1/93
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
In the video "Digital Ethics and the Future of Humans in a Connected World" by Gerd Leonhard, which of the following statements is the most correct?
Facebook has 100s of people creating the content for its news feed.
Technology has no ethics.
People work less mecause they are distracted by social media and mobile devices.
Stephen Hawking states Artificial Intelligence is not our last and greatest invention.
Technology has no ethics
In the video regarding the paper "What is Computer Ethics" by James Moore, which statement below is the most accurate?
Computer ethics is about right and wrong behavior as defined by local laws.
Computer ethics is about the social impact of computer technology and the ethical use of such
Computer ethics is about computer security.
Computer ethics is about right and wrong behavior as defined by a person's religion.
Computer ethics is about the social impact of computer technology and the ethical use of such tech
"What is Computer Ethics" by James Moore, which statement below is the most accurate?
Executives that work from home gain spontaneous interaction with colleagues because of handheld devices.
Computer technology has made money more accessible, but has not redefined what money is.
Computer technology is rigid, fixed, and not mealleable, which leads to abuse of the user.
Computer technology has transformed our definition of traditional work as "work" is no longer something that happens at a specific time or specific place.
Computer technology has transformed our definition of traditional work as "work" is no longer something that happens at a specific time or specific place.
"Computer Ethics: Basic Concepts and Historical Overview" by Terrell Ward Bynum, which statement below is the most accurate?
The field of Computer Ethics began after the first recorded network intrusion at the Flagger Dog Track in the state of Floida (USA).
The field of Computer Ethics is partially a response to the development of an antiaircraft cannon capable of shooting down fast warplanes.
Computer technology has made money more accessible, but has not redefined what money is.
Unlinke the Industrial Revolution, computer technology is not transforming society.
The field of Computer Ethics is partially a response to the development of an antiaircraft cannon capable of shooting down fast warplanes.
"Computer Ethics: Basic Concepts and Historical Overview" by Terrell Ward Bynum, which statement below is the most accurate?
Although it is possible to own the source code, object code (machine language), and algorithm assosciated with a computer program, it is not possible to own the "look and feel" of a program.
According to US law, it not is possible for a person to own a patent on a computer algorithm and prevent others from using it.
Computer technology may cause "de-skilling" by replacing human skill with computer technology.
In the long run, computer technology will eliminate more jobs than it creates.
Computer technology may cause "de-skilling" by replacing human skill with computer technology.
In the video "Ethics in the Age of Technology" by Juan Enriquez, which of the following statements is the most correct?
Doctor J. Marion Sims is regarded as one of the first Doctors to suggest slavery is unethical and should be abolished.
Defining who teaches us ethics is difficult because sometimes our traditional sources of guidance like holy books, parents, religious leaders, teachers, lawyers, doctors, and the government provide incorrect information.
Baptist Pastor Richard Furman is regarded as one of the first religious leaders to speak out about the abolishment of slavery.
Lawyer Thomas Cooper, in his "1826 pamphlets," is regarded as one the first Lawyers to suggest slavery is unethical.
Defining who teaches us ethics is difficult because sometimes our traditional sources of guidance like holy books, parents, religious leaders, teachers, lawyers, doctors, and the government provide incorrect information.
"Interaction Between Ethics and Technology" by Shakib and Layton, which statement below is the most correct?
Consumers are having an impact on businesses by supporting those businesses that they believe are morally sound, and thereby making it more difficult for an unethical business to survive.
"Interaction Between Ethics and Technology" by Shakib and Layton, which statement below is the most accurate?
There is no universal ethics.
"Multimedia, Cyberspace, and Ethics" by Jefferies, which statement below is the most accurate?
It is not easy to regulate the Internet because it is a global network without any boundaries.
"Multimedia, Cyberspace, and Ethics" by Jefferies, which statement below is the most accurate?
Bill Gates stated he felt a personal responsibility to build an Internet that is ethical.
