Ethics and Privacy Concerns

0.0(0)
studied byStudied by 3 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/62

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

63 Terms

1
New cards

Ethics

involves making choices about what a person should do, say, and even what to think

2
New cards

Ethics vs Morals

morals = virtuous life

ethics = rational framework for morals

3
New cards

Relationship between ethics and laws

study of society’s legal guidance can frame ethical study

4
New cards

Deepfake

synthetic media in which a person in an existing image or video is replaced with someone else’s likeness and encourages insular information streams

5
New cards

Illegal activity

using the business’s computers or network in a criminal act such as theft of computer hardware, copyright infringement, software piracy, recording piracy, child pornography, computer scams, bomb threats, and federal computer security violations

6
New cards

Organizational policy violations

determined by the standards set by the employer, usually includes prohibitions against sending personal email, shopping, visiting social media, etc.

7
New cards

Five fundamental ethical principles for managers

autonomy, non-malfeasance, beneficence, justice, fidelity

8
New cards

Five fundamental ethical principles for accountants

integrity, objectivity, competence, confidentiality, professionalism

9
New cards

Five dimensions of ethical behavior in the digital age

information rights, copyrights and intellectual property, control and accountability, establishing standards, quality of life

10
New cards

Information rights

rights of individuals and organizations to privacy of the individual’s personal information

11
New cards

Intellectual property

creative work like artwork, literary works, inventions, music, images

12
New cards

Control and accountability

examines how individuals or corporations can be held accountable in case of violations of privacy or intellectual property rights

13
New cards

Whack-a-mole phenomenon

one site is taken down for malfeasance, another is opened nearly instantaneously

14
New cards

Quality of life dimension

difficult to assess because dilemmas are usually complex and resolutions are weak compromises

15
New cards

Wells Fargo Case

2016

  • aggressive manager had encouraged branch employees to open new accounts by setting goals and offering rewards

  • employees created fake accounts

  • costed $3B & loss of reputation

16
New cards

Five steps for resolving delimmas

get all facts, determine who is affected, search for precedents, list options, deal with consequences

17
New cards

Five principles of ethical decision making

principle of moral rights, principle of virtue, principle of distributive justice, universalist principle, utilitarian principle

18
New cards

Principle of moral rights

some decisions are either intrinsically morally right or morally wrong

19
New cards

Principle of virtue

decision maker considers what a highly moral person would do

20
New cards

Principle of distributive justice

attempts to distribute rewards equitably among individuals based on levels of effort or productivity

  • ex) incentives for sales

21
New cards

Universalist principle

manager must determine if a decision is fair for all involved

22
New cards

Utilitarian principle

do the ends justify the means? can ignore the rights of the individual

23
New cards

Privacy

right to control what happens with an individual’s personal information

24
New cards

Internet privacy

right of personal privacy concerning the storing, distributing, and displaying of information concerning an individual via the internet

25
New cards

Resolution 68/167

adopted by UN general assembly in Dec 2013

affirms that the rights held by people offline must be held online, called states to protect the right to privacy in digital communication

26
New cards

Effect of first amendment on internet privacy

limits government censorship

Supreme Court rejected legislation that was designed to protect children on the internet, calling it unconstitutional

27
New cards

Digital Millennium Copyright Act

1998

implements treaties of the World Intellectual Property Organization and is comprised of five titles meant to protect intellectual property in digital formats

28
New cards

Children’s Internet Protection Act

2000

children’s access to harmful content over the internet, requires pornographic sites to include age verification

29
New cards

Electronic Communications Privacy Act

1986

protects email and VoIP communications by making it illegal to intercept calls or messages without a warrant

30
New cards

US Patriot Act/USA Freedom Act

monitors terrorist activities and communications, allows law enforcement to obtain information about online and offline communications related to terrorist activities without a warrant

31
New cards

Federal Information Security Management Act

protects government information and assets against cyberthreats

32
New cards

Cybersecurity Information Act

improves cybersecurity by creating a network where information about threats can be shared between government and technology companies

33
New cards

Computer Fraud and Abuse Act

prohibits accessing a computer or network without proper authorization

34
New cards

Wiretap Act

protects person to person wire, oral, electronic communications

35
New cards

Cookie

small text file of information created by a website you visit, stored on hard drive, creates privacy problems

36
New cards

First-party cookies

created by a website you visit and keep track of your personal preferences and the current web browsing session

37
New cards

Third-party cookies

created by a website other than the one you are currently visiting, used to track surfing habits, invasion of privacy

38
New cards

Session cookies

small text files stored in temporary memory like RAM or cache, lost when browser is closed

39
New cards

Persistent cookies

stored on hard drive, not lost when web browser is closed, only lost if it has an expiration date

40
New cards

Opt-In and Opt-Out

common methods of gaining consumer permission to access the consumer’s information or track their behavior, take advantage of naiveté

41
New cards

Intellectual property

human knowledge and ideas that the law protects against unauthorized use by others

42
New cards

4 Categories of intellectual property

patents, trademarks, copyright, trade secrets

43
New cards

Copyright

form of protection provided by the laws of the US for original works of authorship (literary, musical creations, etc.)

44
New cards

Patent

government grants an inventor the right to exclude others from the use of the invention for a period of time

45
New cards

Types of patents

utility patent, design patent

46
New cards

Utility patent

granted for a new machine or process

47
New cards

Design patent

protects the unique appearance of an object

48
New cards

Digital Millennium Copyright Act

by President Clinton in 1998

updates copyright laws to deal with the issues of how to regulate digital material

  • difficult to copy analog video recordings

  • protects ISP for being sued when the user copies items from the internet

  • allows educational institutions to use copyrighted material

49
New cards

Data

raw facts that describe the characteristics of an event, object, or set of information

50
New cards

Structured data

defined length, type, format

51
New cards

Big data

methodologies that attempt to deal with the vast amount of complex information that accumulates at high and accelerating velocity

52
New cards

Methodologies for gathering big data

asking the customer, indirectly tracking behavior, purchasing from third party

53
New cards

Examples of third-party data trackers

comscore, quantcast, acxiom

54
New cards

Transition in Big Data security

move to third-party cloud storage to reduce human factor in data protection

55
New cards

Steps to improve data privacy

exercise good password habits, incorporate anti-virus protection, practice safe browsing and online purchasing, monitor credit report

56
New cards

Another word for password

keycode

57
New cards

Antivirus software

scans files to identify and remove computer viruses and other malicious programs

58
New cards

Common techniques of antivirus programs

signature-based detection and heuristic-based detection

59
New cards

Signature-based detection

capitalizes on the fact that viruses are created with a specific set of data and instructions which constitute the signature, looks for signatures to find and remove virus

60
New cards

Heuristic-based detection

examines files for suspicious characteristics

61
New cards

Free vs fee-based antivirus software

free: basic detection and protection, ads, comparable malware detection performance

fee-based: identity theft protection, firewalls, parental controls

62
New cards

What can still be tracked in private browsing mode

IP address

63
New cards

Virtual Private Network

useful to protect online identity