Ethics in Cybertechnology Final Exam Study Guide

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/40

flashcard set

Earn XP

Description and Tags

Vocabulary-style flashcards covering major ethical theories, cybersecurity, property rights, regulation, digital divides, and moral agency.

Last updated 1:17 AM on 5/18/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

41 Terms

1
New cards

Logical malleability

Computers can be programmed to perform almost any task, making them a “universal tool”

2
New cards

Policy vacuums

A situation where no clear laws or policies exist for new technology or ethical issues

3
New cards

Utilitarianism Theory

The morally correct action is the one that produces the greatest overall happiness or benefit for society

4
New cards

Deontology Theory

Actions are right or wrong based on duties and rules, not consequences

5
New cards

Contract-Based Theory

Moral rules come from agreements between people in society

6
New cards

Character-Based Theory

Focuses on developing good character traits and habits

7
New cards

Normative approach

The philosophical method that asks how people should behave ethically, contrasted with the social sciences' descriptive approach

8
New cards

Privacy

The ability to keep your personal information, space, and decisions under your own control

9
New cards

Accessibility Privacy

The right to be left alone and free from unwanted intrusion into your personal or physical space

10
New cards

Decisional Privacy

The freedom to make personal choices and decisions without interference from others

11
New cards

Informational Privacy

Control over the flow of one's personal information, including its transfer and exchange

12
New cards

Data security

Unauthorized access to data, which either is resident in or exchanged

13
New cards

System security

Attacks on system resources like malware by malicious computer programs

14
New cards

Network security

Protecting computer networks and internet infrastructure

15
New cards

Hacktivism

A new form of civil disobedience involving hackers and groups of hackers

16
New cards

Cyber Terrorism

The use of information systems or media to gain an advantage over an opponent

17
New cards

Information Warfare

Operations that target or exploit information media to win an objective over an adversary

18
New cards

Cyber-related crimes

Crimes that involve computers or networks but are not completely dependent on cybertechnology to exist, such as cyberstalking or online fraud

19
New cards

Cyber-exacerbated crimes

A sub-category of cyber-related crimes where technology greatly increases the scale, speed, reach, or impact of the crime

20
New cards

Cyber-assisted crimes

Traditional crimes where a computer or internet is used only as a tool, such as filing a fraudulent tax return

21
New cards

Cyberpiracy

Using cybertechnology to reproduce or distribute copies of proprietary information across a network in an unauthorized way

22
New cards

Cybertrespass

Using cybertechnology to gain unauthorized access to an individual’s or organization’s computer system or password-protected site

23
New cards

Cybervandalism

Using cybertechnology to unleash programs that disrupt electronic transmissions or destroy data and computer resources

24
New cards

Intellectual property (IP)

Creations of the mind, such as software, music, books, and inventions, which are non-physical and non-exclusionary

25
New cards

Exclusionary property

A type of property where only one person can possess or use the objects at a time, preventing others from using it simultaneously; tangible property

26
New cards

Non-exclusionary property

A type of property that can be used or possessed by multiple people at the same time without taking it away from someone else; intellectual property

27
New cards

Scarcity

The measure of how limited a resource is; physical goods are naturally scarce, while digital information is non-rivalrous and less scarce

28
New cards

Labor Theory

A property rights theory associated with John Locke arguing that ownership is a “natural right” based on the labor invested in creation

29
New cards

Utilitarian Theory (Property Rights)

A property right is not a natural right; rather it is a conventional right granted by governments since they encourage creativity and benefit society

30
New cards

Personality Theory

The theory that property rights should be granted because the author's personality is invested in the creative work

31
New cards

Lessig’s four modalities

Law, Social norms, Market pressures, and Architecture (code)

32
New cards

Censorship by Suppression

Blocks or removes objectionable content completely such as deleting posts or banning websites

33
New cards

Censorship by Deterrence

Discourages speech through threats of punishment rather than directly removing the content such as fines, arrest threats, or suspensions

34
New cards

Net neutrality

The principle that ISPs should treat all internet traffic equally without blocking, slowing, or favoring specific companies

35
New cards

Moral Agent

A being capable of making moral decisions and being held responsible, such as adults, governments, or corporations

36
New cards

Moral Patients

Beings deserving moral consideration who can suffer harm but cannot be held responsible for actions, such as animals or children

37
New cards

Digital Divide

The gap between people who have access to cybertechnology and those who don’t

38
New cards

Factors that contribute to the Digital Divide

Income, Education, Race, Gender

39
New cards

Three ways cyber-technology can be used to strengthen democracy

Access to Information, Political Participation, Citizen Empowerment

40
New cards

Three ways cyber-technology can be used to threaten democracy

Misinformation, Polarization, Manipulation

41
New cards

Tangible property

Physical property that can be touched and owned