• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/15

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

15 Cards in this Set

  • Front
  • Back
Ethical Issues With Technology
Intellectual property
Copyright
Fair use doctrine
Pirated software
Counterfeit software
Privacy
the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent
Confidentiality
the assurance that messages and information are available only to those who are authorized to view them
Ethical computer use policy
contains general principles to guide computer user behavior
Who is the sole person responsible for ethical computer use policy?
Chief Information Officer
Information privacy policy
contains general principles regarding information privacy
email privacy policy
details the extent to which email messages may be read by others
Internet use policy
ontains general principles to guide the proper use of the Internet
Monitoring
tracking people’s activities by such measures as number of keystrokes, error rate, and number of transactions processed
Information security
the protection of information from accidental or intentional misuse by persons inside or outside an organization
Insiders
legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident
Social engineering
using one’s social skills to trick people into revealing access credentials or other information valuable to the attacker
Authentication
a method for confirming users’ identities
Authorization
the process of giving someone permission to do or have something
Tokens
small electronic devices that change user passwords automatically