Section 2 Flashcards

1
Q

What are the objectives of normative ethics?

A

To establish standards or norms for ethical behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the objectives of descriptive ethics?

A

To describe and analyze people’s beliefs about morality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the key tensions present in ethical discussions?

A
  • Limited resources
  • Competing kinds of good
  • Different ideas about what is good.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the two varieties of ethical statements?

A
  • Normative statements
  • Descriptive statements
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a normative statement?

A

An assessment of how things should be rather than how they are.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an example of a normative statement?

A

‘Being kind is more important than being the most successful.’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the relationship between descriptive and normative judgments?

A

Descriptive judgments can reflect underlying normative judgments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the significance of choosing details in descriptions?

A

It involves normative judgments about relevance and importance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the challenge in making ethical judgments?

A

Determining which facts are most important and how to describe them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is participatory design?

A

A practice that emphasizes multidisciplinary reflection in design.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the purpose of studying different ethical frameworks?

A

To provide different ways of asking and answering questions about ethical challenges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True or False: Ethical living requires individuals to sacrifice their own needs.

A

False.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a zero-sum situation?

A

A scenario where one person’s gain is another person’s loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the difference between ‘ethics’ and ‘morality’?

A

‘Morals’ refer to personal standards, while ‘ethics’ involves thoughtful reflection on those standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the three changes that have been brought about by the societal impacts of computer technologies?

A
  • Reproducibility of information
  • Information Flow (many-to-many communication)
  • Identity Conditions: the ability to communicate anonymously but also have made individuals easier to track/identify in general
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the two major professional societies within the computing fields?

A
  • ACM (The Association for Computing Machinery)
  • IEEE (Institute of Electrical and Electronics Engineers)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the four major frameworks discussed in the textbook?

A
  • Deontology
  • Utilitarianism
  • Virtue Ethics
  • Communitarianism
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Deontology

A

Emphasizes moral obligation and prescribes or describes moral principles that govern ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Virtue Ethics

A

Centers on the human character as the locus of moral activity and emphasizes how we develop and exercise good qualities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Communitarianism

A

Focuses on the interdependence of human nature and how that shapes our possibilities for well-being and self-realization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Utilitarianism

A

Prioritizes the greatest happiness for the greatest number of people and therefore focuses on the outcomes of actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Metaphysics

A

Our understanding of how the world works and the nature of reality, including what human beings are and are for.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

This ethical framework emphasizes the rightness or wrongness of an action by reference to certain principles.

A

Deontology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a moral relativist?

A

Someone who believes that all moral judgements are based on individual viewpoints and that no one viewpoint ought to be privileged above any other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What are the three deontic forms of authority?

A

Political, Divine, and Human Reason

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Contractarianism

A

A deontological tradition that presupposes that human beings are driven by self-interest, and therefore the best strategy for deciding which institutions, principles, and social rules can place constraints on our otherwise selfish actions is to first find the ones on which we all would agree. Contractarianism grew out of social contract theory (from Thomas Hobbes in the early 1600s).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Divine Command Theory

A

A deontological tradition that derives its authority from God/gods. Moral obligations consist of obedience to deities in regards to obligatory or forbidden actions, and all other actions are considered to be permissible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Natural law theory

A

A deontological tradition that accepts that law can be considered and spoken of both as a sheer social fact of power and practice, and as a set of reasons for action that can be and often are sound as reasons and therefore normative for reasonable people addressed by them. “Unjust laws are not laws.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

T/F
Deontology is organized around the question of what is right rather than what is good

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Habitus

A

The patterns of living that issue from and reveal a person’s qualities of character

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What are virtues?

A

Virtues are the basic building blocks of human character that all people possess. A virtue is the capacity to exercise a specific quality. Ex. A habitual liar is deficient in honesty rather than lacking honesty entirely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Confucianism

A

A tradition of virtue ethics that argues that we are all basically same by nature at birth and habituation is what differentiates us.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Aristotelianism

A

A tradition of virtue ethics based on Aristotle’s teachings particularly in the Nicomachean Ethics, which lists 11 moral virtues that must be developed through habituation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Continence

A

The forcible restraining of one’s own appetites or desires

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What are some of the general assumptions that communitarianism makes about how communities work?

