Chapter 4

¡Supera tus tareas y exámenes ahora con Quizwiz!

trade secret

Any intellectual work product—a formula, device, pattern, or compilation of data—used for a business purpose, provided it is not based on information in the public domain.

ethical "no free lunch" rule

Assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise.

Golden Rule

Do unto others as you would have them do unto you

Candidate Ethical Principles

Golden Rule Kant's Categorical Imperative Descartes' Rule of Change Utilitarian Principle Risk Aversion Principle Ethical "No Free Lunch" Rule

Descartes' rule of change

If an action cannot be taken repeatedly, it is not right to take at all (slippery slope)

Immanuel Kant's Categorical Imperative

If an action is not right for everyone to take, it is not right for anyone

nonobvious relationship awareness (NORA)

can take information about people from many disparate sources, such as employment applications, telephone records, customer listings, and "wanted" lists, and correlate relationships to find obscure hidden connections that might help identify criminals or terrorists

Computer abuse

commission of acts involving a computer that may not be illegal but that are considered unethical (spam)

Computer crime

commission of illegal acts through the use of a computer or against a computer system

Informed consent

defined as consent given with knowledge of all the facts needed to make a rational decision.

patent

grants the owner an exclusive monopoly on the ideas behind an invention for 20 years.

Digital Millennium Copyright Act (DMCA) of 1998

implemented a World Intellectual Property Organization Treaty that makes it illegal to circumvent technology-based protections of copyrighted materials

carpal tunnel syndrome (CTS)

in which pressure on the median nerve through the wrist's bony structure produces pain.

Intellectual property

intangible property of any kind created by individuals or corporations.

Liability

is a feature of political systems in which a body of laws is in place that permits individuals to recover the damages done to them by other actors, systems, or organizations.

safe harbor

is a private, self-regulating policy and enforcement mechanism that meets the objectives of government regulators and legislation but does not involve government regulation or enforcement.

Due process

is a related feature of law-governed societies and is a process in which laws are known and understood, and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly.

Copyright

is a statutory grant that protects creators of intellectual property from having their work copied by others for any purpose during the life of the author plus an additional 70 years after the author's death.

Spam

junk e-mail sent by an organization or individual to a mass audience of Internet users who have expressed no interest in the product or service being marketed.

Accountability

means that mechanisms are in place to determine who took responsible action, and who is responsible.

Responsibility

means that you accept the potential costs, duties, and obligations for the decisions you make.

opt-in

model of informed consent in which a business is prohibited from collecting any personal information unless the consumer specifically takes action to approve information collection and use.

opt-out

model of informed consent permits the collection of personal information until the consumer specifically requests that the data not be collected.

repetitive stress injury (RSI)

occurs when muscle groups are forced through repetitive actions often with high-impact loads (such as tennis) or tens of thousands of repetitions under low-impact loads (such as working at a computer keyboard).

Computer vision syndrome (CVS)

refers to any eyestrain condition related to display screen use in desktop computers, laptops, e-readers, smartphones, and hand-held video games.

Ethics

refers to the principles of right and wrong that individuals, acting as free moral agents, use to make choices to guide their behaviors.

spyware

secretly install itself on an Internet user's computer by piggybacking on larger applications. Once installed, the spyware calls out to Web sites to send banner ads and other unsolicited material to the user, and it can also report the user's movements on the Internet to other computers.

Fair Information Practices (FIP)

set of principles governing the collection and use of information about individuals, based on the notion of a mutuality of interest between the record holder and the individual.

Cookies

small text files deposited on a computer hard drive when a user visits Web sites; identify the visitor's Web browser software and track visits to the Web site.

technostress

stress induced by computer use. Its symptoms include aggravation, hostility toward humans, impatience, and fatigue.

Web beacons (Web bugs)

tiny objects embedded in e-mail messages and Web pages that are designed to monitor the behavior of the user visiting a Web site or sending e-mail

Basic Concepts for Ethical Analysis

Responsibility Accountability Liability Due Process

Utilitarian Principle

Take the action that achieves the higher or greater value

Risk Aversion Principle

Take the action that produces the least harm or the least potential cost

Five-Step ETHICAL ANALYSIS

1. Identify and clearly describe the facts 2. Define the conflict or dilemma and identify the higher-order values involved 3. Identify the stakeholders 4. Identify the options that you can reasonably take 5. Identify the potential consequences of your options

5 MORAL DIMENSIONS OF THE INFORMATION AGE

Information rights & obligations Property rights & obligations Accountability & control System quality Quality of life

digital divide

Large disparities in access to computers and the Internet among different social groups and different locations.

FTC FIP Principles

Notice/awareness (core) Choice/consent (core) Access/participation Security Enforcement

privacy

The claim of individuals to be left alone, free from surveillance or interference from other individuals, organizations, or the state.

information rights

The rights that individuals and organizations have with respect to information that pertains to themselves.

profiling

The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals

3 Main Ways Intellectual Property is Protected

Trade Secret Copyright Patents


Conjuntos de estudio relacionados

Digital forensics Midterm (1,3,4,6)

View Set

Programming Fundamentals 1 - Unit 3: Compiled v. Interpreted Languages

View Set

Phlebotomy CH 7 - 11 Study Questions

View Set

Chapter 1: Constitutional Democracy

View Set

Y7 Computing Key Words, Definitions & Questions

View Set

The Watsons Go To Birmingham ch 1 - 5 Questions

View Set

Chapter 11: Growth and Development: Infancy Through Adolescence

View Set

Module 1: Introduction to Operations Management

View Set

Individual Differences - The Flynn Effect

View Set