• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/79

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

79 Cards in this Set

  • Front
  • Back

Which of the following concepts best represents Lawrence Lessig’s concern that “Code is Law”?

In computer science, "code" typically refers to the text of a computer program (the source code). In law, "codex" can refer to the texts that constitute statutory law. In his 1999 book Code and Other Laws of Cyberspace, Lessig explores the ways in which code in both senses can be instruments for social control, leading to his dictum that "Code is law."



Programs and devices set the terms on which we interact with cyber-technology. Code is not up for public debate.

A company developed a software package with an unexpected side effect. The company was sued in court and paid damages, but did not admit fault. Which of the following terms best describes this situation?
Liability

Proponents of which theory claim that public information network should treat all contents, sites, and data equally?

Net neutrality

Who was Sabeen Mahmud?

A Pakistani humans rights activist who ran the first hackathon in Pakistan. She was assassinated in late April of this year.

According to De George’s criteria, which of the following is a condition for being morally obligated to blow the whistle?

When:

(a)When it will cause serious harm to the public


(b)When you have already reported the immediate threat to your supervisor


(c)You have exhausted all company policies (d)You have documented evidence


(e)The public will change the situation




a,b,c are criteria for being morally PERMITTED to blow the whistle. d,e are conditions for being morally OBLIGATED. (so a,b,c would be wrong) edit: all 5 would have to be satisfied

Which of the following organizations primarily promotes open source as a development process, while allowing for proprietary software and commercial use?

The Open Source Initiative

Your friend says, “It’s wrong to paint over this artist’s painting, because it could diminish their reputation.” What philosophy of intellectual property is she using?
The personality theory - IP is an extension of your personality
Which of the following governments deployed the so-called “Great Cannon”?

The People’s Republic of China

In class, we took two implicit association tests and discussed the results. Which of the following do the majority of people who took these tests associate more with “male” rather than “female”?

Careers / Math and science over humanities and the arts

The proportion of women graduating with computer science degrees has decreased since the 1980’s. True or false?

True

When a fixed copy of a work is purchased, which of these grants the buyer the freedom to give the fixed copy away without the author’s permission?
Right of first sale/first-sale doctrine
According to a study we discussed in class, placing stereotypical objects like Star Trek posters and video games in a classroom decreased young women’s interest in studying computer science. True or false?

True

Software can be patented

Yes. Software can be both patented and copyrighted

Which one of the following statements is true about property?
Property can include land, physical objects (teapots/cars), and intellectual objects (books/movies/software)



property = relationship between individuals in reference to things

Which of the following would most likely be considered “fair use”?

List of fair use exceptions:


criticism


comment


teaching


scholarship


research


parody

The DMCA is an example of which of Lessig’s Four Modes of Regulation?

Regulation by law

Which of the following is part of the analyze step of Tavani’s “Comprehensive Strategy for Approaching Cyberethics Issues”?

Analyze step:


(a) Identify any policy vacuums


(b) Clear up conceptual muddles

According to John Rawls, what do we call resources that satisfy basic human needs, giving them moral weight?
Primary social goods (The Digital Divide slide, page 14)
The proportion of women graduating with computer science degrees has steadily increased since the 1980’s. True or false?

False

Under which philosophical theory of ethics is intellectual property considered a natural right?

Labor theory (Intellectual Property slides, page 8)

Which of the following philosophies is rooted in the idea that intellectual property should be protected only because it benefits society?

Utilitarian theory

Which of the following words describes the situation in which a dominant group so successfully projects its particular way of seeing social reality that its view is accepted as common sense and part of the natural order?

Hegemony

Melinda works for a company that sells medical software with a crucial bug that causes a misdiagnosis of cancer. She talked to her supervisor about her concerns and filed a formal complaint, but nothing has been done to correct the bug. Unless she blows the whistle, Melinda believes the bug will remain hidden from the public. She has collected extensive internal documentation about the bug and is prepared to go public. According to De George, Melinda is…

Permitted and obligated (Professional Ethics slides, page 13)

What do we call a situation when accountability is distributed in a large project or organization?

Problem of many hands

In which of these decades was the proportion of men and women graduating with computer science degrees furthest from equal (i.e. women were most underrepresented.)

60s (see lecture W12)

Which of the following is not given a ”fair use” exemption?

List of fair use exemptions:


criticism


comment


teaching


scholarship


research


parody

Which of the following organizations, founded by Lawrence Lessig, leverages existing copyright laws to give greater flexibility and choices to the creator?
Creative Commons
Which of the following intellectual property schemes grants an inventor an exclusive monopoly?
Patents
Which of the following is true of the programmers of the ENIAC, the first electronic general purpose computer?
They were women
Your friend says, “We should respect this inventor’s patents, because that incentivizes him to invent even more useful products to benefit society.” What philosophy of intellectual property is she using?
Utilitarian theory
Which of the following is a phrase used by the United States Supreme Court to describe speech that is not protected by the First Amendment?

Harmful speech/hate speech

Under which philosophical theory of ethics is intellectual property considered a moral right?
Personality theory
Morally, what would we consider donating to charity?
supererogatory



Week 11, slide 15

When people are worried about confirming negative stereotypes about their social group, studies report that they underperform on tests. What do we call this phenomenon?
Stereotype threat
Which of the following intellectual property schemes has been abused lately by “rent seeking” behavior?
Patents
Your friend says, “Pirating music is wrong, because you are stealing from hard working artists. They have a right to benefit from their efforts.” What philosophy of intellectual property is she using?
Labor theory
Most of the people in the world had become regular Internet users by the year 2010. True or false?
False. Only about 30%
Which of the following intellectual property schemes could be used to protect a chemical formula for hundreds of years?
Trade secrets
We used Tavani’s “Comprehensive Strategy for Approaching Cyberethics Issues” frequently in class. Which of the following is the correct order of the three steps?

