Social, Ethical, and Legal Issues Flashcards

1
Q

What are the 5 technology tends

A
  1. storage costs decreasing
  2. computing power increases
  3. big data techniques
  4. growth of internet
  5. growth of mobile phone usage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 5 implications of the technology trends?

A
  1. personal information
  2. digital property rights
  3. Data and system quality
  4. accountability
  5. quality of life
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a cautionary tale for the technology trends?

A

loss of control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain the ethical aspect

A

principles of right and wrong that individuals use to make choices to guide their behaviors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Explain the social aspect

A

affecting people and communication, i.e. etiquette, expectations, social responsibility (acting for the benefit of society), changing social institutions (family, education, organizations)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explain the legal/politcal aspect

A

knowing the law and working within its limits, i.e. changing old laws, creating new laws, and understanding existing
laws

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the 4 key legal terms

A
  1. responsibility: accepting the potential costs, duties, and obligations for decisions
  2. accountability: provide mechanisms to identify who is responsible
  3. liability: laws exist that permit individuals to recover damages for harm done to them
  4. due process: laws are well known and understood, can appeal to a higher authority to ensure that the laws are applied correctly
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the 5 ethical principles?

A
Golden rule
Kant's categorical imperative
Decartes' Rule of change
Utilitarian principle
Risk aversion principle
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Explain the golden rule

A

Do unto others as you would have them do unto you

Question: What would you want if you were in that situation?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Explain Kant’s Categorial Imperative

A

If an action is not right for everyone to take, then it is not right for anyone

Question: What if everyone did that?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Explain Descartes’ Rule of Change

A

If an action cannot be taken repeatedly, then it is not right to be taken at any time

Question: What if you kept on doing that?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Explain Utilitarian Principle

A

Take the action that achieves the higher or greatest value for all concerned

Question: What action achieves the greatest value for all?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Explain Risk Aversion Principle

A

Take actions that do not have a high
cost of failure (even if the probability of failure is low)

Question: What is the worst that can happen with this action?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the privacy act in canada and what does it establish?

A

Personal Information Protection and
Electronic Documents Act (PIPEDA)

It establishes principles for the collection, use, and disclosure of personal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define privacy

A

Privacy is the claim of individuals to be left alone, free from surveillance or interference from other individuals, organizations, or the state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What do organizations need to collect and use customer data?

A

Informed Consent

17
Q

What is considered personal information (4)

A

demographics
Internet
physical
financial

18
Q

What are the principles for the treatment of Personal Information

A

Accountability: appoint someone to be responsible

Consent: inform you of the purpose of collecting info

Limiting use: only use it for consented reason

Safeguards: PI must be protected

Individual access: you have right to access

Identifying purposes: must have a reason to collect PI

Limiting collection: only gather needed info

Accuracy: keep info accurate

Openness: privacy policy should be easy to find and understand

Recourse: provided with a complaint procedure

19
Q

What is terms of service?

A

Terms of service is the name we give to the document you consent to when you use a create an account at a website

Terms of service are often all-or-nothing, if you use the website or app you must agree to give up your privacy

20
Q

What are cookies?

A

World Wide Web challenges to privacy

a website stores a unique bit of data (like an account number) on your device

21
Q

What are third party cookies?

A

Companies like Facebook, Google, Amazon, track your activity across many websites, not just their own

22
Q

What are web beacons?

A

websites can tell that you’ve viewed a

certain item, say an ad in your email

23
Q

What is spyware?

A

software that gathers information about the user without the user’s knowledge

24
Q

What is international mobile equipment identity?

A

each smartphone has a unique International Mobile Equipment Identity (IMEI) associated with them (try dialing *#06#) that tracks that device and can be used to blacklist a phone in case of theft

25
Q

What is browser fingerprinting?

A
  • Each computer/cell phone has many
    ▪ settings (e.g. is “do not track” activated)
    ▪ hardware specs (what are my screen dimensions)
  • The combination of these properties that browsers can report makes each cell phone/laptop rare (or unique)

This rareness provides a way for companies to track you
even if many other tracking methods have been blocked

26
Q

What are some examples of information that is collected?

A
  • Your searches, seaches you started typing but then deleted.
  • Your posts, post you started but then deleted.
  • Sites visited, videos viewed.
  • Location (and from that: interests, where you live/work)
  • Relationships, people you have communicated with.
  • Items you have purchased, items you have looked at.
  • Images from you computer camera.
  • Sounds overheard by personal assistant (e.g. Alexa).
  • Health, medical data and financial data.
27
Q

What are the 6 world wide web challenges to privacy?

A
Cookies
Third party cookies
Web beacons
Spyware
Intl Mobile Equipment identity
browser fingerprinting
28
Q

How is collected information used?

A
Advertising
Tailoring content
hiring decisions
insurance coverage/premiums
Preferential offers/pricing/etc.
Identifying security risks
Solving crimes
29
Q

What is NORA?

A

nonobvious relationship awareness

NORA combines info (telephone listings,
customer lists, mailing lists, credit card
purchases) from various sources (e.g. data brokers) to create a more detailed profile of each person

30
Q

What are 3 strategies to combat personal info challenges?

A

Use 2 browsers -> one for day to day access one for private access

Keep an old computer around for private access

Use a computer in a library or lab

31
Q

What is intellectual property?

A

Intellectual property (IP) is intangible property (a recipe, a song, an invention, software) created by individuals or corporations

32
Q

What are 3 ways intellectual property can be protected?

A

a) Trade secret
b) Copyright
c) Patent

33
Q

What is a trade secret?

A

intellectual work or product belonging to a business, provided it is not in the public domain, that confers economic advantage, and reasonable attempts have been made to keep it secret

34
Q

What is copyright?

A

protects original literary, musical, artistic, dramatic works and computer software

Prohibits copying of entire work or parts for at least 50 years

35
Q

What is a patent?

A

grants the owner an exclusive monopoly on the ideas behind an invention for between 17 and 20 years

36
Q

What are the key concepts of a patent?

A

originality (you created it)
novelty (it’s a new idea)
invention (useful)

37
Q

What are the challenges to IP rights?

A

The internet has made it easy to copy and distribute intellectual property

38
Q

What is the issue regarding data and system quality?

A

no large program is error free, errors exist with a low probability

The largest source of error is poor data quality rather than faulty hardware or software

39
Q

Explain software company liability in terms of being an information / service provider

A

when software acts more like an information provider (e.g. a book publisher) the producer is not liable

when software acts more like a service provider (e.g. a machine controller) the producer can be held liable