This site is 100% ad supported. Please add an exception to adblock for this site.

MIS chap 5

Terms

undefined, object
copy deck
Principles of right and wrong that can be used gy individuals actiong as fre moral agents to make choices to guide their beavior
ethics
The rights that individuals and organizations have with respect to information that pertains to themselves.
information rights
The use of omputers to combine data from multiple sources and create electronic dossiers of detailed information on individuals
profiling
Technology that can find obsure hidden connections between people or other entities by analyzing information from many different sources to correlate relationships
nonobvious relationship awareness (NORA)
Accepting the potential costs, duties, and obligations for the decisions one makes.
responsibility
The mechanisms for assessing responsibility for decisions made and actions taken.
accountability
The existance of laws that permit individuals to recober the damages done to them by other actoors, systems, or organizations.
liability
Aprocess in which laws are well-known and understood, and there is an ability to appeal to higher authorities to ensure that laws are applied correctly.
due process
A principle that states that if an action is not right for everone to take it is not right for anyone.
Immanuel Kant's Categorical Imperative
A principle that states that if an action cannot be taken repeatedly, then it is not right to be taken at any time.
Descartes' rule of change
Principle that one should take the action that produces the least harm or incurs the least cost.
Risk Aversion Principle
Assumption that all tangible and intangible objuects are owned by someone else, unless there is a specific declaration otherwise, and that the creator wants compensation for this work.
ethical "no free lunch" rule
The claim of individuals to be left alone, free form surveillance or interference from other individuals, organizations, or the state.
privacy
A set of principles originally set forth in 1973 that governs the collection and use of information about individuals and forms the basis of most U.S. and European privacy laws.
Fair Information Practices (FIP)
Consent given with knowledge of all the facts needed to make a rational decision.
informed consent
Private self-regulating policy and enforcement mechanism that meets the objectives of government regulatiors but does not involve government regulation or enforcement.
safe harbor
Tiny file deposited on a computer hard drive when an individual visits certain Web sites. used to identify the visitor and track visits to the Web site.
cookie
Tiny graphic files embedded in e-mail messages and Web pages that are designed to monitor online Internet user behavior.
Web bugs
Technology that aids in gathering information about a person or organization without their knowledge.
spyware
Model of informed consent permitting the collection of personal information until the consumer specifically requests that the data not be collected.
opt-out
Model of informed consent prohibiting an organization form collection any personal information unless the individual specifically takes action to approve information collection and use.
opt-in
Industry standard designed to give users more control over personal information gathered on Web sites they visit. Stands for Platform for Privacy Preferences.
P3P
Intangible property created by individuals or corporations that is subject to protections under trade secret, copyright and patent law.
intellectual property
Any intellectual work or product used for a business purpose that can be classified as belonging to that business, provided it is not based on information in the public domain.
trade secret
A statutory grant that protects creatators of intellectual property against copying by others for any purpose for a minimim of 70 years.
copyright
A legal document that grants the owner an exclusive monopoly on the ideas behind an invention for 20 years; designed to ensure that inventors of new machines or methods are rewarded for their labor while makeing widespread use of their inventions.
patent
Displaying the content of another Web site inside one's own Web site inside within a frame or a window.
framing
adjusts copyright laws to the Internet age by making it illegal to make, distribute, or use devices that circumvent technology-based protections of copy-righted materials.
Digital Millenmium Copyright Act (DMCA)
The commission of illegal acts through the use of a computer or against a computer system.
computer crime.
Theft of key pieces of personal information, such as credit card or Social Security numbers, in orcer to obtain merchandise and services in the name of the victim or to obtain false credentials.
identity theft
The commission of acts involving a computer that may not be illegal but are considered unethical
computer abuse
Unsolicited commercial e-mail
spam
The scientific collection, examination, authentication, preservation, and analysis of data held on or retrieved from computer storage media in such a way that the information can be used as evidence in a court of law
computer forensics
Large disparities in acess to computers and the Internet among different social groups and diffferent locations .
digital divide
Occupational disease that occurs when muscle groups are forced through repetive actions with high-impact loads or thousands of repetitions with low-impact loads.
repetitive stress injury (RSI)
Type of RSI in which pressure on the median nerve through the wrist's bony carpal tunnel structure produces pain.
carpal tunnel syndrome (CTS)
Eyestrain condition related to computer display screen use; symptoms include headaches, blurred vision, and dry and irritated eyes.
computer vision syndrome (CVS)
Stress induced by computer use; symptoms include aggravation, hostility toward humans, impatience, and enervation.
technostress

Deck Info

38

permalink