MIS: Exam 4 - Ch 4 Flashcards

1
Q

Intense social change, threatening existing distributions of power, money, rights, and obligations. New kinds of crime - Example: Crypto-currency redefining the perception of value and currency.

A

IS raises ethical questions b/c they create the opportunity for:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The science and art of designing ciphers/codes.

A

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A digital/virtual currency that uses cryptography methods for security, thus increasing the difficulty associated with counterfeiting measures.

A

Crypto-currency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

1 of the 5 Moral dimension of the Information Age: (intellectual property, patent control)

A

Property rights and obligations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

1 of the 5 Moral dimension of the Information Age:(government mandates and regulations, what standards of data collection need to be regulated? HIPPA)

A

Accountability and Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

1 of the 5 Moral dimension of the Information Age: (what values should we preserve? Property rights and obligations can affect quality of life. Quality of life associated with data. Positives and negatives)

A

Quality of Life

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

1 of the 5 Moral dimension of the Information Age: (what rights do individuals have the right to protect?)

A

Information Rights and Obligations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

1 of the 5 Moral dimension of the Information Age: qual

A

System Quality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

More organizations depend on computer systems for critical operations

A

Doubling of Computer Power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Organizations can easily maintain detailed databases on individuals

A

Rapid Declining Data Storage Costs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Copying data from one location to another and accessing personal data from remote locations is much easier

A

Networking and Internet Advances

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Companies can analyze vast quantities of data gathered on individuals for:

A

Advances in data analysis techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Combining data and information from multiple sources to create detailed descriptions of individuals

A

Profiling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Combining data from multiple sources to find obscure hidden connections that might help identify criminals or terrorists . Also helps to identify potential new customers/markets, Business Intelligence/Analytics

A

NORA Nonobvious Relationship Awareness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Claim of individuals to be left alone, free from surveillance or interference from other individuals, organizations, or state (government). Claim to be able to control information about yourself. Reasonable Expectation of it

A

Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Principles governing collection and use of information, basis of most US and European privacy laws, based on mutuality of interest b/t record holder and individual

A

Fair Information Practices (circa 1973)

17
Q

Restated and extended FTC 1998

A

Provides guidelines for protecting online privacy. Used to drive changes in privacy legislation (COPPA, Gramm-Leach-Bliley Act, HIPAA)

18
Q

Tiny files downloaded by Web site to visitor’s hard drive to help identify visitor’s browser and track visits to site. Allow Web sites to develop profiles on visitors

A

Cookies

19
Q

Tiny graphics embedded in e-mail and Web pages to monitor who is reading message

A

Web Beacons/Bugs

20
Q

Surreptitiously installed on user’s computer. May transmit user’s keystrokes or display unwanted ads

A

Spyware

21
Q

Allows Web sites to communicate privacy policies to visitor’s Web browser – User specifies privacy levels desired in browser settings

A

P3P Platform for Privacy Preferences

22
Q

Tor directs Internet traffic through a free, worldwide, volunteer network consisting of more than four thousand relays to conceal a user’s location or usage from anyone conducting network surveillance or traffic analysis.

A

TOR Anonymity Network

23
Q

Intangible property of any kind created by individuals or corporations

A

Intellectual Property

24
Q

Intellectual work or product belonging to business, not in the public domain

A

Trade Secret

25
Q

Statutory grant protecting intellectual property from being copied for the life of the author, plus 70 years

A

Copyright

26
Q

Grants creator of invention an exclusive monopoly on ideas behind invention for 20 years

A

Patents

27
Q

Equity, access, and boundaries

A

Quality of Life

28
Q

Commission of illegal acts through use of compute or against a computer system – computer may be object or instrument of crime

A

Computer Crime

29
Q

Reengineering work resulting in lost jobs

A

Employment

30
Q

Certain ethnic and income groups in the United States less likely to have computers or Internet access

A

Equity and access - The digital divide

31
Q

Current political and social events are challenging the way we view our _____ and call into question our basic rights.

A

Privacy