Midterm 1: Chapter 4 Section
Issues with Data
- tech advances can be a double-edged sword - create opportunities for intense social change, threatening existing distributions of power, money, rights, and obligations
Challenges to Intellectual Property Rights
- the proliferation of digital networks, including the Internet, has made it even more difficult to protect intellectual property; using networks, information can be more widely reproduced and distributed - you can easily copy and distribute virtually anything to millions of people worldwide, even if they are using different types of computer systems - individuals have been illegally copying and distributing digitized music files on the Internet for several decades
Technology Trends That Raise Ethical Issues
1. Doubling of computer power every 18 months (more organizations depend on computer systems for critical operations and become more vulnerable to system failures) 2. Rapidly declining data storage costs (organizations can easily maintain detailed databases on individuals; there are no limits on the data collected about you; large-scaled population surveillance is enabled) 3. Networking advances and the Internet (companies can analyze vast quantities of data gathered; the cost of moving data and making data accessible from anywhere falls exponentially; access to data becomes more difficult to control) 4. Advances in data analysis techniques
Three Principles of Poor System Performance
1. software bugs and errors 2. hardware or facility failures caused by natural or other cause 3. poor input data quality
Non-obvious relationship awareness
Combining data from multiple sources to find obscure hidden connections that might help identify criminals or terrorists
Due Process
a process in which laws are well-known and understood and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly
Fair Information Practices (FIP)
a set of principles originally set forth in 1973 that governs the collection and use of information about individuals and forms the basis of most U.S. and European privacy laws
Digital Millennium Copyright Act (DMCA)
adjusts copyright laws to the Internet Age by making it illegal to make, distribute, or use devices that circumvent technology-based protections of copyrighted materials
Trade Secret
any intellectual work or product used for a business purpose that can be classified as belonging to that business, provided it is not based on information in the public domain
Trademarks
are the marks, symbols, and images used to distinguish products in the marketplace; trademark laws protect consumers by ensuring they receive what they paid for
Patent
grants the owner an exclusive monopoly on the ideas behind an invention for 20 years
Opt-in Model
informed consent in which a business is prohibited from collecting any personal information unless the consumer specifically takes action to approve information collection and use; here, the default option is no collection of user information
Intellectual Property
intangible property created by individuals or corporations that is subject to protections under trade secret, copyright, and patent law
Copyright
is a statutory grant that protects creators of intellectual property from having their work copied by others for any purpose during the life of the author plus an additional 70 years after the author's death - or corporate-owned works, copyright protection lasts for 95 years after their initial creation
Responsibility
means that you accept the potential costs, duties, and obligations for the decisions you make
Opt-out
model of informed consent permitting the collection of personal information until the consumer specifically requests that the data not be collected
Professional Codes of Conduct
promulgated by associations of professionals such as the: - American Medical Association (AMA) - American Bar Association (ABA) - Association of Information Technology Professionals (AITP) - Association for Computing Machinery (ACM) - The Health Insurance Portability and Accountability Act (HIPAA) of 1996 - Children's Online Privacy Protection Act (COPPA) of 1998
Spyware
technology that aids in gathering information about a person or organization without their knowledge - once installed, the spyware calls out to websites to send banner ads and other unsolicited material to the user, and it can report the user's movements on the Internet to other computers - nearly 80 percent of global Internet users use Google Search and other Google services, making Google the world's largest collector of online user data
Privacy
the claim of individuals to be left alone, free from surveillance or interference from other individuals, organizations, or the state
Liability
the existence of laws that permit individuals to recover the damages done to them by other actors, systems, or organizations
Accountability
the mechanisms for assessing responsibility for decisions made and actions taken
Information Rights
the rights that individuals and organizations have with respect to information that pertains to themselves
Profiling
the use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals - companies purchase relevant personal information from sources to help them more finely target their marketing campaigns; companies can analyze large pools of data from multiple sources to identify buying patterns of customers rapidly and make individualized recommendations
Cookies
tiny file deposited on a computer hard drive when an individual visits certain websites; used to identify the visitor and track visits to the website - when the visitor returns to a site that has stored a cookie, the website software searches the visitor's computer, finds the cookie, and knows what that person has done it the past
Web Beacons
tiny objects invisibly embedded in email messages and web pages that are designed to monitor the behavior of the user visiting a website or sending email - they report this data back to whomever owns the tracking file, which is invisibly embedded in email messages and web pages to monitor the behavior of the user visiting a website or sending email - web beacons are placed on popular websites by third-party firms who pay the websites a fee for access to their audience