Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
24 Cards in this Set
- Front
- Back
ETHICS |
The principles and standards that guide our behavior toward other people |
|
INTELLECTUAL PROPERTY |
Intangible creative work that is embodied in physical form |
|
COPYRIGHT |
The legal protection afforded an expression of an idea such as song, video game, and some types of proprietary documents |
|
FAIR USE DOCTRINE |
In certain situations, it is legal to use copyrighted material |
|
PIRATED SOFTWARE |
The unauthorized use, duplication, distribution, or sale of copyrighted software |
|
COUNTERFEIT SOFTWARE |
Software that is manufactured to look like the real thing |
|
PRIVACY |
A major ethical issue and is the right to be left alone when you want to be, to have control over your own personal possessions and not to be observed without your consent |
|
CONFIDENTIALITY |
The assurance that messages and information are available only to those who are authorized to view them |
|
ETHICAL COMPUTER USE POLICY |
Contains general principles to guide computer user behavior. It ensures all users are informed of the rulers and by agreeing to use the system on that basis,consent to abide by the rules |
|
INFORMATION PRIVACY POLICY |
Contains general principles regarding information privacy |
|
ACCEPTABLE USE POLICY |
A policy that a user must agree to follow in order to be provided access to a network or to the internet. It contains a non repudiation clause |
|
EMAIL PRIVACY POLICY |
Details the extent to which email messages may be read by others |
|
INTERNET USE POLICY |
Contains general principles to guide the proper use of the internet |
|
SPAM |
Unsolicited email |
|
ANTI-SPAM POLICY |
Simply states that email users will not send unsolicited emails |
|
MONITORING |
Tracking people's activities by such measures as number of keystrokes, error rate, and number of transactions processed |
|
KEY LOGGER OR KEY TRAPPER SOFTWARE |
A program that captures keystrokes on their journey from the keyboard to the motherboard |
|
HARDWARE KEY LOGGER |
A hardware device that captures keystrokes on their journey from the keyboard to the motherboard |
|
COOKIE |
A small file deposited on a hard drive by a website containing information about customers and web activities. It allows websites to record the comings and goings of customers usually without their knowledge or consent |
|
ADWARE |
Software generates ads that install themselves on a computer when a person downloads some other program from the internet |
|
SPYWARE (SNEAKWARE OR STEALTHWARE) |
Software that comes in hidden in free downloadable software and tracks online movements, mines the information stored on a computer, or uses a computer's CPU and storage for some task the user knows nothing about |
|
WEB LOG |
Consists of one line of information for every visitor to a website and is usually stored on a web server |
|
CLICKSTREAM |
Records information about a customer during a web surfing session such as what websites were visited, how long the visit was,what ads were viewed,and what was purchased |
|
EMPLOYEE MONITORING POLICIES |
Explicitly state how, when and where the company monitors its employees |