CSE 3801 Final Exam Prep

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 32

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

33 Terms

1

Deontological theories

an approach to Ethics that focuses on the rightness or wrongness of actions themselves, as opposed to the rightness or wrongness of the consequences of those actions

New cards
2

Personal information

any information relating to an individual person.

New cards
3

Informed consent

users being aware of what information is collected and how it is used.

New cards
4

Invisible information gathering

collection of personal information about a user without the user's knowledge.

New cards
5

Cookies

Files a Web site stores on a visitor's computer.

New cards
6

Secondary use

Use of personal information for a purpose other than the purpose for which it was provided.

New cards
7

Data mining

Searching and analyzing masses of data to find patterns and develop new information or knowledge.

New cards
8

Computer matching

Combining and comparing information from different databases (using social security number, for example) to match records.

New cards
9

Computer profiling

Analyzing data to determine characteristics of people most likely to engage in a certain behavior.

New cards
10

opt out

Person must request (usually by checking a box) that an organization not use information.

New cards
11

opt in

The collector of the information may use information only if person explicitly permits use (usually by checking a box).

New cards
12

4th Amendment

Sets limits on government's rights to search our homes and businesses and seize documents and other personal effects. Requires government provide probable cause.

New cards
13

Government Accountability Office

monitors government's privacy policies

New cards
14

Public Records

- records available to general public

New cards
15

EU Data Privacy Directive

Prohibits transfer of personal information to countries outside the EU that do not have an adequate system of privacy protection.
"Safe Harbor" plan
Abuses still occur
Puts requirements on businesses outside the EU

New cards
16

The Communications Assistance for Law Enforcement Act (CALEA)

Passed in 1994
Requires telecommunications equipment be designed to ensure that the government can intercept telephone calls (with a court order or other authorization).
Rules and requirements written by Federal Communications Commission (FCC)

New cards
17

1st Amendment

freedom of press, religion, speech, right to assemble, and right to petition the government

New cards
18

Telecommunication Act of 1996

Changed regulatory structure and removed artificial legal divisions of service areas and restrictions on services that telephone companies can provide.

New cards
19

Communications Decency Act of 1996

First major Internet censorship law
Main parts ruled unconstitutional

New cards
20

Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN-SPAM Act)

Targets commercial spam
Criticized for not banning all spam, legitimized commercial spam

New cards
21

Net Neutrality

Refers to a variety of proposals for restrictions on how telephone and cable companies interact with their broadband customers and set fees for services.
Argue for equal treatment of all customers

New cards
22

Intellectual Property

a work or invention that is the result of creativity, such as a manuscript or a design, to which one has rights and for which one may apply for a patent, copyright, trademark

New cards
23

Copyright

exclusive rights:
To make copies
To produce derivative works, such as translations into other languages or movies based on books
To distribute copies
To perform the work in public (e.g. music, plays)
To display the work in public (e.g. artwork, movies, computer games, video on a Web site)

New cards
24

Fair Use Doctrine

Purpose and nature of use - commercial (less likely) or nonprofit purposes
Nature of the copyrighted work
Amount and significance of portion used
Effect of use on potential market or value of the copyright work (will it reduce sales of work?)

New cards
25

Sony v. Universal City Studios (1984)

Supreme Court decided that the makers of a device with legitimate uses should not be penalized because some people may use it to infringe on copyright
Supreme Court decided copying movies for later viewing was fair use

New cards
26

MGM v. Grokster

Grokster, Gnutella, Morpheus, Kazaa, and others provided peer-to-peer (P2P) file sharing services
The companies did not provide a central service or lists of songs
P2P file transfer programs have legitimate uses
Lower Courts ruled that P2P does have legitimate uses
Supreme Court ruled that intellectual property owners could sue the companies for encouraging copyright infringement

New cards
27

DRM - Digital Rights Management

Collection of techniques that control uses of intellectual property in digital formats
Includes hardware and software schemes using encryption
The producer of a file has flexibility to specify what a user may do with it

New cards
28

Hacking

Intentional, unauthorized access to computer systems

New cards
29

Computer Fraud and Abuse Act (CFAA)

Covers government computers, financial and medical systems, and activities that involve computers in more than one state, including computers connected to the Internet
Under CFAA, it is illegal to access a computer without authorization
The USA PATRIOT Act expanded the definition of loss to include the cost of responding to an attack, assessing damage and restoring systems

New cards
30

Electronic Communications Privacy Act

prohibits interception of email and reading stored email without a court order, but makes an exception for business systems

New cards
31

National Labor Relation Board

sets rules and decides cases about worker-employer relations.

New cards
32

Redundancy

Multiple computers capable of same task; if one fails, another can do the job.

New cards
33

beta test

a trial of machinery, software, or other products, in the final stages of its development, carried out by a party unconnected with its development.

New cards
robot