Topic 5 Flashcards

1
Q

What are the four general categories of ethical issues related to IT?

A
  1. privacy
  2. accuracy
  3. property
  4. accessibility
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is privacy?

A

The right to be left alone and to be free of unreasonable personal intrusions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is information privacy?

A

The protection of personal data from those who should not have access to it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are some examples of organizations that have had privacy issues?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the two general rules of privacy for many countries?

A
  1. The right of privacy is not absolute, and privacy must be balanced against the needs of society
  2. The public’s right to know supersedes the individual’s right of privacy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are digital dossiers?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are data aggregators?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the two methods of informed consent?

A

Opt-out model
Opt-in model (privacy by default)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

GDPR, CSA, and PIPEDA are all examples of what?

A

ethics & privacy standards & legislations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is false about privacy protection?
1. there is inconsistent standards from country to country
2. using technology to monitor individuals as they go about their daily routines is against the law in Canada
3. there are different methods of informed consent
4. approximately 50 countries have data-protection laws

A
  1. using technology to monitor individuals as they go about their daily routines is against the law in Canada
    FALSE!
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the five factors that contribute to the increasing vulnerability of information resources?

A
  1. Today’s interconnected, interdependent, wirelessly networked business environment
  2. Smaller, faster, cheaper computers and storage devices
  3. Decreasing skills necessary to be a computer hacker
  4. International organized crime taking over cybercrime
  5. Lack of management support
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a specific example of how today’s interconnected, interdependent, wirelessly networked business environment?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the ten types of deliberate attacks?

A

1.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are three risk mitigation strategies?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the three major types of controls that organizations can use to protect their information resources?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly