Ethical Aspects - Droit de l’informatique et éthique informatique Flashcards

1
Q

What is the Budapest Convention’s main purpose?

A

The Budapest Convention addresses cybercrime and harmonizes national laws to enhance investigative methods and international cooperation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What ethical principle is focused on rule adherence, regardless of outcome?

A

Deontological ethics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which international convention prohibits child exploitation and requires safeguards against grooming?

A

The Lanzarote Convention.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is cyberharassment?

A

Cyberharassment is online harassment, including threats to expose personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name the three primary ethical theories discussed in the document.

A

Deontological, consequentialist, and teleological ethics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What distinguishes the response to harassment based on the offender’s age?

A

Minors often face ‘no blame’ approaches, focusing on awareness rather than punishment; adults face penal actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the ‘no blame’ approach?

A

A method used for minor offenders focusing on raising awareness and understanding impacts rather than punishment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Fill in the blank: Cybersecurity professionals are responsible for developing tools to mitigate ____ online.

A

harassment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why was the Budapest Convention created?

A

To create the first international treaty addressing cybercrime and establish a unified approach to handling cyber offenses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does grooming involve in a cyber context?

A

Grooming involves adults communicating with minors with the intent to meet or exploit them, even if no physical encounter occurs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are cybersecurity professionals’ ethical responsibilities on platforms like Twitter?

A

They are responsible for content moderation, balancing free speech with ethical considerations, and preventing harmful interactions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which ethical theory evaluates actions based on their consequences?

A

Consequentialist ethics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

True or False: The Budapest Convention is focused solely on preventing harassment.

A

False. It addresses various cybercrimes including child exploitation, copyright infringement, and hate speech.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define teleological ethics in the context of digital actions.

A

Teleological ethics judges actions by the goals they aim to achieve, with moral value tied to achieving a beneficial outcome.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What prompted new legal adaptations for child protection on the internet?

A

Ethical imperatives and the rise of harmful media content prompted legal changes for child protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the ethical dilemma in using automated content moderation systems?

A

Automated moderation can prevent harmful content exposure but risks creating overly censored, prudish environments.

17
Q

How does the ‘no blame’ approach differ from penal action?

A

It aims to raise awareness in minor offenders without punishment, unlike penal actions which apply to adults.

18
Q

Explain the ethical responsibilities of cybersecurity professionals when designing teenage dating apps.

A

They must ensure strict age verification and user separation to prevent predation by adults.

19
Q

What is a key challenge for cybersecurity on opinion platforms like Twitter?

A

Balancing content moderation with ethical responsibility without overstepping into excessive censorship.

20
Q

Which law explicitly addresses cybercrime including online child exploitation?

A

The Budapest Convention.

21
Q

How does the Lanzarote Convention address grooming?

A

It prohibits grooming, recognizing it as illicit even without physical encounters.

22
Q

Which ethical theory would prioritize ‘doing one’s duty’ over the consequences of an action?

A

Deontological ethics.

23
Q

Fill in the blank: Actions that are ethical often ____ legal standards in digital spaces.

A

precede.

24
Q

True or False: According to the text, something illegal in hacking can still be considered ethical.

A

True, as there may be ethical reasoning behind certain hacking actions.

25
Q

What is the relationship between ethics and law in cyber actions, as suggested by the document?

A

Ethical considerations often drive legal changes, setting standards for appropriate conduct.

26
Q

What is the primary goal of the Budapest Convention regarding online hate speech?

A

To harmonize national laws and foster cooperation in managing hate speech and cyber offenses.

27
Q

Fill in the blank: Content moderation on platforms like Twitter can create ethical challenges because it makes professionals act as ____ over free speech.

A

gatekeepers.

28
Q

What is cybercriminal activity on the dark web often associated with?

A

Illegal activities such as trafficking, cybercrime, and exploitation.

29
Q

Define consequentialist ethics.

A

An ethical approach that evaluates the morality of actions based on their outcomes or consequences.

30
Q

Fill in the blank: The first international treaty on cybercrime was the ____ Convention.

A

Budapest.