Ethics
Quiz yourself by thinking what should be in
each of the black spaces below before clicking
on it to display the answer.
Help!
|
|
||||
---|---|---|---|---|---|
show | John Locke hols that when people remove something from Nature through their own labor, they have mixed their labor with it, and therefore they have a property right in that object.
🗑
|
||||
What paradoxes arise when we attempt to extend a natural right to property into the realm of intellectual property? | show 🗑
|
||||
show | Fair use refers to those circumstances under which it is legal to reproduce a copyrighted work without permission
🗑
|
||||
When describing a software license, what does the phrase "open source" mean? | show 🗑
|
||||
show | OS:software released under that license can be used as part of programs distributed under other licenses
CL:Once a program is distributed under a certain liscense, the other modifications to the program have to be listed under that exact same liscense.
🗑
|
||||
What right is guaranteed by the Third Amendment to the U.S. Constitution? | show 🗑
|
||||
What right is guaranteed by the Fourth Amendment to the U.S. Constitution? | show 🗑
|
||||
what are the three most controversial provisions of the USA PATRIOT Act? | show 🗑
|
||||
What is the purpose of the Freedom of Information Act? | show 🗑
|
||||
show | Privacy groups objected to installation of advanced imaging technology scanners at airport security checkpoints because the scanners revealed features in great detail. TSA respondedwith new software indicates the location of threatening items gen outline
🗑
|
||||
show | Samuel Warren and Louis Brandeis
🗑
|
||||
show | Judith Jarvis Thomson
🗑
|
||||
A _______contains information about an incident or action reported to a government agency for the purpose of informing the public | show 🗑
|
||||
show | determine the location
🗑
|
||||
Manufacturers are replacing bar codes with ______tags because they give more information about the product and are easier to scan. | show 🗑
|
||||
show | cookie
🗑
|
||||
show | data mining
🗑
|
||||
When information collected for one purpose is put to another purpose, that is called a ______ of the data. | show 🗑
|
||||
thanks to the _______/ credit reports, you can get a credit card from a bank or store with which you have never done business. | show 🗑
|
||||
The Third Amendment to the U.S. Constitution has to do with a) freedom of speech and religion. b) search warrants. c) the right to bear arms. d) quartering of soldiers in private homes. e) self-incrimination | show 🗑
|
||||
Who wrote an influential paper in the 1890s urging that privacy rights be enacted into law? | show 🗑
|
||||
show | d) Judith Jarvis Thomson
🗑
|
||||
show | prudential right.
🗑
|
||||
A public record contains information about an incident or action reported to a government agency for the purpose of | show 🗑
|
||||
show | e) All of the above
🗑
|
||||
show | a wireless transmitter.
🗑
|
||||
show | a) a vehicle owner to initiate a conversation with an OnStar b) the vehicle to automatically send a message to an OnStar representative after an accident. c) an OnStar representative to disable the gas pedal of the vehicle without the driver's permission.
🗑
|
||||
Flash cookies are controversial, in part, because | show 🗑
|
||||
The process of searching through many records in one or more databases looking for patterns or relationships is called | show 🗑
|
||||
When information is put to another purpose, that is called a | show 🗑
|
||||
A policy that requires the consumer to explicitly give permission before an organization can share information with another organization is called | show 🗑
|
||||
A policy that does not requires the consumer to explicitly give permission before an organization can share information with another organization is called | show 🗑
|
||||
Which philosopher argued in The Second Treatise of Government that people have a natural right to property? | show 🗑
|
||||
Intellectual property is a unique product of the human intellect that | show 🗑
|
||||
show | all of the above
🗑
|
||||
The proper noun "Kleenex" is protected | show 🗑
|
||||
Which of the following rights is not a right of a copyright holder? | show 🗑
|
||||
show | all of the above
🗑
|
||||
show | fair use
🗑
|
||||
show | all of the above
🗑
|
||||
show | time shifting
🗑
|
||||
show | spaceshifting
🗑
|
||||
The decision by the U.S. Court of Appeals, Ninth Circuit in Kelly v. Arriba Soft Corporation established that the display of thumbnail images by a search engine | show 🗑
|
||||
Google Books is b) an effort to gain copyrights on millions of books in the public domain. c) a book reader designed to compete with the Kindle. d) an online store competing with Amazon.com. | show 🗑
|
||||
show | shipping CDs that secretly installed a rootkit on Windows computers.
