CIS Chapter 4
the distinction between an idea and its expression
"Look and feel" copyright infringement lawsuits are concerned with:
Health risks:
- Repetitive stress injury (RSI) Largest source is computer keyboards Carpal tunnel syndrome (CTS) - Computer vision syndrome (CVS) Eyestrain and headaches related to screen use - Technostress Aggravation, impatience, fatigue
The principle sources of poor system performance are
1) software bugs and errors 2) hardware of facility failures caused by natural or other causes 3) poor input data quality
True
A Web beacon is a tiny object embedded in e-mail messages and Web pages that is designed to monitor online Internet user behavior
acceptable, because the higher value is the survival of the family
A classic ethical dilemma is the hypothetical case of a man stealing from a grocery store in order to feed his starving family. If you used the Utilitarian Principle to evaluate this situation, you might argue that stealing the food is
Kant's Categorical Imperative
A colleague of yours frequently takes, for his own personal use, small amounts of office supplies noting that the loss to the company is minimal. You counter that if everyone were to take office supplies the loss would no longer be minimal. Your rationale expresses which historical ethical principle?
Safe harbor
A private, self-regulating policy and enforcement mechanism that meets the objectives of government regulations and legislation but does NOT involve government regulation
patent
A(n) ________ grants the owner an exclusive monopoly on the ideas behind an invention for 20 years.
opt-out
A(n) ________ model of informed consent permits the collection of personal information until the consumer specifically requests that the data not be collected.
responsibility
Accepting the potential costs, duties, and obligations for the decisions you make is referred to as:
Risk Aversion Principle
According to the ________, you should take the action that produces the least harm
False
According to the courts, the creation of software, unique concepts, general functional features, and even colors are protectable by copyright law
False
Advances in data storage have made routine violation of individual privacy more difficult
behavioral targeting
Advertisers use ________ in order to display more relevant ads based on user's search and browsing history.
increase in multimedia quality
All of the following are current key technology trends raising ethical issues except
Negative social consequences of systems
Balancing power: computing power decentralizing but key decision making remains centralized Rapidity of change: maybe not have enough time to respond to global competition Maintaining boundaries: use lengthens work-day, infringes on family time Dependence and vulnerability: organizations more dependent on it
yestrain related to computer display screen use
CVS refers to:
Equity and access—the digital divide:
Certain ethnic and income groups in the United States less likely to have computers or Internet access
Privacy:
Claim of individuals to be left alone, free from surveillance or interference from other individuals, organizations, or state; claim to be able to control information about yourself
The impact of data analysis advances are
Companies can analyze vast quantities of data gathered on individuals to develop detailed profiles of individual behavior. Companies can assemble and combine little pieces of information about you-- from credit card purchases, phone calls, visits to websites, etc. Companies purchase this information for selling products. PROFILING
True
Copyright is the legal protection afforded intellectual property, such as a song, book, or video game.
the slippery-slope rule
Descartes' rule of change, that if an action cannot be taken repeatedly, it is not right to take at all, is also known as:
False
Despite the passage of several laws defining and addressing computer crime, accessing a computer system without authorization is not yet a federal crime
Technical solutions:
E-mail encryption Anonymity tools Anti-spyware tools Browser features "Private" browsing "Do not track" options Overall, few technical solutions
much more stringent
European privacy protection is ________ than in the United States
False
Even in today's legal climate, there is little incentive for firms to cooperate with prosecutors investigating financial crimes at their firm
mutuality of interest between the record holder and the individual
FIP principles are based on the notion of the
Most American and European privacy law is based on a regime called _____. It is a set of principles governing the collection and use of information about individuals. Mutual between individual and record holder. Record may not be used to support other activities with the individual's consent.
Fair Information Practices (FIP)
Spam is legally defined as any e-mail that is unsolicited.
False
cannot be easily detected or deleted
Flash cookies are different from ordinary cookies in that they
What is an acceptable, technologically feasible level of system quality?
Flawless software is economically unfeasible.
Recent cases of failed ethical judgment in business:
General motors - covered up faulty ignition switches Barclay's Bank - manipulated benchmark interest rates to benefit trading positions GlaxoSmithKline - unlawful and criminal promotion of certain prescription drugs Walmart- Bribes to Mexican officials for building permits
Computer-related liability problems If software fails, who is responsible?
