Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

ChapterFour

Ethical and Social Issues in Information Systems

QuestionAnswer
Accountability is a feature of systems and social institutions
Carpal tunnel syndrome The most common kind of computer-related Repetitive stress injury
Computer abuse is the commission of acts involving a computer that may not be illegal but are considered unethical
Computer crime is the commission of illegal acts by using a computer or against a computer system.
Computer vision syndrome refers to any eyestrain condition related to display screen use in desktop computers, laptops, e-readers,smartphones, and handheld video games.
Cookies are small text files deposited on a computer hard drive when a user visits websites
Copyright is a statutory grant that protect creator of intellectual property from having their work copied by other for any purpose during the life of the author plus an additional 70 years after authors death.
Digital divide could lead to a society of information haves, computer literate and skilled versus a large group of information have-nots, computer illiterate and unskilled.
Digital Millennium Copyright act of 1998 also provides some copyright protection.
Due Process is a related feature of law governed societies and is process in which laws are known and understood, and ability exists to appeal to higher authorities to ensure that the laws are applied correctly
Ethical no-free-lunch rule assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise
Ethics refers to the principles of right and wrong that individuals, acting as free moral agents, use to make choices to guide their behaviors.
Fair Information Practices Is a set of principles governing the collection and use of information about individuals
Golden Rule do unto others as you would have them unto you
Immanuel Kant categorical imperative if an action is not right for everyone to take, it is not right for anyone.
Information rights Information rights management (IRM) is a subset of digital rights management (DRM), technologies that protect sensitive information from unauthorized access. It is sometimes referred to as E-DRM or Enterprise Digital Rights Management
informed consent Customers must provide their informed consent before any company can legally use data about them
intellectual property is considered to be tangible and intangible products of the mind created by individuals or corporations
Liability extends the concepts of responsibility further to the area of laws
non-obvious relationship awareness a data analysis technology that has given both the government and the private sector even more powerful profiling capabilities
Opt-in model of informed consent in which a business is prohibited from collecting any personal information unless the consumer specifically takes action to approve information collection and use.
Opt-out model of informed consent permits the collection of personal information until the consumer specifically requests the date not to be collected
Patent grants the owner an exclusive monopoly on the ideas behind an invention for 20 years
Privacy is the claim of individuals to be left alone, free from surveillance or interference from other individuals or organizations, including the state
Profiling the use of computers to combine data from multiple sources and create digital dossiers of detailed information on individuals is called profiling.
Repetitive stress injury occurs when muscle groups are forced through repetitive action often with high impact loads or tens of thousand of repetitions under low impact loads.
Responsibility is a key element of ethical action
Risk aversion principle take the action that produces the least harm or the least potential cost
Safe Harbor is a private, self-regulating policy and enforcement mechanism that meets the objectives of government and regulators and legislation but does not involve government regulation or enforcement.
Spam was junk email an organization or individual sent to a mas audience of internet users who have expressed no interest in the product or service being marketed.
Spyware can secretly install itself on an internet user computer by pig-gybacking on larger applications.
Trade Secret any intellectual work product can be classified as a trade secret, provided it is not based on information in the public domain.
Utilitarian Principle take the action that achieves the higher or greater value
Web beacons also called web bugs, are tiny software programs that keep a record of users online clickstreams.
Trademark are the marks, symbols and images used to distinguish products in the marketplace
Slippery Slope rule if ab action cannot be taken repeatedly, it is not right to take at all.
Five moral dimensions of information age? 1. Information rights and obligations. 2. Property rights and obligations. 3. Accountability and control. 4. System Quality. 5. Quality of life.
What specific principles for conduct can be used to guide ethical decisions? 1. Responsibility, Accountability, and liability. 2. Ethical analysis. 3. Candidate ethical principles. 4. Professional codes of conducts. 5. Some real world ethical dilemmas
Ethical Analysis? 1. Identify and describe the facts 2. Define the conflict 3. Identify the stakeholders 4. Identify the options that you can reasonably take 5. Identify the potential consequences of your options
Candidate Ethical Principles? 1. Golden Rule 2. Immanuel Kant's categorical imperative 3. Slippery Slope 4. Utilitarian principle 5. Risk Aversion principle 6. Ethical "no free lunch" rule
Property Rights: Intellectual property? 1. Trade secrets 2. Copyright 3. Patents
Non-Obvious Relationship Awareness (NORA) 1. Watch Lists 2. Incident and Arrest Systems 3. Customer Transaction Systems 4. Telephone Records 5. Human Resource Systems
Created by: TroyIS3310
Popular Computers sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards