M05b: Information Systems Ethics

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What is the assurance that messages and information remain available only to those authorized to view them?

Confidentiality

______ is the assurance that messages and information remain available only to those authorized to view them.

Confidentiality

What is the legal protection afforded an expression of an idea, such as a song, book, or video game?

Copyright

______ is the legal protection afforded an expression of an idea, such as a song, book, or video game.

Copyright

______ software is software that is manufactured to look like the real thing and sold as such.

Counterfeit

What is software that is manufactured to look like the real thing and sold as such?

Counterfeit software

What are the principles and standards that guide our behavior toward other people?

Ethics

What governs the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself?

Information ethics

What is the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent?

Privacy

Information governance

a method or system of government for information management or control

Information _________ is the act of conforming, acquiescing, or yielding information.

compliance

Information _________ is a method or system of government for information management or control.

governance

Information management

examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data/information required to function and grow effectively

______ rights management is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.

Digital

What is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution?

Digital rights management

______ ethics govern the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself.

Information

What is the act of conforming, acquiescing, or yielding information?

Information compliance

What is a method or system of government for information management or control?

Information governance

What examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data/information required to function and grow effectively?

Information management

What is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged?

Information property

What category of computer security addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity?

Information secrecy

What is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents?

Intellectual property

What is an exclusive right to make, use, and sell an invention and is granted by a government to the inventor?

Patent

______ software is the unauthorized use, duplication, distribution, or sale of copyrighted software

Pirated

What is the unauthorized use, duplication, distribution, or sale of copyrighted software?

Pirated software

Information property

an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged

A(n) _________ is an exclusive right to make, use, and sell an invention and is granted by a government to the inventor.

patent

______ is the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent

privacy

Information _________ is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged.

property

Intellectual ___________ is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents.

property

Information ________ is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.

secrecy

Information compliance

the act of conforming, acquiescing, or yielding information

Information secrecy

the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity


संबंधित स्टडी सेट्स

Architecture of the Ancient Greece

View Set

Patho-Pharm: Exam 1 Practice Questions

View Set

Physics First H(Vining) - Semester 1 Final Study Guide

View Set

BEM 251 (MIS) MIDTERM (Lectures 2-6; Austin)

View Set

Data Collection, Behavior, and Decisions

View Set

The Cardiovascular System (Chapter 6)

View Set