ISBA Chap. 4

0.0(0)
Studied by 2 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/34

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 1:46 AM on 2/10/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

35 Terms

1
New cards

Ethics

The principles and standards that guide our behavior toward other people 

2
New cards

Confidentiality

The assurance that messages and information remain available only to those authorized to view them. 

3
New cards

Information Ethics

Govern the ethical and moral issues arising from the development and use of information technologies as well as the creation, collection, duplication, distribution, and processing of information itself or without the aid of computer technologies. 

4
New cards

Privacy

The right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent. 

5
New cards

Data scraping

The process of extracting large amounts of data from a website and saving it to a spreadsheet or computer 

6
New cards

Data harvesting

Refers to the process of collecting and extracting large amounts of data from various sources, often through automated means, for analysis, storage, or business purposes 

7
New cards

Digital trust

The measure of consumer, partner, and employee confidence in an organization's ability to protect and secure data and the privacy of individuals 

8
New cards

E-Discovery (or electronic discovery)

Refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry 

9
New cards

AI explainability

Refers to the ability to understand and interpret the output or prediction from the algorithm 

10
New cards

AI transparency

Refers to the extent to which the decision- making processes, algorithms, and data used by artificial intelligence systems are open, accessible, and understandable to stakeholders and users 

11
New cards

AI hallucination

The fabrication of imaginary text, images, and sources when an AI model does not have enough data to answer a question 

12
New cards

Ethical computer use policy

Contains general principles to guide computer user behavior 

13
New cards

Click-fraud

The abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking a link to increase charges or costs for the advertiser 

14
New cards

Competitive click-fraud

A computer crime in which a competitor or disgruntled employee increases a company’s search advertising costs by repeatedly clicking the advertiser’s link 

15
New cards

Cyberbullying

Includes threats, negative remarks, or defamatory comments transmitted through the Internet or posted on the website 

16
New cards

Threat

An act or object that poses a danger to assets 

17
New cards

Information privacy policy

Contains general principles regarding information privacy 

18
New cards

Fair information practices (FIPs)

A general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy 

19
New cards

General Data Protection Regulation (GDPR)

A legal framework that sets guidelines for the collection and processing of personal information of individuals within the European Union (EU) 

20
New cards

The right to be forgotten

Allows individuals to request to have all content that violates their privacy removed 

21
New cards

Acceptable use policy (AUP)

Requires a user to agree to follow it to be provided access to corporate email, information systems, and the Internet

22
New cards

Nonrepudiation

A contractual stipulation to ensure that ebusiness participants do not deny their online actions 

23
New cards

Internet use policy

Contains general principles to guide the proper use of the Internet 

24
New cards

Email privacy policy

Details the extent to which email messages may be read by others 

25
New cards

Spam

Unsolicited email

26
New cards

Anti-spam policy

Simply states that email users will not send unsolicited emails (or spam) 

27
New cards

Opt out

A user can stop receiving emails by choosing to deny permission to incoming emails 

28
New cards

Opt in

A user can receive emails by choosing to allow permissions to incoming emails 

29
New cards

Social media policy

Outlines the corporate guidelines or principles governing employee online communications 

30
New cards

Social media monitoring

The process of monitoring and responding to what is being said about a company, individual, product, or brand 

31
New cards

Social media manager

A person within the organization who is trusted to monitor, contribute, filter, and guide the social media presence of a company, individual, product, or brand 

32
New cards

Cyberbullying

Refers to the act of using digital communication technologies, such as social media platforms, text messages, or online forums, to harass, intimidate, threaten, or humiliate others 

33
New cards

Cyberbullying policy

Outlines the guidelines, expectations, and consequences related to cyberbullying within an organization or educational institution 

34
New cards

Workplace MIS monitoring

Tracks people’s activities by such measures as number of keystrokes, error rate, and number of transactions processed 

35
New cards

Employee monitoring policy

Explicitly state how, when, and where the company monitors its employees