Computers and Society (P. I)

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/69

flashcard set

Earn XP

Description and Tags

5 Lectures Covered: Ethics, Privacy, Freedom of Speech, Professional Ethics, Work

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

70 Terms

1
New cards

Claim rights or positive rights…

(a) are rights to act without interference
(b) are guaranteed in the First Amendment
(c) impose an obligation on some people to provide certain things for others
(d) all of the above

c

2
New cards

Which of the following is an example of a negative right or liberty?
(a) freedom of speech, as provided in the First Amendment of the U.S. Constitution
(b) freedom of religion, as provided in the First Amendment of the U.S. Constitution
(c) the right to use your labor, skills or mind to create goods and services
(d) all of the above

d (the right to act without interference)

3
New cards

When a person visits a Web site, their IP address and the links they clicked on are automatically recorded. This is an example of

(a) secondary use
(b) invisible information gathering
(c) data spillage
(d) data mining

b

4
New cards

A mid-west grocery store discovered that when men buy diapers, it's usually on Thursdays and Saturdays, and quite often, they also pick up some beer. So, from marketing standpoint, it makes sense to move display of diapers closer to where the beer is and charge full price for those items on those days. This is an example of

(a) secondary use
(b) invisible information gathering
(c) data spillage
(d) data mining

d

5
New cards

Direct association with a person's name is not essential for compromising privacy. This is because __________ is fairly easy to due to the quantity of personal information stored and the power of data search and analysis tools.

re-identification

6
New cards

The Privacy Act of 1974 established rules to regulate

(a) private sector databases only
(b) all databases that contain personal information
(c) all personal information, including surveillance data
(d) Federal government databases only

d

7
New cards

A cookie is

(a) a feature of a Web site designed to attract children
(b) an illegal use of information about a customer
(c) a file that a Web site stores on a visitor's computer
(d) a small reward that can be redeemed on a Web site

c

8
New cards

If a business follows an "opt-in" policy for handling personal data, information about a customer

(a) may not be released under any conditions
(b) may not be released unless the customer gives permission
(c) may be released unless the customer requests that the information be kept private
(d) may be released for any legitimate business purpose

b

9
New cards

The Communications Assistance for Law Enforcement Act (CALEA) said that

(a) international electronic communications must be filtered through a single hub.
(b) agents of a foreign power may be wiretapped with authorization from a secret court
(c) telecommunications equipment must be designed to allow the interception of telephone calls (with a court order)
(d) email should have the same degree of legal protection as telephone calls

c

10
New cards

The legal guidelines for determining whether material is obscene include all of the following EXCEPT

(a) the material depicts particular sexual (or excretory) acts specified by state law
(b) the material is patently offensive according to contemporary community standards
(c) the material has no serious artistic, literary, social, political, or scientific value
(d) the material is intended for or distributed to persons under the age of 18

d

11
New cards

Which of the following requirements was a key provision of the Children's Internet Protection Act (CIPA)?

(a) proof of age must be provided to access Web sites containing pornography
(b) children must not be allowed to access "hate material" online
(c) filtering software must be installed on Internet terminals in schools and libraries
(d) commercial Web sites must require parental consent for access by children

c

12
New cards

Anonymizers allow a user to

(a) obtain a new identity
(b) send email and surf the Web anonymously
(c) secretly spy on people visiting your Web site
(d) randomly create a handle or avatar

b

13
New cards

Which of the following are the two main arguments against the Communications Decency Act accepted by the courts?

(a) it was not enforceable, and it did not use the least restrictive means of accomplishing the goal of protecting children
(b) it was too vague and broad, and it did not use the least restrictive means of accomplishing the goal of protecting children
(c) it was too vague and broad, and it did not use community standards to determine what would be harmful to minors
(d) it was not enforceable, and it did not use community standards to determine what would be harmful to minors

b

14
New cards

Which of the following limits deceptive commercial email and outlines spammers' responsibilities:

(a) the Spam Reduction Act
(b) the Electronic Communications Act
(c) the Commercial Communications Act
(d) the CAN-SPAM Act

d

15
New cards

Which of the following is NOT a provision of the CAN-SPAM Act that applies to commercial emailers?

