecommunications infrastructure
○ establish workable partnerships between all information and communication technology stakeholders
○ promote innovations geared towards overcoming the digital divide

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

we mean a branch of moral philosophy –a sense of rightness or wrongness of actions, motives and the results of these actions

A

Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

It identifies good or evil, just or unjust, fair or unfair practices, about moral duty.

A

Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

It is well-based standards that a person should do, concerning rights, obligations, fairness, benefits to society and so on.

A

Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

refer to the important and enduring beliefs or principles, based on which an individual makes judgements in life.

A

Moral Values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

It is at the center of our lives which act as a standard of behavior.

A

Moral Values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

They severely affect the emotional state of mind of an individual.

A

Moral Values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

They can be personal values, cultural values or corporate values

A

Moral Values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

structure of standards and practices that influences how people lead their lives. Unline laws that legally mandate what is right or wrong

A

Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

best action is the one that leas to the greatest amount of happiness for the greatest nukber of people

A

Utilitarianism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

creator of utilitarianiasm

A

Jeremy Bentham and John Stuart Mill

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

highest good was the good will

A

Kantianism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

intention behind an action rather than itsconsequences that make that action good

A

Kantianism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Moral behaviour is a duty. Persons of good will do their duty because it is their duty and for no other reasons

A

Kantianism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

set of moral standards that govern the use of computers

A

Computer Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

society’s views about the use of computers, both hardware and software

A

Computer Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Common issues of computer ethics

A

Privacy concerns, intellectual property rights and effects on the society

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

the science of information feedback systems.

A

Cybernetics, 1940-1950

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

published his monumental book, the “The Human Use of Human Beings”

