CH 3 Ethics for the Information Age (8th Edition)

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/59

flashcard set

Earn XP

Description and Tags

Flashcards of key vocabulary terms and definitions from Chapter 3: Networked Communications.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

60 Terms

1
New cards

M-PESA

Africa's first mobile money platform, allowing people to conduct financial transactions using their mobile phones.

2
New cards

Detrimental Effects of Social Media

The heavy use of social media can have detrimental effects on the mental health of young people, by increasing feelings of anxiety, lowering the quality of sleep, raising concerns about body image, exposing them to cyberbullying, and heightening the fear of missing out.

3
New cards

eSports

Watching other people compete at video games, or eSports, began with the internet café culture in South Korea and China and has now become a global phenomenon.

4
New cards

Twitch

The most popular platform for live streaming video games over the Internet.

5
New cards

Spam

Unsolicited bulk email.

6
New cards

Origin of the term 'Spam'

Brad Templeton, chairman of the board of the Electronic Frontier Foundation, traces the term back to the SPAM sketch from The Final Rip Off by Monty Python’s Flying Circus, in which a group of Vikings drown out a café conversation by loudly and obnoxiously repeating the word “spam”.

7
New cards

Early Spam Messages

Early spam messages provoked Internet users and generated big headlines. For example, in 1994 Phoenix lawyers Laurence Canter and Martha Siegel sent an email advertising their immigration services to more than 9,000 electronic newsgroups.

8
New cards

Peak of Spam Tsunami

In 2009 about 85 percent of all email messages were spam.

9
New cards

Advantage of Spam

The principal advantage of spam is its low cost compared to other forms of advertising.

10
New cards

Dictionary Attacks

Spammers bombard Internet service providers (ISPs) with millions of emails containing made-up addresses.

11
New cards

Botnets

Huge networks of compromised computers controlled by “bot herders.”

12
New cards

Zombie Computer

A computer with the bot program installed on it is called a zombie because it can be directed by a remote computer to perform certain tasks.

13
New cards

Spam Problem Origin

The spam problem arose because the Internet and email technology developed without taking social expectations into account.

14
New cards

Ann the Acme Accountant

Ann sent an email to all the other Acme employees, inviting them to stop by her desk during a break and place orders for girl scout cookies.

15
New cards

Categorical Imperative

We should always respect the autonomy of other people, treating them as ends in themselves and never only as the means to an end.

16
New cards

Problem with Internet Design

The design of the Internet allows sophisticated users to disguise their own email addresses. Spammers take advantage of this loophole to send out millions of messages, knowing that unhappy recipients will not be able to respond.

17
New cards

Hypertext System

A flexible database of information that allows Web pages to be linked to each other in arbitrary fashion.

18
New cards

Mobile Apps

Software programs that are loaded onto mobile devices.

19
New cards

Decentralized

An individual or organization can add new information to the Web without asking for permission from a central authority.

20
New cards

Unique Address

Every object on the Web has a unique address.

21
New cards

URL

A Web object’s address is called a URL (uniform resource locator).

22
New cards

E-Commerce Statistics

E-commerce represented 9 percent of all retail sales in the United States in the fourth quarter of 2017.

23
New cards

Craigslist

Allows people to place free classified advertisements on the Internet.

24
New cards

Social Network

A popular way for friends to keep in touch with each other.

25
New cards

Wiki

A Web site that allows multiple people to contribute and edit its content.

26
New cards

Blog

A personal journal or diary kept on the Web.

27
New cards

Web 2.0

People are now using the Web not simply to access content but to build communities and upload and share content they have created.

28
New cards

Darknet

A network of Web sites that can only be accessed through special software that encrypts messages and provides users with anonymity.

29
New cards

Crowdsourcing

An online method of getting goods or services from a large group of people.

30
New cards

Waze App

People use x to find the quickest way to drive from one place to another.

31
New cards

Crowdfunding

Financing a project through crowdsourcing.

32
New cards

FamilySearch.org

Offers free access to indexes to US census information from 1790 to 1940, allowing genealogical research to be performed remotely—and much more quickly—over the Internet.

33
New cards

Online Game

A game played on a computer network that supports the simultaneous participation of multiple players.

34
New cards

PC Bangs

Cybercafés have large-screen monitors enabling spectators to watch the game-play, which is full of virtual violence and mayhem.

35
New cards

Internet of Things

An increasing number of non-IT devices are being equipped with wireless connections to the Internet, forming an Internet of Things.

36
New cards

Kiva

A Web site supporting person-to-person microlending.

37
New cards

M-PESA in Kenya

Allows people in developing countries to save money and pay bills using their cell phones, bypassing traditional banks.

38
New cards

iCow

Uses voice and text messaging to help dairy farmers keep track of the gestation of their cows.

39
New cards

Twitter

Allows its users to send out text messages known as tweets.

40
New cards

Censorship

The attempt to suppress or regulate public access to material considered offensive or harmful.

41
New cards

Three Forms of Direct Censorship

Government monopolization, prepublication review, and licensing and registration.

42
New cards

Licensing

Licensing invites censorship.

43
New cards

Self-Censorship

A group deciding for itself not to publish material.

44
New cards

Internet Censorship

Government Filtering and Surveillance of Internet Content.

45
New cards

One of the most cherished—and most controversial—rights in the United States

Freedom of expression.

46
New cards

First-Amendment To The United States Constitution

Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the government for a redress of grievances.

47
New cards

Free Speech

Asking a judge to make the distinction turns it into a political decision.

48
New cards

Kate’s Blog

A journalism major who maintains a popular blog focusing on campus life. Kate attends a private birthday party in someone’s apartment for her friend Jerry, a college student active in the Whig Party on campus.

49
New cards

Web Filters

Two methods to determine if a page should be blocked, check the URL of the page against a blacklist of objectionable sites, look for combinations of letters or words that may indicate a site has objectionable content

50
New cards

Child Internet Protection Act

In March 2003, the Supreme Court weighed testimony in the case of United States v. American Library Association, deciding if the government can require libraries to install antipornography filters in return for receiving federal funds for Internet access?

51
New cards

Sexting

sending sexually suggestive text messages or emails containing nude or nearly nude photographs.

52
New cards

Identity Theft

The misuse of another person’s identity, such as name, Social Security number, driver’s license, credit card numbers, and bank account numbers. The objective is to take actions permitted to the owner of the identity, such as withdraw funds, transfer money, charge purchases, get access to information, or issue documents and letters under the victim’s identity.

53
New cards

Dumpster Diving

Looking for personal information in garbage cans or recycling bins.

54
New cards

Shoulder Surfing

Looking over the shoulders of people filling out forms.

55
New cards

Phishing

Gathering financial information via spam.

56
New cards

Instant Messaging

Refers to a system allowing two people to “chat” via typing in real time over the Internet.

57
New cards

Cyberbullying

The use of the Internet or the phone system to inflict psychological harm on another person.

58
New cards

Revenge Porn

A pornographic image or film which is published, posted or otherwise circulated without the consent of one or more of the participants, usually with malicious and vindictive intent, such as following a break-up.

59
New cards

Internet Addition

Excessive use of digital devices that causes harm.

60
New cards

Why do people get so attached to their devices?

The brains of heavy users of digital devices crave newness, and every text or email message results in a release of the neurotransmitter dopamine that feeds the craving.