If seen as part of machine that injures or harms, software producer and operator may be liable. If seen as similar to book, difficult to hold author/publisher responsible. What should liability be if software seen as service? Would this be similar to telephone systems not being liable for transmitted messages?
if an action is not right for everyone to take, it is not right for anyone to take
Immanuel Kant's Categorical Imperative states that
similar to books
In general, it is very difficult to hold software producers liable for their software products when those products are considered to be
property rights and obligations
In the information age, the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of:
quality of life
In the information age, the obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within the moral dimension of:
Real world ethical problems
Info technology takes jobs, companies monitor what their employees are doing on the internet. Facebook sells user info. Not all call it unethical
intangible property created by individuals or corporations
Intellectual property can best be described as
it is too expensive to create perfect software
It is not feasible for companies to produce error-free software because
True
Liability refers to the existence of laws that permit individuals to recover damages done to them by other actors, systems, or organizations
Digital Millennium Copyright Act (DMCA)
Makes it illegal to circumvent technology-based protections of copyrighted materials
False
Most American and European privacy law is based on a set of five principles called COPPA
True
Most Internet businesses do very little to protect the privacy of their customers
new data analysis technology that finds hidden connections between data in disparate sources
NORA is a
Informed consent
Needed in Europe. Defined as consent given with knowledge of all the facts needed to make a rational decision.
Fair Information Practices (FIP) principles: Notice/Awareness Choice/consent Access/participation Security Enforcement
Notice/Awareness - Websites must disclose information practices before collecting data Choice/consent - There must be a choice regime in place to allow customers to choose how their information will be used for secondary purposes. Access/participation - Consumers should be able to review and contest the accuracy of the data collected about them. Security - Must take responsible steps to assure info is secure. Enforcement - self-regulation, legislation giving consumers legal remedies for violations, or federal statutes.
the years of waiting to receive it
One of the drawbacks of patent protection is
The impact of computing power doubling every 18 months is
Organizations use information systems for their core production processes. As a result, our dependence on them and vulnerability to system errors have increased. Social rules and laws have not yet adjusted to this dependence.
True
Privacy is the right to be left alone when you want to be, without surveillance or interference from other individuals or organizations.
True
Professionals take on special rights and obligations because of their special claims to knowledge, wisdom, and respect.
The impact of data storage costs rapidly declining is
Public and private organizations easily maintain detailed databases on individuals -- employees, customers, and potential customers. Routine violation of individual privacy is cheap and easy. Enormous data storage systems are available for companies.
increases in efficiency may be accompanied by job losses
Re-designing and automating business processes can be seen as a double-edged sword
Employment:
Reengineering work resulting in lost jobs
________ are *not* held liable for the messages they transmit.
Regulated common carriers (like phones)
Taking the action that produces the least harm best describes the
Risk Aversion Principle
False
Safe harbor is informal permission to reuse data, given with knowledge of all the facts needed to make a rational decision
Cookies
Small text files deposited on a computer hard drive when a user visits web sites. Cookies identify the visitor's web browser software and track visits to the web site.
Three principal sources of poor system performance:
Software bugs, errors Hardware or facility failures Poor input data quality (most common source of business system failure)
Computer abuse: unethical acts, not illegal Ex.
Spam: high costs for businesses in dealing with spam
True
Spyware is software that comes hidden in downloaded applications and can track your online movements.
Spyware
Surreptitiously installed on user's computer May transmit user's keystrokes or display unwanted ads
True
Technostress is a computer-related malady whose symptoms include fatigue
blur the traditional boundaries between work and family time
The "do anything anywhere" computing environment can
False
The Copyright Office began registering software programs in the 1990s
True
The European Parliament has passed a ban on unsolicited commercial messaging
Web sites must disclose their information practices before collecting data
The Federal Trade Commission FIP principle of Notice/Awareness states that:
encourages self regulation to develop a set of privacy guidelines for its members
The Online Privacy Alliance
requires spammers to identify themselves
The U.S. CAN-SPAM Act of 2003
False
The Utilitarian Principle asks you to put yourself in the place of others, and think of yourself as the object of the decision
opt-in
The ________ model prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use.
true
The commission of acts involving the computer that may not be illegal but are considered unethical is called computer abuse.
True
The drawback to copyright protection is that the underlying ideas behind the work are not protected, only their reproduction in a product
everything is owned by someone else, and that the creator wants compensation for this work
The ethical "no free lunch" rule states that
Accountability
The feature of social institutions that means mechanisms are in place to determine responsibility for an action is called:
ripple effect, raising new ethical, social, and political issues
The introduction of new information technology has a
False
The key concepts in patent law are originality, novelty, and value
False
The last step in analyzing an ethical issue should be to identify the stakeholders - people who have a vested interest in the outcome of the decision.
