Lecture 25 - Ethics and Privacy in IT Flashcards

1
Q

Ethics

A

Ethics are a set of common beliefs about appropriate conduct within a community (a business, country, etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Business ethics

A

Business ethics concerns issues that confront business professionals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Practical Circumstances Influence Ethical Decisions (6)

A
  1. Consequences (harm or benefit from the decision)
  2. Society’s opinion (what others think)
  3. Likelihood of effect (probability of harm or benefit)
  4. Time to consequences
  5. Relatedness (how much you identify with the person or persons who will be affected)
  6. Reach of result (how many people will be affected)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is utilitarianism?

A

Greatest good for the greatest number – measure good

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Kant’s categorical imperative?

A

o Would things work if everyone behaved this way?

o Must uphold promises to individuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the ethic of justice?

A

What if the roles were reversed? Still fair?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the ethic of virtue?

A

Would you be proud to display this behavior to the public?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Dimensions of Ethical Computer Use (5)

A
  • Ownership and Intellectual Property
    Who owns data/process? Who has right to modify/destroy them?
  • Responsibility
    Who is responsible for quality of data/process?
  • Personal privacy
    Who has the right to see (a copy of) “private” data?
  • Access
    Who has the right to access official data/processes?
  • Unethical handling of information within business is a problem
    Relevant for designing any IT system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Intellectual property

A

Intellectual property is intangible creative work that is embodied in physical form e.g. software, music, sketches of a company’s product.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Copyright

A

Copyright is legal protection for an expression of an idea.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why is the security of email an important issue?

A

Email is completely insecure…

o Each e-mail you send results in at least 3 or 4 copies being stored on different computers.
o You can take measures to protect your e-mail, such as encrypting your messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are technologies to help monitor employees? (5)

A

• Key logger software: records each stroke and mouse click performed
• Screen capture programs periodically record what is displayed on the computer screen.
• Any CD your computer burns can be traced back to your CD drive.
• An Event Data Recorders (EDR) in a car collects data if a collision occurs. It will even keep information if a second impact follows the collision.
• Computer servers (Web, Email) keep a record of:
o Each email received and sent
o Each website visited and duration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are technologies to track customers? (6)

A
  1. Cookie
  2. Adware
  3. Spyware
  4. Trojan-horse software
  5. Web log
  6. Anonymous Web browsing (AWB)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cookie

A

Cookie - a small record deposited on your hard disk by a Web site containing information about you and your Web activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Adware

A

Adware is software that generates ads. It installs itself when you download another (usually free) program from the Web.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Spyware (sneakware, stealthware)

A

Spyware (sneakware, stealthware) is malicious software that comes hidden in downloaded software. It tracks your on-line movements and/or mines the information stored on your computer.

17
Q

Trojan-horse software

A

Trojan-horse software – unwanted software, hidden inside software you do want.

18
Q

Web Log

A

Web Log - Even without spyware, a Web site can capture a great deal of visitor information in its Web log. The Web log is usually stored on the Web server. At the very least, it will record the visitor’s clickstream (Web sites visited and for how long, ads viewed, and information about purchases).

19
Q

Anonymous Web browsing (AWB)

A

Anonymous Web browsing (AWB) services hide a user’s identity from the Web site being visited. Identifying information is removed by sending the information through the AWB’s server.

20
Q

Spam

A

Spam is unsolicited e-mail sent from businesses to advertise their goods and services.

21
Q

Identity theft

A

Identity theft is the forging of someone’s identity for the purpose of fraud.

22
Q

Phishing (carding, brand spoofing)

A

Phishing (carding, brand spoofing) is a technique used to get personal information for the purpose of identity theft. This is usually done using email.

23
Q

Pharming

A
  • When on a legitimate Web site, pharming occurs when your request is rerouted to a fake site for the purpose of collecting your information.
  • Pharming is accomplished by gaining access to the giant databases that Internet providers use to route Web traffic.
24
Q

PIPEDA

A
  • Canada’s Personal Information Protection and Electronic Documents Act (PIPEDA) became law in the late 1990s (includes ten principles).
  • It meets the privacy criteria of the European Union and ensures that the personal information of European citizens is protected in Canada.
25
Q

Foundations of PIPEDA (10)

A
  1. Accountability
  2. Identify the purposes and uses at or before the time you collect the information – must be for a reasonable purpose
  3. Consent to collect, use or disclose personal information
  4. Limiting Collection
  5. Limiting use, disclosure, and retention
  6. Accuracy
  7. Safeguarding personal information
  8. Openness
  9. Individual Access
  10. Challenging compliance – handling complaints in a timely and fair manner