Social, Ethical, and Legal Issues Flashcards

1
Q

What are the 5 technology tends

A
  1. storage costs decreasing
  2. computing power increases
  3. big data techniques
  4. growth of internet
  5. growth of mobile phone usage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 5 implications of the technology trends?

A
  1. personal information
  2. digital property rights
  3. Data and system quality
  4. accountability
  5. quality of life
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a cautionary tale for the technology trends?

A

loss of control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain the ethical aspect

A

principles of right and wrong that individuals use to make choices to guide their behaviors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Explain the social aspect

A

affecting people and communication, i.e. etiquette, expectations, social responsibility (acting for the benefit of society), changing social institutions (family, education, organizations)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explain the legal/politcal aspect

A

knowing the law and working within its limits, i.e. changing old laws, creating new laws, and understanding existing
laws

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the 4 key legal terms

A
  1. responsibility: accepting the potential costs, duties, and obligations for decisions
  2. accountability: provide mechanisms to identify who is responsible
  3. liability: laws exist that permit individuals to recover damages for harm done to them
  4. due process: laws are well known and understood, can appeal to a higher authority to ensure that the laws are applied correctly
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the 5 ethical principles?

A
Golden rule
Kant's categorical imperative
Decartes' Rule of change
Utilitarian principle
Risk aversion principle
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Explain the golden rule

A

Do unto others as you would have them do unto you

Question: What would you want if you were in that situation?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Explain Kant’s Categorial Imperative

A

If an action is not right for everyone to take, then it is not right for anyone

Question: What if everyone did that?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Explain Descartes’ Rule of Change

A

If an action cannot be taken repeatedly, then it is not right to be taken at any time

Question: What if you kept on doing that?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Explain Utilitarian Principle

A

Take the action that achieves the higher or greatest value for all concerned

Question: What action achieves the greatest value for all?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Explain Risk Aversion Principle

A

Take actions that do not have a high
cost of failure (even if the probability of failure is low)

Question: What is the worst that can happen with this action?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the privacy act in canada and what does it establish?

A

Personal Information Protection and
Electronic Documents Act (PIPEDA)

It establishes principles for the collection, use, and disclosure of personal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define privacy

A

Privacy is the claim of individuals to be left alone, free from surveillance or interference from other individuals, organizations, or the state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What do organizations need to collect and use customer data?

A

Informed Consent

17
Q

What is considered personal information (4)

A

demographics
Internet
physical
financial

18
Q

What are the principles for the treatment of Personal Information

A

Accountability: appoint someone to be responsible

Consent: inform you of the purpose of collecting info

Limiting use: only use it for consented reason

Safeguards: PI must be protected

Individual access: you have right to access

Identifying purposes: must have a reason to collect PI

Limiting collection: only gather needed info

Accuracy: keep info accurate

Openness: privacy policy should be easy to find and understand

Recourse: provided with a complaint procedure

19
Q

What is terms of service?

A

Terms of service is the name we give to the document you consent to when you use a create an account at a website

Terms of service are often all-or-nothing, if you use the website or app you must agree to give up your privacy

20
Q

What are cookies?

A

World Wide Web challenges to privacy

a website stores a unique bit of data (like an account number) on your device

21
Q

What are third party cookies?

A

Companies like Facebook, Google, Amazon, track your activity across many websites, not just their own

22
Q

What are web beacons?

A

websites can tell that you’ve viewed a

certain item, say an ad in your email

23
Q

What is spyware?

A

software that gathers information about the user without the user’s knowledge

24
Q

What is international mobile equipment identity?

A

each smartphone has a unique International Mobile Equipment Identity (IMEI) associated with them (try dialing *#06#) that tracks that device and can be used to blacklist a phone in case of theft

25
What is browser fingerprinting?
- Each computer/cell phone has many ▪ settings (e.g. is “do not track” activated) ▪ hardware specs (what are my screen dimensions) - The combination of these properties that browsers can report makes each cell phone/laptop rare (or unique) This rareness provides a way for companies to track you even if many other tracking methods have been blocked
26
What are some examples of information that is collected?
* Your searches, seaches you started typing but then deleted. * Your posts, post you started but then deleted. * Sites visited, videos viewed. * Location (and from that: interests, where you live/work) * Relationships, people you have communicated with. * Items you have purchased, items you have looked at. * Images from you computer camera. * Sounds overheard by personal assistant (e.g. Alexa). * Health, medical data and financial data.
27
What are the 6 world wide web challenges to privacy?
``` Cookies Third party cookies Web beacons Spyware Intl Mobile Equipment identity browser fingerprinting ```
28
How is collected information used?
``` Advertising Tailoring content hiring decisions insurance coverage/premiums Preferential offers/pricing/etc. Identifying security risks Solving crimes ```
29
What is NORA?
nonobvious relationship awareness NORA combines info (telephone listings, customer lists, mailing lists, credit card purchases) from various sources (e.g. data brokers) to create a more detailed profile of each person
30
What are 3 strategies to combat personal info challenges?
Use 2 browsers -> one for day to day access one for private access Keep an old computer around for private access Use a computer in a library or lab
31
What is intellectual property?
Intellectual property (IP) is intangible property (a recipe, a song, an invention, software) created by individuals or corporations
32
What are 3 ways intellectual property can be protected?
a) Trade secret b) Copyright c) Patent
33
What is a trade secret?
intellectual work or product belonging to a business, provided it is not in the public domain, that confers economic advantage, and reasonable attempts have been made to keep it secret
34
What is copyright?
protects original literary, musical, artistic, dramatic works and computer software Prohibits copying of entire work or parts for at least 50 years
35
What is a patent?
grants the owner an exclusive monopoly on the ideas behind an invention for between 17 and 20 years
36
What are the key concepts of a patent?
originality (you created it) novelty (it’s a new idea) invention (useful)
37
What are the challenges to IP rights?
The internet has made it easy to copy and distribute intellectual property
38
What is the issue regarding data and system quality?
no large program is error free, errors exist with a low probability The largest source of error is poor data quality rather than faulty hardware or software
39
Explain software company liability in terms of being an information / service provider
when software acts more like an information provider (e.g. a book publisher) the producer is not liable when software acts more like a service provider (e.g. a machine controller) the producer can be held liable