Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
60 Cards in this Set
- Front
- Back
Ethics
|
the study of what it means to do the right thing
|
|
Deontological Theory
|
actions are ABSOLUTELY good or ABSOLUTELY bad with no concern for consquences
|
|
Kant's theory of universality
|
Follow rules that we can universally apply to everyone by using logic/rationality not emotion
|
|
Consequentialist Theories
|
Acts are good or bad because of their
consequences |
|
Utilitarianism
|
A consequentalist theory that says an act is right if it increases aggregate (total)
utility (happiness) for everyone |
|
Act Utilitarianism
|
Judge each action by its net impact without respecting individual rights
|
|
Rule utilitarianism
|
Apply utility principles to general ethical rules, not
individual actions |
|
Natural Rights
|
Ethical behaviors respect fundamental/natural rights
including rights to life, liberty, and property where the persons are not coerced into actions but make them of their own free will Emphasize the process by which people interact, not the result of the interaction |
|
Negative rights
|
Liberties - the right to act without interference
Right to life, liberty, and the pursue of happiness |
|
Positive rights
|
Claim rights- demand that some action occur such as obligations of some people to provide something for other people (food, shelter etc.)
You have right to live but are obligated to pay for food and medical care |
|
Golden rules
|
Treat others as you would want them to treat you. See how your actions impact other people from their perspective
|
|
Locke's views
|
delegate moral rules to government and people will submit to the government to live in a civil society
|
|
Rawl's Theory of Justice
|
-Reasonable people will abide by the rules of society
-Emphasizes basic liberties (negative rights), requires positive rights -Action is not ethical if it leave least advantaged people worse off |
|
Rawl's Veil of Ignorance
|
chooses policies that would be fair for all without regard for sex, political affiliation, sexual orientation etc but not being ignorant of the general types of possible situations in
which humans can find themselves in |
|
Right
|
Ethically Obligatory
|
|
Wrong
|
Ethically Prohibited
|
|
Okay
|
Ethically Acceptable
|
|
Reindentification
|
identifying the individual from a set of anonymous data
|
|
Personal information
|
includes any info relating to a person including their user name, id number, phone numbers and images of people online
|
|
Informed Consent
|
user is aware of what information is collected and how it is stored.
|
|
Cookies
|
files that website stores on a vistor's computer
|
|
Invisible information gathering
|
user is aware of what information is collected and how it is stored
|
|
Secondary use
|
use of personal info for something other than intended purpose
|
|
Data mining
|
searching and analyzing masses of data to find patterns and develop new information or knowledge
|
|
computerized matching
|
combining and comparing information from different databases using a single identifier such as IP address and social security
|
|
Profiling
|
analyzing data to determine characteristics of people most likely to engage in certain behavior
|
|
Examples of secondary usage of information
|
data mining, computer matching and profiling
|
|
Opt out policy
|
Default – personal information may be used by organization
In opt-out, most people are opted in |
|
Opt in policy
|
collector of the personal information may NOT use it for secondary uses unless person explicitly checks box/ signs agreement permitting the use
|
|
Dataveillance
|
personal-data systems to investigate or monitor people (data surveilance)
|
|
Olmstead vs United States (1928)
|
allowed wiretaps on telephone lines w/o court order because 4th amendment applies only to physical intrusion not material things
|
|
Katz vs United States (1967)
|
4th amendment applies to conversations and protects people.
To intrude in a place where reasonable person has a reasonable expectation of privacy requires a court order |
|
Kylo v United States (2001)
|
Supreme Court ruled that police could not use
thermal‐imaging devices to search a home from the outside or government level technology against citizens without warrant |
|
RFID tags
|
small devices that contain a computer chip and an antenna and store ID data for constant surveillance
|
|
Privacy Act of 1974
|
Never disclose info about person unless for
-census info -routine uses within a U.S. government agency -archival and law enforcement purposes -congressional investigations and other admin purposes |
|
Government Accountability Office
|
Congress’ agency to monitor government's
privacy policies, and enforces the Act and have stated inadequate protection of data. |
|
Freedom of Information Act
|
burden of proof falls on the government body asked for information
|
|
Cryptography
|
art of hiding data
|
|
confidentiality
|
only B can see the content of a received message
A sender encrypts with B’s public key and sends it B decrypts with B’s private key |
|
authentication
|
entity A signs a document
A encrypts with A’s private key and sends it Receiver decrypts with A’s public key to verify |
|
Privacy audits
|
Check for info. leaks, review privacy policies,
evaluate compliance to policies |
|
Free Market View of privacy
|
Freedom of consumers to make voluntary
agreements -believe strongly in contracts |
|
Consumer Protection View
|
Consumers need protection from their own lack of knowledge, judgment, or interest through privacy regulations
|
|
Communications Assistance for Law Enforcement Act of 1994 (CALEA)
|
-Government must be able to intercept phone calls, cell phones and Internet with court order
|
|
The Nothing to Hide Argument
|
If you don't do bad things then you shouldn't be worried about getting caught and punished.
1)info only shared with few govt. officials 2)doesn't threaten privacy of law abiding citizens 3)security outweighs privacy |
|
Posner's 4 types of harmful acts
|
1)Intrusion into plaintiff's private affairs
2)public disclosure of private affairs 3)False negative publicity of plaintiff in public eye 4)Appropriation, for the defendant’s advantage, of the plaintiff ’s name or likeness |
|
Solove's view on privacy
|
Family resemblances - Concepts are related to one another rather than having one thing in common
|
|
Taxonomy of Data Privacy (CPDI)
|
Collection
Processing Dissemination Invasion |
|
Chilling behavior
|
interrupts free speech
|
|
Who has the strongest protection under the first amendment?
|
print media
|
|
Obscenity (1973 Supreme Court Definition)
|
sexual act against state law, doesnt adhere to community standards or lacks literary, artistic, social, political or scientific value
|
|
Communication Decency Act (CDA)
|
first internet censorship bill
Tried to outlaw indecent communications for people under 18 but was found unconstitutional because too vague and broad |
|
Child Online Protection Act (COPA)
|
-2nd internet censorship bill
-illegal to make harmful material available to minors based on community standards -Unconstitutional because restricts content for adults (chilling effect) |
|
Children's Internet Protection Act (CIPA)
|
Requires schools and libraries that participate
in certain federal programs to install filtering software. Can disable the filter for adults. Upheld because condition for receiving federal funds |
|
WikiLeaks
|
released U.S. military documents related to the
wars in Iraq and Afghanistan, including videos of shooting incidents; confidential U.S. diplomatic cables also released harmful info about United States critical sites and 250,000 diplomatic cables |
|
Net Neutrality
|
Argue for equal treatment of all customers
|
|
De‐regulation
|
Flexibility and market incentives will benefit
customers |
|
neutral broadband network
|
free of restrictions on content, sites, or platforms, on
the kinds of equipment that may be attached, and on the modes of communication allowed |
|
Pros and Cons of net neutrality
|
|
|
FCC Net Neutrality Order (2010)
|
1) Transparency regarding Broadband services
2) No blocking of lawful content 3)No unreasonable discrimination |