1/34
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
cookies
___ are small text files deposited on a computer hard drive when a user visits websites. ___ identify the visitor's web browser software and track visits to the website.
Assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise. (This is the ethical ___ rule.) If something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work.
no-free-lunch
Originally, ___ was junk email an organization or individual sent to a mass audience of Internet users who had expressed no interest in the product or service being marketed.
spam
__ process is a related feature of law-governed societies and is a process in which laws are known and understood, and ability exists to appeal to higher authorities to ensure that the laws are applied correctly.
due
Left uncorrected, the digital ___ could lead to a society of information haves, who are computer literate and skilled, versus a large group of information have-nots, who are computer illiterate and unskilled.
divide
The use of computers to combine data from multiple sources and create digital dossiers of detailed information on individuals is called ___.
profiling
, also called web bugs (or simply tracking files), are tiny software programs that keep a record of users' online clickstreams. They report this data back to whomever owns the tracking file, which is invisibly embedded in email messages and web pages to monitor the behavior of the user visiting a website or sending email. _ are placed on popular websites by third-party firms who pay the websites a fee for access to their audience.
web beacons
Individuals know how to act in society because ___ institutions (family, education, organizations) have developed well-honed rules of behavior, and these are supported by laws developed in the ___ sector that prescribe behavior and promise sanctions for violations.
social, political
Advances in data storage techniques and rapidly declining storage costs have been responsible for the proliferation of databases on individuals—employees, customers, and potential customers—maintained by private and public organizations. These advances in data storage have made the routine violation of individual ___ both inexpensive and effective.
privacy
Any intellectual work product—a formula, device, pattern, method of manufacture, or compilation of data—used for a business purpose can be classified as a trade ___, provided it is not based on information in the public domain.
secret
Privacy advocates would like to see wider use of an ___ model of informed consent in which a business is prohibited from collecting any personal information unless the consumer specifically takes action to approve information collection and use. Here, the default option is no collection of user information.
opt-in
___ extends the concept of responsibility further to the area of laws. ___ is a feature of political systems in which a body of laws is in place that permits individuals to recover the damages done to them by other actors, systems, or organizations.
liability
"Take the action that produces the least harm or the least potential cost (risk ___ principle). Some actions have extremely high failure costs of very low probability (e.g., building a nuclear generating facility in an urban area) or extremely high failure costs of moderate probability (speeding and auto-mobile accidents). Avoid actions that have extremely high failure costs; focus on reducing the probability of accidents occurring. "
aversion
Fair Information Practices principles are based on the notion of a ___ of interest between the record holder and the individual.
mutuality
The European Commission and the U.S. Department of Commerce developed a ___ framework for U.S. firms. A ___ is a private, self-regulating policy and enforcement mechanism that meets the objectives of government regulators and legislation but does not involve government regulation or enforcement. U.S. businesses would be allowed to use personal data from EU countries if the firms developed privacy protection policies that met EU standards. Enforcement would occur in the United States by using self-policing, regulation, and government enforcement of fair trade statutes.
safe harbor
___ means that you accept the potential costs, duties, and obligations for the decisions you make.
responsibility
An ___ model of informed consent permits the collection of personal information until the consumer specifically requests the data not to be collected.
opt-out
"___ is a feature of systems and social institutions; it means that mechanisms are in place to determine who took action and who is responsible. Systems and institutions in which it is impossible to find out who took what action are inherently incapable of ethical analysis or ethical action. "
accountability
Take the action that achieves the higher or greater value (___ principle). This rule assumes you can prioritize values in a rank order and understand the consequences of various courses of action.
utalitarian
Credit card companies and similar organizations have begun engaging in ___, taken from the term redlining, by altering their treatment of you based on the actions of other people with profiles similar to yours.
weblining
___ are the marks, symbols, and images used to distinguish products in the marketplace.
trademarks
Typically, an ethical issue involves a ___: two diametrically opposed courses of action that support worthwhile values.
dilemma
They argue that excessive use of computers reduces intelligence. One MIT scholar believes exposure to computers encourages ___ answers rather than engaging in real problem solving.
looking up
If an action cannot be taken repeatedly, it is not right to take at all. This is the ___ slope rule: An action may bring about a small change now that is acceptable, but if it is repeated, it would bring unacceptable changes in the long run. In the vernacular, it might be stated as "once started down a ___ path, you may not be able to stop."
slippery
If an action is not right for everyone to take, it is not right for anyone (Immanuel ___'s categorical imperative). Ask yourself, "If everyone did this, could the organization, or society, survive?"
Kant
A ___ grants the owner an exclusive monopoly on the ideas behind an invention for 20 years. The congressional intent behind ___ law was to ensure that inventors of new machines, devices, or methods receive the full financial and other rewards of their labor and yet make widespread use of the invention possible by providing detailed diagrams for those wishing to use the idea under license from the ___'s owner.
patent
__ is a statutory grant that protects creators of intellectual property from having their work copied by others for any purpose during the life of the author plus an additional 70 years after the author's death. For corporate-owned works, copyright protection lasts for 95 years after their initial creation.
copyright
Every ethical, social, and political issue has ___: players in the game who have an interest in the outcome, who have invested in the situation, and usually who have vocal opinions.
stakeholders
According to the European Commission's Data Protection Directive, customers must provide their ___ consent before any company can legally use data about them, and they have the right to access that information, correct it, and request that no further data be collected.
informed
___ consent can be defined as consent given with knowledge of all the facts needed to make a rational decision.
informed
___ is the claim of individuals to be left alone, free from surveillance or interference from other individuals or organizations, including the state.
privacy
Like other technologies, such as steam engines, electricity, and the telephone, information technology can be used to achieve social progress, but it can also be used to commit crimes and ___ cherished social values.
threaten
___ refers to the principles of right and wrong that individuals, acting as free moral agents, use to make choices to guide their behavior.
ethics
___ are generally older transaction processing systems created for mainframe computers that continue to be used to avoid the high cost of replacing or redesigning them.
legacy systems
___: Cloud infrastructure operated solely for a single organization and hosted either internally or externally.
private cloud