Ethics in Technology – D333

5.0(1)
studied byStudied by 10 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/121

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

122 Terms

1
New cards

Virtue ethics

A moral theory that emphasizes character and the training of virtues over adherence of rules.

2
New cards

Deontology

An ethical theory focused on following moral rules or duties regardless of the consequences. "If wrong, its always wrong"

3
New cards

Utilitarianism/Consequentialism

An ethical theory that evaluates actions based on their outcomes, aiming to maximize positive consequences. "the greater good for great amount of people"

4
New cards

Relativism

The belief that moral principles vary with individual or cultural perspectives. All ethical frameworks are subjective.

5
New cards

Ethical Decision Making Model

1. Identify the problem

2. Identify alternatives

3. Choose an alternative

4. Implement decision

5. Evaluate Results

6
New cards

Ethical

Having to do with morals, values, right and wrong. "Golden rule", "Would you be okay if a coworker did this"

7
New cards

Legal

allowed by law

8
New cards

Kantian ethics

A deontological ethical theory developed by Immanuel Kant, which emphasizes duty, moral laws, and treating others as ends in themselves.

9
New cards

ethics

societal code of behavior

10
New cards

morals

Beliefs and values regarding what is right and wrong, reflects personal principles

11
New cards

Corporate code of ethics

A formal document outlining a company's principles, values, and ethical standards that guide employee behavior.

12
New cards

Environmental, social, and governance policies

Corporate practices and policies that address environmental sustainability, social responsibility, and governance issues.

13
New cards

Supply chain sustainability

focuses on developing and maintaining a supply chain that meets the needs of the present without compromising the ability of future generations to meet their needs

14
New cards

Corporate social responsibility (CSR)

concept that an organization should act ethically by taking responsibility for the impact of its actions on its shareholders, consumers, employees, community, environment, and suppliers

15
New cards

Care

An ethical approach that emphasizes empathy, relationships, and the well-being of others.

16
New cards

Access

The ability or right to approach, enter, or use something, especially in the context of technology and information.

17
New cards

Accuracy

The correctness or precision of information, data, or systems.

18
New cards

Property

The rights and ownership related to tangible or intangible assets, including intellectual property.

19
New cards

Privacy

The right of individuals to control access to their personal information and to be free from surveillance or intrusion.

20
New cards

Gain goodwill

Earning a positive reputation or trust from customers, stakeholders, or the public.

21
New cards

Cross-sell products

Offering additional or complementary products to existing customers to increase sales.

22
New cards

Whistleblowing

The act of exposing unethical, illegal, or harmful practices within an organization. Used to gain public attention.

23
New cards

Industrial espionage

The illegal practice of obtaining confidential information from a company for competitive advantage.

24
New cards

Corruption

The abuse of power for personal or financial gain, often involving bribery or unethical behavior.

25
New cards

Nepotism

Favoritism shown to relatives or friends in business or employment, regardless of merit.

26
New cards

Perimeter Security

The protection of the outermost boundary of a network or physical location to prevent unauthorized access.

27
New cards

Endpoint Security

The practice of securing individual devices, such as computers or smartphones, that connect to a network.

28
New cards

Layered Security

A multi-faceted approach to security using multiple tools and techniques to protect systems at different levels.

29
New cards

On-premises Security

Security measures implemented within a physical location or a company's local infrastructure.

30
New cards

Advanced Encryption Standard (AES)

A symmetric encryption algorithm used to secure data, known for its strength and efficiency.

31
New cards

Transport Layer Security (TLS)

A cryptographic protocol used to secure communications over a computer network.

32
New cards

Virtual private network (VPN)

A service that encrypts internet connections to provide privacy and security, often used for remote access.

33
New cards

Rivest-Shamir-Adleman (RSA)

A widely-used asymmetric encryption algorithm for securing sensitive data, particularly in digital communications.

34
New cards

Data Governance

The process of managing data's availability, usability, integrity, and security in an organization.

35
New cards

Data Accuracy

The precision and correctness of data within a given context, ensuring reliable and trustworthy information.

36
New cards

Data Quality

The condition of data based on factors like accuracy, completeness, and reliability, important for effective decision-making.

37
New cards

Data Regulation

Legal requirements and standards that govern the collection, use, and storage of data.

38
New cards

Data Encryption

The process of converting data into a coded form to prevent unauthorized access.

