Ethics, Computing & Society – Vocabulary Review

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/90

flashcard set

Earn XP

Description and Tags

A set of key vocabulary flashcards covering ethical theories, Internet concepts, privacy laws, cybersecurity terms, professional ethics, and related topics from the lecture notes.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

91 Terms

1
New cards

Ethics

A rational, philosophical examination of people’s moral beliefs and actions.

2
New cards

Morality

Rules of conduct describing what people ought and ought not to do in various situations.

3
New cards

Society

An association of people organized under a system of rules designed to advance the good of its members over time.

4
New cards

Ethical Relativism

The view that there are no universal moral principles and morality is culturally determined.

5
New cards

Ethical Objectivism

The belief that moral principles have an existence independent of human opinion.

6
New cards

Divine Command Theory

Ethical theory claiming that an action’s morality depends on whether it accords with God’s commands.

7
New cards

Ethical Egoism

The theory that people ought to act in their own long-term self-interest.

8
New cards

Categorical Imperative

Kant’s foundational moral rule stating one should act only on maxims that could be universal laws.

9
New cards

Second Formulation (Kant)

Principle that it is wrong for one person to use another merely as a means to an end.

10
New cards

Greatest Happiness Principle

Another name for the Principle of Utility; actions are right if they promote overall happiness.

11
New cards

Utilitarianism

A consequentialist theory holding that the morally right action produces the greatest net happiness.

12
New cards

Consequentialist Theory

Ethical view judging actions solely by their outcomes or consequences.

13
New cards

Moral Luck

Problem that a person’s moral standing may depend on factors beyond their control.

14
New cards

Social Contract Theory

View that moral and political rules are justified by agreements among rational individuals.

15
New cards

State of Nature

Hobbes’s term for life without rules or a means of enforcing them—“solitary, poor, nasty, brutish, and short.”

16
New cards

Positive Right

A right that others must provide a benefit or service to honor (e.g., education).

17
New cards

Negative Right

A right guaranteed by non-interference from others (e.g., freedom of speech).

18
New cards

Absolute Right

A right guaranteed without exception.

19
New cards

Virtue (Aristotle)

A character trait developed through repetition of appropriate acts that enables human flourishing.

20
New cards

Vice

A character trait that prevents a person from flourishing or becoming truly happy.

21
New cards

Spam

Unsolicited bulk electronic messages, often advertising, sent at very low cost.

22
New cards

Botnet

Network of compromised computers remotely controlled to perform tasks such as sending spam.

23
New cards

IP Address

Numeric label uniquely identifying every device connected to the Internet.

24
New cards

URL (Uniform Resource Locator)

The unique address of an object (page, file) on the Web.

25
New cards

Wiki

A Web site that allows multiple people to contribute and edit its content collaboratively.

26
New cards

Blog

A personal journal or commentary posted chronologically on the Web.

27
New cards

Web 2.0

Trend toward user-generated content, social networking, and online collaboration.

28
New cards

Crowdsourcing

Obtaining goods, services, or ideas from a large online community rather than traditional employees.

29
New cards

Cryptocurrency

Virtual currency secured by cryptography and typically independent of governments or banks.

30
New cards

Blockchain

Encrypted, distributed ledger that records cryptocurrency or other digital asset transactions.

31
New cards

Direct Censorship

Government actions such as pre-publication review or licensing that suppress speech.

32
New cards

Self-Censorship

Individuals or publishers refraining from expression due to fear of consequences.

33
New cards

Mill’s Principle of Harm

Government should restrict individual actions only to prevent harm to others.

34
New cards

Communications Decency Act (CDA)

1996 law attempting to regulate indecent online content; struck down as unconstitutional.

35
New cards

Child Internet Protection Act (CIPA)

U.S. law requiring federally funded schools and libraries to filter obscene Web content.

36
New cards

Sexting

Sending nude or nearly nude photographs via text or email.

37
New cards

Identity Theft

Crime of using someone else’s personal information for financial gain.

38
New cards

Phishing

Fraudulent attempt to obtain sensitive information by masquerading as a trustworthy entity.

39
New cards

Cyberbullying

Inflicting psychological harm on another using the Internet or phone system.

40
New cards

Revenge Porn

Non-consensual distribution of intimate images online, a form of cyberbullying.

41
New cards

Internet Addiction

Compulsive, harmful use of the Internet, including variants like excessive gaming.

42
New cards

Copyright

Legal protection granting authors exclusive rights to reproduce, distribute, and adapt creative works.

43
New cards

Patent

Government grant giving inventors exclusive rights to make, use, or sell an invention for a period.

44
New cards

Trademark

Symbol, word, or phrase legally registered to represent a company or product.

45
New cards

Trade Secret

Confidential business information that provides a competitive edge.