Deep Fake technology allows one to fake one's fingerprints and frame someone for a crime they did not commit.
Deep Fake technology creates an ethical issue by allowing a victim's appearance to be faked in a video, appearing to be doing whatever the Deep Fake developer wants.
The Internet is a major contribution to cultural diversity.
Deep Fake technology creates an ethical issue by allowing a victim's appearance to be faked in a video, appearing to be doing whatever the Deep Fake developer wants.
"The Social Dilemma of Driverless Cars" by Iyad Rahwan, what was the suggestion provided by a blogger?
Cars should be equipped with a "people catcher" (like a "cow catcher" on the front of trains) that push people gently out of the way when the driver loses control of the car.
The driver of the car should push an eject button just before impact to avoid being killed in a car accident.
Cars should be made out of soft spongy material (the "Nurf car") to help reduce deaths in the case of accidents.
All drivers should wear helmets and other safety gear to help them survive what would normally be a deadly crash.
The driver of the car should push an eject button just before impact to avoid being killed in a car accident.
"The Ethics of Driverless Cars" by Neil McBride, what is meant by an "iron cage"?
The "iron cage" is another name for a driverless car in that it is made of iron, but has no one in it.
The "iron cage" is a modification to the car that makes it safe.
The "iron cage" is the place people should be to keep them safe from driverless cars.
The "iron cage" is technology that has constrained us.
The "iron cage" is technology that has constrained us.
"The Ethics of Driverless Cars" by Neil McBride, what is suggested in the conclusion?
Driverless cars allow the passenger to have more free time to pursue other activities.
We need a car that provides more information to the user so the user can be a better driver.
We need to perfect the technology regarding driverless cars so less people are injured.
Driverless cars are essential for allowing the human spirit to be free.
We need a car that provides more information to the user so the user can be a better driver.
"Automated Detect and Avoid" by Erik Theunissen and others, which of the following statements is the most correct?
An ethical issue arises because writing code involves a degree of premeditation regarding how a robot car will act.
Algorithm developers and programmers are forgiven for accidents because everyone knows computer code is imperfect.
We should code human behavior because human situations are simple and easy to program.
When a human acts without deliberation, they are ethically responsible to the same degree as a programmer making premeditated decisions for a robot car.
An ethical issue arises because writing code involves a degree of premeditation regarding how a robot car will act.
"Automated Detect and Avoid" by Erik Theunissen and others, which of the following statements is the most correct?
Current data supports the claim that self-driving cars have resulted in a reduction in the number of accidents.
When it comes to programming automated detect and avoid algorithms, human values and judgments do not become part of the code.
Current data does not support the claim that self-driving cars have resulted in a reduction in the number of accidents.
When it comes to programming automated detect and avoid algorithms, it is best to replace all human judgment with algorithms as algorithms can be perfected to respond correctly in all situations
Current data does not support the claim that self-driving cars have resulted in a reduction in the number of accidents.q
"Right Wrong: How Technology Transforms our Ethics" (see the PowerPoint slides provided with the course material), ethics does not change over time. T/F
F
"Right Wrong: How Technology Transforms our Ethics" (see the PowerPoint slides provided with the course material), ethics changes our technology. T/F
F
"Right Wrong: How Technology Transforms our Ethics" (see the PowerPoint slides provided with the course material), it pays to be humble about the past, as we too will be judged by the future. T/F
T
"Computer Technology is Like the Gift of Fire," computer technology is like fire in that if it is not managed appropriately, it can get out of control and hurt many people. T/F
T
"Woman Injured by a Garage Door," which direction is the garage door closing?
The garage door closes from the top down.
The garage door closes from left to right.
The garage door closes from left and right at the same time.
The garage door closes from right to left.
left to right.
"Ethics and Safety of Computer Systems," which of the following statements is the most correct?
The main issue is regarding the responsibility for computer failures in critical systems.
