CHAPTER 3 EMERGING TECHNOLOGY ETHICS Flashcards
What is a Social Networking Site?
> a website that encourages members in its online community to share their interests, ideas, stories, photos, music, and videos with other registered users.
enables users to communicate thru text, voice and video chat and play games together online.
What is a Database?
a collection of data organized in a manner that allows access, retrieval, and use of that data.
Database Management Systems (DBMS) allow users to?
a. create a computerized database
b. add, modify and delete data in the database
c. sort and retrieve data from the database
d. create forms and reports from the data in the database
Examples of DBMS?
a. Microsoft Access
b. SQL
c. MongoDB
What is Big Data?
Big Data refers to the Large, Diverse sets of information that grow at every-increasing rates.
The Important 8vs for the Big Data Development?
- Volume - the amount of data to be processed at a given time
- Velocity - The speed of the data coming in and the speed of the transformed data leaving the computer
- Variety - the heterogeneous data sources needed to be identified and normalized before computing
- Viability - a model’s ability to represent reality
- Value - the worth of data to the customers
- Veracity - uncertainty in the data which may or may not be trusted
- Validity - refers to how accurate and correct the data is for its intended use
- Volatility - how old does your data need to be before it is considered irrelevant, historic, or not valuable any longer?
What is Digital Security Risk?
is any event or action that could cause a loss of or damage to computer or mobile device hardware, software, data, information or processing capability.
Common Digital Security Risks include :
a. internet and network attacks
b. unauthorized access and use
c. hardware theft
d. software theft
e. information theft
f. system failure
What is a Botnet/Zombie Army?
is a group of compromised computers or mobile devices connected to a network, such as the Internet, that are used to attack other networks.
What is Denial of Service Attack(DoS Attack)?
an assault whose purpose is to disrupt computer access to an Internet Service, such as the web or email.
What is Spoofing?
a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.
How to safeguard your computer systems?
a. use antivirus software
b. be sus of unsolicited email attachments
c. scan removable media bfore using it
d. implement firewall solutions
e. create access control that defines who can access a computer, device, or network when they can access it and what actions they can take while accessing it
f. maintain an audit trail that records in a file, both successful and unsuccessful access attempts
g. use username, password and pin number
h. use two step verification
i. encrypt your data or information
j. use of product activation
k. restrict physical access
l. back up your computer/file regularly
What is technology ethics?
moral guidelines that govern the use of computers, mobile devices, information systems, and related technologies.
Frequently discussed areas of computer ethics?
a. unauthorized use of computers, mobile devices and network
b. software theft (piracy)- unauthorized or illegal duplication of copyrighted software
c. information accuracy
d. intellectual property rights
e. codes of conduct
f. green computing
g. information privacy
What is Intellectual Property Rights?
right to which creators are entitled for their unique and originals works. The creation could vary such as ideas, inventions, art, writing, process, product names and logos.