A
  • That they are enduring and have patterns, processes and structures that exist prior to the individuals who are formed by them
  • Shared wisdom is carried to a large extent by elders, those who have excelled in living in a way that the community values, especially sympathetic awareness
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What are the three ways that individuals rely on others to become the person they are?

A
  • Through support: material, emotional, or psychological
  • Through recognition and affirmation of one’s goals
  • Self-realization is rooted in the shared social meanings within communities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Sub-Saharan Metaphysics

A

A communitarian tradition that views the entire world as an interdependent and harmonious system with gradient boundaries instead of absolute divides.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is Ubuntu?

A

A human quality that involves engaging with the process of becoming/being human, attending and embracing the interdependence of human existence within an interdependent and harmonious universe. Being human means having particular obligations to other humans.

39
Q

What is Yorùbá communitarianism?

A

A tradition based in western Africa that takes hearing(instead of seeing) to be the foundation of how understanding works. This approach underscores the relational, rather than biological, nature of social roles and relationships, as physical appearances are not a significant indicator of who a person is.

40
Q

What is the consensus principle?

A

A principle rooted in both knowledge theory and the social organization of communitarianism that urges us to find common ground with others who have a stake in a given issue

41
Q

What is consequentialism?

A

A category of ethical theories that focuses primarily or solely on consequences in determining the moral worth of an action. Ex. Utilitarianism

42
Q

Classical Utilitarianism

A

The tradition of early utilitarian thinkers such as British philosophers John Stuart Mill and Jeremy Bentham. Sometimes associated with ethical hedonism(the pursuit of pleasure).

43
Q

Preference Utilitarianism

A

Moral statements are prescriptive and universalizable: to claim that we ought to do something, we must be willing to make the same claim from the perspectives of everyone affected. Preference satisfaction is the primary good, so one must take into account individuals present and future selves.

44
Q

Responsibility Ethics

A

An approach to ethical reasoning that begins with the notion that human beings are not only acting beings, but beings that are constantly reacting to powers, forces and events that are beyond our control. The idea that we could meaningfully anticipate the outcomes of our actions is unrealistic.

45
Q

Feminist Ethics

A

An approach to ethics that offers “a way of doing ethics” shaped by “the needs of those one cares for in relational contexts” rather than by “abstract, universal principles”

46
Q

The Capability Approach (CA)

A

Capabilities are the resources that individuals have (money, shelter, health, education, etc.). These capabilities along with their barriers should be considered within the context of governmental, institutional, and society-level choices more than individual ones.

47
Q

What is ethics?

A

A code of behavior that is defined by the group to which an individual belongs

48
Q

What are morals?

A

The personal principles upon which an individual bases his or her decisions about what is right and what is wrong

49
Q

What is corporate social responsibility?

A

The concept that an organization should act ethically by taking responsibility for the impact of its actions on its shareholders, consumers, employees, community, environment and suppliers.

50
Q

What are five reasons for pursuing corporate social responsibility goals?

A

1) to gain the goodwill of the community
2) to create an organization that operates consistently
3) to foster good business practices
4) to protect the organization and its employees from legal action
5) to avoid unfavorable publicity

51
Q

What are the five core characteristics of a profession?

A
  • A core body of theoretical knowledge
  • Authority, a professional has clients not customers
  • Special and often unique privileges given to them by the community
  • A code of ethics
  • Its own culture
52
Q

IEEE

A

Institute of electrical and electronics engineers. Formed from the merging of the American Institute of Electrical Engineers(AIEE) and the Institute of Radio Engineers (IRE) in 1963

53
Q

ACM

A

Association for Computing Machinery. The largest educational and scientific society dedicated to information technology that broadly encompasses computer science.

54
Q

SECEPP

A

Software Engineering Code of Ethics and Professional Practice. Was composed jointly by the ACM and the IEEE to target software engineering specifically.

