Topic 11: Computer Crime, Fraud, Ethics and Privacy Flashcards

1
Q

Bot

A

Short for ‘robot’, an automated process that interacts with other networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Consequentialist Theories

A

Theories that argue that the consequences of one’s actions should be the basis for making an ethical decision.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cookies

A

Small files stored on a computer’s hard drive that keep a record of websites viewed, viewing preferences and user profiles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Customer Profiling

A

A process where data on a customer’s website viewing habits are used to build a profile of their interests, needs and preferences, which can then be used for targeted advertising.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cybercrime

A

A crime committed using a computer and/or the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data Mining

A

A data analysis technique where large amounts of data are taken and analysed for potential patterns and relationships that may exist.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Ethics

A

The term given to the implicit rules that guide us in our everyday behaviour, thoughts and actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Fraud

A

An act on behalf of a person that is deceptive or deceitful in some way in that it causes them to receive a benefit that they are not entitled to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hacking

A

Gaining unauthorised access to a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Identity Crime

A

A generic term that describes a range of activities/offences where a perpetrator uses an identity (some combination of personal information) that is fabricated, manipulated, stolen or assumed from another person in order to facilitate the commission of a crime(s).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Identity Fabrication

A

The creation of a fictitious identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Identity Fraud

A

Gaining money, goods, services or other benefits, or avoiding obligations by using a fabricated, manipulated or stolen/assumed identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Identity Manipulation

A

Altering one or more elements of an identity (e.g. name, date of birth, address etc.).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Identity Misuse

A

Using personal information for purposes extraneous to the original transaction — such as renting it to a vendor of related products, or mining it to create a consumer profile or direct marketing list.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Identity Takeover

A

Assuming parts or all of the identity of another person without their consent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Identity Theft

A

Stealing or assuming a pre-existing identity (or significant part thereof) without consent and, in the case of an individual, whether the person is living or deceased.

17
Q

Kantianism

A

A theory proposed by Kant that an action is morally right if it is motivated by a good will that stems from a sense of duty.

18
Q

Malware

A

Malicious code that is designed to damage, disrupt or steal data or disrupt computer systems and networks.

19
Q

Maxim

A

A rule or principle on which one acts.

20
Q

Non-consequentialist Theory

A

The theory that a decision or action should be based on duties and rights (or obligations).

21
Q

Online Fraud

A

Any type of fraud scheme that uses email, websites, chat rooms or message boards to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme.

22
Q

Personal Information

A

Information or an opinion about an identified individual, or an individual who is reasonably identifiable.

23
Q

Phishing

A

Using email to seek passwords and financial data from internet users.

24
Q

Privacy

A

The claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others.

25
Q

Radio Frequency Identification (RFID)

A

A system that transmits the identity (in the form of a unique serial number) of an object or person wirelessly, using radio waves. It is grouped under the broad category of automatic identification technologies.

26
Q

Spam

A

The sending of unsolicited emails or junk email.

27
Q

Trojan

A

Named after the mythical wooden horse used to gain access to Troy. It is a harmful piece of software that looks legitimate.

28
Q

Utilitarianism

A

The theory that the decision or action is right if it creates happiness for the greatest number of people.

29
Q

Virus

A

A program or code that replicates; that is, infects another program, boot sector, partition sector, or document that supports macros, by inserting itself or attaching itself to that medium.

30
Q

Whistleblower

A

A person who informs on a person or organisation engaging in an unlawful or immoral activity.

31
Q

Worm

A

A type of malware that is similar to a virus and causes the same type of damage, but does not require a host program.