Proving computer systems are correct is easy and therefore we should always prove them correct before allowing the public to use them. Because the 'Computer Medical Assistant' is error free, medical personnel are unethical if they do not follow the suggestion provided by this service.
The main issue is regarding the proper use of critical systems by the non-computer scientist.
The main issue is regarding the responsibility for computer failures in critical systems.
"Ethics and Safety of Computer Systems," which of the following statements is the most correct?
Computer professionals do not ignore important human issues when designing and implementing computer technology.
A point was made that it is easy for people to not use technology.
People use technology that is "unjustifiably risky" because they have sufficient knowledge of how risky technology is.
A point was made that maybe Computer Scientists should take an oath to 'do no harm.'
A point was made that maybe Computer Scientists should take an oath to 'do no harm.'
"When Formal Systems Kill," what is a "formal system"?
A formal system uses a grammar for encoding logic and states such that a given conclusion follows from a given premise.
A formal system requires less time, less money, and less complexity to verify it is correct.
A formal system is one that is proven correct through testing.
A formal system is computer code that cannot be proven correct.
A formal system uses a grammar for encoding logic and states such that a given conclusion follows from a given premise.
"When Formal Systems Kill," which of the following statements is the most correct?
Modeling complex systems is easy and therefore every system can be proven correct or incorrect.
Computational fluid dynamics (CFD) is not a good analogy for a formal method because CFD involves testing in a wind tunnel.
Computational fluid dynamics (CFD) is not a good analogy for a formal method because CFD involves mechanical engineering.
Modeling complex systems is challenging and prevents us from using a formal method to prove they are correct.
Modeling complex systems is challenging and prevents us from using a formal method to prove they are correct.
"Voice Recognition Software in 'Hello Barbie' Doll Concerns Parents Privacy Groups," what 'old information' did the doll suggest about the person playing with the doll?
The doll suggested the person might be a "young girl."
The doll suggested the person might be a "dancing polititian."
The doll suggested the person might be a "teacher."
The doll suggested the person might be "single mother."
The doll suggested the person might be a "dancing polititian."
"Can and Should Hello Barbie Keep a Secret" by Meg Jones and Kevin Meurer, who maintains the recorded conversations of the child?
Mattel (the manufacturer).
A 3rd party vendor.
The parents of the child.
The person that purchased the doll.
A 3rd party vendor.
"Can and Should Hello Barbie Keep a Secret" by Meg Jones and Kevin Meurer", what is suggested in the conclusion?
Hello Barbie has been demonstrated to help children get better grades in school.
When programming algorithms, human values and judgements should not become part of the code.
The tendency to share a child's personal data among 'big data' collectors has the potential to negatively impact a child's ability to trust others.
Purchasers of "Hello Barbie" fully understand the risks when they buy this product and are therefore responsible for the abuse of children.
The tendency to share a child's personal data among 'big data' collectors has the potential to negatively impact a child's ability to trust others.
Privacy and Ethical Concerns in Internet Security" by Rebecca and James Rutherfoord, what is meant by an 'extrinsic loss of freedom'?
An extrinsic loss of freedom occurs when a person voluntarily gives someone permission to collect data about themself.
An extrinsic loss of freedom is when a person changes their behavior because they think they are being watched.
An extrinisic loss of freedom is when a person's behavior is controlled by another person.
An extrinsic loss of freedom is when a person chooses to have solitude.
An extrinisic loss of freedom is when a person's behavior is controlled by another person.
"Privacy and Ethical Concerns in Internet Security" by Rebecca and James Rutherfoord, which of the following statements is the most correct?
There are many ways to define privacy including solitude, maintaining control over personal data, and the right to not being monitored.
The best way to ensure privacy in a world of changing technology is to write laws that all countries follow.
When it comes to privacy issues regarding ones data, there is no concern regarding stolen identity.
