Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Ethical and Social Issues in Information Systems

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
Accountability   is a feature of systems and social institutions  
🗑
Carpal tunnel syndrome   The most common kind of computer-related Repetitive stress injury  
🗑
Computer abuse   is the commission of acts involving a computer that may not be illegal but are considered unethical  
🗑
Computer crime   is the commission of illegal acts by using a computer or against a computer system.  
🗑
Computer vision syndrome   refers to any eyestrain condition related to display screen use in desktop computers, laptops, e-readers,smartphones, and handheld video games.  
🗑
Cookies   are small text files deposited on a computer hard drive when a user visits websites  
🗑
Copyright   is a statutory grant that protect creator of intellectual property from having their work copied by other for any purpose during the life of the author plus an additional 70 years after authors death.  
🗑
Digital divide   could lead to a society of information haves, computer literate and skilled versus a large group of information have-nots, computer illiterate and unskilled.  
🗑
Digital Millennium Copyright act   of 1998 also provides some copyright protection.  
🗑
Due Process   is a related feature of law governed societies and is process in which laws are known and understood, and ability exists to appeal to higher authorities to ensure that the laws are applied correctly  
🗑
Ethical no-free-lunch rule   assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise  
🗑
Ethics   refers to the principles of right and wrong that individuals, acting as free moral agents, use to make choices to guide their behaviors.  
🗑
Fair Information Practices   Is a set of principles governing the collection and use of information about individuals  
🗑
Golden Rule   do unto others as you would have them unto you  
🗑
Immanuel Kant categorical imperative   if an action is not right for everyone to take, it is not right for anyone.  
🗑
Information rights   Information rights management (IRM) is a subset of digital rights management (DRM), technologies that protect sensitive information from unauthorized access. It is sometimes referred to as E-DRM or Enterprise Digital Rights Management  
🗑
informed consent   Customers must provide their informed consent before any company can legally use data about them  
🗑
intellectual property   is considered to be tangible and intangible products of the mind created by individuals or corporations  
🗑
Liability   extends the concepts of responsibility further to the area of laws  
🗑
non-obvious relationship awareness   a data analysis technology that has given both the government and the private sector even more powerful profiling capabilities  
🗑
Opt-in   model of informed consent in which a business is prohibited from collecting any personal information unless the consumer specifically takes action to approve information collection and use.  
🗑
Opt-out   model of informed consent permits the collection of personal information until the consumer specifically requests the date not to be collected  
🗑
Patent   grants the owner an exclusive monopoly on the ideas behind an invention for 20 years  
🗑
Privacy   is the claim of individuals to be left alone, free from surveillance or interference from other individuals or organizations, including the state  
🗑
Profiling   the use of computers to combine data from multiple sources and create digital dossiers of detailed information on individuals is called profiling.  
🗑
Repetitive stress injury   occurs when muscle groups are forced through repetitive action often with high impact loads or tens of thousand of repetitions under low impact loads.  
🗑
Responsibility   is a key element of ethical action  
🗑
Risk aversion principle   take the action that produces the least harm or the least potential cost  
🗑
Safe Harbor   is a private, self-regulating policy and enforcement mechanism that meets the objectives of government and regulators and legislation but does not involve government regulation or enforcement.  
🗑
Spam   was junk email an organization or individual sent to a mas audience of internet users who have expressed no interest in the product or service being marketed.  
🗑
Spyware   can secretly install itself on an internet user computer by pig-gybacking on larger applications.  
🗑
Trade Secret   any intellectual work product can be classified as a trade secret, provided it is not based on information in the public domain.  
🗑
Utilitarian Principle   take the action that achieves the higher or greater value  
🗑
Web beacons   also called web bugs, are tiny software programs that keep a record of users online clickstreams.  
🗑
Trademark   are the marks, symbols and images used to distinguish products in the marketplace  
🗑
Slippery Slope rule   if ab action cannot be taken repeatedly, it is not right to take at all.  
🗑
Five moral dimensions of information age?   1. Information rights and obligations. 2. Property rights and obligations. 3. Accountability and control. 4. System Quality. 5. Quality of life.  
🗑
What specific principles for conduct can be used to guide ethical decisions?   1. Responsibility, Accountability, and liability. 2. Ethical analysis. 3. Candidate ethical principles. 4. Professional codes of conducts. 5. Some real world ethical dilemmas  
🗑
Ethical Analysis?   1. Identify and describe the facts 2. Define the conflict 3. Identify the stakeholders 4. Identify the options that you can reasonably take 5. Identify the potential consequences of your options  
🗑
Candidate Ethical Principles?   1. Golden Rule 2. Immanuel Kant's categorical imperative 3. Slippery Slope 4. Utilitarian principle 5. Risk Aversion principle 6. Ethical "no free lunch" rule  
🗑
Property Rights: Intellectual property?   1. Trade secrets 2. Copyright 3. Patents  
🗑
Non-Obvious Relationship Awareness (NORA)   1. Watch Lists 2. Incident and Arrest Systems 3. Customer Transaction Systems 4. Telephone Records 5. Human Resource Systems  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: TroyIS3310
Popular Computers sets