CSE 3801 Final Exam Study Materials: Key Terms and Definitions

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/89

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

90 Terms

1
New cards

Morals

Personal beliefs about what is fair and what is right or wrong

2
New cards

Ethics

The rules that a society system provides us with

3
New cards

Ethnocentrism

belief your culture is better than another culture

4
New cards

Cultural relativism

not judging a culture to our own standards

5
New cards

Moral Absolutism

the view that there are moral laws that are universal and unconditional across all cultures

Example: a murder, which is always considered as morally wrong even if it was done in self-defense or for protection

6
New cards

Utilitarianism

an ethical theory that determines the morality of the actions of an individual based on their outcome

Example: Let us assume four people suffer from kidney damage, liver damage, brain hemorrhage, and heart disease. All of them need urgent organ transplants for their survival. Incidentally, another person named Hayden has been in a coma for the last five years. Doctors have expressed less hope for the survival of the person. The family of Hayden has appealed for mercy killing for the person in the court. However, per the utilitarian theory, the greater good lies in helping the four patients needing organ transplants after the mercy killing is approved. Hence Hayden's organs would be utilized to help the other four people to survive, which is the best outcome of the action.

7
New cards

Ethical egoism

acceptance of society for people to pursue their own self-interests. We "SHOULD" act in our own self-interest

8
New cards

Psychological egoism

philosophical theory that says all human action is motivated by self-interest. We "DO" act in our own self-interest

9
New cards

Consequentialism

an ethical theory that judges whether or not something is right by what its consequences are

Example: Trolley problem of 5 people vs 1 person

10
New cards

Deontology

an ethical theory that uses rules to distinguish right from wrong

Example: you're a software engineer and learn that a nuclear missile is about to launch that might start a war. You can hack the network and cancel the launch, but it's against your professional code of ethics to break into any software system without pe rmission. And it's a form of lying and cheating. Deontology advises not to violate this rule. However, in letting the missile launch, thousands of people will die

11
New cards

Computer Ethics

set of commonly agreed principles that govern the use of computers

12
New cards

Why is Computer Ethics important?

To protect personal & commercial information, To control plagiarism, To suppress dishonest business practices and to protect and encourage fair competition, & To promote moral and social values in society

13
New cards

Positive impacts of Computers

Employment, Education, Communication, E-Commerce, Health care, Entertainment, Science and technology, and Multimedia

14
New cards

Negative impacts of Computers

Reduction of Employment, Computer Crime, Privacy, Creativity, Physical Effects, Mental health, Safety

15
New cards

10 Commandments of Computer Ethics

1) Thou shalt not use a computer to harm other people.
2) Thou shalt not interfere with other people's computer work.
3) Thou shalt not snoop around in other people's computer files.
4) Thou shalt not use a computer to steal.
5) Thou shalt not use a computer to bear false witness.
6) Thou shalt not copy or use proprietary software for which you have not paid.
7) Thou shalt not use other people's computer resources without authorization or proper compensation.
8) Thou shalt not appropriate other people's intellectual output.
9) Thou shalt think about the social consequences of the program you are writing or the system you are designing.
10) Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans.

16
New cards

Privacy

to be free from interference and intrusion
to associate freely with whom, you want
to be able to control who can see or use information about you

17
New cards

Personally identifiable information (PII)

Data that could be used to identify, contact or locate an individual or distinguish one person from another

18
New cards

Personal health information (PHI)

Medical history, insurance information and other private data that is collected by healthcare providers and could be linked to a certain person

19
New cards

Personally identifiable financial information (PIFI)

Credit card numbers, bank account details or other data concerning a person's finances

20
New cards

Student records

An individual's grades, transcripts, class schedule, billing details and other educational records

21
New cards

THE SEVEN CATEGORIES OF PRIVACY

1. PRIVACY OF PERSON
2. PRIVACY OF BEHAVIOR AND ACTION
3. PRIVACY OF COMMUNICATION
4. PRIVACY OF DATA AND IMAGE (INFORMATION)
5. PRIVACY OF THOUGHTS AND FEELINGS
6. PRIVACY OF LOCATION AND SPACE (TERRITORIAL)
7. PRIVACY OF ASSOCIATION

22
New cards

Children's Online Privacy Protection Act (COPPA)

U.S. law that protects children's online data

23
New cards

Health Insurance Portability and Accountability Act (HIPAA)

a federal privacy protection law that safeguards individuals' medical information

24
New cards

Gramm-Leach-Bliley Act (GLB Act or GLBA) AKA the Financial Modernization Act of 1999

This law protects consumer privacy and applies to any financial institution that collects, uses, or discloses personal information

25
New cards

Fair Credit Reporting Act (FCRA)

a federal law that helps to ensure the accuracy, fairness and privacy of the information in consumer credit bureau files

26
New cards

Family Educational Rights and Privacy Act (FERPA) AKA Buckley Amendment

protect the privacy of personally identifiable information in a student's education record

27
New cards

PRIVACY ACT (1974)

It safeguards privacy through creating four procedural and substantive rights in personal data.