55
Q

What are some of the major codes found within the ACM and IEEE codes of ethics?

A
  • Avoidance of harm & disclosure of risks
  • Honesty and accurate assessment
  • Avoidance or disclosure of conflicts of interest
  • Nondiscriminatory treatment
  • Education of the public
  • Working only in areas of competence
  • Respect for intellectual property
  • Professional development
  • Accepting & giving review
  • Workplace confidentiality
  • Equitable and privacy-protecting design
56
Q

What are the seven principles for designing and deploying algorithms to maximize transparency and accountability as outlined by the ACM?

A

1) Awareness (of possible biases)
2) Access and redress (enable questioning and redress for those affected)
3) Accountability
4) Explanation (of how decisions are made)
5) Data Provenance (how was training data collected?)
6) Auditability
7) Validation and testing

57
Q

AITP

A

Association of Information Technology Professionals. Chicago-based CompTIA acquired the AITP in 2017

58
Q

SysAdmin, Audit, Network, Security (SANS) Institute

A

Provides information security, training, and certification for a wide range of individuals.

59
Q

Common IT Industry Certifications

A
  • Security: CompTIA Security+
  • Security: Certified Security Analyst
  • Forensics: Certified Computer Examiner
  • Governance: Certified in the Governance of Enterprise IT
  • Project Management: Project Management Professional
60
Q

Common Vendor-Specific Certifications for IT Workers

A
  • Apple Certified Technical Coordinator
  • Cisco Certified Design Associate
  • Cisco Certified Network Professionals
  • Cisco Certified Internetwork Expert
  • Microsoft Certified Professional
  • Citrix Certified Administrator (CCA)
  • Oracle Database 12c: Certified Expert Performance Management and Tuning
  • Salesforce.com Certified Administrator
61
Q

Why are computer incidents becoming increasingly prevalent?

A

Increasing computer complexity, expanding and changing systems, an increase in the prevalence of BYOD policies, a growing reliance on vulnerable software, and the increasing sophistication of those who would do harm.

62
Q

What is the US-CERT?

A

US Computer Emergency Readiness Team

A partnership between DHS and the public and private sectors that was established to protect the nation’s Internet infrastructure against cyber attacks by serving as a Clearinghouse for info on new viruses, worms and other cyber security topics.

63
Q

What are the key elements of a risk-based strategy?

A

A risk assessment to ID and prioritize threats, a well-defined disaster recovery plan, definition of security policies needed to guide employees to avoid security-related problems, periodic security audits, compliance standards defined by external parties, and use of a security dashboard to help track key performance indicators of their security strategy.

64
Q

What are some key elements of the network security layer?

A

Authentication methods, firewalls, routers, encryption, proxy servers, VPN, and an IDS

65
Q

What are some key elements of the application security layer?

A

Authentication methods, user roles and accounts, and data encryption.

66
Q

What are some key elements of the end-user security layer?

A

Security education, authentication methods, antivirus software, and data encryption

67
Q

Smishing

A

Text phishing

68
Q

What should a security intrusion response plan address?

A

Notification, evidence protection, activity log maintenance, containment, eradication, and follow-up

69
Q

Vishing

A

Similar to smishing but victims receive a voice-mail message telling them to call a phone number or access a website

70
Q

What is the 4th amendment?

A

No unreasonable search and seizure.

71
Q

Fair Credit Reporting Act

A

Regulates operations of credit reporting bureaus

72
Q

Right to Financial Privacy Act

A

Protects the financial records of financial institution customers from unauthorized scrutiny by the federal government

73
Q

Gramm-Leach-Bliley Act (GLBA)

A

Established mandatory guidelines for the collection and disclosure of personal financial information by financial institutions: requires financial institutions to document their data security plans; and encourages institutions to implement safeguards against peetexting

74
Q

Fair and Accurate Credit Transaction Act

A

Allows consumers to request and obtain a free credit report each year from each of the three consumer credit reporting agencies

75
Q

HIPAA

A

Defined numerous standards to improve the portability and continuity of health insurance coverage. Reduce fraud, waste and abuse in health insurance care and healthcare delivery; and simplify the administration of health insurance

76
Q

American Recovery and Reinvestment Act

A

Included strong privacy provisions for EHRs, including banning the sale of health information, promoting the use of audit trails and encryption, and providing rights of access for patients. It also mandated that each individual whose health information has been exposed being notified within 60 days after discovery of a data breach.

