1/29
Looks like no tags are added yet.
Name  | Mastery  | Learn  | Test  | Matching  | Spaced  | 
|---|
No study sessions yet.
Cloud Computing
the delivery to users of on-demand services from third-party servers over a network
Cookie
a small file sent from a website and stored in a user’s Web browser to track the user’s Web browsing activities
Cybersquatting
the act of registering a domain name that is the same as, or confusingly similar to, the trademark of another and then offering to sell that domain name back to the trademark owner
Cyber Tort
a tort committed via the Internet
distributed network
a network that can be used by persons located (distributed) around the country or the globe to share computer files
domain name
the series of letters and symbols used to identify a site operator on the Internet (an Internet address)
goodwill
in the business context, the valuable reputation of a business viewed as an intangible asset
Internet service provider (ISP)
a business or organization that offers users access to the Internet and related services
peer-to-peer (P2P) networking
the sharing of resources among multiple computer or other devices without the requirement of a central network server
Social media
forms of communication through which users create and share information, ideas, messages, and other content via the Internet
Spam
bulk, unsolicited (junk) e-mail
typosquatting
a form of cybersquatting that relies on mistakes, such as typographical errors, made by Internet users when entering information into a Web browser
three-quarters
Unsolicited junk e-mail accounts for about … of all emails.
The Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act
two laws enacted to prohibit false and deceptive emails from originating in the U.S.
The U.S. Safe Web Act
allows U.S. authorities to cooperate and share information with foreign agencies in investigating and prosecuting those involved in in spamming, spyware, and various Internet frauds and deceptions
The Internet Corporation for Assigned Names and Numbers (ICANN)
oversees the distribution of domain names and has expanded the available domain names to include new generic top-level domain names
Anti-cybersquatting legislation
makes the practice of cybersquatting illegal if the one registering, trafficking in, or using the domain name as “bad faith intent” to profit from the mark
Meta Tags
search engines compile their results by looking through a website’s key words or …
Trademark dilution
when a trademark is used online, without authorization, in a way that diminishes the distinctiveness of the mark, does not require proof
Licensing
when companies choose to permit others to use their trademarks and other intellectual property
Digital Milennium Copyright Act
protects copyrights online and establishes civil and criminal penalties against anyone who bypasses encryption software or other technologies
File-Sharing
software used to download others’ stored music files or illegally copy movies, usually results in infringement
True
True/False: Law enforcement and administrative agencies now routinely use social media to detect illegal activity or conduct investigations, as do many businesses.
for employees to share information about work
Company-wide social media networks can be used …
Communication Decency Act (CDA)
Internet Service providers generally are not liable for defamatory messages posted by their subscribers
reasonable expectation
To sue for invasion of privacy a person must have a … of privacy in particular situation.
The Electronic Communications Privacy Act (ECPA)
prohibits the intentional interception or disclosure of any wire, oral, or electronic communication
“business extension exception”
The ECPA includes a … that permits employers to monitor employees’ electronic communications made in ordinary course of business
The Stored Communications Act (SCA)
part of the ECPA and prohibits intentional unauthorized access to stored electronic communications (such as back up data stored by employer)
Company Internet Privacy Policies
typically inform users what types of data they are gathering and for what purposes it will be used