Chapter 17 - Notes Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Social and ethical issues related to information technology are _____

A

unavoidable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are Ethics?

A

the study of how to decide if something is morally right or wrong

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Consequentialism/Utilitarianism?

A

focuses on the consequences of an act—on the whole good or bad outcomes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What points can be made that copying music is okay?

A
  1. There are many more music users than publishers
  2. Music users are happy to get free access
  3. Publishers get publicity for their products
  4. File sharing is akin to hearing a song on the radio
  5. Many users buy a song after listening to it
  6. Drop in sales may relate more to purchasing
    song-by-song rather than by album
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What points can be made that copying music is not okay?

A
  1. Early on MP3 sharing encouraged CD sales, but long-term trend is reduction in sales
  2. iTunes and Amazon sell one song at a time to compete with illegal file sharing
  3. If publishers cannot profit, then less music will be made
  4. Copyright protection is the law, and music file sharing is clearly illegal; encouraging illegal behavior is wrong
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Dialectic

A

a dialogue that explores an issue from both sides to lead to greater understanding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the Athens Affair?

A

Law enforcement needed to wiretap phones belonging to suspects. In Greece, hackers wiretapped 100 major business and political leaders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are possible analogies that could make with respect to the Athens Affair situation

A

Analogy #1: Lawful Intercept (LI) is like requiring everyone to record their face-to-face conversations (VoIP)

Analogy #2: LI is like suspicious activity reporting (SAR) in banking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the implications with the analogy of the Lawful Intercept being similar to VoIP?

A

LI systems go beyond rules for private conversations

Without LI, law enforcement can still monitor as with face-to-face conversations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the problems with the analogy of the Lawful Intercept being compared to VoIP?

A
  1. This argument would apply to normal phone tapping
  2. Society accepts the need for some phone taps
  3. What features of the analogy don’t work?
  4. Fourth party involvement: telecommunications provider
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the similarities with the analogy that the Lawful Intercept being compared to VoIP?

A
  1. Forms of communication
  2. Meant to include a limited number
  3. Possible for others to listen in
  4. Easy access for others; required recordings allow abuses by government or hackers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the similarities with the analogy between Lawful Intercept (LI) and Suspicious Activity Reporting (SAR)?

A
  1. Both are critical resources for criminals and require the help of external (law-abiding) entity
  2. Information helps to connect suspects with each other and discover networks of suspects
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the problems with the analogy between Lawful Intercept (LI) and Suspicious Activity Reporting (SAR)?

A
  1. Who initiates the sending of information differs (banks initiate, not government)
  2. The information provided is very different
    - Banks provide times, dates, and participants
    - Full conversation recording supplies much more detail
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

After analyzing the analogies between the Lawful Intercept and VoIP systems, what are possible options to consider?

A
  1. Require all VoIP systems to implement LI
  2. Do not require LI; use physical eavesdropping
  3. Require VoIP providers to report suspicious activities, but do not record conversations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Who are the stakeholders in the Athens Affair case study>

A
  1. Law enforcement
  2. Hackers and non-hacker criminals
  3. The public
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is hacktivism?

A

the use of technology to promote a political agenda or a social change.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What groups or organizations are examples of hacktivists?

A
  1. Wikileaks

2. Anonymous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is an analogy of a hacktivist breaking into a computer?

A

breaking into a computer is like breaking into someone’s house

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the similarities or differences of the analogy of breaking into a computer is like breaking into someone’s house?

A

Similarities:
1. Intruders are there without permission
2. Owners take precautions to discourage intrusion
3. Both are against the law
Differences
1. Burglars take physical objects, depriving owner
2. Hackers, in this case, copy intellectual property
3. No threat of violence with hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What utilitarian argument can be made about the analogy of breaking into a computer is like breaking into someone’s house?

A
  1. Owner of information loses control over it
  2. Hacker gains access to information
  3. Owner must increase security
    a. Increased awareness of vulnerability may be good
    b. Increased security only required because of hackers
  4. Hard to see consequences
  5. Must we distinguish between “good hackers” and “bad hackers”?
21
Q

What deontological argument can be made about the analogy of breaking into a computer is like breaking into someone’s house?

A
  1. The information being shared does not belong to the hacker
  2. Does not respect other people’s wishes or safety
  3. Rules exist because we, as a society, expect electronic privacy
  4. Why should their ethic override other people’s wishes?
  5. Does hacking treat other people as a means to an end?
22
Q

What is Deontology?

A

the study of duty and obligation.

ie. Focus on intent of an action, not consequences

23
Q

What is Kant’s 2nd categorical imperative?

A

Never treat a fellow human merely as a means to an end

24
Q

What is Paramedic ethics?

A

know a little and know when to ask ethical questions

25
Q

Ask these questions when facing an ethical problem

A
  1. Who are the stakeholders in this situation?
  2. What does each stakeholder have to gain or lose?
  3. What duties and responsibilities are important?
  4. Can you think of an analogous situation? Does it clarify the situation?
  5. Make a decision or repeat in dialectic form
26
Q

Given this situation, who are the stakeholders?

“Family doctor asks you to participate in a study of genetic diversity and disease by donating some skin cells. Cells are identified by a randomly assigned number and your zip code. Should you donate?”

A
  1. You
  2. Family doctor
  3. Pharmaceutical company (ie. Pharm Co)
  4. Skin cell donors to study, in general
  5. People with genetic disease
27
Q

Given this situation, what is at stake?

“Family doctor asks you to participate in a study of genetic diversity and disease by donating some skin cells. Cells are identified by a randomly assigned number and your zip code. Should you donate?”

