ITM chap 4 Flashcards
Ethics
The principles of right and wrong that individuals, acting as free moral agents, use to make choices to guide their behaviours
3 levels of disturbance caused by IT
- Political - Social -Ethical
5 Moral Dimentions of the Information Age
- Information rights ad obligations - Property rights and obligations - Accountability and control - System Quality - Quality of life
Information Rights
The rights that individuals and organizations have with respect to information that pertains to themselves
Profiling
The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals
NORA
Nonbovious Relationship Awareness, can take information about people from many disparate sources and correlate relationships to find hidden correlations
Responsibility
To accept potential cose, duties, and obligations for decisions made
Accountability
mechanisms are in place to determine who took responsible action, and who is responsible
Liability
Extends the concept of responsibility further to the area of laws. It is a feature of political systems in which a body of laws is in place that permits individuals to recover the damages done to them by other actors, systems, or organizations
Due Process
Laws are known and understood and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly
5 Steps Ethical Analysis
- Identify and clearly describe the facts - Define the conflict or dilemma, and identify the higher-order values involved - Identify the stakeholders - Identify the options that you can reasonably take - Identify the potential consequences of your options
6 Ethical principles
- The Golden Rule - Immanuel Kant’s Categorical Imperative - Descartes’ rule of change - Utilitarian Principle - Risk Aversion Principle - Ethical “no free lunch” Rule
The Golden Rule
Do unto others as you would have them do unto you
Immanuel Kant’s Categorical Imperative
If an action is not right for everyone to take, it is not right for anyone
Descartes’ rule of change
If an action cannot be taken repeatedly, it is not right to take at all
Utilitarian Principle
Take the action that achieves the higher or greater value
Risk Aversion Principle
Take the action that produces the least harm or the least potential cost
Ethical “no free lunch” Rule
Assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise
Privacy
The claim of individuals to be left alone, free from surveillance or interference from other individuals or organizations, including the state
PIPEDA
Personal Information Protection and Electronic Documents Act
Informed Consent
Consent given with knowledge of all the facts needed to make a rational decision
Safe Harbour
A private, selfregulating policy and enforcement mechanism that meets the objectives of government regulators and legislation but does not involve government regulation or enforcement
Cookies
Small text fi les deposited on a computer hard drive when a user visits Web sites. Cookies identify the visitor’s Web browser software and track visits to the site.
Web Beacons or Bugs
Tiny objects invisibly embedded in e-mail messages and Web pages that are designed to monitor the behaviour of the user visiting a site or sending e-mail
Spyware
Technology that aids in gathering information about a person or organization without their knowledge
Banner Ad
A graphic display on a Web page used for advertising. The banner is linked to the advertiser’s Web site so that a person clicking on it will be transported to the advertiser’s Web site
Opt out model of informed consent
Permits collection of personal information until the consumer forbids
Opt In
Model of informed consent permitting prohibiting an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use.
P3P
Platform of Privacy Preference. Enables automatic comunication of privacy between an e-commerce site and its visitors
Intelectual Property
Intengible property created by individuals or corporations
Trade Secret
Any intellectual work product—a formula, device, pattern, or compilation of data—used for a business purpose. Trade secret law are a matter of provincial jurisdiction
Copyright
A statutory grant that protects creators of intellectual property from having their work copied by others for any purpose for a period of at least 50 years
Patent
Grants the owner an exclusive monopoly on the ideas behind an invention for between 17 and 20 years
MP3
Compression standard that can compress audio files for transfer over the Internet with virtually no loss in quality
Digital Millennium Copyright Act (DMCA)
It implemented a World Intellectual Property Organization Treaty that makes it illegal to circumvent technology-based protections of copyrighted materials
Computer Crime
The commission of illegal acts through the use of a computer or against a computer system
Computer Abuse
The commission of acts involving a computer that may not be illegal but are considered unethical
Spam
Junk e-mail sent by an organization or individual to a mass audience of Internet users who have expressed no interest in the product or service being marketed
Digital Divide
Large disparities in access to computers and the Internet among different social groups and different locations
Repetitive Stress Injury (RSI)
It is the most common ocupational disease today, it occurs when muscle groups are forced through repetitive actions often with high-impact loads (such as tennis) or tens of thousands of repetitions under low-impact loads
Carpal Tunnel Syndrome (CTS)
The most common kind of computer related RSI
Computer Vision Syndrom (CVS)
Refers to any eyestrain condition related to display screen use in desktop computers, laptops, e-readers, smart-phones, and handheld video games
Technostress
Stress indused by computer use, symptomes include hostility toward humans, impatience, and fatigue