CSE 3801 Final Exam Study Materials: Key Terms and Definitions

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 89

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

90 Terms

1

Morals

Personal beliefs about what is fair and what is right or wrong

New cards
2

Ethics

The rules that a society system provides us with

New cards
3

Ethnocentrism

belief your culture is better than another culture

New cards
4

Cultural relativism

not judging a culture to our own standards

New cards
5

Moral Absolutism

the view that there are moral laws that are universal and unconditional across all cultures

Example: a murder, which is always considered as morally wrong even if it was done in self-defense or for protection

New cards
6

Utilitarianism

an ethical theory that determines the morality of the actions of an individual based on their outcome

Example: Let us assume four people suffer from kidney damage, liver damage, brain hemorrhage, and heart disease. All of them need urgent organ transplants for their survival. Incidentally, another person named Hayden has been in a coma for the last five years. Doctors have expressed less hope for the survival of the person. The family of Hayden has appealed for mercy killing for the person in the court. However, per the utilitarian theory, the greater good lies in helping the four patients needing organ transplants after the mercy killing is approved. Hence Hayden's organs would be utilized to help the other four people to survive, which is the best outcome of the action.

New cards
7

Ethical egoism

acceptance of society for people to pursue their own self-interests. We "SHOULD" act in our own self-interest

New cards
8

Psychological egoism

philosophical theory that says all human action is motivated by self-interest. We "DO" act in our own self-interest

New cards
9

Consequentialism

an ethical theory that judges whether or not something is right by what its consequences are

Example: Trolley problem of 5 people vs 1 person

New cards
10

Deontology

an ethical theory that uses rules to distinguish right from wrong

Example: you're a software engineer and learn that a nuclear missile is about to launch that might start a war. You can hack the network and cancel the launch, but it's against your professional code of ethics to break into any software system without pe rmission. And it's a form of lying and cheating. Deontology advises not to violate this rule. However, in letting the missile launch, thousands of people will die

New cards
11

Computer Ethics

set of commonly agreed principles that govern the use of computers

New cards
12

Why is Computer Ethics important?

To protect personal & commercial information, To control plagiarism, To suppress dishonest business practices and to protect and encourage fair competition, & To promote moral and social values in society

New cards
13

Positive impacts of Computers

Employment, Education, Communication, E-Commerce, Health care, Entertainment, Science and technology, and Multimedia

New cards
14

Negative impacts of Computers

Reduction of Employment, Computer Crime, Privacy, Creativity, Physical Effects, Mental health, Safety

New cards
15

10 Commandments of Computer Ethics

1) Thou shalt not use a computer to harm other people.
2) Thou shalt not interfere with other people's computer work.
3) Thou shalt not snoop around in other people's computer files.
4) Thou shalt not use a computer to steal.
5) Thou shalt not use a computer to bear false witness.
6) Thou shalt not copy or use proprietary software for which you have not paid.
7) Thou shalt not use other people's computer resources without authorization or proper compensation.
8) Thou shalt not appropriate other people's intellectual output.
9) Thou shalt think about the social consequences of the program you are writing or the system you are designing.
10) Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans.

New cards
16

Privacy

to be free from interference and intrusion
to associate freely with whom, you want
to be able to control who can see or use information about you

New cards
17

Personally identifiable information (PII)

Data that could be used to identify, contact or locate an individual or distinguish one person from another

New cards
18

Personal health information (PHI)

Medical history, insurance information and other private data that is collected by healthcare providers and could be linked to a certain person

New cards
19

Personally identifiable financial information (PIFI)

Credit card numbers, bank account details or other data concerning a person's finances

New cards
20

Student records

An individual's grades, transcripts, class schedule, billing details and other educational records

New cards
21

THE SEVEN CATEGORIES OF PRIVACY

1. PRIVACY OF PERSON
2. PRIVACY OF BEHAVIOR AND ACTION
3. PRIVACY OF COMMUNICATION
4. PRIVACY OF DATA AND IMAGE (INFORMATION)
5. PRIVACY OF THOUGHTS AND FEELINGS
6. PRIVACY OF LOCATION AND SPACE (TERRITORIAL)
7. PRIVACY OF ASSOCIATION

New cards
22

Children's Online Privacy Protection Act (COPPA)

U.S. law that protects children's online data

New cards
23

Health Insurance Portability and Accountability Act (HIPAA)

a federal privacy protection law that safeguards individuals' medical information

New cards
24

Gramm-Leach-Bliley Act (GLB Act or GLBA) AKA the Financial Modernization Act of 1999

This law protects consumer privacy and applies to any financial institution that collects, uses, or discloses personal information

New cards
25

Fair Credit Reporting Act (FCRA)

a federal law that helps to ensure the accuracy, fairness and privacy of the information in consumer credit bureau files

New cards
26

Family Educational Rights and Privacy Act (FERPA) AKA Buckley Amendment

protect the privacy of personally identifiable information in a student's education record

New cards
27

PRIVACY ACT (1974)

It safeguards privacy through creating four procedural and substantive rights in personal data.