A
  1. You lose a few skin cells
  2. Your privacy
    a. PHARM CO may seek to learn your identity
    b. Transmission of genetic data could be intercepted
  3. Your doctor might be paid for finding participants
  4. PHARM CO may develop new drugs
  5. Drugs could help people with genetic diseases
28
Q

Given this situation, identify the duties and responsibilities.

“Family doctor asks you to participate in a study of genetic diversity and disease by donating some skin cells. Cells are identified by a randomly assigned number and your zip code. Should you donate?”

A
  1. Doctor has a duty to treat you and protect your privacy
  2. You have a duty to pay the doctor and follow instructions
  3. PHARM CO has a duty to develop safe drugs
  4. PHARM CO has promised to pay doctors for finding participants
  5. PHARM CO has promised to respect your privacy
  6. Should you get royalties if your information leads to a profitable drug?
  7. Does PHARM CO own genetic information, or should it be shared freely?
  8. Why is zip code part of encoding?
  9. Do you have a duty to help cure disease?
29
Q

Given this situation, what is a possible analogy?

“Family doctor asks you to participate in a study of genetic diversity and disease by donating some skin cells. Cells are identified by a randomly assigned number and your zip code. Should you donate?”

A
  1. Compare to Red Cross blood donations

2. Compare to for-profit companies that solicit money for a charity

30
Q

Given this situation, what can be said about comparing them to the Red Cross?

“Family doctor asks you to participate in a study of genetic diversity and disease by donating some skin cells. Cells are identified by a randomly assigned number and your zip code. Should you donate?”

A

a. Both involve confidential health information
b. Both ask for volunteer donors
c. Both have collectors and users who are paid
d. Both involve altruistic reasons for donation
e. Blood is the valuable item; genetic information in skin cells is the value
f. Company might or might not find usefulness in cells
g. Company is driven by profit and loss

31
Q

Given this situation, what can be said about comparing them to for-profit companies that solicit money for a charity?

“Family doctor asks you to participate in a study of genetic diversity and disease by donating some skin cells. Cells are identified by a randomly assigned number and your zip code. Should you donate?”

A

a. Confidentiality is an issue for both
b. In both, volunteers are asked to donate by someone with financial interest in the donation
c. Both involve altruistic motivations
d. One involves donated money; the other does not
e. Doctor and pharmaceutical roles don’t quite match for-profit company

32
Q

Given this situation, what can be said about making a decision or looping again?

“Family doctor asks you to participate in a study of genetic diversity and disease by donating some skin cells. Cells are identified by a randomly assigned number and your zip code. Should you donate?”

A
  1. Must you decide right now (while at the doctor)?
  2. Should you do more research?
  3. Should you ask others?
    a. Might choose to decline unless you know more about PHARM CO’s use of your information, especially given the financial interests of other stakeholders
33
Q

What is cyberbullying?

A

humiliating, taunting, threatening, invading someone’s privacy online

34
Q

What is sexting?

A

sending sexually explicit messages or images using cell phones or tablet computers

35
Q

What happened in the case with Megan Meier?

A

Megan Meier committed suicide after being harassed on MySpace; harasser was the mother of a former friend

36
Q

What happened in the case with Tyler Clementi?

A

Tyler Clementi committed suicide after his roommate posted a recording of a sexual encounter with another man

37
Q

What ethical arguments can be made about sexting?

A
  1. Sexting between consenting adults is legal
    a. Images intended to be private between two individuals may not stay that way
    b. Once something is posted on the Internet, it is there forever
  2. Sexting involving minors may be considered child pornography, even if the perpetrator is the “child”
    a. Laws around minors sending other minors images have been relaxed in some states
38
Q

Don’t post something online if:

A
  1. You don’t want a large number of people to see it
  2. You would be embarrassed to have it widely circulated (to parents, employers, etc.)
  3. The material could be considered libelous or defamatory
  4. The information is private and of a sexual nature
39
Q

Assume that anything sent or posted online:

A

May become widely distributed and public and will last forever

40
Q

What is Fake news?

A

news deliberately altered or fabricated with the intent of passing it off as valid

41
Q

What are imposter sites?

A

mimic valid sites to spread fake news

42
Q

What is Manipulated content?

A

original content has been manipulated to fit the dialog of the posting site

43
Q

What is Fabricated content?

A

all of it is untrue

44
Q

What happened with the case of ”Pizzagate” fake news during the 2016 election

A
  1. Comet Ping Pong Pizza was said to be involved in a child pornography ring with presidential candidate
  2. Hillary Clinton and multiple members of congress
  3. An individual with an AK-47 showed up threatening to shoot anybody involved in child pornography in 2016
  4. Determined to be fabricated in order to hurt the Clinton campaign
45
Q

What should you do to verify a source when reading a story of interest online?

A
  1. Check the author
  2. Check the supporting links
  3. Who else is reporting it
  4. Consider the intent of the story
46
Q

Deontological reasoning focuses on ___ rather than ___

A

intent; outcomes

47
Q

Ethical issues with information technology include:

A
  1. Copyright protections in an era of file sharing
  2. Personal privacy and lawful intercept laws
  3. Hackers who claim to be a social good
  4. Privacy and the protection of personal information
  5. Cyberbullying, sexting and distribution of online postings
48
Q

Utilitarianism evaluates an ___ based on its _____

A

act; consequences

49
Q

A _____ is a comparative discussion of opposing sides intended to clarify and improve understanding

A

dialectic