ITM chap 4 Flashcards

2
Q

Ethics

A

The principles of right and wrong that individuals, acting as free moral agents, use to make choices to guide their behaviours

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

3 levels of disturbance caused by IT

A
  • Political - Social -Ethical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

5 Moral Dimentions of the Information Age

A
  • Information rights ad obligations - Property rights and obligations - Accountability and control - System Quality - Quality of life
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Information Rights

A

The rights that individuals and organizations have with respect to information that pertains to themselves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Profiling

A

The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

NORA

A

Nonbovious Relationship Awareness, can take information about people from many disparate sources and correlate relationships to find hidden correlations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Responsibility

A

To accept potential cose, duties, and obligations for decisions made

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Accountability

A

mechanisms are in place to determine who took responsible action, and who is responsible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Liability

A

Extends the concept of responsibility further to the area of laws. It is a feature of political systems in which a body of laws is in place that permits individuals to recover the damages done to them by other actors, systems, or organizations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Due Process

A

Laws are known and understood and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

5 Steps Ethical Analysis

A
  • Identify and clearly describe the facts - Define the conflict or dilemma, and identify the higher-order values involved - Identify the stakeholders - Identify the options that you can reasonably take - Identify the potential consequences of your options
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

6 Ethical principles

A
  • The Golden Rule - Immanuel Kant’s Categorical Imperative - Descartes’ rule of change - Utilitarian Principle - Risk Aversion Principle - Ethical “no free lunch” Rule
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The Golden Rule

A

Do unto others as you would have them do unto you

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Immanuel Kant’s Categorical Imperative

A

If an action is not right for everyone to take, it is not right for anyone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Descartes’ rule of change

A

If an action cannot be taken repeatedly, it is not right to take at all

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Utilitarian Principle

A

Take the action that achieves the higher or greater value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Risk Aversion Principle

A

Take the action that produces the least harm or the least potential cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Ethical “no free lunch” Rule

A

Assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise

20
Q

Privacy

A

The claim of individuals to be left alone, free from surveillance or interference from other individuals or organizations, including the state

21
Q

PIPEDA

A

Personal Information Protection and Electronic Documents Act

22
Q

Informed Consent

A

Consent given with knowledge of all the facts needed to make a rational decision

23
Q

Safe Harbour

A

A private, selfregulating policy and enforcement mechanism that meets the objectives of government regulators and legislation but does not involve government regulation or enforcement

24
Q

Cookies

A

Small text fi les deposited on a computer hard drive when a user visits Web sites. Cookies identify the visitor’s Web browser software and track visits to the site.

25
Q

Web Beacons or Bugs

A

Tiny objects invisibly embedded in e-mail messages and Web pages that are designed to monitor the behaviour of the user visiting a site or sending e-mail

26
Q

Spyware

A

Technology that aids in gathering information about a person or organization without their knowledge

27
Q

Banner Ad

A

A graphic display on a Web page used for advertising. The banner is linked to the advertiser’s Web site so that a person clicking on it will be transported to the advertiser’s Web site

28
Q

Opt out model of informed consent

A

Permits collection of personal information until the consumer forbids

29
Q

Opt In

A

Model of informed consent permitting prohibiting an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use.

30
Q

P3P

A

Platform of Privacy Preference. Enables automatic comunication of privacy between an e-commerce site and its visitors

31
Q

Intelectual Property

A

Intengible property created by individuals or corporations

32
Q

Trade Secret

A

Any intellectual work product—a formula, device, pattern, or compilation of data—used for a business purpose. Trade secret law are a matter of provincial jurisdiction

33
Q

Copyright

A

A statutory grant that protects creators of intellectual property from having their work copied by others for any purpose for a period of at least 50 years

34
Q

Patent

A

Grants the owner an exclusive monopoly on the ideas behind an invention for between 17 and 20 years

35
Q

MP3

A

Compression standard that can compress audio files for transfer over the Internet with virtually no loss in quality

36
Q

Digital Millennium Copyright Act (DMCA)

A

It implemented a World Intellectual Property Organization Treaty that makes it illegal to circumvent technology-based protections of copyrighted materials

37
Q

Computer Crime

A

The commission of illegal acts through the use of a computer or against a computer system

38
Q

Computer Abuse

A

The commission of acts involving a computer that may not be illegal but are considered unethical

39
Q

Spam

A

Junk e-mail sent by an organization or individual to a mass audience of Internet users who have expressed no interest in the product or service being marketed

40
Q

Digital Divide

A

Large disparities in access to computers and the Internet among different social groups and different locations

41
Q

Repetitive Stress Injury (RSI)

A

It is the most common ocupational disease today, it occurs when muscle groups are forced through repetitive actions often with high-impact loads (such as tennis) or tens of thousands of repetitions under low-impact loads

42
Q

Carpal Tunnel Syndrome (CTS)

A

The most common kind of computer related RSI

43
Q

Computer Vision Syndrom (CVS)

A

Refers to any eyestrain condition related to display screen use in desktop computers, laptops, e-readers, smart-phones, and handheld video games

44
Q

Technostress

A

Stress indused by computer use, symptomes include hostility toward humans, impatience, and fatigue