1/30
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
The _____ theory that is considered for modern ethical frameworks is derived from the Greek word meaning goal or end.
teleological
A _____ implies a requirement that the holder of this right be provided with whatever one needs to pursue one's legitimate interests.
positive right
The need to consider the interests and perspectives of the affected parties in assessing alternative action plans, the other's moral and legal rights, and our duty to treat the other as an end and not as a means, all stand in opposition to the dangerous and myopic philosophy of _____, which is blind to the rights and aspirations of others.
ethical egoism
The ethical theory proposed by _____ has three major characteristics: it is ontocentric, ecological, and patient-oriented.
Floridi
The ethical theory developed by _____ has three major characteristics: ontocentric ethics, ecological macroethics, and information ethics.
Floridi
The ethical theory of _____ is commonly used in biomedical ethics to constitute prima facie duties, and has become popularized through the work of Beauchamp and Childress.
principlism
The First Principle of Morality states: keep one's choices open to _____, the fulfillment of all persons and communities.
integral human fulfillment (IHF)
One principal of practical reason is the norm forbidding the taking of _____.
innocent life
_____ works by breaking up a message into fixed-sized units.
Package switching
_____ establishes a unique numeric address for each system connected to the internet.
IP
The heart of the internet's original design is a network architectural standard that was first called the _____ principle, where intelligence is located at the ends but not in the network itself.
end-to-end
The last three letters of a web address indicate a(n) _____ identification, such as .edu stands for education.
top-level
Because search algorithms are proprietary technology, the opacity of the search process threatens the ideal of equal and fair access to _____ information.
objective
Because Google used a(n) ___ search technology that provided better results and was free of spam, it quickly became the favorite search tool.
PageRank
Google's dominance has concerned regulators that Google will _____ internet search and use that as a lever to gain control over other online industries.
monopolize
The fundamental question regarding search engine technology is whether users are getting _____ results when they initiate a search.
unbiased
Because users such as NASA rely on this tool for communications, _____ is primed to become the "epicenter of the Web."
Facebook and Twitter are examples of ___.
Social Networks
A challenge facing university administrators is their hesitation to ___ on social apps, even when offensive content is posted.
censor content
Because the internet was designed as a(n) _____ global technology, it is difficult for governments to enforce laws or restrictions.
borderless
_____ handles ordinary and routine technical matters such as the determination of technical standards and the management of domain names and IP addresses.
governance
Due to strong _____ programs, it is more difficult for the state to conduct surveillance on confidential electronic communications.
encryption
Companies such as Facebook and Google rely largely on lucrative _____ of their users.
personal information
Mobile devices have opened a new controversy about access to adult sites. ____ is a company that censors apps, and they will not allow for availability any apps that have pornographic content.
Apple
Freedom and free expression are fundamental human rights, but these and other rights can only be reasonably exercised in a context of mutual respect and common acceptance of certain moral norms, which are often referred to as the ____.
public morality
Some philosophers argue that playing vivid video games cultivates insensitivity to human suffering and a lack of ____.
empathy
Unlike obscenity and libel, ____ is not illegal under U.S. federal law and is fully protected by the First Amendment.
hate speech
____ has helped many bottom-up movements like Black Lives Matter and the Tea Party to mobilize their members.
By encrypting a message and routing that message through a series of remailers, a user can ensure that his or her message will remain _____.
anonymous and confidential
_____ is defined as the "coordinated production of information by an authority with the intent of competing with or distracting from information the authority would rather not access."
Flooding
_____ censorship is a type of incomplete censorship used in China to avoid more obvious repression that would likely ignite popular backlash.
Porous