Digital Citizenship Vocab Flashcards
availability
when data and files are accessible and available when an operating system is secure
browser history
record of the sites visited in the past
CIA triad security model
the three principles form the cornerstone of any organization’s security infrastructure: confidentiality, integrity, availability
common knowledge
information that everyone knows
confidentiality
privacy of data
copyright
intellectual property that protects original works of authorship as soon as an author fixes the work in a tangible form of expression
cybersecurity
being protected against criminal use online
digital citizenship
responsible use of technology to engage with society
digital footprint
everything you leave behind on the internet; never goes away
computer ethics
how computing professionals make decisions regarding professional and social conduct
hacking
unauthorized access to computer data
integrity
accuracy, completeness, and quality of data as it’s maintained over time and across formats
intellectual curiosity
person’s willingness or desire to learn new things; acquisition of general knowledge
IP
intellectual property; work or invention that is the result of creativity; only person who created has rights to it
internet fast lanes
proposed internet rules that allow ISPs to charge technology companies for access to faster lanes, speeding up delivery of video and other
ISP
internet service provider; company that is able to provide you with access to the internet; verizon, AT&T, etc.
net neutrality
the principle that ISPs must treat all internet communications equally; highly debated
netiquette
digital etiquette (manners online)
paraphrase
put someone else’s words in your own words
patent
IP that gives its owner the legal right to exclude others from making, using, or selling an invention for a limited period of time in exchange for publishing an enabling disclosure of the invention
plagiarism
stealing someone else’s work or ideas and passing them off as one’s own
public domain
creative work to which no exclusive intellectual property rights apply
ransomware
malicious software designed to block access to a computer system until a sum of money is paid
right to be forgotten law
individuals have a right under certain circumstances to force search engines to remove links about them from the past
social media platform
web-based technology that enables the development, deployment and management of social media solutions and services
IoT
internet of things; the billions of physical devices around the world that are now connected to the internet, all collecting and sharing data; refrigerators, machines, etc.
trademark
word, phrase, design, or a combination that identifies your goods or services
works cited
formatted list of all sources you cited within your paper
In what country did the “right to be forgotten” law originate?
Spain
What are the 3 types of IP?
trademark, copyright, and patent
fair use
doctrine that permits limited use of copyrighted material without having to first acquire permission from the copyright holder; basically being able to use information without the fear of copyright
factors of fair use
1: purpose and character
2: nature of copyrighted work
3: amount or substantiality of portion used
4: effect of the use on the potential market for or value of the work
Why is this net neutrality important to all Americans, especially individuals and small businesses?
It ensures that you, not a corporate monopoly, choose how you access and use the Internet. It also protects your ability to access and send any lawful information on the Internet.