Ethics, Privacy, and Security Flashcards

1
Q

Branch of philosophy that deals with the principle of right and wrong behavior

A

Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Whose definition of ethics states that it is study of the fundamental nature of knowledge, reality, and existence

A

Oxford

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Whose definition of ethics states that these are philosophical questions presented as problems to be studied or resolved

A

Wiki

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

→ interdisciplinary field of public health, health research, and clinical care (WHO)
→ prioritizes and justifies the actions done by healthcare professionals that may impact the health of patients (WHO)

A

Health Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Written document that allows patients to instruct practitioners in advance about the medical procedures when they are no longer able to express informed consent

A

Living Will

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Legal and Ethical Euthanasia Practices

A
  • Passive
  • Indirect
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Illegal and Unethical Euthanasia Practices

A
  • Voluntary
  • Involuntary
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Intentionally performing interventions to cause the patient’s death with informed patient consent

A

Voluntary Active Euthanasia

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Intentionally performing interventions to cause the patient’s death when the patient was incompetent to consent or was not informed at all

A

Involuntary Active Euthanasia

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Intentionally performing interventions to cause the patient’s death when the patient was mentally incapable of consenting

A

Non-voluntary Active Euthanasia

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Withdrawing medications/interventions to allow the patient to die gradually

A

Passive Euthanasia

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Administration of narcotics to reduce pain but with the incidental consequence of death

A

Indirect Euthanasia

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Physician provides medications and interventions to the patient with the understanding that they may use it to commit suicide

A

Physician-assisted Suicide

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Establishes a written code of ethics for policies and procedures with the goal of attaining proper conduct for employees

A

Health Ethics Committee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Branch of ethics that deals with the practice of clinical medicine and related scientific research

A

Medical Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

→ practical discipline with a structured approach to practitioners in identifying, analyzing, and resolving issues within the medical practice

→ acceptable conditions for exposure of individuals to risks and burdens for the benefit of society (research)

A

Clinical Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

School of Ethics: How to live your life?

A

Virtue Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

School of Ethics: Are your actions good?

A

Consequentialist Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

School of Ethics: Are your actions right?

A

Deontological/Duty-based Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

→ principles that govern the behavior of a person or group of people
→ provides rules on how people should act towards other people in different institutions
→ codified as a set of rules which a particular group of people will use—must be adhered to even if personal values differ

A

Professional Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Refers to when the healthcare provider has certain obligations to the client

A

Fiduciary Duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Refers to when written agreements/contracts with clients creates binding obligations to perform the terms in the contract

A

Contractual Obligations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Underpins all professional codes of conduct which may differ depending on the profession

A

Ethical Principles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

→ minimum standards of appropriate behavior in a professional context
→ sits alongside the general law of the land and personal values of professionals

A

Code of Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Refers to the concept that the principles that guide the work ethic should always be derived from the main objectives of the profession
Value Neutrality
26
Ethics pertaining to what computers do, how they work, and the user behavior for the benefit of individuals and society
Cyber Ethics
27
Manners applied to the internet and the use of technology in everyday situations
Cyber Etiquette
28
Type of privacy referring to personal space
Physical privacy
29
Type of privacy referring to personal data
Informational Privacy
30
Type of privacy referring to personal choices relating to cultural and religious affiliations
Decisional Privacy
31
Type of Privacy referring to personal relationships with family and intimates
Associational Privacy
32
Type of Privacy referring to the physical human which also includes thoughts
Body
33
Type of Privacy referring to the right to communicate with whoever one desires
Correspondence
34
Type of Privacy referring to diaries, photos, etc.
Data
35
Type of Privacy referring to wealth, debt, expenditure, and income
Finance
36
Type of Privacy referring to the right to anonymity
Identity
37
Type of Privacy referring to being wherever we want without others knowing
Location
38
Type of Privacy referring to not being invaded by government forces (belongings and possessions)
Territory
39
“The privacy of communication and correspondence shall be inviolable except upon lawful order of the court, or when public safety or order requires otherwise, as prescribed by law”
PH Constitution of 1987 under Article 3, Section 3
40
State of being free from danger or threat
Security
41
Refers to virus protection softwares and spam filtering softwares that keep machines free from malware
In-house or local security
42
Refers to 3rd party companies that handle and manage security
Outsourced Security as a Service (SECaaS)
43
Sets of practices used to protect digital information from unauthorized access and disclosure during its lifetime
Data Security
44
DMS stands for?
Document Management System
45
Document that gets issued after availing shredding services of organizations
Certificate of Destruction
46
Refers to when information portability is a primary concern
Data Leakage
47
Refers to when information portability is a primary concern
Data Leakage
48
The process that allows specific people or departments to have access to sensitive information
Whitelisting
49
T or F: software updates are done less frequently than system updates
False (system updates must be done less frequently and software updates must be done more frequently)
50
The data breach case wherein the Vastaamo company had an extortion attack in October 2020 wherein cyber criminals threatened to leak patient info unless they paid €200 worth of bitcoin as ransom
Digital Extortion Attack of a Finnish Psychotherapy Center
51
The data breach case on November 8th of 2019, wherein the clinic server was breached and data had been stolen
Facial Restoration Center
52
Type of data breach aka corporate espionage; there is a physical theft of documents or equipment containing important data like cardholder account information
Physical Data Breach
53
Type of data breach wherein there is an unauthorized access or deliberate attack on a system where cardholder data is processed, stored, or transmitted
Electronic Data Breach
54
Type of Data Breach that involves the capturing and recording of magnetic strip data on the back of credit cards; attached on a machine’s POS without the owner’s knowledge
Skimming
55
Type of cybersecurity threat that refers to storing sensitive information related to employees and business operations on the cloud
Cloud Vulnerability
56
Type of cybersecurity threat that is beneficial for cybercriminals
AI-Enhanced Cyberthreats
57
Type of cybersecurity threat wherein AI is combined with traditional fuzzing techniques to detect system vulnerabilities
AI Fuzzing
58
Type of cybersecurity threat wherein hackers inject instructions into the machine learning models
Machine Learning Poisoning
59
Type of cybersecurity threat that refers to programs that carry self-executing contract codes between a buyer and seller; fairly new system that is vulnerable to attacks
Smart Contract Hacking
60
Refers to the cyberespionage campaign against managed IT service providers
Operation Cloud Hopper
61
Refers to the malware that creates more convincing spam and avoids security detection
Adaptive Malicious Software
62
Malware that attacks the developer wherein they learn about the system flaw but have “zero” days to fix it
Zero-Day Attacks
63
The company that got hacked of 2 billion dollars since 2017
Ethereum
64
Refers to the process of protecting information by mitigating information risks
Information Security