39
New cards

Data Property

Ownership rights over data, including control over its usage and dissemination.

40
New cards

Data Access

The ability to retrieve, view, or use data, often governed by policies and permissions.

41
New cards

Speech

The expression of ideas or information through verbal, written, or digital means, often protected as a form of free expression.

42
New cards

Patent

A legal right granted to inventors to exclusively produce, use, or sell an invention for a specified period.

43
New cards

Trademark

A symbol, word, or phrase legally registered or established to represent a company or product.

44
New cards

Copyright

Legal protection granted to the creators of original works, giving them control over reproduction and distribution.

45
New cards

Trade Secret

A formula, device, idea, process, or other information used in a business that gives the owner a competitive advantage in the marketplace.

46
New cards

John Doe lawsuit

gains subpoena power in an effort to learn the identity of anonymous Internet users who they believe have caused some form of harm to the organization through their postings

47
New cards

Electronic medical record (EMR)

collection of health related information on an individual that is created, managed, and consulted by authorized clinicians and staff within a single healthcare organization

48
New cards

electronic health record (EHR)

comprehensive view of the patient's complete medical history designed to be shared with authorized providers and staff from more than one organization

49
New cards

Personal health record (PHR)

portions of the EHR that an individual patient "owns" and controls such as personal identifiers, contact information, health provider information, problem list, medication history, allergies, immunizations, and lab and test results.

50
New cards

Health information exchange (HIE)

process of sharing patient-level electronic health information between different organization

51
New cards

Doxing

The act of publicly revealing someone's private information, such as address or phone number, without consent.

52
New cards

Cyberharassment

The use of technology to harass, threaten, or humiliate someone repeatedly.

53
New cards

Cyberstalking

The use of electronic communication to stalk or harass an individual persistently.

54
New cards

Swatting

The act of falsely reporting an emergency to provoke a SWAT team response to someone's address.

55
New cards

contingent workers

Individuals hired by a company temporarily, typically not as full-time employees, to meet specific project needs.

56
New cards

H-1B Visa Holders

temporary work visa (foreign to US) granted by the USCIS for people who work in specialty occupations

57
New cards

Ethical Computing

The practice of ensuring technology is used in a manner that is responsible, fair, and respects privacy and human rights.

58
New cards

Green Computing

efficient and environmentally responsible design, manufacture, operation, and disposal of IT-related products

59
New cards

Distributed Computing

A computing model where multiple computers work together as a single system to perform tasks, often over a network.

60
New cards

Cognitive Computing

A technology that simulates human thought processes in a computerized model, using AI and machine learning to solve complex problems.

61
New cards

Insubordination

The refusal to obey orders from a superior, often leading to disciplinary actions in a workplace.

62
New cards

Software Engineering Code of Ethics and Professional Practice

A set of principles guiding software engineers to act ethically and responsibly, ensuring quality and integrity in their work.

63
New cards

Safeguarded confidence

The ethical obligation to protect confidential information shared in trust, especially in professional relationships.

64
New cards

Lifelong learning

The continuous pursuit of knowledge and skills for personal or professional development throughout an individual's life.

65
New cards

Inherent dignity

The intrinsic value and worth that every individual possesses, which should be respected and protected in all ethical decisions.

66
New cards

Independent judgment

The ability to make decisions based on objective evaluation and reasoning, free from external pressure or bias.

67
New cards

Fraud

The act of intentionally deceiving others to gain an unfair or illegal advantage, often involving financial harm.

68
New cards

Conflict of interest

A situation where a person's personal interests could interfere with their professional duties or responsibilities.

69
New cards

Misrepresentation

The act of giving false or misleading information, often for personal or financial gain.

70
New cards

Bribery

The offering, giving, receiving, or soliciting of something of value to influence the actions of an individual in a position of power.

71
New cards

Breach of contract

The failure to fulfill the terms of a legally binding agreement, leading to legal consequences or penalties.

72
New cards

Limited feature bias

A type of bias that occurs when machine learning models are trained on incomplete or insufficient features, leading to inaccurate predictions.

73
New cards

Tainted example bias

Bias that arises when the data used to train a model is influenced by flawed or misleading examples.

74
New cards

Skewed sample bias

Bias introduced when the data set used for training does not represent the true population, leading to unequal model performance.