When it comes to privacy issues regarding ones data, there is no concern regarding the accuracy of
There are many ways to define privacy including solitude, maintaining control over personal data, and the right to not being monitored.
"Ethics and Safety of Computer Systems" by Michael C. McFarland, which of the following statements is the most correct?
Normative ethics recognizes that values and choices are expressed in individual actions, and are emobodied effectively in social structure.
Normative ethics asks what kind of person does the right thing.
Normative ethics seeks to develop and justify rules for right conduct.
Normative ethics asks what social structures are needed to support values such as justice and respect for human life and dignity.
Normative ethics seeks to develop and justify rules for right conduct.
Normative ethics
seeks to develop and justify rules for right conduct.
social ethics
recognizes that values and choices are expressed in individual actions, and are emobodied effectively in social structure.
ethics of virtue
asks what kind of person does the right thing
"Ethics and Safety of Computer Systems" by Michael C. McFarland, which of the following statements is the most correct?
Ethics of virtue asks what kind of person does the right thing.
Ethics of virtue asks what social structures are needed to support values such as justice and respect for human life and dignity.
Ethics of virtue recognizes that values and choices are expressed in individual actions, and are emobodied effectively in social structure.
Ethics of virtue seeks to develop and justify rules for right conduc
Ethics of virtue asks what kind of person does the right thing.
Ethics and Safety of Computer Systems" by Michael C. McFarland, which?
Social ethics asks what social structures are needed to support values such as justice and respect for human life and dignity.
Social ethics seeks to foster and promote knowledge.
Social ethics seeks to develop and justify rules for right conduct.
Social ethics asks what kind of person does the right thing.
Social ethics asks what social structures are needed to support values such as justice and respect for human life and dignity.
"When Formal Systems Kill" by Darren Abramson and others, what are the challenges to formal methods? Select ALL that apply.
Computer code cannot be proven correct.
How to mechanically check the correctness of mathematical proofs.
How to automate methematical proofs.
How to mathematically model formal systems and their environments.
How to mechanically check the correctness of mathematical proofs.
How to automate methematical proofs.
How to mathematically model formal systems and their environments.
"When Formal Systems Kill" by Darren Abramson and others, one of the points being made is both proof and testing are needed to support good software code.
True
False
True
"Can and Should Hello Barbie Keep a Secret" by Meg Jones and Kevin Meurer", parents are given the perception of complete control over the stored conversations, yet their child's data has the potential to be shared with numerous third parties.
True
False
True
"Can and Should Hello Barbie Keep a Secret" by Meg Jones and Kevin Meurer", in order for Hello Barbie to retain the trust of parents, ToyTalk could make a clearer commitment to withholding individual data from third parties or offer an opt-in system for parental monitoring
True
False
True
"Privacy and Ethical Concerns in Internet Security" by Rebecca and James Rutherfoord, virtual connections make it feel like people are near us.
True
False
True
"Privacy and Ethical Concerns in Internet Security" by Rebecca and James Rutherfoord, an intrinsic loss of freedom comes about when people behave in a different manner when they are being monitored, watched or spied upon."
True
False
True
"Privacy and Ethical Concerns in Internet Security" by Rebecca and James Rutherfoord, what does Durlak include in his list of basic rights regarding privacy? Select all that apply.
intimacy
solitude
iron cage
reserve
intimacy
solitude
reserve
what did Mark Zuckerberg say might be "more relevant to your interests right now than people dying in Africa"?
Information about one's favorite musical artist.
The happiness and status of one's own family.
The happiness and status of one's own friends.
A squirrel dying in your front yard.
A squirrel dying in your front yard.
In the video "What FACEBOOK and GOOGLE are Hiding from the World - the Filter Bubble," which of the following statements is the most correct?
Google buys Facebook data to customize the research results provided to Google users.
Google is filtering search content based on a user's profile and returning to a user results that are tailored to them.
Facebook buys Google search results to customize Facebook news items for the Facebook user.
