Ethics, Cyber safety, and copyright

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Identity Theft

A term used to refer to fraud that involves stealing money or other benefits by pretending to be someone else

hackers

people who try to break into the security systems of educational institutions, corporations, and government sites.

Code of conduct

the ethics that we live by

Copyright

the exclusive legal right to reproduce, publish, sell, or distribute the matter and form of something

Back up

the process of copying data, software, or other digitial information on a separate media in addition to its original storage.

Integrity

the strict adherence to a code of behavior

Encryption

the translation of data into a secret code; is the most effective way to achieve data security

etiquette

1. Conventional requirements as to social behavior 2. the code of ethical behavior regarding professional practice of action among the members of a profession they are in.

What are tips for organizing your thoughts when you are working on a project that you gather your information online?

1. Plan ahead 2. Start an outline 3. Record your ideas 4. Bookmark your sources

What are the four situations in which fair use is applied?

1. Schoolwork and Education 2. Criticizing or Commenting 3. News Reporting 4. Comedy or Parody

What are some critical thinking tips?

1. Think about the message 2. make mental images 3. Ask questions 4. connect to existing knowledge 5. Reflect on your reaction 6. Determine key points

What are the four points of fair use?

1. You can only use a small amount of the work 2. You have to add new meaning to the work to make it original. 3. You have to rework it and use it in a totally different way. 4. You can use it for nonprofit purposes only.

What are the 10 commandments of Computer Ethics? (You should be able to list these

)1. Thou shalt not use a computer to harm other people. 2. Thou shalt not interfere with other people's computer work. 3. Thou shalt not snoop around in other people's files. 4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false witness. 6. Thou shalt not use or copy software for which you have not paid. 7. thou shalt not use other people's computer resources without authorization. 8. Thou shalt not appropriate other people's intellectual output. 9.Thou shalt think about the social consequences of the program you write. 10. Thou shalt use a computer in ways that show consideration and respect.

netiquette

It is the rules of etiquette that apply when communication over the computer networks, especially the internet.

fair use

Is when you can use copyrighted information only in certain situations.

computer forensics

The application of scientifically proven methods to gather, process, interpret, and use digital evidence to provide a description of cybercrime activities.

Ethics

The principles of right and wrong that guide an individual in making decisions

a person, book, etc., that gives information

What is a source?

If it makes more sense to use the source's exact words instead of paraphrasing or rewriting.

When is it necessary to use quotation marks for a source?

synthesis

When you put information together in your head from different sources to come up with your own opinion/conclusion.

Are cyber crimes punishable by law?

YES!

virus

a computer program that is usually hidden within another seemingly harmless program and that produces copies of itself and inserts them into other programs and usually performs a malicious action (such as destroying data)

Spyware

a form of software that collects information about the user in order to display advertisements in the web browser based on the information it collects from the user's browsing patterns

License Agreement

a legal statement which indicates the terms under which a user may make use of a software product

Back Door

a means of disabling a system's security which is deliberately left by designers of the system, often to give access to service technicians or maintenance programmers

Trojan Horse

a program that appears to be useful and harmless, but which has harmful side-effects such as destroying data or breaking security on the system on which it is run.

Antivirus

a program that detects and removes computer viruses

phishing

a scam by which an e-mail user is duped into revealing personal or confidential information which the scammer uses illicitly

Computer Ethics

a set of moral principles that regulate the use of computers

Spoofing

a technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host

Cybercrime

any criminal act dealing with computers and networks (called hacking), including crimes conducted through the Internet

Adware

any software package which automatically plays, displays, or downloads advertising material to a computer after the software is installed on it or while the application is being used.

Values

attitudes and beliefs about things we think are important in life; your beliefs about what is right and wrong, good or bad, acceptable or unacceptable

Piracy

copying a computer program (even for personal use) without permission

Firewall

computer hardware or software that prevents unauthorized access to private data (as on a company's local area network or intranet) by outside computer users

Ergonomics

science of designing working environments and the tools in them for maximum work efficiency and maximum worker efficiency and maximum worker health and safety; proper lighting, chairs that support good posture, etc.

cookies

small data files that certain websites write to your hard drive when you visit them. A cookie file can contain a user ID that the site uses to track the pages you've visited.

Plagiarism

stealing and passing off (the ideas or words of another)as one's own: using (another's productions) without crediting the source

Hacking

trying to get into a computer system without permission

spam

unsolicited, usually commercial, e-mail sent to a large number of addresses

Business Ethics

using personal ethics in making business decisions

Worm

usually a small self-contained and self-replication computer program that invades computers on a network and usually performs a destructive action.

Character

what you do when no one is watching

Unauthorized access

when a person who does not have permission to connect to or use a system gains entry in a manner unintended by the system owner. The popular term for this is "hacking"


Ensembles d'études connexes

MOD 114 Chp 46&42 Homework review

View Set

Descriptive Astronomy - Memorizing and Locating Constellations, Bright Stars, Star Clusters, and Non-Stellar Objects

View Set