Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
32 Cards in this Set
- Front
- Back
What are some Privacy Issue concerns in the word place?
|
-Employee monitoring systems |
|
What is the most common way to index and link databases?
|
By using social security numbers
|
|
When did the U.S. government begin linking databases?
|
1977 |
|
What is the 1970 Fair Credit Reporting Act?
|
Issues involving both the user's and organization's responsibilities and liabilities. |
|
What are "acceptable use policies"?
|
-Set of rules specifying the legal and ethical use of a system and the consequences of noncompliance. |
|
What is "Accountability" regarding web and network privacy?
|
-Issues involving both the user's and the organization's responsibilities and liabilities. |
|
What is "Nonrepudiation"?
|
-Method for binding all the parties to a contract |
|
What are the hardware or software controls used for?
|
-Determine what personal information is provided on the web. |
|
What is Spam?
|
-Sent in bulk by using automated mailing software |
|
What is the "ease of access" concern?
|
-Any e-mails sent on company-owned computers are the property of the organization |
|
Why are many customers reluctant to make online purchases?
|
|
|
What are Cookies
|
-Embedded in a web browser -Saved on the user's hard drive -Many users disable cookies |
|
What are log files?
|
-Record a user's actions on a Web site |
|
What does Ethics mean?
|
Doing the right things. |
|
What opportunities do Information Technology offer for unethical behavior
|
-Cybercrime, cyberfraud, identity theft, & intellectual property theft |
|
what are the ten commandments of Computer Ethics
|
2-Thou shalt not interfere with other people's computer work 3-Thou shalt not snoop around in other people's files 4-Thou shalt not use a computer to steal 5-Thou shalt not use a computer to bear false witness 6-Thou shalt not use or copy software for which you have not paid 7-Thou shalt not use other people's computer resources without authorization 8-Thou shalt not appropriate other people's intellectual output 9-Thou shalt think about the social consequences of the program you write 10- Thou shalt use a computer in ways that show consideration and respect |
|
How is public information limited on the Web?
|
it can be censored for public policy reasons |
|
How is private information on the web censored?
|
It is not, due to constitutional freedom of expression. |
|
What is Intellectual property?
|
-Protections that involve copyrights, tademarks, trade secrets, and patents for "creations of the mind" developed by people or businesses |
|
Intellectual property can be divided into what two categories?
|
|
|
What are examples of Industrial property |
-Trademarks -Logos -Industrial Designs |
|
What are examples of Copyrighted material? |
-Literary and artistic works -May apply to online materials -Exceptions under Fair Use Doctrine |
|
What is Trademark?
|
-rotects product names and identifying marks |
|
What is a Patent?
|
Something that protects new processes |
|
What is Cybersquatting
|
-Registering, selling, or using a domain name to profit from someone else's trademark |
|
Digital Divide
|
divide between the information rich and the information poor
|
|
What is the impact of information technology in the workplace?
|
It has taken some jobs away, but it has also created many new ones as well. |
|
What are the potential benefit to drawback ratio regarding telecommuting?
|
There are far more potential benefits than drawbacks. |
|
What are Virtual Organizations?
|
-Networks of independent companies, suppliers, customers, and manufactuerers |
|
What is VDTs?
|
Video Display Terminals. |
|
What is Video Display Terminals? |
-No conclusive study |
|
What is Green Computing?
|
Computing that promotes a sustainable environment and consumes the least amount of energy |