Google is filtering news content based on what Google want's the user to see and therefore hiding the truth.
Google is filtering search content based on a user's profile and returning to a user results that are tailored to them.
"Cyberethics - Morality and Law in Cyberspace - Chapter 4 - Intellectual Property in Cyberspace," which of the following statements is the most correct?
A dance can be copyrighted.
A copyright gives an author exclusive rights to their works.
A video of a dance cannot be copyrighted.
A copyright gives an author exclusive rights to their works.
"Cyberethics - Morality and Law in Cyberspace - Chapter 4 - Intellectual Property in Cyberspace," what was the issue regarding Expedia and Priceline?
Priceline sued Expedia for infringing on its logo which includes an aircraft in a blue circle.
Expedia sued Priceline for infringing on its pricing algorithm for air travel.
Expedia sued Priceline for selling discount travel services to the public.
Priceline sued Expedia for copying the method of allowing the customer to name the price for a hotel room.
Priceline sued Expedia for copying the method of allowing the customer to name the price for a hotel room.
"Intellectual Property and the Process of Invention: Why Software is Different" by Robert Plotkin, why is software special?
Software is special because it can be protected by both patent and a copyright.
Software is special because it can be copyrighted, but not patented.
Software is special because it can be patented, but not copyrighted.
Software is special because all software is in the public domain and cannot by copyrighted.
Software is special because it can be protected by both patent and a copyright.
Intellectual property consists of original musical compositions, poems, novels, inventions, and product formulas. T/F
T
The U.S. Constitution confers upon congress the power to promote the progress of science and the useful arts, by securing for limited time to authors and inventors the exclusive rights to their respective writings and discoveries. T/F
T
A dance can be copyrighted. T/F
F
The first sale provision allows the first purchaser of a copyrighted work to sell or lend that copy to someone else without the copyright holder's permission. T/F
T
A trademark is a word, phrase, or symbol that identifies a product or service.
T/F
T
__ occurs when a trademark is used by someone else in connection with the sale of its goods or services.
infringement
__ occurs when the trademark is associated with dissimilar products - for example, using the Disney trademark name to sell suits for men.
blurring
Through financial incentives intellectual property rights induce creators to develop works they would not otherwise produce without this protection, and this contributes to the general good of society. T/F
T
"How Data Brokers Sold my Identity," what happened when Massachusetts Governor William Weld approved the release of 135,000 medical records of state employees with the names and social security numbers redacted?
Professor Sweeney sent the Governor his medical records as a demonstration that the Governor could be identified by cross-referencing his medical records with public voter registration data.
The Governor demonstrated that without a name or Social Security Number, medical records cannot be associated with a person.
A health-care provider recognized the Governor's medical records and sent them to the Governor.
The union representing the state employees sued the Governor for violating privacy laws.
Professor Sweeney sent the Governor his medical records as a demonstration that the Governor could be identified by cross-referencing his medical records with public voter registration data.
In the video regarding the paper "Choosing Passwords: Security and Human Factors" by Edward Gehringer, what does the author suggest?
The author suggests users should use a "password wallet" to store all of their passwords.
The author suggests passwords should be in different formats, for different devices.
The author suggests users should have one password and not many.
The author suggests users should change their passwords frequently.
The author suggests users should have one password and not many.
"Choosing Passwords: Security and Human Factors" by Edward Gehringer, what does the author suggest?
The author suggests Microsoft Passport is the best solution for maintaining secure passwords.
The author suggests passwords should be of an unlimited length.
The author suggests more complex rules are needed to control the generation of secure passwords.
The author suggests computer systems should restrict password formats to make programming more convenient.
The author suggests passwords should be of an unlimited length.
"The Ethics of Collecting Data" with Marie Wallace, what does the speaker suggest?
The speaker suggests we can put an end to big data collection and we should.
The speaker suggests users should be paid for giving up personal data.
The speaker suggests social media can raise your concern about your own body issues and then exposed you to diet products to generate sales.
