MI375: chapter 4
Responsibility
Accepting the potential costs, duties, and obligations for decisions
Privacy
Claim of individuals to be left alone, free from surveillance or interference from other individuals, organizations, or state; claim to be able to control information about yourself
Profiling
Combining data from multiple sources to create dossiers of detailed information on individuals
Nonobvious relationship awareness (NORA)
Combining data from multiple sources to find obscure hidden connections that might help identify criminals or terrorists
Golden Rule
Do unto others as you would have them do unto you
Spyware
Surreptitiously installed on user's computer May transmit user's keystrokes or display unwanted ads
Utilitarian Principle
Take the action that achieves the higher or greater value
Risk Aversion Principle
Take the action that produces the least harm or potential cost
Which of the following restricts the information that the U.S. federal government can collect about an individual and regulates what it can do with the information?
The Privacy Act
Which of the following best describes how new information systems can result in legal gray areas?
They result in new situations that are not covered by old laws
Although online tracking gathers an enormous amount of information on individual users, it is anonymous and can't be tied to a specific person
false
In today's legal environment, managers who are convicted for the misuse of information systems are still unlikely to be given a prison sentence.
false
Patents
grants creator of invention an exclusive monopoly on ideas behind invention for 20 years
Trade secret
intellectual work or product belonging to business, not in the public domain
Which of the following is not protected by copyright law?
machines
When a cookie is created during a website visit, it is stored:
on the hard drive of the visitor's compute
In the ________ model of informed consent, personal information can be collected until the consumer specifically requests that his or her data not be collected.
opt-out
The use of computers to assemble data from different sources to create digital dossiers of detailed information about individuals is known as which of the following?
profiling
The obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within which of the following moral dimensions of the information age
quality of life
________ means that you accept the potential costs and obligations for the decisions you make.
responsibility
Copyright
statutory grant protecting intellectual property from being copied for the life of the author, plus 70 years
European countries do not allow businesses to use personally identifiable information without consumers' prior consent.
true
Ethical "No Free Lunch" Rule
Assume that virtually all tangible and intangible objects are owned by someone unless there is a specific declaration otherwise
Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed?
HIPPA
Ethical analysis
Identify and clearly describe the facts. Define the conflict or dilemma and identify the higher-order values involved. Identify the stakeholders. Identify the options that you can reasonably take. Identify the potential consequences of your options.
Cookies
Identify browser and track visits to site
Descartes' Rule of Change
If an action cannot be taken repeatedly, it is not right to take at all
Immanuel Kant's Categorical Imperative
If an action is not right for everyone to take, it is not right for anyone
What are the 5 Moral demensions of the Information age?
Information rights and obligations Property rights and obligations Accountability and control System quality Quality of life
Intellectual property
Intangible property of any kind created by individuals or corporations
Due process
Laws are well-known and understood, with an ability to appeal to higher authorities
Accountability
Mechanisms for identifying responsible parties
Which of the following is a data analysis technology that finds hidden connections between data in disparate sources?
NORA
Liability
Permits individuals (and firms) to recover damages done to them
Web Beacons (web bugs)
Tiny graphics embedded in e-mails and web pages Monitor who is reading e-mail message or visiting site
Which of the following forms of protection of intellectual property requires that the property be the subject of a nondisclosure agreement?
Trade secret
Advertisers use ________ in order to display more relevant ads based on a user's search and browsing history.
behavioral targeting