1/34
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Ethics
The principles and standards that guide our behavior toward other people
Confidentiality
The assurance that messages and information remain available only to those authorized to view them.
Information Ethics
Govern the ethical and moral issues arising from the development and use of information technologies as well as the creation, collection, duplication, distribution, and processing of information itself or without the aid of computer technologies.
Privacy
The right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent.
Data scraping
The process of extracting large amounts of data from a website and saving it to a spreadsheet or computer
Data harvesting
Refers to the process of collecting and extracting large amounts of data from various sources, often through automated means, for analysis, storage, or business purposes
Digital trust
The measure of consumer, partner, and employee confidence in an organization's ability to protect and secure data and the privacy of individuals
E-Discovery (or electronic discovery)
Refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry
AI explainability
Refers to the ability to understand and interpret the output or prediction from the algorithm
AI transparency
Refers to the extent to which the decision- making processes, algorithms, and data used by artificial intelligence systems are open, accessible, and understandable to stakeholders and users
AI hallucination
The fabrication of imaginary text, images, and sources when an AI model does not have enough data to answer a question
Ethical computer use policy
Contains general principles to guide computer user behavior
Click-fraud
The abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking a link to increase charges or costs for the advertiser
Competitive click-fraud
A computer crime in which a competitor or disgruntled employee increases a company’s search advertising costs by repeatedly clicking the advertiser’s link
Cyberbullying
Includes threats, negative remarks, or defamatory comments transmitted through the Internet or posted on the website
Threat
An act or object that poses a danger to assets
Information privacy policy
Contains general principles regarding information privacy
Fair information practices (FIPs)
A general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy
General Data Protection Regulation (GDPR)
A legal framework that sets guidelines for the collection and processing of personal information of individuals within the European Union (EU)
The right to be forgotten
Allows individuals to request to have all content that violates their privacy removed
Acceptable use policy (AUP)
Requires a user to agree to follow it to be provided access to corporate email, information systems, and the Internet
Nonrepudiation
A contractual stipulation to ensure that ebusiness participants do not deny their online actions
Internet use policy
Contains general principles to guide the proper use of the Internet
Email privacy policy
Details the extent to which email messages may be read by others
Spam
Unsolicited email
Anti-spam policy
Simply states that email users will not send unsolicited emails (or spam)
Opt out
A user can stop receiving emails by choosing to deny permission to incoming emails
Opt in
A user can receive emails by choosing to allow permissions to incoming emails
Social media policy
Outlines the corporate guidelines or principles governing employee online communications
Social media monitoring
The process of monitoring and responding to what is being said about a company, individual, product, or brand
Social media manager
A person within the organization who is trusted to monitor, contribute, filter, and guide the social media presence of a company, individual, product, or brand
Cyberbullying
Refers to the act of using digital communication technologies, such as social media platforms, text messages, or online forums, to harass, intimidate, threaten, or humiliate others
Cyberbullying policy
Outlines the guidelines, expectations, and consequences related to cyberbullying within an organization or educational institution
Workplace MIS monitoring
Tracks people’s activities by such measures as number of keystrokes, error rate, and number of transactions processed
Employee monitoring policy
Explicitly state how, when, and where the company monitors its employees