FBIM words 5

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/34

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

35 Terms

1
New cards

cookies

___ are small text files deposited on a computer hard drive when a user visits websites. ___ identify the visitor's web browser software and track visits to the website.

2
New cards

Assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise. (This is the ethical ___ rule.) If something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work.

no-free-lunch

3
New cards

Originally, ___ was junk email an organization or individual sent to a mass audience of Internet users who had expressed no interest in the product or service being marketed.

spam

4
New cards

__ process is a related feature of law-governed societies and is a process in which laws are known and understood, and ability exists to appeal to higher authorities to ensure that the laws are applied correctly.

due

5
New cards

Left uncorrected, the digital ___ could lead to a society of information haves, who are computer literate and skilled, versus a large group of information have-nots, who are computer illiterate and unskilled.

divide

6
New cards

The use of computers to combine data from multiple sources and create digital dossiers of detailed information on individuals is called ___.

profiling

7
New cards

, also called web bugs (or simply tracking files), are tiny software programs that keep a record of users' online clickstreams. They report this data back to whomever owns the tracking file, which is invisibly embedded in email messages and web pages to monitor the behavior of the user visiting a website or sending email. _ are placed on popular websites by third-party firms who pay the websites a fee for access to their audience.

web beacons

8
New cards

Individuals know how to act in society because ___ institutions (family, education, organizations) have developed well-honed rules of behavior, and these are supported by laws developed in the ___ sector that prescribe behavior and promise sanctions for violations.

social, political

9
New cards

Advances in data storage techniques and rapidly declining storage costs have been responsible for the proliferation of databases on individuals—employees, customers, and potential customers—maintained by private and public organizations. These advances in data storage have made the routine violation of individual ___ both inexpensive and effective.

privacy

10
New cards

Any intellectual work product—a formula, device, pattern, method of manufacture, or compilation of data—used for a business purpose can be classified as a trade ___, provided it is not based on information in the public domain.

secret

11
New cards

Privacy advocates would like to see wider use of an ___ model of informed consent in which a business is prohibited from collecting any personal information unless the consumer specifically takes action to approve information collection and use. Here, the default option is no collection of user information.

opt-in

12
New cards

___ extends the concept of responsibility further to the area of laws. ___ is a feature of political systems in which a body of laws is in place that permits individuals to recover the damages done to them by other actors, systems, or organizations.

liability

13
New cards

"Take the action that produces the least harm or the least potential cost (risk ___ principle). Some actions have extremely high failure costs of very low probability (e.g., building a nuclear generating facility in an urban area) or extremely high failure costs of moderate probability (speeding and auto-mobile accidents). Avoid actions that have extremely high failure costs; focus on reducing the probability of accidents occurring. "

aversion

14
New cards

Fair Information Practices principles are based on the notion of a ___ of interest between the record holder and the individual.

mutuality

15
New cards

The European Commission and the U.S. Department of Commerce developed a ___ framework for U.S. firms. A ___ is a private, self-regulating policy and enforcement mechanism that meets the objectives of government regulators and legislation but does not involve government regulation or enforcement. U.S. businesses would be allowed to use personal data from EU countries if the firms developed privacy protection policies that met EU standards. Enforcement would occur in the United States by using self-policing, regulation, and government enforcement of fair trade statutes.

safe harbor

16
New cards

___ means that you accept the potential costs, duties, and obligations for the decisions you make.

responsibility

17
New cards

An ___ model of informed consent permits the collection of personal information until the consumer specifically requests the data not to be collected.

opt-out

18
New cards

"___ is a feature of systems and social institutions; it means that mechanisms are in place to determine who took action and who is responsible. Systems and institutions in which it is impossible to find out who took what action are inherently incapable of ethical analysis or ethical action. "

accountability

19
New cards

Take the action that achieves the higher or greater value (___ principle). This rule assumes you can prioritize values in a rank order and understand the consequences of various courses of action.

utalitarian

20
New cards

Credit card companies and similar organizations have begun engaging in ___, taken from the term redlining, by altering their treatment of you based on the actions of other people with profiles similar to yours.

weblining

21
New cards

___ are the marks, symbols, and images used to distinguish products in the marketplace.

trademarks

22
New cards

Typically, an ethical issue involves a ___: two diametrically opposed courses of action that support worthwhile values.

dilemma

23
New cards

They argue that excessive use of computers reduces intelligence. One MIT scholar believes exposure to computers encourages ___ answers rather than engaging in real problem solving.

looking up

24
New cards

If an action cannot be taken repeatedly, it is not right to take at all. This is the ___ slope rule: An action may bring about a small change now that is acceptable, but if it is repeated, it would bring unacceptable changes in the long run. In the vernacular, it might be stated as "once started down a ___ path, you may not be able to stop."

slippery

25
New cards

If an action is not right for everyone to take, it is not right for anyone (Immanuel ___'s categorical imperative). Ask yourself, "If everyone did this, could the organization, or society, survive?"

Kant

26
New cards

A ___ grants the owner an exclusive monopoly on the ideas behind an invention for 20 years. The congressional intent behind ___ law was to ensure that inventors of new machines, devices, or methods receive the full financial and other rewards of their labor and yet make widespread use of the invention possible by providing detailed diagrams for those wishing to use the idea under license from the ___'s owner.

patent

27
New cards

__ is a statutory grant that protects creators of intellectual property from having their work copied by others for any purpose during the life of the author plus an additional 70 years after the author's death. For corporate-owned works, copyright protection lasts for 95 years after their initial creation.

copyright

28
New cards

Every ethical, social, and political issue has ___: players in the game who have an interest in the outcome, who have invested in the situation, and usually who have vocal opinions.

stakeholders

29
New cards

According to the European Commission's Data Protection Directive, customers must provide their ___ consent before any company can legally use data about them, and they have the right to access that information, correct it, and request that no further data be collected.

informed

30
New cards

___ consent can be defined as consent given with knowledge of all the facts needed to make a rational decision.

informed

31
New cards

___ is the claim of individuals to be left alone, free from surveillance or interference from other individuals or organizations, including the state.

privacy

32
New cards

Like other technologies, such as steam engines, electricity, and the telephone, information technology can be used to achieve social progress, but it can also be used to commit crimes and ___ cherished social values.

threaten

33
New cards

___ refers to the principles of right and wrong that individuals, acting as free moral agents, use to make choices to guide their behavior.

ethics

34
New cards

___ are generally older transaction processing systems created for mainframe computers that continue to be used to avoid the high cost of replacing or redesigning them.

legacy systems

35
New cards

___: Cloud infrastructure operated solely for a single organization and hosted either internally or externally.

private cloud