MI375: chapter 4

¡Supera tus tareas y exámenes ahora con Quizwiz!

Responsibility

Accepting the potential costs, duties, and obligations for decisions

Privacy

Claim of individuals to be left alone, free from surveillance or interference from other individuals, organizations, or state; claim to be able to control information about yourself

Profiling

Combining data from multiple sources to create dossiers of detailed information on individuals

Nonobvious relationship awareness (NORA)

Combining data from multiple sources to find obscure hidden connections that might help identify criminals or terrorists

Golden Rule

Do unto others as you would have them do unto you

Spyware

Surreptitiously installed on user's computer May transmit user's keystrokes or display unwanted ads

Utilitarian Principle

Take the action that achieves the higher or greater value

Risk Aversion Principle

Take the action that produces the least harm or potential cost

Which of the following restricts the information that the U.S. federal government can collect about an individual and regulates what it can do with the information?

The Privacy Act

Which of the following best describes how new information systems can result in legal gray areas?

They result in new situations that are not covered by old laws

Although online tracking gathers an enormous amount of information on individual users, it is anonymous and can't be tied to a specific person

false

In today's legal environment, managers who are convicted for the misuse of information systems are still unlikely to be given a prison sentence.

false

Patents

grants creator of invention an exclusive monopoly on ideas behind invention for 20 years

Trade secret

intellectual work or product belonging to business, not in the public domain

Which of the following is not protected by copyright law?

machines

When a cookie is created during a website visit, it is stored:

on the hard drive of the visitor's compute

In the ________ model of informed consent, personal information can be collected until the consumer specifically requests that his or her data not be collected.

opt-out

The use of computers to assemble data from different sources to create digital dossiers of detailed information about individuals is known as which of the following?

profiling

The obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within which of the following moral dimensions of the information age

quality of life

________ means that you accept the potential costs and obligations for the decisions you make.

responsibility

Copyright

statutory grant protecting intellectual property from being copied for the life of the author, plus 70 years

European countries do not allow businesses to use personally identifiable information without consumers' prior consent.

true

Ethical "No Free Lunch" Rule

Assume that virtually all tangible and intangible objects are owned by someone unless there is a specific declaration otherwise

Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed?

HIPPA

Ethical analysis

Identify and clearly describe the facts. Define the conflict or dilemma and identify the higher-order values involved. Identify the stakeholders. Identify the options that you can reasonably take. Identify the potential consequences of your options.

Cookies

Identify browser and track visits to site

Descartes' Rule of Change

If an action cannot be taken repeatedly, it is not right to take at all

Immanuel Kant's Categorical Imperative

If an action is not right for everyone to take, it is not right for anyone

What are the 5 Moral demensions of the Information age?

Information rights and obligations Property rights and obligations Accountability and control System quality Quality of life

Intellectual property

Intangible property of any kind created by individuals or corporations

Due process

Laws are well-known and understood, with an ability to appeal to higher authorities

Accountability

Mechanisms for identifying responsible parties

Which of the following is a data analysis technology that finds hidden connections between data in disparate sources?

NORA

Liability

Permits individuals (and firms) to recover damages done to them

Web Beacons (web bugs)

Tiny graphics embedded in e-mails and web pages Monitor who is reading e-mail message or visiting site

Which of the following forms of protection of intellectual property requires that the property be the subject of a nondisclosure agreement?

Trade secret

Advertisers use ________ in order to display more relevant ads based on a user's search and browsing history.

behavioral targeting


Conjuntos de estudio relacionados

Cognitive Processes Test 3, Chapter 5/6 Wrap up

View Set

Score for this attempt: 0 out of 100 Submitted Feb 6 at 2:57pm This attempt took 30 minutes. UnansweredQuestion 1 0 / 5 pts A Trojan is a malicious program that uses a computer network to replicate. False True A worm is a malicious program that us

View Set

Micro final from previous quizzes

View Set

FAR Chapter 18 - Preffered Stock and Common Stock

View Set

Chapter 55: Care of Patients with Stomach Disorders (H)

View Set

Chapter 3: Historical Foundations of Professional Nursing

View Set