The speaker suggests users should not give up personal data to support product marketing.
The speaker suggests social media can raise your concern about your own body issues and then exposed you to diet products to generate sales.
"The Ethics of Collecting Data" with Marie Wallace, what does the speaker suggest?
The speaker suggests transparency can exist in personal data collection by businesses and customers voluntarily give up their data.
The speaker suggests we should enact laws immediately to stop personal data collection because it will be considerably worse for the next generations.
The speaker suggests there is no way to embrace personal privacy while also supporting personal data collection by businesses.
The speaker suggests 'big data' collection cannot be done in a transparent way such that customers voluntarily give up their data.
The speaker suggests transparency can exist in personal data collection by businesses and customers voluntarily give up their data.
In an environment where a user has numerous accounts with different passwords, a lockout is a powerful incentive to write down a list of those passwords rather than guess at them when trying to log in. T/F
T
"Choosing Passwords: Security and Human Factors" by Edward Gehringer, password wallets are a good option for password security T/F
F
"Choosing Passwords: Security and Human Factors" by Edward Gehringer, which of the following does he suggest are the role of the computer scientist? Select all that apply.
Reduce lockouts
Modify the lifetime limits
Make password management easier for the user
Allow a user to have much longer passwords, of a universal format
All
Maintaining password security involves striking a delicate balance between having enough rules to maintain good security and not having so many that users will take evasive action that compromises security. T/F
True
Regarding the video about "Elves Ethics - The Digital World," which of the following statements is the most accurate?
The Orcs slaughter the Elves with stolen weapons.
The true identity of the 'gay girl in Damascus' is actually a male American student studying abroad.
The Elves defeat the Orcs with magic. There is a strict code of ethics that all participants follow.
The true identity of the 'gay girl in Damascus' is actually a male American student studying abroad.
"Ethic in Massively Multiplayer Online Role-Playing Games," which of the following statements is the most accurate?
Ninja looting is the process of killing a character a second time as soon as that character regenerates.
It is not possible to steal items from another person.
Behaving unethically in a virtual world might lead to unethical behavior in the real world.
Griefing and bullying are not abusive because it is occurring in virtual reality.
Behaving unethically in a virtual world might lead to unethical behavior in the real world.
griefing
Bullying or harassment of players while playing online games.
"Ethic in Massively Multiplayer Online Role-Playing Games," which of the following statements is the most accurate?
The abuse in virtual reality games is not real.
There is no chance for any real monetary damage.
The abuse in virtual reality games is real.
Games do not help individuals learn good and bad behavior.
The abuse in virtual reality games is real.
"An Ethical Examination of the Internet Census 2012 Dataset - A Menlo Report Case Study," which of the following statements is the most accurate?
Students at Menlo College were involved in a very large cheating scandal.
A central point is that commercial products that are accessible from the Internet should not be sold with a default password.
Participants that answered questions found in the Internet Census are unethical for not providing honest answers.
Students and Menlo University developed password cracking software that allowed them to enter devices connected to the Internet.
A central point is that commercial products that are accessible from the Internet should not be sold with a default password.
An Ethical Examination of the Internet Census 2012 Dataset - A Menlo Report Case Study," which of the following statements is the most accurate?
Because there was such an outcry about the unethical behavior in the creation of the Internet Census 2012 Dataset, other researchers are discouraged from similar activity.
The author suggests there should be more public outcry regarding the unethical behavior exhibited in the creation of the Internet Census 2012 Dataset.
The German Penal Code considers a person's "good intent" when deciding if a law has been broken.
There is nothing unethical about using default passwords to enter a network that is intended to be locked.
The author suggests there should be more public outcry regarding the unethical behavior exhibited in the creation of the Internet Census 2012 Dataset.
"Cyber War," which of the following statements is the most accurate?
The speaker stated experienced hackers are recruited at the Def Con Hacking Conference in Las Vegas, NV almost every year.
