Chapter 4: Ethical and Social Issues in Information Systems Flashcards

1
Q

Accountability

A

The mechanisms for assessing responsibility for decisions made and actions taken.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Carpal Tunnel Syndrome (CTS)

A

Type of RSI in which pressure on the median nerve through the wrist’s bony carpal tunnel structure produces pain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Computer Abuse

A

The commission of acts involving a computer that may not be illegal but are considered unethical.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Computer Crime

A

The commission of illegal acts through the use of a computer or against a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Computer Vision Syndrome (CVS)

A

Eyestrain condition related to computer display screen use; symptoms include headaches, blurred vision, and dry and irritated eyes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cookies

A

Tiny file deposited on a computer hard drive when an individual visits certain Web sites. Used to identify the visitor and track visits to the Web site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Copyright

A

A statutory grant that protects creators of intellectual property against copying by others for any purpose for a minimum of 70 years.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Descartes’ Rules of Change

A

A principle that states that if an action cannot be taken repeatedly, then it is not right to be taken at any time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Digital Divide

A

Large disparities in access to computers and the Internet among different social groups and different locations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Digital Millennium Copyright Act (DMCA)

A

Adjusts copyright laws to the Internet Age by making it illegal to make, distribute, or use devices that circumvent technology-based protections of copy-righted materials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Due Process

A

A process in which laws are well-known and understood and there is an ability to appeal to higher authorities to ensure that laws are applied correctly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Ethical “No Free Lunch” Rule

A

Assumption that all tangible and intangible objects are owned by someone else, unless there is a specific declaration otherwise, and that the creator wants compensation for this work.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Ethics

A

Principles of right and wrong that can be used by individuals acting as free moral agents to make choices to guide their behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Fair Information Practices (FIP)

A

A set of principles originally set forth in 1973 that governs the collection and use of information about individuals and forms the basis of most U.S. and European privacy laws.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Golden Rule

A

Putting oneself in the place of others as the object of a decision.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Immanuel Kant’s Categorical Imperative

A

A principle that states that if an action is not right for everyone to take it is not right for anyone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Information Rights

A

The rights that individuals and organizations have with respect to information that pertains to themselves.

18
Q

Informed Consent

A

Consent given with knowledge of all the facts needed to make a rational decision.

19
Q

Intellectual Property

A

Intangible property created by individuals or corporations that subject to protections under trade secret, copyright, and patent law.

20
Q

Liability

A

The existence of laws that permit individuals to recover the damages done to them by other actors, systems, or organizations.

21
Q

Nonobvious Relationship Awareness (NORA)

A

Technology that can find obscure hidden connections between people or other entities by analyzing information from many different sources to correlate relationships.

22
Q

Opt-Int

A

Model of informed consent permitting prohibiting an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use.

23
Q

Opt-Out

A

Model of informed consent permitting the collection of personal information until the consumer specifically requests that the data not be collected.

24
Q

Patent

A

A legal document that grants the owner an exclusive monopoly on the ideas behind invention for 17 years; designed to to ensure that investors of new machines or methods are rewarded for their labor while making widespread use of their inventions.

25
Q

Privacy

A

The claim of individuals to be left alone, free from surveillance or interference from other individuals, organizations, or the state.

26
Q

Profiling

A

The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals.

27
Q

Repetitive Stress Injury (RSI)

A

Occupational disease that occurs when muscle groups are forced through repetitive actions with high-impact loads or thousands of repetitions with low-impact loads.

28
Q

Responsibility

A

Accepting the potential costs, duties, and obligations for the decisions one makes.

29
Q

Risk Aversion Principle

A

Principle that one should take the action that produces the least harm or incurs the least cost.

30
Q

Safe Harbor

A

Private self-regulating policy and enforcement mechanism that meets the objectives of government regulations but does not involve government regulation or enforcement.

31
Q

Spam

A

Unsolicited commercial e-mail.

32
Q

Spyware

A

Technology that aids in gathering information about a person or organization without their knowledge.

33
Q

Technostress

A

Stress induced by computer use; symptoms include aggravation, hostility toward humans, impatience, and enervation.

34
Q

Trade Secret

A

Any intellectual work or produce used for a business purpose that can be classified as belonging to that business, provided it is not based on information in the public domain.

35
Q

Utilitarian Principle

A

Principle that assumes one can put values in rank order and understand the consequences of various courses of action.

36
Q

Web Beacons

A

Tiny objects invisibly embedded in e-mail messages and Web pages that are designed to monitor the behavior of the user visiting a Web site or sending e-mail.

37
Q

What ethical, social, and political issues are raised by information systems?

A

Information technology is introducing changes for which laws and rules of acceptable conduct have not yet been developed. Increasing computing power, storage, and networking capabilities– including the Internet– expand the reach of individual and organizational actions and magnify their impacts. The ease and anonymity with which information is now communicated, copied, and manipulated in online environments pose new challenges to the protection of privacy and intellectual property. The main ethical, social, and political issues raised by information systems center around information rights and obligations, property rights and obligations, accountability and control, system quality, and quality of life.

38
Q

What specific principles for conduct can be used to guide ethical decisions?

A

Six ethical principles for judging conduct include the Golden Rule, Immanuel Kant’s Categorical Imperative, Descartes’ rule of change, the Utilitarian Principle, the Risk Aversion Principle, and the ethical “no free lunch” rule. These principles should be used in conjunction with an ethical analysis.

39
Q

Why do contemporary information systems technology and the Internet pose challenges to the protections of individual privacy and intellectual property?

A

Contemporary data storage and data analysis technology enables companies to easily gather personal data about individuals from many different sources and analyze these data to create detailed electronic profiles about individuals from many different sources and analyze these data to create detailed electronic profiles bout individuals and their behaviors. Data flowing over the Internet can be monitored at many points. Cookies and other Web monitoring tools closely track the activities of Web site visitors. Not all Web sites have strong privacy protection policies, and they do not always allow for informed consent regarding the use of personal information. Tradition copyright laws are insufficient to protect against software piracy because digital material can be copied so easily and transmitted to many different locations simultaneously over the Internet.

40
Q

How have information systems affected everyday life?

A

Although computer systems have been sources of efficiency and wealth, they have some negative impact. Computer errors can cause serious harm to individuals and organizations. Poor data quality is also responsible for disruptions and losses for businesses. Jobs can be lost when computers replace workers or tasks become unnecessary in reengineered business processes. The ability to own and use a computer may be exacerbating socioeconomic disparities among different racial groups and social classes. Widespread use of computers increases opportunities for computer crime and computer abuse. Computers can also create health problems, such as RSI, computer vision syndrome, and technostress.