module 4 Flashcards
deepfake
fake videos or audio recordings that look and sound like real thing
acceptable use policy
set of rules specifying legal and ethical use of a system and consequences of noncompliance
accountability
issues involving both the users and the orgs responsibilities and liabilities
nonrepudiation
method for binding all the parties to a contract
guidelines to minimize invasion of privacy
- use websites with privacy policies that are easy to find, read and understand
- limit access to personal info
- ensure datas reliability and take precautions to prevent misuse of the data
- ensure data collection has a stated purpose
- must consent to use info for other reasons
- must verify data accuracy and only collect what is needed
record keeping systems should not be secret
must be able to prevent unauthorized access and misuse of data
federal data protections
health insurance portability and accountability act (HIPAA)
fair and accurate credit transaction act (FACTA)
childrens online privacy protection act (COPPA)
laws that protection EU citizens data
genetic data
racial/ethnic origin
religious beliefs
key components of general data protection regulation
user consent
anonymized data
data breach notifications within 72 hrs
safe transfer or data across borders
appointment of a GDPR compliance officier
GDPR business benefits
improved cx confidence
better data security
reduced maintenance by retiring legacy applications
better alignment with evolving technology
better decision making from effective use of cx info
cookies
small text files with unique ID tags that are embedded in a web browser and saved on the users hard drive
-used for welcoming new and returning cxs
-used to rmbr info for ordering
-helps websites customize pages for users
- a cookie manager can disable cookies if needed
log files
a record of a users actions on a web site
-generated by web server software
-can help determine cases of identity misrepresentation on web sites
-data is not always accurate as users can misrepresent themselves
social media networking ethics
open and fair access to all users
- authenticity: trustworthy and sincere
- transparency: members are honest and open with no hidden agenda
- communication: members are open to knowing other members and communicate properly
- business network ethics: open and fair access to all users
utilitarian networking
true utility, truthful and is not wasting users time
emotional networking
able to empathize with being ethical in all situations, emotion has no role
virtuous networking
all parties will act in good faith
digital citizenship
using info technology safely, ethically and responsibly
7 principles to good digitial citiznship
online etiquette
privacy protection
know how to stay safe online
dos and donts of info tech
protecting and respecting intellectual property
understanding ones digital footprint
healthy usage pattersn
two types of info on web
- public info: posted by an org or public agency - censored
- private info: posted by a person - not censored
intellectual property
a legal umbrella covering two categories of protections
- industrial property: inventions, copyrights, trademarks, logos, industrial desgins
-copyright material: literary and artistic works.
copyrights
protects tangible material and online materials (webpages and HTML) and computer graphics
trademarks
protects product names and identifying marks (logos)
trade secrets
protects ideas, info and innovationsa
patents
protects new processes
cybersquatting
registering, selling or using a domain name to profit from someone elses trademark
typosquatting (URL hyjacking)
relies on typographical errors made by web users
digital divide
info rich vs info poor
impact of info tech in the workplace
telecommuting
job deskilling
job upgrading
one skilled person can now do multiple jobs
virtual organizations
network of independent companies, suppliers, cxs, and manufacturers
green computing
involves the design, manufacture, use and disposal of info tech devices
ways to achieve green computing
design products that last longer and are modular in design
design search engines and computing routines that are fast and nrg efficient
use devices that consumer less nrg