chapter 4 Flashcards

1
Q

Information systems create opportunities for:

A

Intense social change,
threatening existing distributions of power,
money,
rights,
obligations
New kinds of crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 5 moral dimensions of the information age?

A

information rights and obligations,
property rights and obligations,
system quality,
quality of life,
accountability and control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The introduction of new information technology has a ripple effect, raising issues what are they

A

The introduction of new information technology has a ripple effect, raising new ethical, social, and political issues that must be dealt with on the individual, social, and political levels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Key technology trends that raise ethical issues

A

Technology trends that raise ethical issues include doubling computer power, rapidly declining data storage costs, networking advances, data analysis techniques, profiling, mobile device growth, and tracking of individual cell phones. Profiling involves combining data from multiple sources to create dossiers of detailed information on individuals, while nonobvious relationship awareness (NORA) involves combining data from multiple sources to find obscure hidden connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Moral Dimensions of Information Systems

A

Privacy
Intellectual Property
Accountability, Liability and Control
System and Data Quality
Quality of Life
Computer Crime and Abuse
Employment
Equity and Access
Health Risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

privacy and freedom in the Internet age

A

Claim of individuals to be left alone, free from surveillance or interference from other individuals, organizations, or state; claim to be able to control information about yourself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What challenges does the Internet bring to privacy?

A

Cookies
- Identify browser and track visits to site
- Super cookies (Flash cookies)
Web beacons (Web bugs)
- Tiny graphics embedded in e-mails and Web pages
- Monitor who is reading e-mail message or visiting site
Spyware
- Surreptitiously installed on user’s computer
- May transmit user’s keystrokes or display unwanted ads
- Google services and behavioral targeting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Property rights: Intellectual property

A

Intellectual property: intangible property of any kind created by individuals or corporations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Three main ways that intellectual property is protected:

A

Trade secret: intellectual work or product belonging to business, not in the public domain
Copyright: statutory grant protecting intellectual property from being copied for the life of the author, plus 70 years
Patents: grants creator of invention an exclusive monopoly on ideas behind invention for 20 years

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Challenges to intellectual property rights

A

Digital media different from physical media (e.g., books)
Ease of replication
Ease of transmission (networks, Internet)
Difficulty in classifying software
Compactness
Difficulties in establishing uniqueness

Digital Millennium Copyright Act (DMCA)
Makes it illegal to circumvent technology-based protections of copyrighted materials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an acceptable, technologically feasible level of system quality?

A

Flawless software is economically unfeasible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Three principal sources of poor system performance:

A

Software bugs, errors
Hardware or facility failures
Poor input data quality (most common source of business system failure)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Quality of life: Equity, access, boundaries

A

Balancing power, rapid change, maintaining boundaries, and balancing dependence and vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Employment

A

Reengineering work resulting in lost jobs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Computer crime

A

Computer crime: commission of illegal acts through use of computer or against a computer system—computer may be object or instrument of crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Computer abuse & spam

A

Computer abuse: unethical acts, not illegal
Spam: high costs for businesses in dealing with spam

17
Q

Equity and access—the digital divide

A

Certain ethnic and income groups in the United States less likely to have computers or Internet access

18
Q

Health risks

A

Repetitive stress injury (RSI)
Largest source is computer keyboards
Carpal tunnel syndrome (CTS)
Computer vision syndrome (CVS)
Eyestrain and headaches related to screen use
Technostress
Aggravation, impatience, fatigue