• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/132

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

132 Cards in this Set

  • Front
  • Back

If we argue that privacy is important for trust and friendship, we are arguing it has what kind of value?

Instrumental

"Illinois CS students should use their expertise to make the world a better place" What kind of statement is this?

normative

"The Earth is clearly flat,because there is no evidence that the Earth is round" What kind of logical fallacy?

Appeal to ignorance

Which of the following security objectives is concerned with trust and verification of data?

Authenticity

What do we call public information about a person

PPI, public personal information

Illinois CS students have created software that makes people safer and happier. What kind of statement is this?

Descriptive or positive

What kinds of arguments are considered strong

sound and inductive

When I weigh the social utility of preserving individual privacy against the safety risks, maintaining privacy leads to greater overall happiness. Preserving privacy is therefore morally right" What kind of ethical reasoning?

utilitarian

After a study indicated this feature might undermine a reader's comprehension of scientific articles, Popular Science disabled this feature on their website

comment sections

What do we call data used to uniquely identify a person

PII, personal identifying information

What odo we call the philosophical stance that there are multiple plausible answers to ethical dilemmas, as long as rational criteria are satisfied, but some answers are more right than others?

ethical/moral objectivism

Which of the following is an example of cybercrime

cyberpiracy, cyberharassment, cybervandilism,cybertrespass, cyberterrorism, cyberextortion

When we say a person is a "Aristotelian" to what ethical theory do they subscribe?

Virtue (character) based

Two researchers discuss whether or not it is ethical to collect the names of subjects in a psychological study. What are they wrestling with?

Norms of appropriateness

If we argue that privacy is a "means to an end" we are arguing it has what kind of value

Instrumental

Two employees for a cell phone company discuss whether or not it is ethical to share user data with a marketing firm. What are they wrestling with

norms of distribution

What do we call the situation that arises when a technology creates non-obvious ethical concerns?

Morally opaque

Which of these philosophers is associated with deotological ethics?

Kant

What do we call our tendency to believe that people ultimately deserve the things that happen to them?

just-world hypothesis

"I aspire to be an honest, just, and disciplined person. If I cannot afford to pay for copyrighted material, I will cultivate these virtues by refusing to pirate it." What ehtical theory?

Virtue based

"Cyberbullying and trolling are unethical. While they might at first seem like fun, the abusers are using humans as a means to an end. Violating moral rules" ethical theory?

Rule deontology

Which of these terms means "having a right to privacy"?

normative privacy

"Thomas Jefferson was a slave owner. His ideas about democracy are flawed" logical fallacy?

Poisoning the well

Which definition of privacy means "freedom from interference in one's choices"

decisional privacy

"Though a sentient machine might seem like something out of science fiction. I would strive to be just and tolerant in my interactions with one. Perhaps a sufficeintly advanced AI could pursue eudaemonia" Ethical reasoning?

virtue/character based

When does a valid argument contain all true premises

it is sound

When we question whether personal information should be gathered or divulged within a given context, what are we talking about?

norm of appropriateness

What is the definition of a logical argument?

A set of premises and a conclusion

In which of the following practices is implicit personal data discovered?

data mining

"You think this house is worth a million dollars The appraiser thinks it's worth three millions dollars. The true value is probably around two million dollars" Logical fallacy?

argument to moderation

The practices of merging and matching personal info potentially violate which of the following

contextual integrity

"A neuron is not sentient, so the brain cannot be sentient" logical fallacy?

fallacy of composition

which of the following laws protects private medical records in the US?

HIPAA

What do we call confidential info about a person?

Nonpublic personal info (NPI)

Which of these terms means "having privacy"?

Descriptive privacy

"Regardless of how intelligent a computer is, people should ultimately use it as they would any other machine: to promote human happiness" Ethical theory?

utilitarian

When we say person is a "deontologist" what ethical theory?

duty-based (deontology)

What is another name for a "white hat" or "pentester"

ethical hacker

"Illinois CS students should strive to protect sensitive user data" statement?

normative

Which of the following is true of risk analysis in cyber security?

Risk analysis: we quantify how likely it is that an adversary will exploit a probability. Risk analysis is de-perimeterized (security spans boundaries of multipe parties) and has the problem of many hands

"Distributing copyrighted works is a form of stealing. Stealing violates moral laws which we believe to be universal, so we should not distribute copyrighted material" What ethical theory is being employed in this argument?

Duty based

"These doughnuts are healthy. They're made using only organically-grown locally-sourced ingredients" Logical fallacy?

composition fallacy or non sequitur:appeal to nature

What kinds of arguments are considered weak?

unsound and fallacious

"We both agree that slavery is wrong and people should be free. Why are you asking me to pay you for your work? Shouldn't you be free?" Logical fallacy?

equivocation

Which of the following laws concerns the "right to be forgotten"

EU DIrective 95/46/EC

"If we let him eat just one doughnut, we'll have to let him eat the whole box" logical fallacy?

slippery slope

"People born in July are bad drivers. They are responsible 1 in 12 traffic accidents!" what kind of fallacy is this?

Post hoc ergo propter hoc, texas sharpshooter, non-sequitur

"The lion preys upon the slowest gazelle. If I get rich by taking advantage of the foolish, it's not immoral. It's evolution" logical fallacy?

Naturalistic fallacy

Which of the following security objectives is concerned with preventing unauthorized access?

Confidentiality

What do we call the descriptive proposition that cultures have different beliefs about what is moral and immoral?

Cultural relativism

When does a sound argument contain all true premises

by definition, always

What do we call the situation where technological development outpaces a society's development of relevant norms?

Policy vacuum

When we question whether personal information should be transferred from its original context, what are we talking about?

Norms of distribution

"Why should anyone listen to you? You're a liar and a thief" Logical fallacy?

Ad hominem or poisoning the well

"Distributing copyrighted material robs the creator of wealth, which discourages artists from creating more works for the public to enjoy. Distributing copyrighted works is therefore unethical" ethical theory?

utilitarian or contract based?

"The Earth is flat. The surface is obviously smooth and level" Logical fallacy?

Composition fallacy or begging the question

Which definition of privacy means "freedom from physical intrusion"

accessibility privacy

Which definition of privacy protects against unwarranted search and seizure

Accessibility privacy

"Either my magic coffee beans can cure diseases, or all the people who bought them are mindless fools" Logical fallacy?

false dillema

Whic definition of privacy protects freedom of conscience?

Decisional privacy

When is an argument that is valid also inductive?

Valid arguments are never inductive, only invalid arguments can be inductive

Under Brey's comprehensive and disclosive method, which perspective of applied ethics does he advocate we use?

All of them

What do we cal our tendency to judge the strength of an argument by our belief in the conclusion?

belief bias

A hacker floods an online poll to skew the results in favor of a political issue. Which of the following is she engaged in?

Hacktivism or cybervandalism

"I refuse to take part in cyberbullying or trolling, because I strive to be a kind and honorable person" What ethical theory is being employed in this argument?

Virtue based

A hacker has permission to hack systems for a company. She finds a vulnerability in the network and reports it to the company. Which of the following is she engaged in?

Ethical hacking

Which of the following is the name of the Naxi forced euthanasia program which lead to the development of technologies eventually used in the Holocaust?

Action T4

Which of the following is the name given to a telegram decoded in Bletchley Park that contained information about the Holocaust?

Hofle Telegram

"How can you doubt the Nof ghosts? Millions of people believe in them!" Logical fallacy?

Appeal to popularity - non sequitur

When Gotterbarn argued that we don't need "automobile ethics" but we do need "auto mechanic ethics" which perspective was he advocation for applied ethics?

professional

A hacker working for a national government shuts down the power grid of an enemy nation. Which of the following is she engaged in?

Information Warfare

Which of the following cybersecurity terms refers to the things we want to protect?

assets

Which of the following is an example of cybercrime?

Crime carried out exclusively using cybertech and takes place entirely in cyberspace

"Illinois CS students have a flawless history of protecting sensitive user data" statement?

Descriptive

"As a human, your life is sacred, so each cell in a person's body is also sacred" WHat kind of logical fallacy is this?

division/composition

Which branch of applied ethics focuses on what is the case rather than what ought to be the case?

Sociological, descriptive

What do we call our tendency to attribute our own behavior to our situation while attributing

actor-observer asymmetry

What do we call the philosophical stance that we cannot morally evaluate the ethical behavior of a person from another culture?

moral relativism

Which of the following is an example of cyber related crime?

cyberstalking, harrassment, drug trafficking, identity theft, fraud, phishing, distributing cp, spam, slander, counterfeiting, undustrial espionage

Which of these philosophers is associated with virute-based ethics

aristotle

Which of the following is the name of an early information technology that used punch cards to store and tabulate data?

Hollerith Machine

The practice of dataveillance potentially violates which of the following?

Contextual integrity

When we say a person is a utilitarian what ethical theory?

consequence based

What do we call our tendency to believe that, after an event occurred, the outcome was obvious all along?

Hindsight bias

"All doughnuts are chocolate-covered. If you put anything else on one, its just not a doughnut anymore" logical fallacy?

no true scotsman

What do we call our tendency to explain other people's behavior by their internal attributes while ignoring external factors?

fundamental attribution error

"Cyberbullying and trooling are unethical. While they might at first seem like a fun diversion, this dubious social utility is far outweighed by the emotional toll these actions take on their victims" ethical theory?

utilitarianism

What do we call a valid argument with at least one untrue premise

unsound

You are in a classroom by yourself. A classmate enters the room. Which kind of privacy have you lost?