the software is widely distributed
The limitation of trade secret protection for software is that it is difficult to prevent the ideas in the work from falling into the public domain when:
data quality
The most common source of business system failure is
True
The most common type of computer-related RSI is CTS
due process
The practice in law-governed societies in which laws are known and understood, and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly is called
it is so inexpensive and can reach so many people
The practice of spamming has been growing because
False
The principles of right and wrong that can be used by individuals to make choices to guide their behavior are called morals
False
The rate of global piracy is approximately 20%
grants a monopoly on underlying concepts and ideas
The strength of patent protection is that it
digital
The term "________ divide" refers to large disparities in access to computers and the Internet among different social groups and different locations
profiling
The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called
False
Trade secret law does not protect the actual ideas in a work product
Three main ways that intellectual property is protected:
Trade secret: intellectual work or product belonging to business, not in the public domain Copyright: statutory grant protecting intellectual property from being copied for the life of the author, plus 70 years Patents: grants creator of invention an exclusive monopoly on ideas behind invention for 20 years
In recent years, the illegal sharing of music files has declined with the improvement of technological prevention.
True
One of the key concepts in patent law is novelty.
True
birthplace
Types of information gathered by Web site tracking tools include all of the following except
develop equivalent privacy protection policies
U.S. businesses are allowed to use personal data from EU countries if they
Web beacons (web bugs)
Used by marketers, tiny software programs that keep a record of users' online clickstream and report this data back to whomever owns the tracking file (invisibly embedded in emails and websites).
Copyright law
What legal mechanism protects the owners of intellectual property from having their work copied by others
on the visitor's computer
When a cookie is created during a Web site visit, it is stored
Privacy Act of 1974
Which U.S. act restricts the information the federal government can collect and regulates what they can do with the information
Information rights and obligations
Which of the five moral dimensions of the information age do the central business activities of ChoicePoint raise
Quality of life
Which of the five moral dimensions of the information age does spamming raise?
HIPAA
Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed
Digital Millennium Copyright Act
Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials
They result in new situations that are not covered by old laws
Which of the following best describes how new information systems result in legal gray areas?
Assign responsibility
Which of the following is not one of the five steps discussed in the chapter as a process for analyzing an ethical issue
Firms should limit the length of time that any personal data is stored to six months or less
Which of the following is not one of the practices added in 2010 by the FTC to its framework for privacy
Software products are more easily compared to each other than books.
Which of the following statements does not describe a key difference between software and books?
Regulated common carriers
________ are not held liable for the messages they transmit
RSI
________ can be induced by tens of thousands of repetitions under low-impact loads.
Accountability is
a feature of systems and social institutions. Mechanisms are in place to determine who took responsible action and who is responsible.
patent
a legal document that grants th owner an exclusive monopoly on the ideas behind an invention for 17 years; designed to ensure that inventors of new machines or methods are rewarded for their labor while making widespread use of their inventions
descartes' rule of change
a principle that states that if an action cannot be taken repeatedly, then it is not right to be taken at any time
immanuel kant's categorical imperative
a principle that states that if an action is not right for everyone to take it is not right for anyone
Due process is
a process in which laws are *known and understood*, and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly.
due process
a process in which laws are well-known and understood and there is an ability to appeal to higher authorities to ensure that laws are applied correctly
fair information practices
a set of principles originally set forth in 1973 that governs the collection and use of information about individuals and forms the basis of most us and european privacy laws
copyright
a statutory grant that protects creators of intellectual property against copying by others for any purpose for a minimum of 70 years
responsibility
accepting the potential costs, duties, and obligations for the decisions one makes
digital millennium copyright act
adjusts copyright laws to the internet age by making it illegal to make, distribute, or use devices that circumvent technology-based protections of copy-righted materials
trade secret
any intellectual work or product used for a business purpose that can be classified as belonging to that business, provided it is not based on information in the public domain
The introduction of information technology has a ripple effect, Social and political institutions cannot respond overnight to these ripples—it may take years to develop etiquette, expectations, laws.
arising new ethical, social, and political issues that must be dealt with on the individual, social and political levels.
ethical "no free lunch" rule
assumptions that all tangible and intangible objects are owned by someone else, unless there is a specific declaration otherwise, and that the creator wants compensation for this work
Power has become more ____ into the hands of a few private oligopolies and large government agencies.
centralized
Computer crime:
commission of illegal acts through use of computer or against a computer system—computer may be object or instrument of crime
informed consent
consent given with knowledge of all the facts needed to make a rational decision
Online Privacy Alliance helps
encourage self-regulation and set guidelines. Promotes use of online seals (TRUSTe), certifying websites adhering to privacy principles.
computer vision syndrome
eyestrain conditions related to computer display screen ousel symptoms include headaches, blurred vision, and dry and irritated eyes
CVS refers to
eyestrain related to computer display screen use.
The impact of network advances are
greatly reduce costs of moving and accessing large quantities of data and open the possibility of mining large pools of data remotely using small desktop machines. This permits an invasion of privacy with incredible precision.
