Living in the Information Technology (IT) Era

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/20

flashcard set

Earn XP

Description and Tags

Vocabulary flashcards covering the role of information as a resource and economy, digital risks, internal property rights, and information control.

Last updated 1:30 AM on 5/9/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

21 Terms

1
New cards

Information as a Resource

A valuable asset treated like money, labor, or raw materials, used to improve decision-making, predict trends, and gain competitive advantage.

2
New cards

Information Economy

An economic system focusing on the creation, distribution, and use of information as a key economic activity, where data itself is a product.

3
New cards

Information Overload

Too much data

A state that occurs when the amount of received information exceeds an individual's ability to process and use it effectively, leading to mental fatigue and poor decision-making.

4
New cards

Data Privacy

The protection of personal information from misuse and the preservation of an individual's right to privacy.

5
New cards

Data Security

The practice of protecting data from unauthorized access, modification, or destruction.

6
New cards

Identity Theft

The act of stealing someone's personal information to use without permission, typically for financial gain or fraud.

7
New cards

Hacking

The unauthorized access to a computer system, network, or account, often caused by weak passwords or unsecured Wi-Fi.

8
New cards

Online Scams (Phishing)

A scam where attackers pretend to be legitimate organizations via fake emails or messages to trick users into providing sensitive information.

9
New cards

Data Breach

An incident where confidential or sensitive information is accessed, exposed, or stolen without authorization due to weak security or insider leaks.

10
New cards

Two-factor authentication (2FA)

A security process that requires two different forms of identification to access an account, serving as a prevention tip for hacking.

11
New cards

Intellectual Property Rights (IPR)

Protect individuals

protect the creations of individuals, ensuring they receive credit and benefit from their work.

Legal rights that protect creations of the human mind, such as inventions, artistic works, designs, symbols, and software.

12
New cards

Copyright

A type of IPR that protects original creative works such as books, music, movies, paintings, and computer software.

13
New cards

Trademark

A form of protection for brand names, logos, slogans, and symbols used in business to help identify genuine products.

14
New cards

Patent

Legal protection for new inventions or useful processes, granting the inventor exclusive rights for a limited time.

15
New cards

Trade Secret

Protection for confidential business information, such as secret recipes or manufacturing methods.

16
New cards

Industrial Design

Protection for the visual design or appearance of a product, such as the shape of a smartphone or furniture.

17
New cards

Piracy

The illegal downloading or unauthorized sharing of digital content, such as movies or software.

18
New cards

Plagiarism

The act of copying someone else’s work, such as assignments or articles, without giving proper credit.

19
New cards

Control of Information

The ability to decide who can access, use, share, and modify information to ensure it is accurate, secure, and used responsibly.

20
New cards

Algorithm Bias

A condition where the information a user sees online is filtered by corporations, shaping opinions and behavior.

21
New cards

Digital Literacy

The ability to evaluate sources and information effectively to navigate the challenges of the IT era.