Computer Ethics

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/19

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

20 Terms

1
New cards
identity theft
A crime that involves someone pretending to be another person in order to steal money or obtain benefits
2
New cards
Take Down Notices
Requests to remove copyright infringing content from sites. (DMCA)
3
New cards
Invisible information gathering
collection of personal information online about a user without the user's knowledge
4
New cards
Filters
can be used to block access to websites that contain certain words, phrases, and images
5
New cards
biometrics
the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or dna
6
New cards
fair use
  1. purpose and nature of use

  1. nature of work

  2. size and significance of portion used

  3. effect on market

7
New cards
copyright
the exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, or software and to authorize others to do the same.
8
New cards
patent
(n.) exclusive rights over an invention; copyright; (v.) to arrange or obtain such rights; (adj.) plain, open to view; copyrighted
9
New cards
napster case
Napster lost b/c they were encouraging and assisting in infringement of copyrights
10
New cards
cyber crime
criminal activities carried out by means of computers or the Internet.
11
New cards
threat actor
An individual or a group that attempts to exploit vulnerabilities to cause or force a threat to occur.
12
New cards
Hacking
At first it wasn't considered bad, (60's-70's) but then things changed.
13
New cards
hactivism
Political, social, or religious activism taken online; sometimes called cyberterrorism.
14
New cards
Digital Millenium Copyright Act (DMCA) of 1998

-anticircumvention and safe harbor provisions

-anti circumvention prohibits skirting the rules or prevention systems

-safe harbor means host sites aren't responsible (think napster)

15
New cards
USA Patriot Act (2001)

-Gov't has more access to personal civilian info

-Gov't allowed to monitor online activity without a warrant

-Amended Computer Fraud and Abuse Act (CFAA) to be more strict on hacking

16
New cards
Privacy act of 1974
Established rules to regulate federal use of personal data, specifically regulating government databases
17
New cards
communications decency act
Found to be unconstitutional bc it was too vague and too broad, did not use least restrictive means of accomplishing the goal of protecting children
18
New cards
CAN-SPAM Act

-Bans false or misleading header info

-Mandates opt out method for unsolicited email

-requires commercial email identified as advertisement

19
New cards
Children's Internet Protection Act (CIPA)
(2000) filtering software required in federally funded schools and libraries
20
New cards
Foreign Intelligence Surveillance Act of 1978 (FISA)
Established oversight rules for the NSA because the NSA was collecting surveillance on Americans without a court order