COSC 1P50

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/99

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

100 Terms

1
New cards

What is Information literacy?

1) the adoption of appropriate information behavior to identify, though whatever channel or medium, information will fitted to information needs, leading to wise and ethical use of information in society

2) "Information Literacy is defined as the ability to know when there is a need for information, to be able to identify, locate, evaluate, and effectively use that information for the issue or problem at hand

2
New cards

Why is information literacy important?

- It addresses the problem of information overload It is an important skill which supports lifelong learning

It provides skills to evaluate information from a variety of sources

It helps in landing a job

3
New cards

What are the 5 steps for effective research?

Step 1) Define the need.

Step 2) Find the information.

Step 3) Evaluate the information.

Step 4) Organize the information.

Step 5) Communicate the information.

4
New cards

What are some key characteristics of 'defining the need'? Step 1

Identify a variety of types of potential sources

Consider the cost and benefits of acquiring the information

Explore general information sources Dictionaries, encyclopedias

Identify key concepts and terms Key Words and Concepts

5
New cards

In regard to "Defining the Need" Step 1; What are Primary and Secondary Sources?

Primary sources:

enable the researcher to get as close as possible to what actually happened reflects the individual viewpoint of a participant or observer

Secondary sources

A summary, interpretation or analysis Not necessarily reviewed (may be edited; marketing considerations).

6
New cards

What does it mean to "Find the Information?" Step 2

Select the most appropriate methods or retrieval systems Learn the scope, content and organization

Select efficient and effective approaches

7
New cards

What are two options within "Find the Information" for retrieving info?

Library:

- Library cultivates the content more closely on the way in • Library comes from a tradition of putting 'one' thing in 'one' place

Search Engine:

Search engines find the value of the relationships between documents They basically treat everything as a webpage (more of less)

8
New cards

What are the 4 modules within search engines?

- A document processor

A query processor A search and matching function

A ranking capability

9
New cards

What does Step 3 "Evaluate the information" look like?

- Applying things like the CRAAP test.

-avoiding things like 'fake news'.

10
New cards

What does CRAAP stand for? in CRAAP test.

Currency

Relevance

Authority

Accuracy

Purpose

11
New cards

What does Step 4 "Organize the Information" look like?

Ensures your work is honest, and provides evidence of your research

Allows the person reviewing your work to determine how legitimate your sources are

Gives credit to authors whose works you have used.

12
New cards

What does Step 5 "Communicating the Information" look like?

- The physical act of citing the material.

13
New cards

What is plagiarism?

the practice of taking someone else's work or ideas and passing them off as one's own.

14
New cards

About 70% of of university students say they cheat on tests, or have cheated, why is this number significant?

An environment in which cheating is ignored or tolerated breeds more and more cheating; it feeds on itself in a vicious cycle. It is harmful to everyone involved.

15
New cards

What are some rationale points for plagiarizing from students?

Academic, societal and family expectations and pressures

Desire to excel and pressure to get high grades (for good jobs or acceptance to grad school)

Stress

Competitive environment

Ignorance, laziness, apathy, lack of preparation and time management skills

16
New cards

What are the 6 D's of Plagiarism?

1) Define

2) Deter

3) Dialogue

4) Defend

5) Detect

6) Discipline

17
New cards

In relation to the 6 D's of plagiarism, describe the 'D' #1 - "Define"?

- Course syllabus

Knowledge of citing, paraphrasing, etc.

18
New cards

In relation to the 6 D's of plagiarism, describe the 'D' #2 - "Deter"?

- Role model

Tutorials

Course design

19
New cards

In relation to the 6 D's of plagiarism, describe the 'D' #3 - "Dialogue"?

Start of, and throughout, course (More on next slide) During hearing

20
New cards

In relation to the 6 D's of plagiarism, describe the 'D' #4 - "Defend"?

Knowledge of AI (again)

Discuss work habits

Care of work; Helping and asking for help; Academic Integrity 21 Group work; Journal; Procrastination

Ask for clarification if unsure of anything

Know Brock's procedures, if charged

21
New cards

In relation to the 6 D's of plagiarism, describe the 'D' #5 - "Detect"?

Time-honoured ways Phrase matching software

Turnitin Academic Integrity 22

Interpretation of TII reports

22
New cards

In relation to the 6 D's of plagiarism, describe the 'D' #6 - "Discipline"?

Evidence

Hearing

Consistency

23
New cards

Define plagiarism

Plagiarism is using the work/ideas of another as if they were your own, without "bounding the borrowed" and giving the appropriate credit

24
New cards

What are Lipson's Laws?

When you say you did the work yourself, you actually did it -- IOW, Academic Honesty!

25
New cards

What is McCabe's Hypothesis in relation to plagiarism?