Logic bombs have been placed in the power grid of the United States.
Cyber-attacks do not cause destruction in physical space, so cyber war is considered ethical. The Federal Bureau of Investigation in the United States engages in Cyber War against hackers in other countries.
Logic bombs have been placed in the power grid of the United States.
"An Analysis of a Just Cyber Warfare," which of the following statements in the most accurate?
The Just War Theory is inadequate for evaluating the ethicalness of cyber warfare.
Floridi states 'information does not have a right to exist,' and therefore cyber warfare is not unethical.
The Just War Theory states cyber warfare is unethical.
Floridi states 'information does not have a right to exist,' and this is the foundation of a Just Cyber Warfare Theory.
The Just War Theory is inadequate for evaluating the ethicalness of cyber warfare.
"An Analysis of a Just Cyber Warfare," which of the following statements in the most accurate?
A principle of Just Cyber Warfare is that a Cyber War should be waged to promote the well-being of the infosphere.
When addressing Cyber Warfare, the Just War Theory cannot be applied and should be rejected altogether.
Floridi states 'information has a right to exist,' and therefore cyber warfare that destroys information is unethical.
Cyber Warfare makes the Just War Theory invalid.
Floridi states 'information has a right to exist,' and therefore cyber warfare that destroys information is unethical.
According to the paper regarding "Ethic in Massively Multiplayer Online Role-Playing Games," what are the primary means by which playing games help guide moral development? Select all that apply.
Defning good and bad behavior. Learning a system of rules.
Practice following rules.
Developing poor social skills
Defning good and bad behavior. Learning a system of rules.
Practice following rules.
An investigation done by Coyne (as cited in Ethic in Massively Multiplayer Online Role-Playing Games) �nds that online grie�ng has a similar impact as traditional bullying.
True False
T
There should be more public outcry regarding the unethical mapping of the Internet with the Carna botnet.
True False
T
What are the main elements of a 'Just War Theory?'
War as a last resort
Do more good than harm.
Avoid harming non-combatants
"Hacker Tactics Tools - Become a Hacker - Hacking Made Easy," what does a "Wi� Pineapple' allow the user to do?
Hack everyone on the same network.
Goelocate each user connected to the same network.
Encrypt a user's message to protect it from hacking.
Conduct penetration testing on a network.
Hack everyone on the same network.
"Bias in Computer Systems" by Friedman and Nissenbaum, what is the bias found in some airline ticketing systems?
Some airline ticketing systems charge customers more if their IP address geolocates them to a wealthy part of the world.
Some airline ticketing systems always recommend a higher priced ticket for every customer.
Some airline ticketing systems do not suggest using multiple air carriers for a multi-fight trip even if doing so would be less expensive for the customer.
Some airline ticketing systems advertise inexpensive �ights, but then change more than advertised.
Some airline ticketing systems do not suggest using multiple air carriers for a multi-fight trip even if doing so would be less expensive for the customer.
"Bias in Computer Systems" by Friedman and Nissenbaum, what is the bias found in the National Resident Match Program?
Medical school students are biased against when they try to select a training program.
The National Residency Match Program is biased against those British citizens that do not live in England.
The National Residency Match Program is biased against a child with a British father and a mother from another country.
Customers that are trying to find an apartment to establish residency within Great Britain are biased against if this is their first attempt.
Medical school students are biased against when they try to select a training program.
Embedding Ethics in Computer Architecture" by Alan Clements, which of the following statements is the most correct?
In order to be ethical and fair, a computer should be overclocked to increase throughput to accommodate everyone. Algorithms that support the sharing of a computer resource (e.g. 'priority,' 'round-robin,' etc.) are never fair, and therefore are always unethical.
Overclocking a CPU can be unethical in certain situations.
Operating a computer outside of it recommended limits is encouraged to increase throughput.
Overclocking a CPU can be unethical in certain situations.
