ITM Chap 4 Flashcards

1
Q

Ethics

A

The principles of right and wrong that individuals, acting as free moral agents, use to make choices to guide their behaviours

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

3 levels of disturbance caused by IT

A
  • Political
  • Social
  • Ethical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

5 Moral Dimentions of the Information Age

A
  • Information rights ad obligations
  • Property rights and obligations
  • Accountability and control
  • System Quality
  • Quality of life
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Information Rights

A

The rights that individuals and organizations have with respect to information that pertains to themselves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Profiling

A

The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

NORA

A

Nonbovious Relationship Awareness, can take information about people from many disparate sources and correlate relationships to find hidden correlations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Responsibility

A

To accept potential cose, duties, and obligations for decisions made

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Accountability

A

mechanisms are in place to determine who took responsible action, and who is responsible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Liability

A

Extends the concept of responsibility further to the area of laws. It is a feature of political systems in which a body of laws is in place that permits individuals to recover the damages done to them by other actors, systems, or organizations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Due Process

A

Laws are known and understood and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

5 Steps Ethical Analysis

A
  • Identify and clearly describe the facts
  • Define the conflict or dilemma, and identify the higher-order values involved
  • Identify the stakeholders
  • Identify the options that you can reasonably take
  • Identify the potential consequences of your options
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

6 Ethical principles

A
  • The Golden Rule
  • Immanuel Kant’s Categorical Imperative
  • Descartes’ rule of change
  • Utilitarian Principle
  • Risk Aversion Principle
  • Ethical “no free lunch” Rule
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The Golden Rule

A

Do unto others as you would have them do unto you

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Immanuel Kant’s Categorical Imperative

A

If an action is not right for everyone to take, it is not right for anyone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Descartes’ rule of change

A

If an action cannot be taken repeatedly, it is not right to take at all

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Utilitarian Principle

A

Take the action that achieves the higher or greater value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Risk Aversion Principle

A

Take the action that produces the least harm or the least potential cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Ethical “no free lunch” Rule

A

Assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise

19
Q

Privacy

A

The claim of individuals to be left alone, free from surveillance or interference from other individuals or organizations, including the state

20
Q

PIPEDA

A

Personal Information Protection and Electronic Documents Act

21
Q

Informed Consent

A

Consent given with knowledge of all the facts needed to make a rational decision

22
Q

Safe Harbour

A

A private, selfregulating policy and enforcement mechanism that meets the objectives of government regulators and legislation but does not involve government regulation or enforcement

23
Q

Cookies

A

Small text fi les deposited on a computer hard drive when a user visits Web sites. Cookies identify the visitor’s Web browser software and track visits to the site.

24
Q

Web Beacons or Bugs

A

Tiny objects invisibly embedded in e-mail messages and Web pages that are designed to monitor the behaviour of the user visiting a site or sending e-mail

25
Spyware
Technology that aids in gathering information about a person or organization without their knowledge
26
Banner Ad
A graphic display on a Web page used for advertising. The banner is linked to the advertiser's Web site so that a person clicking on it will be transported to the advertiser's Web site
27
Opt out model of informed consent
Permits collection of personal information until the consumer forbids
28
Opt In
Model of informed consent permitting prohibiting an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use.
29
P3P
Platform of Privacy Preference. Enables automatic comunication of privacy between an e-commerce site and its visitors
30
Intelectual Property
Intengible property created by individuals or corporations
31
Trade Secret
Any intellectual work product—a formula, device, pattern, or compilation of data—used for a business purpose. Trade secret law are a matter of provincial jurisdiction
32
Copyright
A statutory grant that protects creators of intellectual property from having their work copied by others for any purpose for a period of at least 50 years
33
Patent
Grants the owner an exclusive monopoly on the ideas behind an invention for between 17 and 20 years
34
MP3
Compression standard that can compress audio files for transfer over the Internet with virtually no loss in quality
35
Digital Millennium Copyright Act (DMCA)
It implemented a World Intellectual Property Organization Treaty that makes it illegal to circumvent technology-based protections of copyrighted materials
36
Computer Crime
The commission of illegal acts through the use of a computer or against a computer system
37
Computer Abuse
The commission of acts involving a computer that may not be illegal but are considered unethical
38
Spam
Junk e-mail sent by an organization or individual to a mass audience of Internet users who have expressed no interest in the product or service being marketed
39
Digital Divide
Large disparities in access to computers and the Internet among different social groups and different locations
40
Repetitive Stress Injury (RSI)
It is the most common ocupational disease today, it occurs when muscle groups are forced through repetitive actions often with high-impact loads (such as tennis) or tens of thousands of repetitions under low-impact loads
41
Carpal Tunnel Syndrome (CTS)
The most common kind of computer related RSI
42
Computer Vision Syndrom (CVS)
Refers to any eyestrain condition related to display screen use in desktop computers, laptops, e-readers, smart-phones, and handheld video games
43
Technostress
Stress indused by computer use, symptomes include hostility toward humans, impatience, and fatigue