15 - 20% of students will cheat no matter what we do.

15 - 20% of students will never cheat, regardless of the circumstances, therefore

60 - 70% of students can be influenced in their attitudes and behaviours after they arrive on campus

26
New cards

What is the 'pace of change'?

Rapid technological advancement

27
New cards

What is an example of change and unexpected development?

How has this affected our lives?

Cell Phones!

- Location tracking raises privacy concerns.

Cameras in cell phones affect privacy in public and non-public places.

28
New cards

Define 'Kill Switches'?

- Allow a remote entity to disable applications and delete files.

Are in operating systems for smartphones, tablets and some computers.

Used mainly for security, but raise concerns about user autonomy.

29
New cards

What are some positive effects of social networking?

- ease with which they can share aspects of their lives.

- Businesses connect with customers.

Organizations seek donations.

Groups organize volunteers.

30
New cards

What are some negative effects of social networking?

Stalkers and bullies stalk and bully.

Jurors tweet about court cases during trials.

Socialbots simulate humans.

31
New cards

How has Communication on the web affected our daily lives and privacy?

Blogs ("Web log") began as outlets for amateurs

wanting to express ideas, but they have become

significant source of news and entertainment.

Inexpensive video cameras and video-

manipulation tools have resulted in a burst

of amateur videos.

Many videos on the Web can infringe copyrights

owned by entertainment companies.

32
New cards

What are some examples of e-commerce? How does e-commerce impact human trust?

Amazon or Ebay -

People were reluctant to provide credit card

information to make online purchases, so

PayPal.com grew out of need for trusted

intermediary to handle payments. Encryption and secure servers made payments

s a f e r.

33
New cards

Define 'Free Stuff' in relation to unexpected developments?

Email programs and email accounts, browsers,

filters, firewalls, encryption software, word

processors, spreadsheets, software for viewing

documents, software to manipulate photos and

video, and much more

- Advertising pays for many free sites and services,

but not all

Generosity and public service flourish on the Web.

Many people share their expertise just because

they want to.

34
New cards

Define 'Artificial Intelligence' in relation to unexpected developments?

A branch of computer science that makes

computers perform tasks normally requiring

human intelligence.

35
New cards

What is the Turing Test?

If the computer convinces the

human subject that the computer is human, the

computer is said to "pass".

36
New cards

Define 'Robots' in relation to unexpected developments?

Mechanical devices that perform physical tasks

traditionally done by humans.

Can operate in environments that are hazardous

for people.

37
New cards

Define 'Robots' in relation to unexpected developments?

Assistive technology devices help restore

productivity and independence to people with

disabilities.

38
New cards

What are some challenges of technology?

Old problems in a new context: crime,

pornography, violent fiction

Adapting to new technology: thinking in a new

way

- Trade -offs and controversy: Increasing security

means reducing convenience.

Global reach of Net: ease of communication with

distant countries

39
New cards

What is ethics?

- Study of what it means to "do the right thing". Assumes people are rational and make free

choices.

40
New cards

What are three ethical POV's?

- Deontological theories Utilitarianism Natural rights

41
New cards

What is deontological ethics?

ethics based on duty with no consideration of personal benefits gained from doing right

42
New cards

What is utilitarianism?

Greatest good for the greatest number of people

43
New cards

What are natural rights?

Life, Liberty, and Property

44
New cards

Compare negative (Liberties) and positive (claim-rights) rights?

Negative (Liberties):

- The right to act without interference

Positive rights (claim-rights)

An obligation of some people to provide certain

things for others

45
New cards

What are the 3 key aspects of privacy?

- Freedom from intrusion (being left alone)

Control of information about oneself

Freedom from surveillance (from being

tracked, followed, watched)

46
New cards

What are some privacy threat categories?

- Intentional, institutional uses of personal

information

Unauthorized use or release by "insiders"

Theft of information

Inadvertent leakage of information

Our own actions

47
New cards

Discuss "New Technology, New Risks" in relation to privacy risks.

- Anything we do in cyberspace is recorded.

Huge amounts of data are stored.

People are not aware of collection of data.

Software is complex.

Leaks happen.

48
New cards

In relation to Privacy risks and principles, define "Personal Information"

any information

relating to an individual person.

49
New cards

In relation to Privacy risks and principles, define "Informed Consent"

Users being aware of what

information is collected and how it is used

50
New cards

In relation to Privacy risks and principles, define "Invisible Information gathering"

collection of

personal information about a user without the user's knowledge

51
New cards

In relation to Privacy risks and principles, define "Cookies"

Files a Web site stores on a visitor's

computer

52
New cards

In relation to Privacy risks and principles, define "Secondary Use"

Use of personal information

for a purpose other than the purpose for

which it was provided.

