Chapter 4

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following statements holds true in this scenario?

Christine developed a new software program, copyrighted its source code, and licensed it to her customers to use for a fixed period of time.

Which of the following statements about the social costs of information technology is true?

The traditional boundaries that separate work from family and just plain leisure have been weakened.

profiling

The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals

What is profiling?

The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called profiling.

Which of the following statements best describe web beacons?

Web beacons are tiny software programs that keep a record of users' online clickstream.

A patent

grants the owner an exclusive monopoly on the ideas behind the invention for 20 years.

Descartes's rule of change

if an action cannot be taken repeatedly, it is not right to take at all. This is the slippery-slope rule: An action may bring about a small change now that is acceptable, but if it is repeated, it might bring unacceptable changes in the long run.

Immanuel Kant's Categorical Imperative

if the action is not right for everyone to take, it is not right for anyone.

Spam

junk emails sent by an organization to a mass audience of Internet users.

Repetitive stress injury (RSI)

leading occupational disease today. It occurs when muscle groups are forced through repetitive actions often under high-impact loads or tens of thousands of repetitions under low-impact loads.

Carpal tunnel syndrome

occupational health risk that consists of pressure on the median nerve through the wrist's bony structure and produces pain.

A safe harbor

private, self-regulating policy and enforcement mechanism that meets the objective of government regulators and legislation but does not involve government regulation or enforcement.

The Golden Rule

putting yourself into the place of others and thinking of yourself as the object of the decision. Also known as "Do unto others as you would have them do unto you," this can help you think about fairness in decision making.

Cookies

small text files deposited on a computer hard drive when a user visits Web sites.

Keylogger

spyware that records every keystroke made on a computer to steal personal information or passwords or to launch Internet attacks.

Copyright

statutory grant that protects creators of intellectual property from having their work copied by others for any purpose during the life of the author plus an additional 70 years after the author's death. A competitor can use the copyrighted software, understand how it works, and build new software that follows the same concepts without infringing on a copyright A copyright protects against copying of entire programs or their parts.

technostress

stress induced by computer and cell phone use.

Technostress

stress induced by computer and cell phone use. previous

Cybersquatting

the dubious practice of registering a domain name and then trying to sell the name for a huge sum of money to the person, company, or organization most likely to want it.

Digital divide

the gap between higher-income families and lower-income families' access to computers and the Internet.

The drawback to copyright protection is

the underlying ideas behind a work are not protected, only their manifestation in a work.

The Utilitarian Principle rule assumes

you can prioritize values in a rank order and understand the consequences of various courses of action

Which of the following best defines copyright?

A statutory grant that protects creators of intellectual property from having their work copied by others for any purpose during the life of the author plus an additional 70 years after the author's death is a copyright.

__________ is a new data analysis technology that takes information about people from many disparate sources and correlates relationships to find obscure hidden connections that might help identify criminals or terrorists.

Nonobvious relationship awareness

Information systems affect ethical principles because they __________.

Raise concerns about the use of intellectual property

Nonobvious relationship awareness (NORA)

a new data analysis technology that takes information about people from many disparate sources and correlates relationships to find obscure hidden connections that might help identify criminals or terrorists. NORA technology has powerful profiling capabilities as it scans data and extracts information as the data are being generated to provide quick information about a person.

Due process

a related feature of law-governed societies and is a process in which laws are known and understood, and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly.

A trade secret

any intellectual work product such as a formula, device, pattern, or compilation of data that is used for a business purpose.

Judy is a data analyst who spends more than 6 hours a day at her computer. She has been experiencing headaches, blurred vision, and dry and irritated eyes. From which of the following occupational health risk does Judy likely suffer?

computer vision syndrome


Conjuntos de estudio relacionados

EXAM 3 - CHAPTER 12 PRACTICE (50 Concepts)

View Set

Anatomie Biomedische wetenschappen KuLeuven 2021

View Set

HLWL 2230 Stress Management Quiz #1

View Set

Interpersonal Communication: Everyday Encounters (Chapter 1)

View Set

Chapter 12 - Supply Chain Management in the Service Industry

View Set

Adolescent Development_Chapter 13 (Final)

View Set