New cards
28

Internet Privacy Issues

1.Identity theft
2. Mobile apps and privacy
3. Location tracking
4. Search engines user tracking
5. Social Media Data Mining
6. Harassment, cyberbullying, and impersonation
7. Electronic Surveillance
8. Spyware

New cards
29

Personal information

any information relating to an individual person.

New cards
30

Informed consent

users being aware of what information is collected and how it is used.

New cards
31

Invisible information gathering

collection of personal information about a user without the user's knowledge

New cards
32

Secondary use

Use of personal information for a purpose other than the purpose for which it was provided

New cards
33

Data Mining

Searching and analyzing masses of data to find patterns and develop new information or knowledge.

New cards
34

Computer matching

Combining and comparing information from different databases (using social security number, for example) to match records.

New cards
35

5 PRINCIPLES OF DATA ETHICS FOR PROFESSIONALS

1. Ownership
2. Transparency
3. Privacy
4. Intention
5. Outcomes

New cards
36

Principles for Ethical Behavior

1. Inform people when you collect information.
2. Collect only the data needed.
3. Offer a way for people to opt out.
4. Keep data only as long as needed.
5. Maintain accuracy of data.
6. Protect security of data.
7. Develop policies for responding to law enforcement requests for data.

New cards
37

the First Amendment of the Constitution

Freedom of speech is a constitutional protection that gives individuals and communities the right to present their ideas and opinions without fear of being censored by the government

New cards
38

Communications Decency Act of 1996 (CDA)

United States Congress's first notable attempt to regulate pornographic material on the Internet

New cards
39

Net Neutrality

the principle that the company that connects you to the internet does not get to control what you do on the in ternet

No Blocking, Throttling, or Paid Prioritization

New cards
40

intellectual property

set of intangible assets owned and legally protected by a company or individual from outside use or implementation without consent

New cards
41

Patent

right to eliminate other people from using, making, selling, or importing the patented invention of the owner.

New cards
42

Trademark

any word, phrase, symbol, design, or a combination of these things that identifies your goods or services.

New cards
43

Trademark symbol

You can use "TM" for goods or "SM" for services even if you haven't filed an application to register your trademark. Once you register your trademark with us, use an ® with the trademark

New cards
44

Trade Secret

defined as a piece of information that is kept confidential or reasonably Which provides a business with an economic benefit over its competitors.

New cards
45

Copyright

the rights that creators have over their literary and artistic works

New cards
46

Intellectual property theft

robbing people or organizations of their ideas, inventions, creative products, and other types of IP.

New cards
47

Fair use

permits a party to use a copyrighted work without the copyright owner's permission for purposes such as criticism, comment, news reporting, teaching, scholarship, or research

New cards
48

Computer crime

a crime involving computing against a digital target or a crime in which a computing system is used to commit criminal offenses

New cards
49

Hacking

gain unauthorized access to personal or organizational data

New cards
50

Hacktivists/Hactivism

Derived from combining the words 'Hack' and 'Activism', it's the act of hacking, or breaking into a computer system, for politically or socially motivated purposes

New cards
51

white hat hackers

ethical security hackers who identify and fix vulnerabilities, with the permission of the organizations they hack into

New cards
52

black hat hackers

cybercriminals that illegally crack systems with malicious intent

New cards
53

gray hat hackers

may not have the criminal or malicious intent of a black hat hacker, but they also don't have the prior knowledge or consent of those whose systems they hack into

New cards
54

Computer Fraud and Abuse Act (CFAA)

an amendment to the first federal computer fraud law, to address hacking

New cards
55

identity theft/fraud

terms used to refer to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, typically for economic gain.

New cards
56

Phishing

clicking on fraudulent links in emails

New cards
57

Vishing

call or leave a voicemail

New cards
58

Smishing

a phishing scam conducted over text message

New cards
59

Pharming

hacker mimics a real website and redirects a user to the fake website

New cards
60

Distributed denial of service (DDoS) attack

when a hacker send a large amount of website traffic or pings to a network to try and slow it down or completely shut it down

New cards
61

10 Employee Rights of Every Employee

1. Privacy Rights
2. Harassment free workplace
3. Safe Workplace
4. Whistleblowing
5. Retaliation Protections
6. Reasonable Accommodations
7. Fair Pay
8. Overtime Wages
9. Unpaid, Job-Protected Leave
10. File a Complaint or Lawsuit

New cards
62

FMLA (Family Medical Leave Act)

entitles eligible employees of covered employers to take unpaid, job-protected leave for specified family and medical reasons with continuation of group health insurance coverage under the same terms and conditions as if the employee had not taken leave.