53
New cards

In relation to Privacy risks and principles, define "Data mining"

Searching and analyzing

masses of data to find patterns and develop

new information or knowledge.

54
New cards

What are two common forms for providing informed consent?

Opt out - Person must request (usually by

checking a box) that an organization not use

information.

Opt in - The collector of the information may

use information only if person explicitly

permits use (usually by checking a box)

55
New cards

What are the 7 fair information principles?

1. Inform people when you collect information.

2. Collect only the data needed.

3. Offer a way for people to opt out.

4. Keep data only as long as needed.

5. Maintain accuracy of data.

6. Protect security of data.

7. Develop policies for responding to law enforcement requests for data.

56
New cards

What are some examples of 'non-invasive' searches?

particle sniffers, imaging systems, location

trackers

57
New cards

What does "reasonable expectation of privacy" have to do with how the Supreme Court has interpreted the 4th Amendment?

Court said that the Fourth Amendment

protects people, not places. To intrude in a place where reasonable person has a

reasonable expectation of privacy requires a

court order.

58
New cards

What is data mining?

the process of analyzing data to extract information not offered by the raw data alone

59
New cards

What are targeted ads?

Ads targeted at the user based on the computer data habits.

60
New cards

Discuss the pros and cons of cloud storage

- Security of online data ? is this the most secure place for your personal data?

- It is certainly convenient however!

61
New cards

Discuss the implications of 'Location Tracking" and privacy?

Global Positioning Systems (GPS) - computer

or communication services that know exactly

where a person is at a particular time

Cell phones and other devices are used for

location tracking

Tools for parents

GPS tracking via cell phones or RFID

62
New cards

What is A right to be forgotten?

The right to have material removed

To exercise the right to be forgotten and request removal from a search engine

63
New cards

Discuss public records: Access vs. Privacy?

Public Records - records available to general

public (bankruptcy, property, and arrest records,

salaries of government employees, etc.)

Identity theft can arise when public records are

accessed

How should we control access to sensitive public

records?

64
New cards

Discuss Social Security Numbers within the context of National ID systems?

SSN's are:

- Too widely used

- easy to falsify

65
New cards

Discuss the implications of implementing a new national ID system? Pro's vs cons?

A new national ID system -

Pros

would require the card

harder to forge

have to carry only one card

A new national ID system -

Cons

Threat to freedom and privacy

Increased potential for abuse

66
New cards

What is encryption and public key cryptography?

- Privacy enhancing-technologies for

consumers

- Business tools and policies for protecting data

67
New cards

Compare Free Market view vs consumer protection view

Free Market View

Freedom of consumers to make voluntary

agreements

Diversity of individual tastes and values

Response of the market to consumer

preferences

Consumer Protection View

Uses of personal information

Costly and disruptive results of errors in

databases

Ease with which personal information leaks

out

68
New cards

What are the free speech principles?

-Advocating illegal acts is (usually) legal.

Anonymous speech is protected.

Some restrictions are allowed on advertising.

Libel and direct, specific threats are not

protected.

Inciting violence is illegal

69
New cards

What is offensive speech?

Most efforts to censor the Internet focus on

pornographic and other sexually explicit

material.

70
New cards

What does the phrase 'laws must not chill expression of legal speech' refer to?

Refers to freedom of speech guidelines.

- Distinguish speech from action. Advocating illegal

acts is (usually) legal

71
New cards

Discuss internet censorship and alternatives?

Made it a crime to make available to anyone under 18

any obscene or indecent communication

Found to be unconstitutional

The worst material threatening children was already

illegal

It was too vague and broad

It did not use the least restrictive means of

accomplishing the goal of protecting children

72
New cards

What is the most likely cause of a law being turned down?

Most likely, the law is found to be unconstitutional.

73
New cards

What does the phrase 'least restrictive means' refer to?

In regard to internet censorship, and the laws surrounding that, especially those protecting children, it is the goal of a law to provide the least restrictive form of protection.

74
New cards

Is Sexting considered legal or illegal?

Sexting is illegal! Falls under

75
New cards

What is spam? What are some of the issues surrounding spam?

Spam is unsolicited bulk email.

- Mostly commercial advertisement

Angers people because of content and the way it's sent

- Spam imposes a cost on recipients

76
New cards

In relation to 'sensitive material', what are 'leaks'?

Leaks of personal information.

-Value to society

Risks to society and individuals

- what is an example of a leaks source?

Wikileaks

Potentially dangerous leaks

Releasing a huge mass of documents

77
New cards

What are some positive uses of anonymity?

Protect political speech

Protect against retaliation and

embarrassment

78
New cards

What are some negative uses of anonymity?

protects criminal and antisocial activities

aids fraud, harassment, extortion, distribution

of child pornography, theft, and copyright

infringement

masks illegal surveillance by government

agencies

79
New cards

Is anonymity protected by the First Amendment?

yes.

80
New cards

Discuss censorship and political freedom?

Authoritarian governments have impeded flow of

information and opinion throughout history.

The vibrant communication of the Internet threatens

governments in countries that lack political and cultural

freedom.

81
New cards

Discuss net-neutrality vs market view?

Net Neutrality:

Refers to a variety of proposals for restrictions

on how telephone and cable companies

interact with their broadband customers and

set fees for services.

-every user on the internet should be treated the same way.

Market Views:

-Flexibility and market incentives will benefit

customers.

82
New cards

Define intellectual property

The intangible creative work, not its particular

physical form

Value of intelligence and artistic work comes

from creativity, ideas, research, skills, labor, non-

material efforts and attributes the creator

provides

Protected by copyright and patent law

- In simple terms, the person who created it, owns it!

83
New cards

As copyright holder, you hold exclusive rights to:

-To make copies

To produce derivative works, such as translations

into other languages or movies based on books

To distribute copies

To perform the work in public (e.g. music, plays) To display the work in public (e.g. artwork,

movies, computer games, video on a Web site)

84
New cards

In regard to intellectual property, how has new technology made things more difficult?

Digital technology and the Internet make

copyright infringement easier and cheaper.

New compression technologies make copying

large files (e.g. graphics, video and audio files)

feasible.

Search engines make finding material easier

85
New cards

What is the Fair use Doctrine?

- It is the ability to use an author's work legally. (to a limited degree)

86
New cards

What are four factors associated with the fair use doctrine?

1) Purpose and nature of use - commercial (less likely)

or nonprofit purposes

2) Nature of the copyrighted work 3) Amount and significance of portion used

4) Effect of use on potential market or value of the

copyright work (will it reduce sales of work?)

87
New cards

Discuss some ethical arguments regarding copying?

- Copying can decrease the amount of money that the copyright owner earns.

- Conversely, Copying enables users to try out products,

benefiting the copyright owner by encouraging

sales.

88
New cards

What are some methods to preventing copyright infringement?

Expiration dates within the software

Copy protection that prevents copying Activation or registration codes Court orders to shut down Internet bulletin boards

and Web sites

89
New cards

Discuss international piracy as it relates to intellectual property?

Some countries do not recognize or protect intellectual

property

Countries that have high piracy rates often do not have a

significant software industry

90
New cards

Discuss 'banning, suing, and taxing' in regard to intellectual property?

- Content industries can respond to copyright infringment by banning, suing, or taxing.

91
New cards

What is Digital Rights Management (DRM)?

Collection of techniques that control uses of

intellectual property in digital formats

Includes hardware and software schemes using

encryption

92
New cards

What is safe harbor in relation to intellectual property?

Protect Web-sites from lawsuits for copyright

infringement by users of site

93
New cards

Discuss the copyright issues that cloud storage raises?

Is copying legally purchased files to and from the

cloud a fair use? Will the companies operating the cloud services have

any responsibility for unauthorized content their

customers store and share

94
New cards

Discuss the copyright issues that search engines raise?

Caching and displaying small excerpts is fair use

Creating and displaying thumbnail images is fair

use

95
New cards

Discuss the copyright issues that online books raise?

Google has scanned millions of books that are in the

public domain and that are not; they display only

excerpts from those still copyrighted

Some court rulings favor search engines and

information access; some favor content producers

96
New cards

What is Free-software?

Free software is an idea advocated and supported by a

large, loose-knit group of computer programmers who allow people to copy, use, and modify their software

97
New cards

What is the concept of 'copyleft'?

the concept of copyleft

hundreds of programs freely available and

thousands of software packages available as free

software (with modifiable source code)

-Concepts such as copyleft and the GNU Public License

provide alternatives to proprietary software within

today's current legal framework

98
New cards

Describe the difference between a copyright and a patent?

Copyright:

the exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same.

Patent:

Patents protect inventions by giving the inventor a

monopoly for a specified time period.

99
New cards

What are patent trolls?

people who buy patents from other people or file for patents then go around looking for companies/people who infringed on their patents

-> money!

if violated, and not fought off, patent office can issue triple damages from infringer

100
New cards

How are software patents beneficial?

- Reward inventors for their creative work

Encourage inventors to disclose their inventions

so others can build upon them Encourage innovation

HOWEVER:

Patents can stifle innovation, rather than

encourage it.

Cost of lawyers to research patents and risk of

being sued discourage small companies from

attempting to develop and market new

innovations.

It is difficult to determine what is truly original and

distinguish a patentable innovation from one that

is not.