• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/60

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

60 Cards in this Set

  • Front
  • Back
Ethics
the study of what it means to do the right thing
Deontological Theory
actions are ABSOLUTELY good or ABSOLUTELY bad with no concern for consquences
Kant's theory of universality
Follow rules that we can universally apply to everyone by using logic/rationality not emotion
Consequentialist Theories
Acts are good or bad because of their 
consequences
Utilitarianism
A consequentalist theory that says an act is right if it increases aggregate (total) 
utility (happiness) for everyone
Act Utilitarianism
Judge each action by its net impact without respecting individual rights
Rule utilitarianism
Apply utility principles to general ethical rules, not 
individual actions
Natural Rights
Ethical behaviors respect fundamental/natural rights 
including rights to life, liberty, and property where the persons are not coerced into actions but make them of their own free will

Emphasize the process by which people interact, not 
the result of the interaction
Negative rights
Liberties - the right to act without interference
Right to life, liberty, and the pursue of happiness
Positive rights
Claim rights- demand that some action occur such as obligations of some people to provide something for other people (food, shelter etc.)

You have right to live but are obligated to pay for food and medical care
Golden rules
Treat others as you would want them to treat you. See how your actions impact other people from their perspective
Locke's views
delegate moral rules to government and people will submit to the government to live in a civil society
Rawl's Theory of Justice
-Reasonable people will abide by the rules of society 
-Emphasizes basic liberties (negative rights), 
requires positive rights
-Action is not ethical if it leave least advantaged people worse off
Rawl's Veil of Ignorance
chooses policies that  would be fair for all without regard for sex, political affiliation, sexual orientation etc but not being ignorant of the general types of possible situations in 
which humans can find themselves in
Right
Ethically Obligatory
Wrong
Ethically Prohibited
Okay
Ethically Acceptable
Reindentification
identifying the individual from a set of anonymous data
Personal information
includes any info relating to a person including their user name, id number, phone numbers and images of people online
Informed Consent
user is aware of what information is collected and how it is stored.
Cookies
files that website stores on a vistor's computer
Invisible information gathering
user is aware of what information is collected and how it is stored
Secondary use
use of personal info for something other than intended purpose
Data mining
searching and analyzing masses of data to find patterns and develop new information or knowledge
computerized matching
combining and comparing information from different databases using a single identifier such as IP address and social security
Profiling
analyzing data to determine characteristics of people most likely to engage in certain behavior
Examples of secondary usage of information
data mining, computer matching and profiling
Opt out policy
Default – personal information may be used by organization
In opt-out, most people are opted in
Opt in policy
collector of the personal information may NOT use it for secondary uses unless person explicitly checks box/ signs agreement permitting the use
Dataveillance
personal-data systems to investigate or monitor people (data surveilance)
Olmstead vs United States (1928)
allowed wiretaps on telephone lines w/o court order because 4th amendment applies only to physical intrusion not material things
Katz vs United States (1967)
4th amendment applies to conversations and protects people.
To intrude in a  place where reasonable person has a 
reasonable expectation of privacy requires a 
court order
Kylo v United States (2001)
Supreme Court ruled that police could not use 
thermal‐imaging devices to search a home  from the outside or government level technology against citizens without warrant
RFID tags
small devices that contain a computer chip and an antenna and store ID data for constant surveillance
Privacy Act of 1974
Never disclose info about person unless for
-census info
-routine uses within a U.S. government agency
-archival and law enforcement purposes
-congressional investigations and other admin 
purposes
Government Accountability Office
Congress’ agency to monitor government's 
privacy policies, and enforces the Act and have stated inadequate protection of data.
Freedom of Information Act
burden of proof falls on the government body asked  for information
Cryptography
art of hiding data
confidentiality
only B can see the content of a received message

A sender encrypts with B’s public key and 
sends it
B decrypts with B’s private key
authentication
entity A signs a document
A encrypts with A’s private key and 
sends it
Receiver decrypts with A’s public key to 
verify
Privacy audits
Check for info. leaks, review privacy policies, 
evaluate compliance to policies
Free Market View of privacy
Freedom of consumers to make voluntary 
agreements
-believe strongly in contracts
Consumer Protection View
Consumers need protection from their own lack of  knowledge, judgment, or interest through privacy  regulations
Communications Assistance for Law  Enforcement Act of 1994 (CALEA)
-Government must be able to intercept phone calls, cell phones and Internet with court order
The Nothing to Hide Argument
If you don't do bad things then you shouldn't be worried about getting caught and punished.
1)info only shared with few govt. officials
2)doesn't threaten privacy of law abiding citizens
3)security outweighs privacy
Posner's 4 types of harmful acts
1)Intrusion into plaintiff's private affairs
2)public disclosure of private affairs
3)False negative publicity of plaintiff in public eye
4)Appropriation, for the defendant’s advantage,
of the plaintiff ’s name or likeness
Solove's view on privacy
Family resemblances - Concepts are related to one another rather than having one thing in common
Taxonomy of Data Privacy (CPDI)
Collection
Processing
Dissemination
Invasion
Chilling behavior
interrupts free speech
Who has the strongest protection under the first amendment?
print media
Obscenity (1973 Supreme Court Definition)
sexual act against state law, doesnt adhere to community standards or lacks literary, artistic, social, political or scientific  value
Communication Decency Act (CDA)
first internet censorship bill
Tried to outlaw indecent communications for people under 18 but was found unconstitutional because too vague and broad
Child Online Protection Act (COPA)
-2nd internet censorship bill
-illegal to make harmful material available to minors based on community standards
-Unconstitutional because restricts content for adults (chilling effect)
Children's Internet Protection Act (CIPA)
Requires schools and libraries that participate 
in certain federal programs to install filtering 
software. Can disable the filter for adults.

Upheld because condition for receiving federal funds
WikiLeaks
released U.S. military documents related to the 
wars in Iraq and Afghanistan, including videos of 
shooting incidents; confidential U.S. diplomatic 
cables
also released harmful info about United States critical sites
and 250,000 diplomatic cables
Net Neutrality
 Argue for equal treatment of all customers
De‐regulation
Flexibility and market incentives will benefit 
customers
neutral broadband network
free of restrictions on content, sites, or platforms, on 
the kinds of equipment that may be attached, 
and on the modes of communication allowed
Pros and Cons of net neutrality
FCC Net Neutrality Order (2010)
1) Transparency regarding Broadband services
2) No blocking of lawful content
3)No unreasonable discrimination