Save
Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

FINALS_SOCIALPROF

QuestionAnswer
are there to promote good research practice and to act as a safeguard to protect researchers as well as their participants. Ethics
a term that refers to the norms, standards, and legal rules regarding appropriate behaviour in the conduct and publication of research. research ethics
It provides guidelines for the responsible conduct of research. Ethics in Research​
Researchers ought to honestly report data and results of the study, including the methods and procedures employed in data gathering as well as publication status.​ HONESTY
Researchers should uphold objectivity and scientific rigor at all times.​ OBJECTIVITY
Researchers should always uphold the principle of confidentiality by not disclosing the personal information of the participants.​ CONFIDENTIALITY​
Researchers are supposed to be knowledgeable and experts in their own discipline or field of specialization.​ COMPETENCE
Researchers ought to keep their promises and honour agreements.​ INTEGRITY
Researchers always has legal dimension.​ LEGALITY
Knowledge is supposed to be free.​ MATURITY AND OPENNESS​
Researchers ought to honor copyrights, patents and other forms of intellectual property.​ RESPECT TO INTELLECTUAL PROPERTY
Researchers need to publish in order to advance knowledge and scholarships and not just to advance one’s own career.​ RESPONSIBLE PUBLICATION​
Researchers ought to avoid all forms of discrimination against colleagues and students on the basis sex, race, ethnicity and other factors.​ NON-DISCRIMINATION​
Researchers should respect human dignity, privacy and autonomy at all times.​ HUMAN SUBJECT PROTECTION​
Researchers should respect ANIMAL RIGHTS at all times.​ ANIMAL CARE​
Researchers should conduct research NOT only for the advancement of their career but for the good of the society as a whole.​ SOCIAL RESPONSIBILITY​
It is researching the internet and other digital data.​ Internet Research​
It is conducting the interview using the technology.​ Internet Mediated Research​
Good Internet Research Practice​ Ethical Process​ Informed Consent​ Harm​ Public Vs Private Platforms​
is a qualitative method for collecting data often used in the social and behavioral sciences.​ Ethnography
Is a research method used to study online communities and cultures.​ Netnography
It has been a requirement set by ethics committee to sign some form of informed consent sheet.​ Informed Consent​
Participants should be informed of the nature of the perceived risk to their participation in the research study.​ Harm
Searching for data on platforms that need membership approval​ Public VS Private Data Sites​
can automate data mining and analysis, streamline manual research processes, and improve the accuracy and speed of research.​ AI-powered tools
Is a member-based, academic association dedicated to the promotion of critical and scholarly Internet research independent from traditional disciplines and existing across academic borders.​ Association of Internet Researchers
allow a profession to determine who will be allowed to practice the profession.​ Certification and licensing
IEEE Computer Society (IEEE-CS) “To be the leading provider of technical information, community services, and personalized services to the world’s​ computing professionals.”​
ACM Association for Computing Machinery
who sets up a joint during 1993in steering committee to explore the establishment of software engineering as a profession.​ EEE-CS and ACM
someone engaged in the development or maintenance of software, or someone who teaches in this area.​ software engineer
Software Engineers Code of Ethics​ ABILITY TO HARM PUBLIC​
PRINCIPLE 1 PUBLIC - software engineers shall approve software only if they have a well-founded belief that it is safe, meets specifications, passes appropriate tests, and does not diminish quality of life, diminish privacy, or harm the environment.​
PRINCIPLE 2 CLIENT AND EMPLOYER​ - Software engineers shall not knowingly use software that is obtained or retained either illegally or unethically.​
PRINCIPLE 3 PRODUCT​ - Software engineers shall ensure proper and achievable goals and objectives for any project on which they work or propose.​
PRINCIPLE 4 JUDGMENT​ - Software engineers shall maintain integrity and​independence in their professional judgment.​
PRINCIPLE 5 MANAGEMENT​ - Subscribe to and promote an ethical approach to the management
PRINCIPLE 6 PROFESSION​ - advance the integrity and reputation of the profession consistent with the public interest.​
PRINCIPLE 7 COLLEAGUES​ - shall be fair to and​ supportive of their colleagues.​
PRINCIPLE 8 SELF​ - shall continually endeavor to improve their ability to create safe, reliable, and useful quality software
Is a person working within an organization who reports that​ organization’s misconduct.​ whistle-blower
the whistle blower reports misconduct to another person within the organization.​ Internal Whistle Blowing
the whistle blower reports misconduct to a person outside the organization, such as law enforcement or the media.​ External Whistle Blowing
is a collection of hardware, software, data, and people that work together to collect, process, store, and disseminate information.​ Information System
TPS Transaction Processing Systems (TPS)
MIS Management Information Systems (MIS)​
DSS Decision Support Systems (DSS)
ESS Executive Support Systems (ESS)​
ERP Enterprise Resource Planning (ERP) Systems​
CRM Customer Relationship Management (CRM) Systems
SCM Supply Chain Management (SCM) Systems​
is composed of the people, property and information within an organization (anything of value).​ Asset
is anything can exploit a vulnerability, intentionally or accidentally, obtain and damage, destroy an asset.​ Threat
Security Threats:​ Hackers​ Viruses and Malwares​ Cyber Attacks​ Natural Disaster​
is a weakness of an asset that can be exploited by a threat.​ Vulnerability
is the potential for loss, damage or destruction of an asset when a threat exploits a vulnerability. Risk
is the practice of protecting information by mitigating information risks.​ Information security
The CIA Triad CONFIDENTIALITY INTEGRITY AVAILABILITY
Is the process of identifying, assessing, monitoring and limiting risk into an acceptable level.​ Risk Management
where risks are identified and assessed. It is the first step in risk management process.​ Risk Assessment
RISK RESPONSE CATEGORIES​ AVOIDANCE ACCEPTANCE MITIGATION TRANSFERENCE RESIDUAL RISK
Access control protects against a wide variety of threats
ACCESS CONTROL CATEGORIES AND TYPES​ Preventive Controls​ Detective Controls​ Corrective Controls Recovery Controls​​ Deterrent Controls​ Compensating Controls​ Physical and Logical Controls​
Background check before approving tenant ensure a qualified tenant.​ Preventive Controls​
Sends an alert during or after an attack.​ Detective Controls​
Correct a damaged system or process​ Corrective Controls​
Needed to restore functionality Recovery Controls​
Deter users from performing actions.​ Deterrent Controls​
Add additional security by compensating other control’s weaknesses.​ Compensating Controls​
includes implementing different access control methods with technology you can touch​ Physical and Logical Controls​
are the foundation of a defense-in-depth network security strategy.​ Firewall
is a perimeter network that protects and adds an extra layer of security to an organization’s internal local-area network from untrusted traffic.​ DMZ – or demilitarized zone
is the practice of developing and using coded algorithms to protect and obscure transmitted information Cryptography
Common Uses of Cryptography​ Passwords​ Cryptocurrency​ Secure Web Browsing​ E-signature​ Authentication​ Secure communication​
ISO 27001 is the international standard that provides specification for an Information Security Management System or ISMS.​
ISO 27001 standard provides companies of any size and from all sectors of activity with guidance for establishing, implementing, maintaining and continually improving ISMS
is a way of protecting an​ organization's sensitive data from threats and vulnerabilities.​ Information security management
esponsible for performing tasks such as risk assessment, risk treatment, security controls, security monitoring ISMS team
exists to ensure compliance of the country with international standards set for data NPC - or the National Privacy Commission
NLP Natural Language Processing)
Created by: user-1782765
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards