Chapter 4: Ethical and Social Issues in Information Systems

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/23

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

24 Terms

1
New cards

Doubling of Computer Power, Rapidly Declining Data Storage Costs, Networking Advances and the Internet, Mobile Device Growth, and Advances in Data Analysis Techniques

Key Technology Trends

2
New cards

Doubling of Computer Power

More organizations depend on computer systems for critical operations

3
New cards

Rapidly Declining Data Storage Costs

Organizations can easily maintain detailed databases on individuals

4
New cards

Networking Advances and the Internet

Copying data from remote locations are much easier

5
New cards

Mobile Device Growth

Tracking of individual cell phones

6
New cards

Advances in Data Analysis Techniques

Profiling and NORA

7
New cards

Profiling

Combining from multiple sources to create dossiers of detailed information on individuals

8
New cards

Nonobvious Relationship Awareness (NORA)

Combining data from multiple sources to find obscure hidden connections that might help identify criminals or terrorists

9
New cards

Nonobvious Relationship Awareness (NORA) Tools

“Watch” Lists, Incident and Arrest Systems, Customer Transaction Systems, Telephone Records, and Human Resources Systems

10
New cards

Information Rights and Obligations, Property Rights and Obligations, Accountability and Control, System Quality, Quality of Life

Five Moral Dimensions of the Information Age

11
New cards

Information Rights and Obligations

About ourselves and organizations

12
New cards

Property Rights and Obligations

Protection of intellectual property rights

13
New cards

Accountability and Control

Who will be held accountable if harm is done

14
New cards

System Quality

Standards of data and system quality

15
New cards

Quality of Life

Preservation of values

16
New cards

What websites can track

Searches conducted, websites/pages visited, online content accessed, and items inspected or purchased over the web

17
New cards

How Cookies Identify Web Visitors

The web server reads the user’s web browser, and determines the operating system, browser name, version number, Internet address, etc. The server transmits this information in a tiny text file to the user’s browser, which is stored on the user’s computer’s hard drive. When the user returns to the web site, the server requests the contents of this file deposited in the computer, and the web server receives the information on the customer.

18
New cards

US Opt-Out Model

Default that consent is given

19
New cards

European Opt-In Model

Default that consent is not given

20
New cards

Three Main Ways Intellectual Property is Protected

Trade Secret, Copyright, and Patents

21
New cards

Trade Secret

Intellectual work or product belonging to business, not in the public domain

22
New cards

Copyright

Statutory grant protecting intellectual property from being copied for the life of the author, plus 70 years

23
New cards

Patent

A grant to the creator of an invention, granting the owner an exclusive monopoly on the ideas behind an invention for 20 years

24
New cards

Data Breach Notification Laws (State-Level)

Require individuals or entities affected by a data breach to notify their customers and other parties about the breach, as well as the take specific steps to remedy the situation based on state legislature