1.2.3 social and ethical issues associated with a networked world Flashcards

1
Q

when can issues of social and ethical significance arise?

A

whenever information technology is used. these issues have positive and negative ethical and social impacts. it can be difficult to identify person who is responsible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the IT subjects of ethical and social significance?

A

reliability, integrity, inconsistency, security, authenticity, privacy, anonymity, intellectual property, the digital divide and equality access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is reliability?

A

how well an IT system functions. computer failures cause data loss, time loss, money loss, injury. reliability of IT systems determines confidence in their value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is integrity?

A

refers to protecting the completeness and accuracy of data. data lacks integrity if its incomplete, out of date, or has been purposely or unintentionally altered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is inconsistency?

A

problems may arise if information is duplicated in a database and only one copy is updated causing inconsistency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is security?

A

refers to protection of hardware, software, peripherals, and computer networks from unauthorized access. biometrics, passwords, firewalls, and locks are some of the most common security systems placed to restrict access to IT systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is authenticity?

A

involves a person proving their identity to gain access to a computer system. requiring more than one independent factor increases the difficulty of providing false credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is privacy?

A

ability to control how and to what extent data is used. includes things such as: how long data is stored, who has access to the data and how its used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is anonymity?

A

privacy becomes anonymity when individuals use an IT system to conceal their true identity in order to cyberbully another person, commit illegal actions or crimes, hack computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is intellectual property?

A

refers ro ideas, discoveries, photographs, films, essays, etc. copyright laws are designed to protect intellectual property from unauthorized and illegal reproduction. copy paste and file sharing practices and devices make it easy to break copyright laws

How well did you know this?
1
Not at all
2
3
4
5
Perfectly