(a) It bans false or misleading header information.
(b) It requires that unsolicited email give recipients an opt-out method.
(c) It requires that commercial email be identified as an advertisement and include the sender's valid physical postal address.
(d) It requires commercial emailers register with the Federal Trade Commission.

d

16
New cards

Which of the following is an example of biometrics:

(a) DNA
(b) Fingerprints
(c) Voice prints
(d) All of the above

d

17
New cards

Which of the following reasons for monitoring email, voice mail, and computer files is considered legal?

(a) Protect security of proprietary information and data
(b) Investigate complaints of harassment
(c) Prevent personal use of employer facilities if prohibited by company policy
(d) All of the above

d

18
New cards

The practice of hiring companies or employees in other countries is known as:

(a) Offshoring
(b) Globalization
(c) Downsizing
(d) None of the above

a

19
New cards

Ken Olson, president of Digital Equipment Corp. in the late 1970's, Thomas J. Watson, chairman of IBM in the early 1940's, and Thomas Edison all made predictions about technology that were extremely wrong. Which of the following explains why the predictions of experts are often so far off?

(a) Lack of imagination about the uses people would find for technology
(b) Lack of imagination about what the public would like
(c) Lack of imagination about what the public would pay for
(d) All of the above

d

20
New cards

In one application of a voice-recognition system, the system failed to recognize female speakers. A likely reason was

(a) The program was specifically designed for men
(b) Women's voices are inherently harder to recognize
(c) Women do not speak as loudly as men, and the system used inferior microphones
(d) The program was primarily developed and tested by men

d

21
New cards

Which of the following is NOT a principle for producing good systems?

(a) Understand what success means
(b) Include users in the design and testing stages
(c) Be open and honest about capabilities, safety, and limitations of software
(d) Overestimate the costs and time a project will take

d

22
New cards

According to the Freedom on the Net 2024 report, which of the following is a key tactic used to manipulate online information during elections, as highlighted in the report?

(a) Promoting digital literacy
(b) Enhancing encryption technologies
(c) Censorship and content manipulation
(d) Encouraging open-source software development

c

23
New cards

What role does Freedom House suggest tech companies should play in safeguarding internet freedom?

(a) Prioritizing government requests for user data without question.
(b) Minimizing their role in content moderation.
(c) Refusing to cooperate with law enforcement agencies.
(d) Protecting users' rights and preventing the spread of harmful content.

d

24
New cards

(T/F) In Olmsted v. United States (1928), the U.S. Supreme Court interpreted the Fourth Amendment to apply only to physical intrusion.

True

25
New cards

(T/F) In Katz v. United States (1967), the U.S. Supreme Court determined that the government needs a court order to intrude where a reasonable person has a reasonable expectation of privacy.

True

26
New cards

(T/F) In Kyllo v. United States (2001), the U.S. Supreme Court ruled that when the government uses a device that's not in use by the general public to 'see' things it could not without intrusion, that is a 'search' and requires a warrant.

True

27
New cards

(T/F) Accelerometers help robots stay upright.

True

28
New cards

(T/F) Broadcast media traditionally has had the strongest First Amendment protection (meaning the fewest regulatory restrictions) while print media has the weakest First Amendment protection.

False

29
New cards

(T/F) Net Neutrality would prevent telecommunications companies from giving preferential treatment to specific content providers or types of content.

True

30
New cards

(T/F) The Supreme Court’s decision on mandatory content filters in public libraries could be seen as a less restrictive alternative to censorship.

True

31
New cards

(T/F) The U.S. Supreme Court ruled that requiring content filters on public library computers was unconstitutional.

False

32
New cards

(T/F) Computer matching, refers to the practice of targeting advertisements to individuals based on their demographic profiles, purchase histories, and other specific, identifiable attributes.

False

33
New cards

(T/F) Stakeholders are the individuals and organizations who would be affected in some way by an ethical dilemma.

True

34
New cards

(T/F) It is safe to turn on file sharing settings on your computer when connected to public Wi-Fi.

False

35
New cards

(T/F) The USA PATRIOT Act (2001) gives individuals more protection from governmental intrusion.