46
New cards

Non-Fungible Token (NFT)

Unique digital token recorded on a blockchain representing ownership of a digital asset.

47
New cards

Fair Use

Legal doctrine allowing limited use of copyrighted material without permission under certain conditions.

48
New cards

Time Shifting

Recording broadcast media to watch or listen at a later time (Sony v. Universal precedent).

49
New cards

Space Shifting

Moving content from one device to another for personal use (RIAA v. Diamond precedent).

50
New cards

Digital Millennium Copyright Act (DMCA)

1998 U.S. law criminalizing circumvention of digital rights management and addressing online infringement.

51
New cards

Digital Rights Management (DRM)

Technological controls restricting use, copying, or distribution of digital media.

52
New cards

BitTorrent

Peer-to-peer file distribution protocol optimized for high-speed downloading by sharing upload bandwidth.

53
New cards

Patent Troll

Company that enforces patent rights aggressively without intending to produce the patented product.

54
New cards

Open-Source Software

Software whose source code is publicly available for use, modification, and distribution.

55
New cards

Third Amendment

U.S. constitutional protection against quartering soldiers in private homes.

56
New cards

Fourth Amendment

Constitutional protection against unreasonable searches and seizures; basis for privacy rights.

57
New cards

Public Record

Information reported to a government agency and open for public inspection, e.g., birth certificate.

58
New cards

RFID

Radio-frequency identification; small wireless transmitter used for tracking and identification.

59
New cards

Data Mining

Analyzing large datasets to discover patterns or relationships.

60
New cards

Secondary Use

Using data collected for one purpose for a different, unauthorized purpose.

61
New cards

Opt-In Policy

Privacy policy requiring explicit consumer permission before data sharing.

62
New cards

Targeted Direct Mail

Mailing advertisements only to individuals most likely to respond, based on data analysis.

63
New cards

COPPA

Children’s Online Privacy Protection Act; limits data collection from children under 13.

64
New cards

GINA

Genetic Information Nondiscrimination Act; restricts use of genetic data in employment and insurance.

65
New cards

Code of Fair Information Practices

Set of principles governing collection and use of personal data, emphasizing transparency and consent.

66
New cards

FCRA

Fair Credit Reporting Act; promotes accuracy and privacy of consumer credit information.

67
New cards

FACTA

Fair and Accurate Credit Transactions Act; grants consumers free annual credit reports.

68
New cards

GLBA

Financial Services Modernization Act; allows banks to merge services and sets privacy obligations.

69
New cards

REAL ID Act

Law setting federal standards for state-issued driver’s licenses to improve identity verification.

70
New cards

FERPA

Family Educational Rights and Privacy Act; protects privacy of student education records.

71
New cards

HIPAA

Health Insurance Portability and Accountability Act; protects privacy and portability of health data.

72
New cards

USA PATRIOT Act

2001 law expanding government surveillance powers to combat terrorism.

73
New cards

USA Freedom Act

2015 law placing new limits on bulk data collection by U.S. government agencies.

74
New cards

Virus

Self-replicating code embedded in another program that infects files or systems.

75
New cards

Worm

Self-contained program that propagates through networks by exploiting security holes.

76
New cards

Trojan Horse

Program with benign appearance that conceals malicious functionality.

77
New cards

Bot

Compromised computer responding to commands from an external controller in a botnet.

78
New cards

Social Engineering

Manipulating people to divulge confidential information or grant access.

79
New cards

Denial-of-Service Attack

Intentional action that prevents legitimate users from accessing an Internet service.

80
New cards

Real-Time System

Computer system that processes data and responds within strict time constraints.

81
New cards

Embedded System

Computer integrated into a larger device to control its functions.

82
New cards

False Positive

Incorrectly identifying a danger or condition when none exists.

83
New cards

MCAS (Maneuvering Characteristics Augmentation System)

Software on Boeing 737 MAX designed to automatically lower the nose during certain maneuvers.

84
New cards

Predictive Policing

Using data analysis to forecast where crimes are likely to occur and allocate resources.

85
New cards

Proxy Variable

In machine learning, a variable highly correlated with a sensitive attribute like race or gender.

86
New cards

Equality of Opportunity (Fairness)

Condition where all qualified individuals have equal chance of selection regardless of group membership.

87
New cards

Mature Profession

Field with specialized knowledge, certification, code of ethics, and public good orientation (e.g., medicine).

88
New cards

Licensing

Legal process granting individuals the right to practice a profession.

89
New cards

Whistle-Blower

Person who makes an unauthorized disclosure about wrongdoing or danger within an organization.

90
New cards

Inclusion

Workplace environment that affirms, celebrates, and appreciates different views and approaches.

91
New cards

Globalization

Process by which the Internet catalyzes integration, breaking down cultural and societal barriers.