acceptable use policy
a set of guidelines or rules adopted by a school or other organization that governs Internet, network, and information technology use
computer crime
a crime committed using a computer, usually to gain access to restricted files, systems, or information; these crimes can resemble trespassing, vandalism, or theft
computer virus
a small, intentionally, created computer program that causes damage to computer workstations, personal computers, or computer networks; this is a generic term that also includes worms, trojan horses, and bombs
data privacy
the concept that an individual has a right to say who has personal information about him or her and how that information is used; with the spread of digital information gathering and recordkeeping, it is becoming more difficult to maintain
flame
an emotionally, often profane, response to an action or statement in a chat-room, electronic discussion group, or newsgroup
hacker/cracker
an individual who gain unauthorized access to computerized information or computer systems; the term “cracker” implies there is malicious intent to the access
intellectual property rights
the concept that a person’s ideas, writings, and constructions (like computer software) that may not exist in a physical sense should be treated as property and the creators or owners of this property have rights to its sale, use, and control
netiquette
a term taken from a combination of “network” and “etiquette”’ that means a code of polite, thoughtful, or respectful behaviors to be followed while using networks, including the Internet
newbie
a new user of networked resources
peer-to-peer file sharing
a type of file that allows computer users with the same program to connect with each other and access files from one another’s hard drives rather from a central server; napster, gnutella, kazaa, and limewire are examples of this type of software
plagiarism
the use of another’s ideas or words as one’s own
spoofing
the use of another’s identity when online
virtual space
the environment created by computer networks in which data is stored and communication transpires; also termed “‘cyberspace”
piracy
illegal using, copying, sharing (etc.) computer software protected by copyright laws
counterfeiting
creating fake softwares, hardwares, parts, programs, etc.