Term
The principles of right and wrong that individuals acting as free moral agents use to make choices to guide their behaviors |
|
Definition
|
|
Term
T/F: Ethical, social, and political issues are not closely linked |
|
Definition
False- they are closely linked |
|
|
Term
The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals |
|
Definition
|
|
Term
This is the key element of ethical action- it means that you accept the potential costs, duties, and obligations for the decisions you make |
|
Definition
|
|
Term
This is the feature of systems and social institutions- it means that mechanisms are in place to determine who took responsible action, who is responsible. |
|
Definition
|
|
Term
This is a feature of political systems in which a body of laws is in place that permits individuals to recover damages done to them by other actors, systems, or organiz |
|
Definition
|
|
Term
This is a process in which laws are known and understood and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly |
|
Definition
|
|
Term
This refers to the personal standards that make up an individual's character |
|
Definition
|
|
Term
The claim of individuals to be left alone, free from surveillance interference from other individuals or organizations, including the state |
|
Definition
|
|
Term
In the U.S., the claim to privacy is protected primarily by the _____________ Amendment guarantees of freedom of speech and association, and the _____________ Amendment protections against unreasonable search |
|
Definition
|
|
Term
Most American and European privacy law is based on a regime called: and it was first to set forth in a report written in 1973 by a federal govt advisory committee |
|
Definition
Fair Information Practices (FIP) |
|
|
Term
In Europe, is the privacy protection much more stringent (stronger) than in the U.S.? |
|
Definition
|
|
Term
This is consent given with knowledge of all the facts needed to make a rational decision |
|
Definition
|
|
Term
This is a private, self-regulating policy and enforcement mechanism that meets the objectives of govt regulators and legislation but does not involve govt regulation |
|
Definition
|
|
Term
Tiny files deposited on a computer hard drive when a user visits a certain website |
|
Definition
|
|
Term
These are tiny graphic files embedded in e-mail messages and web pages that are designed to monitor who is reading the e-mail messages |
|
Definition
|
|
Term
Surreptitiously installed on user’s computer to collect information on the individual’s browsing habits without informed consent. |
|
Definition
|
|
Term
Spyware is a type of _________ |
|
Definition
Malware- malicious software |
|
|
Term
This permits the collection of personal information until the consumer specifically requests that the data not be collected |
|
Definition
|
|
Term
This provides a standard for communicating a Web site's privacy policy to Internet users and for comparing that policy to the user's preferences |
|
Definition
The Platform for Privacy Preferences (P3P) |
|
|
Term
This is considered to be intangible property of any kind created by individuals or corporations |
|
Definition
|
|
Term
Intellectual property is subject to a variety of protections under different legal traditions: 3 of them |
|
Definition
Trade secrets, copyright, and patent law |
|
|
Term
This is intellectual work or product belonging to business not in the public domain |
|
Definition
|
|
Term
This is a statutory gran protecting intellectual property from being copied for the life of the author, plus 70 years after his/her death |
|
Definition
|
|
Term
Grants the creator of invention an exclusive monopoly on ideas behind invention for 20 years |
|
Definition
|
|
Term
This was created in 1998 and it provides some copyright protection |
|
Definition
Digital Millennium Copyright Act (DMCA) |
|
|
Term
What is the most common source of business system failure? |
|
Definition
|
|
Term
This is the commission of illegal acts through the use of a computer or against a computer system |
|
Definition
|
|
Term
This is the commission of acts involving a computer that may not be illegal but that are considered unethical |
|
Definition
|
|
Term
This is junk e-mail sent by an organization or individual to a mass audience of Internet users |
|
Definition
|
|
Term
This is the most common occupational disease today and it occurs when muscle groups are forced through repetitive actions often with high-impact loads |
|
Definition
Repetitive stress injury (RSI) |
|
|
Term
This is the most common kind of computer-related RSI |
|
Definition
|
|
Term
Stress induced by computer use |
|
Definition
|
|