75
New cards

Proxy discrimination bias

Occurs when machine learning models indirectly use a proxy variable that correlates with a protected characteristic, resulting in discriminatory outcomes.

76
New cards

Equal representation

The concept that different groups, particularly those that are underrepresented, should have fair and proportional representation in data sets and decision-making processes.

77
New cards

Equal error

A fairness measure in machine learning ensuring that the error rates for different demographic groups are the same.

78
New cards

Data disparity

Differences in data quality or quantity across groups, which can lead to unequal outcomes in data-driven decision-making.

79
New cards

Protected features

Characteristics such as race, gender, or age that are safeguarded by anti-discrimination laws and should not be used as decision factors in algorithms or models.

80
New cards

Copyright protection

Legal rights that protect creators of original works from unauthorized use, reproduction, or distribution of their creations.

81
New cards

Contributory negligence

A legal doctrine where an injured party is found to have contributed to their own harm, potentially reducing the liability of others involved.

82
New cards

Foreign Corrupt Practices Act (FCPA)

An act that makes it a crime to bribe a:

- Foreign official

- Foreign politcal party official

- Foreign candidate for political office

83
New cards

Controlling the Assualt of Non-Solicited Pornography and Marketing

(CAN-SPAM) Act

A law regulating legal spam.

- May not hide behind a false return address

- Must include a label stating that it is an ad or solicitation

- Must include an opt-out option

84
New cards

American Recovery and Reinvestment Act

A wide-ranging act that included strong security provisions for electronic health records, such as:

- Banning the sale of health information

- Promoting the use of audit trails and encryption

- Providing rights of access for patients

85
New cards

Children's Online Privacy Protection Act (COPPA)

An act that attempts to give parents control over:

- Collection, use, and disclosure of children's personal information

86
New cards

Communications Assistance for Law Enforcement Act (CALEA)

An amendment to the Wiretap Act and Electronic Communications Privacy Act

-The telecommunications industry is required to build tools into its products

that federal investigators could use to eavesdrop on and intercept

conversations and electronic communications.

- Requires a court order

87
New cards

Electronic Communications Privacy Act (ECPA)

An act that deals with three main issues:

- Protection for the transfer of communications from sender to receiver

- Protection of communications while in storage

- Prohibits devices from recording dialing, routing, addressing, and signaling

information without a search warrent

88
New cards

European Union Data Protection Directive

Requires any company doing business within the EU to:

- Implement a set of privacy directives on the fair and appropriate use of

information

89
New cards

Fair and Accurate Credit Transactions Act

Amends the Fair Credit Reporting Act and:

- Allows consumers to obtain a free credit report once per year from the

three main credit reporting companies

90
New cards

Fair Credit Reporting Act

Regulates the operations of credit bureaus in:

- How credit information is collected, stored, and used.

91
New cards

Family Educational Rights and Privacy Act (FERPA)

Assigns certain rights to parents regarding their children's educational records

92
New cards

Foreign Intelligence Surveillance Act (FISA) Court

A court that meets in secret that:

- Hears applications for orders approving electronic surveillance in the

United States.

93
New cards

Foreign Intelligence Surveillance Act (FISA)

An act that:

- Describes procedure for electronic surveillance and collection of foreign

intelligence in communications between foreign powers and agents of

foreign powers

94
New cards

Foreign Intelligence Surveillance Act of 1978 Amendments of Act of

2008

An amendment that:

- Granted the NSA ability to collect international communications as they

flowed through the U.S.

- Does not require an approved warrant

95
New cards

Freedom of Information Act

A law that:

- Grants citizens the right to request certain information from the federal,

state, and local governments

96
New cards

Gramm-Leach-Bliley Act (GLBA)

A bank deregulation law that requires loan, financial or investment advice, or insurance companies to:

- Explain information-sharing practices to customers

- Safeguard sensitive data

97
New cards

Health Insurance Portability and Accountability Act (HIPAA)

An act designed to:

- Improve portability and continuity of health insurance coverage

- Reduce fraud, waste, and abuse in health insurance

- Simplify the administration of health insurance

98
New cards

National Security Letter (NSL)

- Compels holders of your personal records to turn them over to the government

- Is not subject to judicial review or oversight

99
New cards

NSL gag provision

-Prohibits recipients of an NSL from informing anyone including the subject

of the request, that the government has requested their records

100
New cards

PATRIOT Sunsets Extention Act of 20