MIS: Exam 4 - Ch 4 Flashcards
Intense social change, threatening existing distributions of power, money, rights, and obligations. New kinds of crime - Example: Crypto-currency redefining the perception of value and currency.
IS raises ethical questions b/c they create the opportunity for:
The science and art of designing ciphers/codes.
Cryptography
A digital/virtual currency that uses cryptography methods for security, thus increasing the difficulty associated with counterfeiting measures.
Crypto-currency
1 of the 5 Moral dimension of the Information Age: (intellectual property, patent control)
Property rights and obligations
1 of the 5 Moral dimension of the Information Age:(government mandates and regulations, what standards of data collection need to be regulated? HIPPA)
Accountability and Control
1 of the 5 Moral dimension of the Information Age: (what values should we preserve? Property rights and obligations can affect quality of life. Quality of life associated with data. Positives and negatives)
Quality of Life
1 of the 5 Moral dimension of the Information Age: (what rights do individuals have the right to protect?)
Information Rights and Obligations
1 of the 5 Moral dimension of the Information Age: qual
System Quality
More organizations depend on computer systems for critical operations
Doubling of Computer Power
Organizations can easily maintain detailed databases on individuals
Rapid Declining Data Storage Costs
Copying data from one location to another and accessing personal data from remote locations is much easier
Networking and Internet Advances
Companies can analyze vast quantities of data gathered on individuals for:
Advances in data analysis techniques
Combining data and information from multiple sources to create detailed descriptions of individuals
Profiling
Combining data from multiple sources to find obscure hidden connections that might help identify criminals or terrorists . Also helps to identify potential new customers/markets, Business Intelligence/Analytics
NORA Nonobvious Relationship Awareness
Claim of individuals to be left alone, free from surveillance or interference from other individuals, organizations, or state (government). Claim to be able to control information about yourself. Reasonable Expectation of it
Privacy
Principles governing collection and use of information, basis of most US and European privacy laws, based on mutuality of interest b/t record holder and individual
Fair Information Practices (circa 1973)
Restated and extended FTC 1998
Provides guidelines for protecting online privacy. Used to drive changes in privacy legislation (COPPA, Gramm-Leach-Bliley Act, HIPAA)
Tiny files downloaded by Web site to visitor’s hard drive to help identify visitor’s browser and track visits to site. Allow Web sites to develop profiles on visitors
Cookies
Tiny graphics embedded in e-mail and Web pages to monitor who is reading message
Web Beacons/Bugs
Surreptitiously installed on user’s computer. May transmit user’s keystrokes or display unwanted ads
Spyware
Allows Web sites to communicate privacy policies to visitor’s Web browser – User specifies privacy levels desired in browser settings
P3P Platform for Privacy Preferences
Tor directs Internet traffic through a free, worldwide, volunteer network consisting of more than four thousand relays to conceal a user’s location or usage from anyone conducting network surveillance or traffic analysis.
TOR Anonymity Network
Intangible property of any kind created by individuals or corporations
Intellectual Property
Intellectual work or product belonging to business, not in the public domain
Trade Secret