1/36
Flashcards about ethics and privacy issues related to information systems, based on lecture notes.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Tracking Apps: A Double-Edged Sword
New technology allows apps to track user locations and activities, but current laws may not adequately protect user privacy.
Mobile Location Tracking
Apps use Mobile Location Tracking to know your location and phone activity, which can be sold or used to better understand users.
Ethical Dilemma of Data Usage
An ethical dilemma arises because companies use data to improve services and make money, but this can invade user privacy.
Fitness App Data Sharing
A fitness app tracks user runs and health data (like heart rate) and shares this information with advertisers, posing a privacy risk despite anonymization.
Ride-Hailing App Data Monetization
A ride-hailing app sells user travel history to other companies, raising privacy concerns due to the lack of regulations.
Ethics
Knowing what is right and wrong and using that to make good choices.
Impact of Information Systems
Information systems can rapidly change society, affecting power, money, and individual rights, while also creating new crime types like hacking or data theft.
Information Rights and Obligations
The rights and obligations related to controlling personal information and knowing how it's used.
Property Rights and Obligations
The rights and obligations concerning unauthorized copying or stealing of digital content like music, software, or photos.
System Quality
The importance of technology working correctly without bugs or problems that can harm users.
Accountability and Control
Ensuring someone takes responsibility when a system malfunctions or causes harm.
Quality of Life
Aiming for technology to improve lives by reducing stress, increasing fairness, and creating more jobs.
Profiling
The ability to collect and combine data to understand someone's behavior or identity.
Privacy Definition
Privacy means having the right to be left alone and control personal information.
Fair Information Practices (FIP)
Rules that explain how companies should collect and use your data to ensure it is handled fairly and safely.
Notice/Awareness Principle
People should be told that their data is being collected.
Choice/Consent Principle
People should be able to say yes or no to data collection.
Access/Participation Principle
People should be able to see and fix their data.
Security Principle
Data must be kept safe.
Enforcement Principle
There must be ways to ensure that rules are followed.
Consent (Saudi Arabia Law)
Companies must get clear permission before using someone’s data.
Consequences of Non-Compliance
Fines, reputational damage, and legal action that can occur if businesses don’t follow data protection laws.
EU General Data Protection Regulation (GDPR)
People must give clear permission before their data is collected, with strict regulations for data transfer and breach reporting. Includes the right to be forgotten.
Cookies
Small files saved by websites to track user activity and remember them.
Web beacons
Tiny hidden images in emails or web pages that track if you open or read them.
Spyware
Secret software that watches what you type or shows unwanted ads.
Google & behavioral targeting
Tracking your online behavior to show ads based on your interests.
Differential privacy
Software that hides personal data to protect privacy.
Website Privacy Policy
Websites must have a privacy policy that explains how collected visitor data is handled.
How to Protect Your Privacy Online
Be cautious about sharing personal info, avoid public Wi-Fi for sensitive activities, and use secure websites.
Software bugs
Mistakes in the software code that can cause system malfunctions.
Hardware or equipment failures
Machines or devices ceasing to function properly.
Bad input data
Incorrect or disorganized data entered into a system, leading to errors.
Computer crime
Doing something illegal with a computer, like hacking or stealing data.
Computer abuse
Doing something unethical with a computer, even if it’s not illegal.
Spam
Unwanted messages.