28
New cards

Internet Privacy Issues

1.Identity theft
2. Mobile apps and privacy
3. Location tracking
4. Search engines user tracking
5. Social Media Data Mining
6. Harassment, cyberbullying, and impersonation
7. Electronic Surveillance
8. Spyware

29
New cards

Personal information

any information relating to an individual person.

30
New cards

Informed consent

users being aware of what information is collected and how it is used.

31
New cards

Invisible information gathering

collection of personal information about a user without the user's knowledge

32
New cards

Secondary use

Use of personal information for a purpose other than the purpose for which it was provided

33
New cards

Data Mining

Searching and analyzing masses of data to find patterns and develop new information or knowledge.

34
New cards

Computer matching

Combining and comparing information from different databases (using social security number, for example) to match records.

35
New cards

5 PRINCIPLES OF DATA ETHICS FOR PROFESSIONALS

1. Ownership
2. Transparency
3. Privacy
4. Intention
5. Outcomes

36
New cards

Principles for Ethical Behavior

1. Inform people when you collect information.
2. Collect only the data needed.
3. Offer a way for people to opt out.
4. Keep data only as long as needed.
5. Maintain accuracy of data.
6. Protect security of data.
7. Develop policies for responding to law enforcement requests for data.

37
New cards

the First Amendment of the Constitution

Freedom of speech is a constitutional protection that gives individuals and communities the right to present their ideas and opinions without fear of being censored by the government

38
New cards

Communications Decency Act of 1996 (CDA)

United States Congress's first notable attempt to regulate pornographic material on the Internet

39
New cards

Net Neutrality

the principle that the company that connects you to the internet does not get to control what you do on the in ternet

No Blocking, Throttling, or Paid Prioritization

40
New cards

intellectual property

set of intangible assets owned and legally protected by a company or individual from outside use or implementation without consent

41
New cards

Patent

right to eliminate other people from using, making, selling, or importing the patented invention of the owner.

42
New cards

Trademark

any word, phrase, symbol, design, or a combination of these things that identifies your goods or services.

43
New cards

Trademark symbol

You can use "TM" for goods or "SM" for services even if you haven't filed an application to register your trademark. Once you register your trademark with us, use an ® with the trademark

44
New cards

Trade Secret

defined as a piece of information that is kept confidential or reasonably Which provides a business with an economic benefit over its competitors.

45
New cards

Copyright

the rights that creators have over their literary and artistic works

46
New cards

Intellectual property theft

robbing people or organizations of their ideas, inventions, creative products, and other types of IP.

47
New cards

Fair use

permits a party to use a copyrighted work without the copyright owner's permission for purposes such as criticism, comment, news reporting, teaching, scholarship, or research

48
New cards

Computer crime

a crime involving computing against a digital target or a crime in which a computing system is used to commit criminal offenses

49
New cards

Hacking

gain unauthorized access to personal or organizational data

50
New cards

Hacktivists/Hactivism

Derived from combining the words 'Hack' and 'Activism', it's the act of hacking, or breaking into a computer system, for politically or socially motivated purposes

51
New cards

white hat hackers

ethical security hackers who identify and fix vulnerabilities, with the permission of the organizations they hack into

52
New cards

black hat hackers

cybercriminals that illegally crack systems with malicious intent

53
New cards

gray hat hackers

may not have the criminal or malicious intent of a black hat hacker, but they also don't have the prior knowledge or consent of those whose systems they hack into

54
New cards

Computer Fraud and Abuse Act (CFAA)

an amendment to the first federal computer fraud law, to address hacking

55
New cards

identity theft/fraud

terms used to refer to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, typically for economic gain.

56
New cards

Phishing

clicking on fraudulent links in emails

57
New cards

Vishing

call or leave a voicemail

58
New cards

Smishing

a phishing scam conducted over text message

59
New cards

Pharming

hacker mimics a real website and redirects a user to the fake website

60
New cards

Distributed denial of service (DDoS) attack

when a hacker send a large amount of website traffic or pings to a network to try and slow it down or completely shut it down

61
New cards

10 Employee Rights of Every Employee

1. Privacy Rights
2. Harassment free workplace
3. Safe Workplace
4. Whistleblowing
5. Retaliation Protections
6. Reasonable Accommodations
7. Fair Pay
8. Overtime Wages
9. Unpaid, Job-Protected Leave
10. File a Complaint or Lawsuit

62
New cards

FMLA (Family Medical Leave Act)

entitles eligible employees of covered employers to take unpaid, job-protected leave for specified family and medical reasons with continuation of group health insurance coverage under the same terms and conditions as if the employee had not taken leave.

