Unit 2: Computer Ethics and Legal Issues in Information Technology

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/23

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

24 Terms

1
New cards

Copyright

An exclusive right granted by the federal government allowing the owner to reproduce and sell an artistic or published work.

2
New cards

copyright infringement

illegally copying or distributing copyrighted material

3
New cards

piracy

the unauthorized use or reproduction of another's work

4
New cards

Public Domain

Creative work that's not copyrighted and therefore free for you to use whenever you want.

5
New cards

Creative Commons

A kind of copyright that makes it easier for people to copy, share, and build on your creative work, as long as they give you credit for it.

6
New cards

Plagiarism

the practice of taking someone else's work or ideas and passing them off as one's own.

7
New cards

Fair Use Doctrine

Allows a user to make a copy of all or part of a work within specific parameters of usage, even if permission has not been granted.

8
New cards

Ethics

the principles of right and wrong that guide an individual in making decisions

9
New cards

Confidentiality

Respecting the privacy of both parties and keeping details secret

10
New cards

Values

the ideas, beliefs, and attitudes about what is important that help guide the way you live

11
New cards

license

a legal document giving official permission to do something

12
New cards

creative work

any idea or artistic creation that is recorded in some form, whether it's hard copy or digital.

13
New cards

intellectual property rights

The legal protection of the original works of inventors, authors, creators, and performers under patent, copyright, and trademark law.

14
New cards

values

15
New cards

Hacking

unauthorized access, modification, or use of an electronic device or some element of a computer system

16
New cards

Data Vandalism

the manipulation or destruction of data found in cyberspace

17
New cards

indentity theft

the fraudulent acquisition and use of a person's private identifying information, usually for financial gain.

18
New cards

Cyber bullying and harassment

the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.

19
New cards

Phishing Scam

a thief trying to trick you into sending them sensitive information. Typically these include emails about system updates asking you send your username and password, social security number or other things.

20
New cards

Malware

software designed to infiltrate or damage a computer system without the user's informed consent

21
New cards

computer virus

a software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer

22
New cards

quarantine

isolation to prevent the spread of something, such as a computer virus.

23
New cards

Upstander

someone who helps when they see cyberbullying occur

24
New cards

bystander

a person who is present at an event or incident but does not take part.