New cards
63

Equal Pay Act

made it illegal for employers to pay female workers less than men for the same job

New cards
64

Civil Rights Act of 1964

outlawed discrimination based on race, color, religion, sex, or national origin

New cards
65

the Pregnancy Discrimination Act

specifically outlaws discrimination on the basis of pregnancy

New cards
66

Age Discrimination in Employment Act (ADEA)

Act that prohibits discrimination in employment for persons age 40 and over.

New cards
67

The Americans with Disabilities Act (ADA)

Act addresses rights of individuals with disabilities in employment and public accommodations.

New cards
68

Types of Employee Monitoring

Web Activity Tracking/Direct Monitoring, Email Monitoring, Gadgets Monitoring/Computer Monitoring, GPS Tracking, Phone Monitoring and Audio Surveillance, Video Surveillance, Keylogger

New cards
69

Electronic Communications Privacy Act of 1986 (ECPA)

if a company provides a work device, it is considered business property. An employer reserves the right to monitor document, file, internet, and app usage on a company computer. Even if the employee brings the device home, any activity done on it can be audited

New cards
70

Information and communication technologies (ICT)

technological tools and resources used to transmit, store, create, share or exchange information

New cards
71

digital divide

the gap that exists between individuals who have access and those who do not, or who have limited access

New cards
72

Common types of digital divide

Infrastructure divide, Wealth and income divide, Social divide, Gender Divide, Age-Related Issues, Socioeconomic Factors, Geographic Causes, Racial, Cultural, and Language, Motivation and General Interest

New cards
73

Neo-Luddism

a philosophy opposing many forms of modern technology

New cards
74

The CRAAP Test

An easy way to remember how to evaluate sources for credibility (Currency, Relevance, Authority, Accuracy, Purpose)

New cards
75

System Failure

Occurs when a computer crashes or an individual application fails

New cards
76

Examples of system failures

Ariane 5 (Only about 40 seconds after initiation launcher veered off its flight path, broke up and exploded), Theriac-25 (exposed them to massive overdoses of radiation), Denver Airport Case (Originally planned to automate the handling of baggage through the entire airport, the system proved to be far more complex than some had original believed)

New cards
77

Characteristics of a good User Interface

Simplicity, Clarity on Error messages, Consistency, Efficiency, Responsiveness

New cards
78

Traffic Alert and Collision Avoidance System (TCAS) aka Airborne Collision Avoidance System (ACAS)

an airborne system designed to increase cockpit awareness of nearby aircraft and service as a last defense against mid-air collisions

New cards
79

Software Engineering Phases

1. Planning
2. System Analysis
3. System Design
4. Coding/Development
5. Testing
6. Implementation (Launch and Support)
7. Operations and Maintenance

New cards
80

Professional Ethics

to ensure that professionals adhere to certain standards of behavior, which are essential for building trust and maintaining the integrity of their profession

New cards
81

Importance of Professional Values and Ethics

Personal Level - positive impact on our personal growth as well as on the quality of life for our surrounding community
Business Level - positive image for an organization for clients, competitors and the public & help build friendly and respectful work environment
Public Level - build confidence in the professions' trustworthiness & greater transparency to clients and members of the society when the codes of conduct are disclosed publicly

New cards
82

General principles of professional ethics

1.Integrity
2.Respect
3.Responsibility
4.Competence
5.Fairness

New cards
83

Sarbanes-Oxley (SOX) Act of 2002

in response to highly publicized corporate financial scandals earlier that decade

New cards
84

Code of Ethics vs. Code of Conduct

code of ethics: details the general ethics that a person or employee should uphold
code of conduct: details the way that a person or employee should behave in order to uphold the code of ethics

New cards
85

American Bar Association (ABA)

establishes the legal and ethical obligations attorneys owe to their clients, the courts, and the public at large

New cards
86

American Medical Association

a code of ethics on physicians; everything from interpersonal relationships with other staff members to information on patient care

New cards
87

Teachers and Education

developed by the distinguished AAE Advisory Board and by the Executive Committee of AAE. It contains four basic principles relating to the rights of students and educators.
1. Ethical Conduct toward Students
2. Ethical Conduct toward Practices and Performance
3. Ethical Conduct toward Professional Colleagues
4. Ethical Conduct toward Parents and Community

New cards
88

Financial advisers

legally bound to a code of ethics known as a fiduciary duty, requires them to act in the best interest of their clients. Certified public accountants (CPAs) are expected to follow similar ethical standards of truthfulness, objectivity and integrity

New cards
89

Computing Professionals

who use their knowledge of computers and computing technology to create, design, maintain, or use computer-based systems

New cards
90

Association for Computing Machinery (ACM)/IEEE-CS Software Engineering/AMI (Australian Marketing Institute) Code of Professional Conduct

developed a code of ethics for computing professionals/software engineers, which serves as a guide for making decisions in the field

New cards
robot