M05b: Information Systems Ethics
What is the assurance that messages and information remain available only to those authorized to view them?
Confidentiality
______ is the assurance that messages and information remain available only to those authorized to view them.
Confidentiality
What is the legal protection afforded an expression of an idea, such as a song, book, or video game?
Copyright
______ is the legal protection afforded an expression of an idea, such as a song, book, or video game.
Copyright
______ software is software that is manufactured to look like the real thing and sold as such.
Counterfeit
What is software that is manufactured to look like the real thing and sold as such?
Counterfeit software
What are the principles and standards that guide our behavior toward other people?
Ethics
What governs the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself?
Information ethics
What is the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent?
Privacy
Information governance
a method or system of government for information management or control
Information _________ is the act of conforming, acquiescing, or yielding information.
compliance
Information _________ is a method or system of government for information management or control.
governance
Information management
examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data/information required to function and grow effectively
______ rights management is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.
Digital
What is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution?
Digital rights management
______ ethics govern the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself.
Information
What is the act of conforming, acquiescing, or yielding information?
Information compliance
What is a method or system of government for information management or control?
Information governance
What examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data/information required to function and grow effectively?
Information management
What is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged?
Information property
What category of computer security addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity?
Information secrecy
What is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents?
Intellectual property
What is an exclusive right to make, use, and sell an invention and is granted by a government to the inventor?
Patent
______ software is the unauthorized use, duplication, distribution, or sale of copyrighted software
Pirated
What is the unauthorized use, duplication, distribution, or sale of copyrighted software?
Pirated software
Information property
an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged
A(n) _________ is an exclusive right to make, use, and sell an invention and is granted by a government to the inventor.
patent
______ is the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent
privacy
Information _________ is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged.
property
Intellectual ___________ is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents.
property
Information ________ is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
secrecy
Information compliance
the act of conforming, acquiescing, or yielding information
Information secrecy
the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity