• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/24

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

24 Cards in this Set

  • Front
  • Back

ETHICS

The principles and standards that guide our behavior toward other people

INTELLECTUAL PROPERTY

Intangible creative work that is embodied in physical form

COPYRIGHT

The legal protection afforded an expression of an idea such as song, video game, and some types of proprietary documents

FAIR USE DOCTRINE

In certain situations, it is legal to use copyrighted material

PIRATED SOFTWARE

The unauthorized use, duplication, distribution, or sale of copyrighted software

COUNTERFEIT SOFTWARE

Software that is manufactured to look like the real thing

PRIVACY

A major ethical issue and is the right to be left alone when you want to be, to have control over your own personal possessions and not to be observed without your consent

CONFIDENTIALITY

The assurance that messages and information are available only to those who are authorized to view them

ETHICAL COMPUTER USE POLICY

Contains general principles to guide computer user behavior. It ensures all users are informed of the rulers and by agreeing to use the system on that basis,consent to abide by the rules

INFORMATION PRIVACY POLICY

Contains general principles regarding information privacy

ACCEPTABLE USE POLICY

A policy that a user must agree to follow in order to be provided access to a network or to the internet. It contains a non repudiation clause

EMAIL PRIVACY POLICY

Details the extent to which email messages may be read by others

INTERNET USE POLICY

Contains general principles to guide the proper use of the internet

SPAM

Unsolicited email

ANTI-SPAM POLICY

Simply states that email users will not send unsolicited emails


MONITORING

Tracking people's activities by such measures as number of keystrokes, error rate, and number of transactions processed

KEY LOGGER OR KEY TRAPPER SOFTWARE

A program that captures keystrokes on their journey from the keyboard to the motherboard

HARDWARE KEY LOGGER

A hardware device that captures keystrokes on their journey from the keyboard to the motherboard

COOKIE

A small file deposited on a hard drive by a website containing information about customers and web activities. It allows websites to record the comings and goings of customers usually without their knowledge or consent

ADWARE

Software generates ads that install themselves on a computer when a person downloads some other program from the internet

SPYWARE (SNEAKWARE OR STEALTHWARE)

Software that comes in hidden in free downloadable software and tracks online movements, mines the information stored on a computer, or uses a computer's CPU and storage for some task the user knows nothing about

WEB LOG

Consists of one line of information for every visitor to a website and is usually stored on a web server

CLICKSTREAM

Records information about a customer during a web surfing session such as what websites were visited, how long the visit was,what ads were viewed,and what was purchased

EMPLOYEE MONITORING POLICIES

Explicitly state how, when and where the company monitors its employees