63
New cards

Equal Pay Act

made it illegal for employers to pay female workers less than men for the same job

64
New cards

Civil Rights Act of 1964

outlawed discrimination based on race, color, religion, sex, or national origin

65
New cards

the Pregnancy Discrimination Act

specifically outlaws discrimination on the basis of pregnancy

66
New cards

Age Discrimination in Employment Act (ADEA)

Act that prohibits discrimination in employment for persons age 40 and over.

67
New cards

The Americans with Disabilities Act (ADA)

Act addresses rights of individuals with disabilities in employment and public accommodations.

68
New cards

Types of Employee Monitoring

Web Activity Tracking/Direct Monitoring, Email Monitoring, Gadgets Monitoring/Computer Monitoring, GPS Tracking, Phone Monitoring and Audio Surveillance, Video Surveillance, Keylogger

69
New cards

Electronic Communications Privacy Act of 1986 (ECPA)

if a company provides a work device, it is considered business property. An employer reserves the right to monitor document, file, internet, and app usage on a company computer. Even if the employee brings the device home, any activity done on it can be audited

70
New cards

Information and communication technologies (ICT)

technological tools and resources used to transmit, store, create, share or exchange information

71
New cards

digital divide

the gap that exists between individuals who have access and those who do not, or who have limited access

72
New cards

Common types of digital divide

Infrastructure divide, Wealth and income divide, Social divide, Gender Divide, Age-Related Issues, Socioeconomic Factors, Geographic Causes, Racial, Cultural, and Language, Motivation and General Interest

73
New cards

Neo-Luddism

a philosophy opposing many forms of modern technology

74
New cards

The CRAAP Test

An easy way to remember how to evaluate sources for credibility (Currency, Relevance, Authority, Accuracy, Purpose)

75
New cards

System Failure

Occurs when a computer crashes or an individual application fails

76
New cards

Examples of system failures

Ariane 5 (Only about 40 seconds after initiation launcher veered off its flight path, broke up and exploded), Theriac-25 (exposed them to massive overdoses of radiation), Denver Airport Case (Originally planned to automate the handling of baggage through the entire airport, the system proved to be far more complex than some had original believed)

77
New cards

Characteristics of a good User Interface

Simplicity, Clarity on Error messages, Consistency, Efficiency, Responsiveness

78
New cards

Traffic Alert and Collision Avoidance System (TCAS) aka Airborne Collision Avoidance System (ACAS)

an airborne system designed to increase cockpit awareness of nearby aircraft and service as a last defense against mid-air collisions

79
New cards

Software Engineering Phases

1. Planning
2. System Analysis
3. System Design
4. Coding/Development
5. Testing
6. Implementation (Launch and Support)
7. Operations and Maintenance

80
New cards

Professional Ethics

to ensure that professionals adhere to certain standards of behavior, which are essential for building trust and maintaining the integrity of their profession

81
New cards

Importance of Professional Values and Ethics

Personal Level - positive impact on our personal growth as well as on the quality of life for our surrounding community
Business Level - positive image for an organization for clients, competitors and the public & help build friendly and respectful work environment
Public Level - build confidence in the professions' trustworthiness & greater transparency to clients and members of the society when the codes of conduct are disclosed publicly

82
New cards

General principles of professional ethics

1.Integrity
2.Respect
3.Responsibility
4.Competence
5.Fairness

83
New cards

Sarbanes-Oxley (SOX) Act of 2002

in response to highly publicized corporate financial scandals earlier that decade

84
New cards

Code of Ethics vs. Code of Conduct

code of ethics: details the general ethics that a person or employee should uphold
code of conduct: details the way that a person or employee should behave in order to uphold the code of ethics

85
New cards

American Bar Association (ABA)

establishes the legal and ethical obligations attorneys owe to their clients, the courts, and the public at large

86
New cards

American Medical Association

a code of ethics on physicians; everything from interpersonal relationships with other staff members to information on patient care

87
New cards

Teachers and Education

developed by the distinguished AAE Advisory Board and by the Executive Committee of AAE. It contains four basic principles relating to the rights of students and educators.
1. Ethical Conduct toward Students
2. Ethical Conduct toward Practices and Performance
3. Ethical Conduct toward Professional Colleagues
4. Ethical Conduct toward Parents and Community

88
New cards

Financial advisers

legally bound to a code of ethics known as a fiduciary duty, requires them to act in the best interest of their clients. Certified public accountants (CPAs) are expected to follow similar ethical standards of truthfulness, objectivity and integrity

89
New cards

Computing Professionals

who use their knowledge of computers and computing technology to create, design, maintain, or use computer-based systems

90
New cards

Association for Computing Machinery (ACM)/IEEE-CS Software Engineering/AMI (Australian Marketing Institute) Code of Professional Conduct

developed a code of ethics for computing professionals/software engineers, which serves as a guide for making decisions in the field