Embedding Ethics in Computer Architecture" by Alan Clements, what is the result of an error in binary arithmetic?
Several people were killed in a missile attack. A nuclear reactor had a meltdown. An airplane was routed to the wrong location and ran out of fuel. Medical equipment gave the wrong amount of radiation.
Several people were killed in a missile attack
"The Ethical Problem with Facebook's Emotional Experiment," which of the following statements is the most correct?
Facebook demonstrated they could manipulate people's emotions by showing mostly negative or mostly positive posts in people's Facebook data feed.
Facebook demonstrated they could make a user sad by displaying a fake news story regarding the death of someone the user had identi�ed as a "friend" in their Facebook pro�le.
Facebook demonstrated they could manipulate a person into buying weight loss products by altering their Facebook pro�le picture by making the user appear to be fatter.
Facebook demonstrated they could manipulate a person into buying candy buy making the person feel lonely by blocking all content from their friends for a 16 day period.
Facebook demonstrated they could manipulate people's emotions by showing mostly negative or mostly positive posts in people's Facebook data feed.
Regarding the video about "Ethics in Security Research. Which Lines Should Not be Crossed?," which of the following statements is the most correct?
Developing anti-malware that eliminates some existing malware but also harms a small group of people is an acceptable trade-off. Developing malware and allowing it to operate in the wild is ethical because it is the only way we can learn about malware. Because spam is never harmful, observing spam in the wild and not warning the recipient is one of the few acceptable security research activities.
Developing malware to study user infection numbers and malware dissemination strategies is a bad idea.
Developing malware to study user infection numbers and malware dissemination strategies is a bad idea.
Regarding the video about "Ethics in Security Research. Which Lines Should Not be Crossed?," which of the following statements is the most correct?
Developing anti-malware is unethical because it is not ethical to be unethical to the unethical. The biggest threat from spam is that it is a nuisance.
About 50% of the spam sent worldwide advertise medicine/pharmaceutical products which are to a large percent counterfeited and a major health threat.
It is actually cheaper to engage in ethical research rather than unethical research, so switching to ethical research should be easy.
About 50% of the spam sent worldwide advertise medicine/pharmaceutical products which are to a large percent counterfeited and a major health threat.
Regarding the video about the paper on "Research Ethics in Human-Computer Interaction," which of the following statements is the most accurate?
There is a concern that robots might injure a person if robots engage in activities such as caring for the elderly.
It is not a violation of a research subject's privacy if they are not aware of their data being collected during the research process.
Research subjects should not be allowed to withdraw from research once they have volunteered to be a research subject.
Conducting secret research on a human subject is ethical as long as the human subject is informed of the research after it is completed.
There is a concern that robots might injure a person if robots engage in activities such as caring for the elderly.
"Research Ethics in Human-Computer Interaction," which of the following statements is the most accurate?
Researchers do not need to concerned about cultural differences among the participants. It is not necessary to accommodate a research subject's basic need to be free to move during the research.
Researchers need to be careful regarding how recording technology might make the subject feel uncomfortable.
Researchers do not need to be open about the data that is collected during the research.
Researchers need to be careful regarding how recording technology might make the subject feel uncomfortable.
size of a screen display might be a source of bias as it in�uences what can be seen of the �rst page.
True False
True
Once bias is in a computer system, it is easy to remove. T/F
False
The term bias refers to a computer system that systematically and unfairly discriminates against certain individuals or groups of individuals in favor of others.
True False
True
Even though arbitration approaches such as �xed, priority, and round-robin are "fair," they can still have their own bias.
True
Computer-based binary arithmetic is precise and does not present any ethical challenges.
True False
False
Which of the following research topics have the potential to expose real people to harm? Select all that apply.
credit card
fraud spam viruses botnet
all
One abuse that can take place during research is 'secret data collection' in which the participant is unaware of the data that is being collected about them of their computer device(s).
True False
True