A

Norbert Wiener, 1940-1950

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Who perceptively foresaw revolutionary social and ethical consequences?
Norbert Wiener, 1940-1950
26
This book is a comprehensive foundation which remains today a powerful basis for “Computer Ethics” research and analysis.
The Human Use of HumanBeings, 1940-1950
27
Who began to examine unethical and illegal uses of computers by computer professionals?
Donn Parker, 1960
28
published book Communications of the ACM in 1968.
Rules of Ethics in Information Processing, 1960
29
Who went on to produce books, articles, speeches and workshops that relaunched the field of computer ethics?
Donn Parker, 1960
30
Who was shocked at the reactions people had to his simple computer program?
Joseph Weizenbaum, late 1960's
31
a book plus the courses he offered at MIT and the many speeches he gave around the country in the 1970s, inspired many thinkers and projects in computer ethics.
Weizenbaum's book, late 1960's
32
What is the impact of the Weizenbaum's book to the people?
inspired many thinkers and projects in computer ethics
33
Who began to use the term "computer Ethics" to refer to that field of inquiry dealing with ethical problems aggravated, transformed, or created by computer technology?
Walter Maner,mid 1970's
34
What did Walter Maner began?
began to use the term "computer Ethics"
35
It refers to that field of inquiry dealing with ethical problems aggravated, transformed, or created by computer technology
Computer Ethics
36
What did Walter Maner self-published and disseminated?
Starter Kit in Computer Ethics., mid 1970's
37
What happened during the mid 1980's?
- Proliferation of computer-enabled crime, and computer failures - Major law suits regarding Software ownership, because of the work of Parker, Weizenbaum, Maner, etc. - Invasions of privacy via computer databases. - Books in computer ethics
38
When did the increase in the number of computer professionals organization happen?
mid 1990s
39
Primary Computer Ethics Issues
Privacy, Accuracy, Property, Cybercrime, and Access
40
responsibility to protect data about individuals.
Privacy
41
the responsibility of data collectors to authenticate information and ensure its accuracy.
Accuracy
42
who owns information and software and how they can be sold and exchanged.
Property
43
crime that involves a computer and a network.
Cybercrime
44
the responsibility of data collectors to control access and determine what information a person has the right to obtain about others and how the information can be used.
Access
45
means Malicious software. It was created to impair a computer system.
Malware
46
These are the common malware
viruses, spyware, worms, and trojan horses
47
software that tracks your online movements, mines the information stored on your computer, or uses your computer for some task you know nothing about.
Spyware
48
also known as information privacy or data privacy (Republic Act 10173 – Data Privacy Act of 2012),
Data Protection
49
Philippine Law for data protection
Republic Act 10173 – Data Privacy Act of 2012
50
is the process of safeguarding data which intends to influence a balance between individual privacy rights while still authorizing data to be used for business purposes.
Data protection
51
a way of keeping the user's identity masked through various applications
Anonymity
52
Terminologies and issues on privacy
Malware, Spyware, Data Protection, Anonymity
53
Terminologies and issues on Intellectual Property Rights (IPR)
Copyright, Intellectual Property, Plagiarism, Software License, Infringement, Piracy, Trade Secret
54
form of intellectual property that gives proprietary publication, distribution, and usage rights for the author
Copyright
55
means that whatever idea the author created cannot be employed or disseminated by anyone else without the permission of the author.
Copyright
56
creations protected by law.
Intellectual Property
57
an act of copying and publishing another person's work without proper citation. It's like stealing someone else's work and releasing it as your own work.
Plagiarism
58
allows the use of digital material by following the license agreement. Ownership remains with the original copyright owner, and users are just granted licenses to use the material based on the agreement.
Software License
59
copying of copyrighted pictures or text from web pages.
Infringement
60
illegal software copying
Piracy
61
work or products belonging to a business, not in public domain
Trade Secret
62
legal document granting owner exclusive monopoly on an invention for 17 yrs.
Patent
63
Types of Software License
Public Domain, Freeware, Shareware, All Rights Reserved
64
Terminologies and issues on cybercrime
Cybercrime, Fraud, Hacking
65
a crime where a computer is the object of the crime or is used as a tool to commit an offense.
Cybercrime
66
Catergories of Cybercrime
- Crimes that target networks or devices - Crimes using devices to participate in criminal activities
67
Crimes using devices to participate in criminal activities
phishing emails, cyberstalking, and identity theft.
68
Crimes that target networks or devices
viruses, malware, dos attacks.
69
general term used to describe a cybercrime that intends to deceive a person to gain essential data or information.
Fraud
70
can be done by altering, destroying, stealing, or suppressing any information to secure an unlawful or unfair gain.
Fraud
71
involves the partial or complete acquisition of specific functions within a system, network, or website.
Hacking
72
aims to access to essential data and information, breaching privacy
Hacking
73
What do most hackers attack?
corporate and government accounts.
74
Most common types of cybercrime acts
Identity Theft, Scam, Virus, Ransomware, DDOS Attack, Botnet, Spamming, Phishing, Cyberstalking, Cyberbullying, Child Pornography
75
specific form of fraud in which cybercriminals steal personal data, including passwords, data about the bank account, credit cards, debit cards, social security, and other sensitive information.
Identity Theft
76
can be done by offering computer repair, network troubleshooting, and IT support services, forcing users to shell out hundreds of money for cyber problems that do not even exist.
Scam
77
mostly, highly-skilled programs send viruses, malware, and Trojan, among others, to infect and destroy computers, networks, and systems.
Virus
78
one of the most destructive malware-based attacks. It enters your computer network and encrypts files and information through public-key encryption.
Ransomware
79
one of the most popular methods of hacking. It temporarily or completely interrupts servers and networks that are successfully running.
DDOS Attack or Distributed Denial of Service Attack
80
Full term of DDOS Attack
Distributed Denial of Service Attack
81
are controlled by remote attackers called “bot herders” in order to attack computers by sending spams or malware.
Botnet
82
These are remote attackers that control the botnet
bot herders
83
uses electronic messaging systems, most commonly emails in sending messages that host malware, fake links of websites, and other malicious programs.
Spamming
84
They use “email spoofing” to extract confidential information such as credit card numbers, social security numbers, passwords, etc.
Phising
85
The stalker will virtually follow the victim, including his or her activities. Most of the victims of cyberstalking are women and children being followed by men and pedophiles.
Cyberstalking
86
one of the most rampant crimes committed in the virtual world. It is a form of bullying carried over to the internet.
Cyberbullying
87
this cybercrime involves the exploitation of children in the porn industry.
Child Pornography