Busy. Please wait.
or

show password
Forgot Password?

Don't have an account?  Sign up 
or

Username is available taken
show password

why


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
We do not share your email address with others. It is only used to allow you to reset your password. For details read our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Remove Ads
Don't know
Know
remaining cards
Save
0:01
To flip the current card, click it or press the Spacebar key.  To move the current card to one of the three colored boxes, click on the box.  You may also press the UP ARROW key to move the card to the "Know" box, the DOWN ARROW key to move the card to the "Don't know" box, or the RIGHT ARROW key to move the card to the Remaining box.  You may also click on the card displayed in any of the three boxes to bring that card back to the center.

Pass complete!

"Know" box contains:
Time elapsed:
Retries:
restart all cards




share
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

ChapterFour

Ethical and Social Issues in Information Systems

QuestionAnswer
Accountability is a feature of systems and social institutions
Carpal tunnel syndrome The most common kind of computer-related Repetitive stress injury
Computer abuse is the commission of acts involving a computer that may not be illegal but are considered unethical
Computer crime is the commission of illegal acts by using a computer or against a computer system.
Computer vision syndrome refers to any eyestrain condition related to display screen use in desktop computers, laptops, e-readers,smartphones, and handheld video games.
Cookies are small text files deposited on a computer hard drive when a user visits websites
Copyright is a statutory grant that protect creator of intellectual property from having their work copied by other for any purpose during the life of the author plus an additional 70 years after authors death.
Digital divide could lead to a society of information haves, computer literate and skilled versus a large group of information have-nots, computer illiterate and unskilled.
Digital Millennium Copyright act of 1998 also provides some copyright protection.
Due Process is a related feature of law governed societies and is process in which laws are known and understood, and ability exists to appeal to higher authorities to ensure that the laws are applied correctly
Ethical no-free-lunch rule assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise
Ethics refers to the principles of right and wrong that individuals, acting as free moral agents, use to make choices to guide their behaviors.
Fair Information Practices Is a set of principles governing the collection and use of information about individuals
Golden Rule do unto others as you would have them unto you
Immanuel Kant categorical imperative if an action is not right for everyone to take, it is not right for anyone.
Information rights Information rights management (IRM) is a subset of digital rights management (DRM), technologies that protect sensitive information from unauthorized access. It is sometimes referred to as E-DRM or Enterprise Digital Rights Management
informed consent Customers must provide their informed consent before any company can legally use data about them
intellectual property is considered to be tangible and intangible products of the mind created by individuals or corporations
Liability extends the concepts of responsibility further to the area of laws
non-obvious relationship awareness a data analysis technology that has given both the government and the private sector even more powerful profiling capabilities
Opt-in model of informed consent in which a business is prohibited from collecting any personal information unless the consumer specifically takes action to approve information collection and use.
Opt-out model of informed consent permits the collection of personal information until the consumer specifically requests the date not to be collected
Patent grants the owner an exclusive monopoly on the ideas behind an invention for 20 years
Privacy is the claim of individuals to be left alone, free from surveillance or interference from other individuals or organizations, including the state
Profiling the use of computers to combine data from multiple sources and create digital dossiers of detailed information on individuals is called profiling.
Repetitive stress injury occurs when muscle groups are forced through repetitive action often with high impact loads or tens of thousand of repetitions under low impact loads.
Responsibility is a key element of ethical action
Risk aversion principle take the action that produces the least harm or the least potential cost
Safe Harbor is a private, self-regulating policy and enforcement mechanism that meets the objectives of government and regulators and legislation but does not involve government regulation or enforcement.
Spam was junk email an organization or individual sent to a mas audience of internet users who have expressed no interest in the product or service being marketed.
Spyware can secretly install itself on an internet user computer by pig-gybacking on larger applications.
Trade Secret any intellectual work product can be classified as a trade secret, provided it is not based on information in the public domain.
Utilitarian Principle take the action that achieves the higher or greater value
Web beacons also called web bugs, are tiny software programs that keep a record of users online clickstreams.
Trademark are the marks, symbols and images used to distinguish products in the marketplace
Slippery Slope rule if ab action cannot be taken repeatedly, it is not right to take at all.
Five moral dimensions of information age? 1. Information rights and obligations. 2. Property rights and obligations. 3. Accountability and control. 4. System Quality. 5. Quality of life.
What specific principles for conduct can be used to guide ethical decisions? 1. Responsibility, Accountability, and liability. 2. Ethical analysis. 3. Candidate ethical principles. 4. Professional codes of conducts. 5. Some real world ethical dilemmas
Ethical Analysis? 1. Identify and describe the facts 2. Define the conflict 3. Identify the stakeholders 4. Identify the options that you can reasonably take 5. Identify the potential consequences of your options
Candidate Ethical Principles? 1. Golden Rule 2. Immanuel Kant's categorical imperative 3. Slippery Slope 4. Utilitarian principle 5. Risk Aversion principle 6. Ethical "no free lunch" rule
Property Rights: Intellectual property? 1. Trade secrets 2. Copyright 3. Patents
Non-Obvious Relationship Awareness (NORA) 1. Watch Lists 2. Incident and Arrest Systems 3. Customer Transaction Systems 4. Telephone Records 5. Human Resource Systems
Created by: TroyIS3310