False

36
New cards


(T/F) The Omnibus Crime Control and Safe Streets (1968) explicitly allowed wiretapping and electronic surveillance by law enforcement agencies with a warrant.

True

37
New cards

(T/F) Wikipedia relies upon an advertising-based business model.

False

38
New cards

(T/F) Now, average human knowledge is doubling every 24 months.

False

39
New cards

(T/F) Google Drive scans for files that may contain viruses.

True

40
New cards

(T/F) Electronic Communications Privacy Act (ECPA) prohibits interception of email and reading stored emails without a court order, but makes an exception for business systems.

True

41
New cards

(T/F) Researchers are developing brain-computer interfaces to enable severely handicapped people to control appliances with their thoughts.

True

42
New cards

(T/F) It is always wrong to lie would reflect the utilitarian theory of ethics.

False

43
New cards

(T/F) A Turing Test determines the strength of an encryption method.

False

44
New cards

(T/F) A feature of high reliability organizations is loose structure.

True

45
New cards

(T/F) Software designers should include users in the design stages.

True

46
New cards

(T/F) Professional ethics requires professionals maintain their skills.

True

47
New cards

What are the three key aspects of Privacy?

  1. Freedom from intrusion

  2. Control of information about oneself

  3. Freedom from surveillance

48
New cards

What are two ways free services on the web are paid for?

  1. Use ads on the website to generate revenue

  2. Collect info about online activities and sell it to advertisers

49
New cards

What are two unexpected uses of social networking?

  1. Advertising for businesses/politics and using the media to get donations

  2. Posting embarrassing material as well as stalking through social media

50
New cards

Two key problems arise from new technologies are

  1. Much of our personal information is no longer safe in our homes; it resides in huge databases outside our control

  2. New technologies allow the government to search our homes without entering them and search our persons from a distance without our knowledge

51
New cards

Fair Information Principles

  • inform users when collecting data & offer a way to opt out

  • collect only the data needed & keep only as long as needed

  • maintain accuracy of data

  • protect security of data

  • develop policies for responding to law enforcement requests for data

52
New cards

According to Freedom House estimates:

  • Pressure on independent experts in the United States has left people less informed about influence operations ahead of the November 2024 elections.

  • Companies such as Meta and X restricted access to platform activity data, making it harder for fact-checkers and independent researchers to analyze the information landscape.

  • Internet access restrictions on social media platforms affect nearly half of the world's online population.

53
New cards

A negative right is also known as a _________________.

liberty

54
New cards

Deontological Theory

based on morality of an action rather than the consequences; emphasize duty and absolute rules, to be followed regardless of consequences

55
New cards

Utilitarianism Theory

considers most positive outcome; should consider the consequences and calculate the change in your utility, or happiness, that it will cause you

56
New cards

Personal Information

any information related to an individual

57
New cards

Turing Test

if the computer convinces the human subject that the computer is human, the computer is said to "pass"

58
New cards

Informed Consent

users being aware of what information is collected and how it is used

59
New cards

Invisible Information Gathering

collection of personal information about a user without user’s knowledge

60
New cards

Data mining

searching/analyzing masses of data to find patterns and develop new information or knowledge

61
New cards

Computer matching

combining and comparing information from different databases

62
New cards

Re-identifaction

identifying the individual from a set of anonymous data

63
New cards

Computer profiling

analyzing data to determine characteristics of people most likely to engage in certain behavior

64
New cards

net neutrality

refers to how telephone/cable companies interact with their broadband customers and setting fees for services

65
New cards

outsourcing

company pays another company for services instead of performing those tasks itself

66
New cards

inshoring

when another company employs people in the US (opposite of offshoring)

67
New cards

least restrictive mean

not interpreting evidence as is; to give a chance; not chill expression

68
New cards

Safe Harbor Plan

requires the company to make mandatory contributions to the plan participants through a match or non-elective contribution

69
New cards

EU Data Privacy Directive

  • more strict than US

  • safe harbor plan

  • prohibits transfer of personal info to countries outside EU that don’t have adequate privacy protection

70
New cards

FCC (Federal Communications Commission)

regulates communications