Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
26 Cards in this Set
- Front
- Back
Profiling
|
the use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals
|
|
nonobvious relationship awareness (NORA)
|
data analysis technology that instantly scans data and extracts information from disparate sources on individuals and finds obscure hidden connections that might help identify criminals or terrorists
|
|
responsibility
|
accepting the potential costs, duties, and obligations for the decisions one makes
|
|
accountability
|
a feature of systems or social institutions to determine who took responsible action and who is responsible
|
|
liability
|
a feature of political systems in which a body of laws is in place that permits individuals to recover the damages done to them by other actors, systems, or organizations
|
|
due process
|
a process in which laws are known and understood, and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly
|
|
privacy
|
the claim of individuals to be left along, free from surveillance or interference from other individuals or organizations
|
|
Fair Information Practices (FIP)
|
a set of principles governing the collection and use of information about individuals
|
|
Informed consent
|
consent given with knowledge of all the facts needed to make a rational decision
|
|
Safe harbor
|
a private, self-regulating policy that meets government regulators and legislators objectives but does not involve government regulation or enforcement
|
|
Cookies
|
small text files deposited on a computer hard drive when a user visits Web sites; identify the visitor’s Web browser software and track visits
|
|
Web beacon (Web bug)
|
tiny objects invisibly embedded in e-mail messages and Web pages designed to monitor behavior
|
|
Spyware
|
secretly install itself on a computer by piggybacking on larger applications
|
|
Platform for Privacy Preferences (P3P)
|
provides a standard for communicating a Web site’s privacy policy to Internet users and for comparing that policy to the user’s preferences or to other standards
|
|
Intellectual property
|
intangible property created by individuals or corporations
|
|
Trade secret
|
a formula, device, pattern or compilation of data used for a business purpose
|
|
Copyright
|
a statutory grant that protects creators of IP from having their work copied by others for any purpose during the life of the author plus an additional 70 years after death; 95 years after initial creation for corporate-owned works.
|
|
Patent
|
grants the owner an exclusive monopoly on the ideas behind an invention for 20 years
|
|
Computer crime
|
the commission of illegal acts though the use of a computer or against a computer system
|
|
Computer abuse
|
the commission of acts involving a computer that may not be illegal but that are considered unethical
|
|
Spam
|
junk email sent by an organization or individual to a mass audience of Internet users
|
|
Digital divide
|
the inequitable distribution of access to digital information services along ethnic and social class lines
|
|
Repetitive stress injury (RSI)
|
occurs when muscle groups are forced through repetitive actions
|
|
Carpal tunnel syndrome (CPS)
|
most common computer-related repetitive stress injury to wrists
|
|
Computer vision syndrome (CVS)
|
any eyestrain condition related to display screen use; headaches, blurred vision, dry and irritated eyes
|
|
Technostress
|
stress induced by computer use
|