🗑
|
||||
After the RIAA sued Napster, | show 🗑
|
||||
show | d) All of the above are illegal
🗑
|
||||
The Digital Millennium Copyright Act is controversial, in part, because | show 🗑
|
||||
Apple's digital rights management system FairPlay prevented | show 🗑
|
||||
Compared with other peer-to-peer networks, BitTorrent takes advantage of the fact that broadband Internet connections | show 🗑
|
||||
The court's ruling in Apple Computer v. Franklin Computer Corp. established that | show 🗑
|
||||
The Linux operating system is an example of | show 🗑
|
||||
show | JOhn Locke
🗑
|
||||
The U.S. Congress addresses the tension between society's desire for inventions to be in the public domain and the inventor's expectation of profit by giving inventors exclusive rights to their discoveries _______ | show 🗑
|
||||
Merchandise 7X, the formula for Coca-Cola syrup, is a famous example of a type of intellectual property known as a ______ | show 🗑
|
||||
show | trademark
🗑
|
||||
show | Kodak
🗑
|
||||
show | kinko's
🗑
|
||||
show | increased significantly.
🗑
|
||||
Under some circumstances it is legal to reproduce a copyrighted work without permission. These circumstances are called_____ | show 🗑
|
||||
show | legal
🗑
|
||||
In RIAA v. Diamond Multimedia Systems, Inc., the U.S. Court of Appeals ruled that space shifting is _____ | show 🗑
|
||||
show | thumbnail images of photo
🗑
|
||||
In December 2004 _______ announced a plan to scan millions of books held by several of the world's largest libraries | show 🗑
|
||||
show | secretly installed a rootkit
🗑
|
||||
FairPlay was the name of Apple's ______system | show 🗑
|
||||
A _______network allows computers running the same networking program to connect with each other and access files stored on each other's hard drives. | show 🗑
|
||||
show | allowing different pieces of a file to be downloaded simultaneously from different computers.
🗑
|
||||
in September 2003 the RIAA sued 261 individuals for _________ | show 🗑
|
||||
show | object programs
🗑
|
||||
show | clean room
🗑
|
||||
Thanks to the work of Stanford law professor Lawrence Lessig and his collaborators, you can use a ________license to retain the copyright while allowing some uses of your intellectual property under certain circumstances | show 🗑
|
||||
show | information filtering
🗑
|
||||
show | private employers
🗑
|
||||
The Children's Online Privacy Protection Act | show 🗑
|
||||
show | all of the above
🗑
|
||||
The Census Bureau has not always kept confidential the information it has collected. According to the textbook, this became apparent | show 🗑
|
||||
The FBI's National Crime Information Center database | show 🗑
|
||||
show | will give state and local police officers access to information provided by five federal law enforcement agencies.
🗑
|
||||
show | the FBI continued wiretapping people secretly.
🗑
|
||||
show | Intercept all international telegrams entering or leaving the United States
🗑
|
||||
show | Federal Communications Act
🗑
|
||||
After the terrorist attacks of September 11, 2001, which U.S. governmental agency collected telephone call records of tens of millions of Americans without a court order? | show 🗑
|
||||
show | There must be a way for a person to collect damages for financial losses caused by incorrect information about that person stored in a data record-keeping system.
🗑
|
||||
show | is designed to promote the accuracy of credit reports.
🗑
|
||||
show | gives consumers the right to request a free copy of their credit report every year.
🗑
|
||||
show | all of the above
🗑
|
||||
show | all of the above
🗑
|
||||
The Video Privacy Protection Act | show 🗑
|
||||
The Health Insurance Portability and Accountability Act | show 🗑
|
||||
The Children's Online Privacy Protection Act requires online services to obtain parental consent before collecting any information from children ___ years old and younger. | show 🗑
|
||||
The FBI maintains a collection of databases supporting the activities of federal, state, and local law-enforcement agencies in the United States, the U.S. Virgin Islands, These databases are given the name National Crime Information Center (____ | show 🗑
|
||||
show | government
🗑
|
||||
show | inadmissible in court
🗑
|
||||
show | Operation Shamrock
🗑
|
||||
show | USA PATRIOT ACT
🗑
|
||||
show | bankruptcies and criminal convictions
🗑
|
||||
The Fair and Accurate Credit Transactions Act requires the three major credit bureaus to provide customers a free copy of their credit report every ___ months | show 🗑
|
||||
show | 18
🗑
|
||||
The ______ prohibits video service providers from disclosing records without the written consent of the customer. | show 🗑
|
||||
The Health Insurance Portability and Accountability Act limits how doctors, hospitals, and insurance companies can use _____ collected from patients. | show 🗑
|
||||
show | The Freedom of Information Act
🗑
|
||||
show | Do Not Call Registry
🗑
|
||||
show | are played at the same volume as the programs they are interrupting.
🗑
|
||||
A mature profession insists that its members complete an initial professional education. The process by which the profession assures that this formal course work meets its standards is called ______ | show 🗑
|
||||
show | certification
🗑
|
||||
show | legal
🗑
|
||||
The Software Engineering Code of Ethics and Professional Practice was developed by the two largest organizations supporting the computing field: the____ Machinery (ACM). | show 🗑
|
||||
What is the stance of the ACM regarding the licensing of software engineers? | show 🗑
|
||||
In The Nicomachean Ethics, Aristotle writes that happiness results from _____ | show 🗑
|
||||
show | you have acquired that virtue.