Descriptive privacy

What do we call an invalid argument whose premises hav no bearing on the truth of the conclusion?

Fallacious

Which of the following is the name of a technology company directly involved in the Holocaust?

Dehomag AKA IBM

As you are typing you pin into an atm, someone behind you watches you enter the numbers. Which kind of privacy have they violated?

normative

"I shouldnt have to wear a seatbelt. I survived wwII" logical fallacy

special pleading

What do we call our tendency to search for, interpret, and recall info that confirms our beliefs

confirmation bias

What do we call an invalid argument whose premises lead us to believe the conclusion is likely true

inductive

What do we call the situation where technological development causes confusion between previously distinct ideas?

conceptual muddle

What do we call the philosophical stance that morality is a private individual choice? Based on Gert's definition of morality, this is an oxymoron

moral subjectivism

If we believe theres a ghost in our house, we'll just stay up all night worrying about it. fallacy?

non sequitur: appeal to emotion or consequences

Data that must be protected because it is owned by a private party

Proprietary

Which of the following security objectives is concerned with preventing unauthorized modification of data?

integrity

"You shouldn't wear your seatbelt. Seatbelts sometimes trap people in their cars" Logical fallacy?

texas sharpshooter

Which of the following security objectives is concerned with ensuring timely and reliable responses from services?

accessibility

Which of the following is not required of a moral system?

requirements of a moral system: public, informal, rational, impartial

Which of the following is an example of a moral agent?

Anyone who faces moral decisions

"privacy is a basic human right enshrined in law. Regardless of risk, the majority cannot strip a person of their constitutionally protected freedoms. We are therefore morally obligated to preserve privacy" ethical reasoning?

rule deontology

A hacker turns all of the traffic lights green in a major city, intending to cause widespread automobile accidents. engaged in?

cyberterrorism

"You should buy my magic coffee beans. After eating three of them, my friend lost 10 punds" logical fallacy?

post hoc ergo propter hoc

"Copyright is an agreement to preserve and protect the itellectual property rights of the creator. It is unethical to break this kind of formal and explicit social agreement to violate a person's rights" ethical theory?

contract-based

When does a sound argument contain one or more false premises?

by def, never

Which of the following is not a category of cybersecurity?

categories: data security, system security, network security

"Scientists can't detect ghosts, because spirits are invisible to nonbelievers" logical fallacy?

Special pleading or no true scotsman

What do we call the philosophical stance that there is one and only one correct answer to every ethical dilemma?

moral absolutism

What do we call a valid argument with all true premises

sound

Which of these philosohpers is associated with contract-based ethics?

Thomas Hobbes

"Doughbuts obviously taste like rubber, because they're shaped like tires" fallacy?

false analogy

Data that must be protected because it is intimated or confidential

sensitive

"The Earth is flat, because the Bible says that the Earth is flat" fallacy?

Appeal to authority, begging the question

"You're only telling me to wear my seatbelt because you want to control me" fallacy?

strawman, non sequitur

Which definition of privacy is concerned with the way personal data is gathered?

informational privacy

In which of the following practices is data not necessarily exchanged?

Data mining

If we argue that privacy is "an end in and of itself" what kind of value?

intrinsic

Which of the following technology companies conducted a controversial psychological study intended to manipulate the emotions of their users?

FB

Which of these philosophers is associated with utilitarinism?

Bentham, john stuart mill

"You don't believe I saw a shost. Are you calling me a liar?" fallacy?

complex question

"You doubt my magic coffee beans cure diseases, because you don't undertsand how they could possibly work. Well you don't understand how vacciens work either" fallacy

ad hominem

"im your boss. if you dont agree with me, ill fire you" fallacy?

appeal to threat

Which of the following is the name of the conference in which the Nazi "final solution" was officially established

wannsee conference

"A sentient artifical intelligence would be a moral agent. Because of this, it would have intrinsic moral worth. We would therefore have the same moral obligations to selfaware AI that we have to any other person" ethical reasoning

deontological

Which definition of privacy means control over the flow of ones personal info?

informational privacy

"Stripping someone else of their privacy to protect myself is using that person as a means to an end. We have a moral duty to protect are respect the privacy of others, so violating a person's privacy is unethical" ehtical reasoning?

deontology

"This argument is invalid, because you made an ad hominem attack" fallacy?

fallacy fallacy

What do we call our tendency to accept positive feedback as deserved while rejecting negative feedback as invalid?

self-serving bias