Identify


Analyze


Deliberate

Which of the following philosophies is rooted in the idea that intellectual property should be respected as an extension of the creator’s identity?
Personality theory
A user posts a PDF of a novel on Reddit. The author of the novel issues a DMCA takedown notice, and the PDF is removed. Under our definition, does this constitute censorship?
I think no because if the author is trying to remove it then the author has not made it public. Also this doesn’t indicate that the author is removing because he thinks it would be bad if people read it. (see Google doc for more discussion)
Which of the following was not advocated by Reverend Michael C. McFarland?
He advocated that engineers must see their work in relation to society, or an adequate account of their ethical responsibilities cannot be given. Engineers must learn to act in collaboration with others both inside and outside their profession or they will not be able to meet their responsibilities. (Professional ethics slides, page 14)
Which of the following intellectual property schemes lasts for exactly 20 years?
Patents
Which of the following intellectual property schemes could be used to protect a novel?
Copyright
Which of the following intellectual property schemes typically involves employees signing NDAs?
Trade secrets
People or organizations who own and enforce patents for the sole purpose of collecting licensing fees without actually manufacturing products or supplying services are sometimes called...
Patent trolls
Fining a company that publishes profanity is an example of which of the following?
Censorship by deterrence
Which of the following is not part of the identify step of Tavani’s “Comprehensive Strategy for Approaching Cyberethics Issues”?
Identify step:

(a) disclose opaque features


(b) assess sociological implications


(c) search for existing policies or ethical codes

Title II of the Communications Act will be used by the FCC to regulate ISPs as...
Common Carriers
According to our textbook, which of the following are challenges presented by online social networks?
(1) Facilitate Social Polarization

(2) Minimize Face to Face Communication


(3) Facilitate Anonymity and Deception

Which of the following philosophies is rooted in the idea that intellectual property should be protected because the creator is entitled to the benefits of their work.

Labor

Which of the following intellectual property schemes can be used to protect databases that “exhibit authorship”?
Copyright
Fining people who download pornography is an example of which of the following?
Censorship by deterrence
The famous Coca Cola company protects its secret soda formula under which of the following intellectual property schemes?
It is a trade secret
A developer is professionally answerable for the security of an application her company produces. She identifies a vulnerability in the application and issues a patch. Which of the following terms best describes this situation?
Accountability
Which of the following is the U.S. law that first criminalized the circumvention of DRM?
DMCA
According to Lawrence Lessig, what do we call the collection of shared ideas belonging to the public?
Intellectual Commons
In class, we took two implicit association tests and discussed the results. Which of the following do the majority of people who took these tests associate more with “female” rather than “male”?
Family / Humanities and the arts over math and science.
According to U.S. census data, access to information technology is correlated with which of the following?
Economic inequality

Ethnicity


disability

Which of the following is not on the Creative Commons “Menu”?

Here’s the menu:


(a) Attribution


(b) Noncommercial


(c) Derivative works


(d) Share alike

A server hosting a popular blog crashes due to a faulty disk drive. The files cannot be recovered, so the blog contents are lost forever. Under our definition, does this constitute censorship?

No

An artist paints unpatriotic graffiti on the side of a building. The owner of the building has it removed, because he doesn’t want others to be exposed to anti-American ideas. Under our definition, does this constitute censorship?
Yes because he does not want people to see the idea the message expresses- this is censorship by suppression.
Which of the following organizations, founded by Richard Stallman, rejects all notions of proprietary software?
Free Software Foundation
Software can be copyrighted.

True

According to U.S. patent law, which of the following is one of the three criteria that an invention must satisfy for a patent application to be approved?

Novel


Useful


Non-obvious

Which of the following is the U.S. law that provides the “safe harbor” provision for ISPs?

DMCA

The name of the famous shoe brand “Nike” is protected by which of the following intellectual property schemes?
Trademarks
Which of the following intellectual property schemes has a “fair use” exemption?
Copyright
Which of the following grants the right to use another person’s copyrighted work under certain circumstances?
Fair use
Which of the following is the U.S. law that created the concept of a “takedown notice”?
DMCA (Digital Millennium Copyright Act)
In which of these decades was the proportion of men and women graduating with computer science degrees nearest to equal (i.e. closest to half women and half men.)
Mid 80s (about 37% women)
Morally, what would we consider a parent feeding their own children?

Obligatory

Which of the following is part of the deliberate step of Tavani’s “Comprehensive Strategy for Approaching Cyberethics Issues”?
Deliberative step:

(a) Apply one or more ethical theories


(b) Justify the position using logical argumentation

DRM is an example of which of Lessig’s Four Modes of Regulation?

Regulation by code

Like any mathematical formula, an algorithm can be patented without a practical application.
False. It’s not possible to patent algorithms
Burning a book is an example of which of the following?
Censorship by suppression
Under which philosophical theory of ethics is intellectual property considered an artificial right?
Utilitarian theory
Which of the following are characteristics of a professional?
Occupation where decisions and actions have significant social effects.Roles and responsibilities exceed those of non-professionalsExpert in a fieldResponsibility (causality and intent), liability (legal concept not moral), accountability?
Morally, what would we consider risking your own life to save another person?
supererogatory