Network Advertising Initiative (NAI)
has developed privacy policies to help customers opt out of advertising network programs and provide consumers redress from abuses.
The impact of mobile device growth is
individual cellphones may be tracked without user consent or knowledge.
What are the five moral dimensions in the ripple effect?
information rights and obligations, property rights and obligations, system quality, quality of life, and accountability and control.
Opt-in model
informed consent in which a business is prohibited from collecting any personal information unless the consumer specifically takes action to approve information collection and use.
intellectual property
intangible property created by individuals or corporations that is subject to protections under trade secret, copyright, and patent law
Intellectual property:
intangible property of any kind created by individuals or corporations
digital divide
large disparities in access to computers and the internet among different social groups and different locations
opt-in
model of informed consent permitting prohibiting an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use
opt-out
model of informed consent permitting the collection of personal information until the consumer specifically requires that the data not be collected
______ has given the government and private sector even more powerful profiling capabilities. It can take information about people from many sources, and correlate relationships to find hidden connections that might help identify terrorists/criminals. It works in real time.
nonobvious relationship awareness (NORA)
repetitive stress injury
occupational disease that occurs when muscle groups are forces through repetitive actions with high-impact loads or thousands of repetitions with low-impact loads
Opt-out model
of informed consent permits the collection of personal information until the customer specifically requests that the data not be collected.
Which legal mechanism grants the owner exclusive ownership of the ideas behind an invention for 20 years?
patent
Liability is
political systems in which a body of laws is in place that permits individuals to recover the damages done to them by other actors, systems or organizations.
utilitarian principle
principle that assumes one can put values in rank order and understand the consequences of various courses of action
risk aversion principle
principle that one should take the action that produces the least harm or incurs the least cost
ethics
principles of right and wrong that can be used by individuals acting as fee moral agents to make choices to guide their behavior
safe harbor
private self-regulating policy and enforcement mechanism that meets the objectives of government regulations but does not involve government regulation or enforcement
The use of computers to combine data from multiple sources and create documents of detailed information on individuals is called: Ex. DoubleClick Ex. ChoicePoint (police records on everyone)
profiling
________ is the use of computers to assemble data from different sources to create electronic dossiers of detailed information about individuals.
profiling
The moral dimension of ________ can be described as the obligations that individuals and organizations have concerning rights to intellectual property.
property rights and obligations
golden rule
putting oneself in the place of others as the object of a decision
Ethics
refers to the principles of right and wrong that individuals, acting as free moral agents, use to make choices to guide their behaviors.
Key concepts of ethical choices are:
responsibility, accountability and liability
The online industry has preferred ____ to privacy legislation for protecting customers
self-regulation
technostress
stress induced by computer use; symptoms include aggravation, hostility toward humans, impatience, and enervation
spyware
technology that aids in gathering information about a person or organizations without their knowledge
nonobvious relationship awareness
technology that can find obscure hidden connections between people or other entities by analyzing information from many different sources to correlate relationships
safe-harbour
the U.S. Department of Commerce developed a ________ framework in order to enable U.S. businesses to legally use personal data from EU countries.
Privacy
the claim of individuals to be left alone, free from surveillance or interference from other individuals, organizations, or state; claim to be able to control information about yourself
privacy
the claim of individuals to be left alone; free from surveillance or interference from other individuals, organizations, or the state
computer abuse
the commission of acts involving a computer that may not be illegal but are considered unethical
computer crime
the commission of illegal acts through the use of a computer or against a computer system
liability
the hesitance of laws that permit individuals to recover the damages done to them by other actors, systems, or organizations
accountability
the mechanisms for assessing responsibility for decisions made and actions taken
information rights
the rights that individuals and organizations have with respect to information that pertains to themselves
profiling
the use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals
Information systems raise new ethical questions because
they create opportunities for intense social change, and thus threaten existing distributions of power, money, rights and obligations. New kinds of crime
cookies
tiny file deposited on a computer hard drive when an individual visits certain web site. Used to identity the visitor and track visits to the web site
web beacons
tiny objects invisibly embedded in e-mail messages and web pages that are designed to monitor the behavior of the user visiting a web site or sending and e-mail
Because of their special claims to knowledge, wisdom, and respect, professionals take on special rights and obligations. T/F
true
Ethics describes the principles of right and wrong that can be used by individuals to make choices to guide their behavior. T/F
true
carpal tunnel syndrome
type of RSI in which pressure on the median nerve through the wrist's bony carpal tunnel structure produces pain
spam
unsolicited commercial e-mail
information rights and obligations protects
what information rights do they posses and what can they protect
Responsibility means
you accept the potential costs, duties and obligations for the decisions you make.