• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/26

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

26 Cards in this Set

  • Front
  • Back
Profiling
the use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals
nonobvious relationship awareness (NORA)
data analysis technology that instantly scans data and extracts information from disparate sources on individuals and finds obscure hidden connections that might help identify criminals or terrorists
responsibility
accepting the potential costs, duties, and obligations for the decisions one makes
accountability
a feature of systems or social institutions to determine who took responsible action and who is responsible
liability
a feature of political systems in which a body of laws is in place that permits individuals to recover the damages done to them by other actors, systems, or organizations
due process
a process in which laws are known and understood, and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly
privacy
the claim of individuals to be left along, free from surveillance or interference from other individuals or organizations
Fair Information Practices (FIP)
a set of principles governing the collection and use of information about individuals
Informed consent
consent given with knowledge of all the facts needed to make a rational decision
Safe harbor
a private, self-regulating policy that meets government regulators and legislators objectives but does not involve government regulation or enforcement
Cookies
small text files deposited on a computer hard drive when a user visits Web sites; identify the visitor’s Web browser software and track visits
Web beacon (Web bug)
tiny objects invisibly embedded in e-mail messages and Web pages designed to monitor behavior
Spyware
secretly install itself on a computer by piggybacking on larger applications
Platform for Privacy Preferences (P3P)
provides a standard for communicating a Web site’s privacy policy to Internet users and for comparing that policy to the user’s preferences or to other standards
Intellectual property
intangible property created by individuals or corporations
Trade secret
a formula, device, pattern or compilation of data used for a business purpose
Copyright
a statutory grant that protects creators of IP from having their work copied by others for any purpose during the life of the author plus an additional 70 years after death; 95 years after initial creation for corporate-owned works.
Patent
grants the owner an exclusive monopoly on the ideas behind an invention for 20 years
Computer crime
the commission of illegal acts though the use of a computer or against a computer system
Computer abuse
the commission of acts involving a computer that may not be illegal but that are considered unethical
Spam
junk email sent by an organization or individual to a mass audience of Internet users
Digital divide
the inequitable distribution of access to digital information services along ethnic and social class lines
Repetitive stress injury (RSI)
occurs when muscle groups are forced through repetitive actions
Carpal tunnel syndrome (CPS)
most common computer-related repetitive stress injury to wrists
Computer vision syndrome (CVS)
any eyestrain condition related to display screen use; headaches, blurred vision, dry and irritated eyes
Technostress
stress induced by computer use