77
Q

FERPA

A

Provide students and their parents with specific rights regarding the release of student records

78
Q

COPPA

A

Requires websites that cater to children to offer comprehensive privacy policies, notify parents or guardians about their data collection practices and receive parental consent before collecting any personal information from children under the age of 13.

79
Q

Title III of the Omnibus Crime Control and Safe Streets Act (AKA the Wiretap Act)

A

Regulates the interception of wire and oral communications

80
Q

FISA

A

Describes procedures for the electronic surveillance and collection of foreign intelligence information between foreign powers and agents of foreign powers.

81
Q

Executive Order 12333

A

Identifies the various government intelligence gathering agencies and defines what information can be collected, retained and disseminated by the agencies. It allows for the tangential collection of US citizen data even when those citizens are not specifically targeted.

82
Q

ECPA

A

Deals with the protection of communications while in transit from sender to receiver; the protection of communications held in electronic storage; and the prohibition of devices from recording, dialing, routing, addressing, and signaling information without a search warrant.

83
Q

CALEA

A

Requires the telecommunications industry to build tools into its products that federal investigators can use after gaining a court order to eavesdrop on conversations and intercept electronic communications

84
Q

USA Patriot Act

A

Modified 15 existing statutes and gave sweeping new powers both to domestic law enforcement and to international intelligence agencies, including increasing the ability of law enforcement agencies to eavesdrop on telephone communication, intercept email messages and search medical, financial and other records. The Act also eased restrictions on foreign intelligence gathering in the US.

85
Q

USA Freedom Act

A

Terminated the bulk collection of telephone metadata by the NSA instead requiring telecommunications carriers to hold the data and respond to NSA queries for data. The act also restored authorization for roving wiretaps in the tracking of lone wolf terrorists

86
Q

OECD for the Protection of Privacy and Transborder Data Flows of Personal Data

A

Created a set of fair information practices that are often held up as the model for organizations to adopt for the ethical treatment of consumer data

87
Q

EU Data Protection Directive

A

Requires member countries to ensure that data transferred to non-EU countries is protected. It also bars the export of data to countries that do not have data privacy protection standards comparable to those of the EU. After the passage of this directive, the EU and the US worked out an agreement that allowed US companies that were certified as meeting certain safe harbor principles to process and store data of European consumers and companies.

88
Q

European-United States Privacy Shield Data Transfer Program Guidelines

A

A stop-gap measure that allows businesses to transfer personal data about European citizens to the US. The guidelines were established after the European court of justice declared invalid the safe harbor agreement between the EU and the United States.

89
Q

GDPR

A

Addresses the export of personal data outside the EU, enabling citizens to see and correct their personal data, standardizing data privacy regulations within the EU and establishing substantial penalties for violation of its guidelines.

90
Q

FOIA

A

Grants citizens the right to access certain information and records of the federal government upon request.

91
Q

Privacy Act

A

Prohibits US government agencies from concealing the existence of any personal data record-keeping system

92
Q

E-discovery

A

The collection, preparation, review and production of electronically stored information for use in criminal and civil actions and proceedings

93
Q

What is an EDR?

A

A device that records vehicle and occupant data for a few seconds before, during and after any vehicle crash that is severe enough to deploy the vehicle’s airbags. The fact that most cars now come equipped with an EDR and that the data from this device may be used as evidence in a court of law is not broadly known by the public

94
Q

What is predictive coding?

A

A process that couples human guidance with computer driven concept searching in order to ‘train’ document review software to recognize relevant documents within a large collection