Chapter 4
Which of the following statements holds true in this scenario?
Christine developed a new software program, copyrighted its source code, and licensed it to her customers to use for a fixed period of time.
Which of the following statements about the social costs of information technology is true?
The traditional boundaries that separate work from family and just plain leisure have been weakened.
profiling
The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals
What is profiling?
The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called profiling.
Which of the following statements best describe web beacons?
Web beacons are tiny software programs that keep a record of users' online clickstream.
A patent
grants the owner an exclusive monopoly on the ideas behind the invention for 20 years.
Descartes's rule of change
if an action cannot be taken repeatedly, it is not right to take at all. This is the slippery-slope rule: An action may bring about a small change now that is acceptable, but if it is repeated, it might bring unacceptable changes in the long run.
Immanuel Kant's Categorical Imperative
if the action is not right for everyone to take, it is not right for anyone.
Spam
junk emails sent by an organization to a mass audience of Internet users.
Repetitive stress injury (RSI)
leading occupational disease today. It occurs when muscle groups are forced through repetitive actions often under high-impact loads or tens of thousands of repetitions under low-impact loads.
Carpal tunnel syndrome
occupational health risk that consists of pressure on the median nerve through the wrist's bony structure and produces pain.
A safe harbor
private, self-regulating policy and enforcement mechanism that meets the objective of government regulators and legislation but does not involve government regulation or enforcement.
The Golden Rule
putting yourself into the place of others and thinking of yourself as the object of the decision. Also known as "Do unto others as you would have them do unto you," this can help you think about fairness in decision making.
Cookies
small text files deposited on a computer hard drive when a user visits Web sites.
Keylogger
spyware that records every keystroke made on a computer to steal personal information or passwords or to launch Internet attacks.
Copyright
statutory grant that protects creators of intellectual property from having their work copied by others for any purpose during the life of the author plus an additional 70 years after the author's death. A competitor can use the copyrighted software, understand how it works, and build new software that follows the same concepts without infringing on a copyright A copyright protects against copying of entire programs or their parts.
technostress
stress induced by computer and cell phone use.
Technostress
stress induced by computer and cell phone use. previous
Cybersquatting
the dubious practice of registering a domain name and then trying to sell the name for a huge sum of money to the person, company, or organization most likely to want it.
Digital divide
the gap between higher-income families and lower-income families' access to computers and the Internet.
The drawback to copyright protection is
the underlying ideas behind a work are not protected, only their manifestation in a work.
The Utilitarian Principle rule assumes
you can prioritize values in a rank order and understand the consequences of various courses of action
Which of the following best defines copyright?
A statutory grant that protects creators of intellectual property from having their work copied by others for any purpose during the life of the author plus an additional 70 years after the author's death is a copyright.
__________ is a new data analysis technology that takes information about people from many disparate sources and correlates relationships to find obscure hidden connections that might help identify criminals or terrorists.
Nonobvious relationship awareness
Information systems affect ethical principles because they __________.
Raise concerns about the use of intellectual property
Nonobvious relationship awareness (NORA)
a new data analysis technology that takes information about people from many disparate sources and correlates relationships to find obscure hidden connections that might help identify criminals or terrorists. NORA technology has powerful profiling capabilities as it scans data and extracts information as the data are being generated to provide quick information about a person.
Due process
a related feature of law-governed societies and is a process in which laws are known and understood, and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly.
A trade secret
any intellectual work product such as a formula, device, pattern, or compilation of data that is used for a business purpose.
Judy is a data analyst who spends more than 6 hours a day at her computer. She has been experiencing headaches, blurred vision, and dry and irritated eyes. From which of the following occupational health risk does Judy likely suffer?
computer vision syndrome