🗑
|
||||
show | whistleblower.
🗑
|
||||
Responsibility assigned because of a person's assigned duties is called ___responsibility. | show 🗑
|
||||
show | any of its members
🗑
|
||||
show | software engineer
🗑
|
||||
Which of the following is not one of the characteristics of a mature profession? a) code of ethics b) licensing c) mandatory drug testing d) mandatory professional development e) professional education | show 🗑
|
||||
show | b) licensing.
🗑
|
||||
show | d) does not work directly with individual clients.
🗑
|
||||
The Software Engineering Code of Ethics and Professional Practice was developed by | show 🗑
|
||||
The Principles and Clauses in the Software Engineering Code of Ethics and Professional Practice | show 🗑
|
||||
show | d) repetition of the appropriate acts.
🗑
|
||||
show | a) have developed the virtue.
🗑
|
||||
show | b) the action is consistent with their character.
🗑
|
||||
show | a) make an unauthorized discloser about a harmful situation or fraud.
🗑
|
||||
show | c) the weather in Florida was unusually cold.
🗑
|
||||
show | has more moral accountability than any of its members.
🗑
|
||||
A program with a benign capability that conceals another, sinister purpose is called a | show 🗑
|
||||
A ________ is a piece of self-replicating code embedded within another program called the host. | show 🗑
|
||||
show | bot.
🗑
|
||||
Anonymous is | show 🗑
|
||||
show | worm
🗑
|
||||
show | When a person or organization pervents another person or organization from expressing their opinion.
🗑
|
||||
show | Gov.monopolization=gov. owns all the media outlets.Pre-publication review=gov. must approve info before it is disseminated. Licencing and registration=news org must get liscense from the gov. before operating. It is used for media with limited bandwidth,
🗑
|
||||
show | Broadcasting is constantly on and you can't choose what gets broadcasted so the TV could be on and children could be watching. So it has to be more censored. Newspapers readers have a choice to read or not.
🗑
|
||||
What is self-censorship? (provide ex) | show 🗑
|
||||
show | Congress (meaning the government) shall make no law (policy)
🗑
|
||||
State Mill's Principle of Harm and explain what question the principle is designed to help answer? | show 🗑
|
||||
show | Protects Political speech; the balance is the freedom of speech and security.
🗑
|
||||
show | It required blockers on all computers in public places (libraries) that want government funding. (you can get the filter removed,but you have to be an adult)
🗑
|
||||
what is the difference between privacy and anonymity? | show 🗑
|
||||
Define Privacy and include its 3 main components | show 🗑
|
||||
how is violating someone's privacy "an affront to that person's dignity" and autonomy? | show 🗑
|
||||
show | any unique product of the human intellect that has commercal value
🗑
|
||||
Summarize Hegel's theory of why indivduals have a right to own property | show 🗑
|
||||
What is the maximum penalty for violating the Computer Fraud and Abuse Act? | show 🗑
|
||||
show | a computer to computer attack that undermine the confidentiality, integrity or availability of a computer or information resident on it.
🗑
|
||||
what did the Stuxnet worm do? | show 🗑
|
||||
show | a criminal act that requires the use of a computer, which is the target or tool of the crime.
🗑
|
||||
Is cyberstalking considered cybercrime? | show 🗑
|
||||
show | Software Piracy=duplicating, w/o authorization, proprietary software or distributing 2.Computer Sabotage=interfering with the function of computer resources through malware. 3.ElectronicBreak-ins= intentionally entering forbidden property w/o permission.
🗑
|
||||
show | is a vocation that:
requires a high level of education
has significant societal impact
🗑
|
||||
show | Similar: It has a significant social impact (ex: creating, fixing and maintaining technology) It also has a code of ethics (altough not required to follow), has pro journals Diff: Does not require higher ed, does not need liscense or certification
🗑
|
||||
Why did the ACM pass a resolution opposed to the licensing of software engineers? | show 🗑
|
||||
What is whistle-blowing? | show 🗑
|
||||
What are the Harms and benefits of whistle-blowing? | show 🗑
|
||||
show | The purpose to to provide guidelines to these upcoming professionals for moral and ethical questions. It also is intended to help with the accountability of these professionals.
🗑
|
||||
show | 1.who is affected by work 2.make sure you treat others with respect 3.consider if public is well informed 4.analyze how least empowered will be affected 5.consider whether acts would be worthy of ideal professional.
🗑
|
||||
List 9 "alternative" fundamental principles that form the basis of the Software Engineering Code of Ethics | show 🗑
|
Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
lax5