Ethics, Privacy, and Security Flashcards

1
Q

Branch of philosophy that deals with the principle of right and wrong behavior

A

Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Whose definition of ethics states that it is study of the fundamental nature of knowledge, reality, and existence

A

Oxford

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Whose definition of ethics states that these are philosophical questions presented as problems to be studied or resolved

A

Wiki

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

→ interdisciplinary field of public health, health research, and clinical care (WHO)
→ prioritizes and justifies the actions done by healthcare professionals that may impact the health of patients (WHO)

A

Health Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Written document that allows patients to instruct practitioners in advance about the medical procedures when they are no longer able to express informed consent

A

Living Will

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Legal and Ethical Euthanasia Practices

A
  • Passive
  • Indirect
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Illegal and Unethical Euthanasia Practices

A
  • Voluntary
  • Involuntary
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Intentionally performing interventions to cause the patient’s death with informed patient consent

A

Voluntary Active Euthanasia

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Intentionally performing interventions to cause the patient’s death when the patient was incompetent to consent or was not informed at all

A

Involuntary Active Euthanasia

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Intentionally performing interventions to cause the patient’s death when the patient was mentally incapable of consenting

A

Non-voluntary Active Euthanasia

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Withdrawing medications/interventions to allow the patient to die gradually

A

Passive Euthanasia

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Administration of narcotics to reduce pain but with the incidental consequence of death

A

Indirect Euthanasia

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Physician provides medications and interventions to the patient with the understanding that they may use it to commit suicide

A

Physician-assisted Suicide

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Establishes a written code of ethics for policies and procedures with the goal of attaining proper conduct for employees

A

Health Ethics Committee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Branch of ethics that deals with the practice of clinical medicine and related scientific research

A

Medical Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

→ practical discipline with a structured approach to practitioners in identifying, analyzing, and resolving issues within the medical practice

→ acceptable conditions for exposure of individuals to risks and burdens for the benefit of society (research)

A

Clinical Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

School of Ethics: How to live your life?

A

Virtue Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

School of Ethics: Are your actions good?

A

Consequentialist Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

School of Ethics: Are your actions right?

A

Deontological/Duty-based Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

→ principles that govern the behavior of a person or group of people
→ provides rules on how people should act towards other people in different institutions
→ codified as a set of rules which a particular group of people will use—must be adhered to even if personal values differ

A

Professional Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Refers to when the healthcare provider has certain obligations to the client

A

Fiduciary Duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Refers to when written agreements/contracts with clients creates binding obligations to perform the terms in the contract

A

Contractual Obligations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Underpins all professional codes of conduct which may differ depending on the profession

A

Ethical Principles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

→ minimum standards of appropriate behavior in a professional context
→ sits alongside the general law of the land and personal values of professionals

A

Code of Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Refers to the concept that the principles that guide the work ethic should always be derived from the main objectives of the profession

A

Value Neutrality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Ethics pertaining to what computers do, how they work, and the user behavior for the benefit of individuals and society

A

Cyber Ethics

27
Q

Manners applied to the internet and the use of technology in everyday situations

A

Cyber Etiquette

28
Q

Type of privacy referring to personal space

A

Physical privacy

29
Q

Type of privacy referring to personal data

A

Informational Privacy

30
Q

Type of privacy referring to personal choices relating to cultural and religious affiliations

A

Decisional Privacy

31
Q

Type of Privacy referring to personal relationships with family and intimates

A

Associational Privacy

32
Q

Type of Privacy referring to the physical human which also includes thoughts

A

Body

33
Q

Type of Privacy referring to the right to communicate with whoever one desires

A

Correspondence

34
Q

Type of Privacy referring to diaries, photos, etc.

A

Data

35
Q

Type of Privacy referring to wealth, debt, expenditure, and income

A

Finance

36
Q

Type of Privacy referring to the right to anonymity

A

Identity

37
Q

Type of Privacy referring to being wherever we want without others knowing

A

Location

38
Q

Type of Privacy referring to not being invaded by government forces (belongings and possessions)

A

Territory

39
Q

“The privacy of communication and correspondence shall be inviolable except upon lawful order of the court, or when public safety or order requires otherwise, as prescribed by law”

A

PH Constitution of 1987 under Article 3, Section 3

40
Q

State of being free from danger or threat

A

Security

41
Q

Refers to virus protection softwares and spam filtering softwares that keep machines free from malware

A

In-house or local security

42
Q

Refers to 3rd party companies that handle and manage security

A

Outsourced Security as a Service (SECaaS)

43
Q

Sets of practices used to protect digital information from unauthorized access and disclosure during its lifetime

A

Data Security

44
Q

DMS stands for?

A

Document Management System

45
Q

Document that gets issued after availing shredding services of organizations

A

Certificate of Destruction

46
Q

Refers to when information portability is a primary concern

A

Data Leakage

47
Q

Refers to when information portability is a primary concern

A

Data Leakage

48
Q

The process that allows specific people or departments to have access to sensitive information

A

Whitelisting

49
Q

T or F: software updates are done less frequently than system updates

A

False (system updates must be done less frequently and software updates must be done more frequently)

50
Q

The data breach case wherein the Vastaamo company had an extortion attack in October 2020 wherein cyber criminals threatened to leak patient info unless they paid €200 worth of bitcoin as ransom

A

Digital Extortion Attack of a Finnish Psychotherapy Center

51
Q

The data breach case on November 8th of 2019, wherein the clinic server was breached and data had been stolen

A

Facial Restoration Center

52
Q

Type of data breach aka corporate espionage; there is a physical theft of documents or equipment containing important data like cardholder account information

A

Physical Data Breach

53
Q

Type of data breach wherein there is an unauthorized access or deliberate attack on a system where cardholder data is processed, stored, or transmitted

A

Electronic Data Breach

54
Q

Type of Data Breach that involves the capturing and recording of magnetic strip data on the back of credit cards; attached on a machine’s POS without the owner’s knowledge

A

Skimming

55
Q

Type of cybersecurity threat that refers to storing sensitive information related to employees and business operations on the cloud

A

Cloud Vulnerability

56
Q

Type of cybersecurity threat that is beneficial for cybercriminals

A

AI-Enhanced Cyberthreats

57
Q

Type of cybersecurity threat wherein AI is combined with traditional fuzzing techniques to detect system vulnerabilities

A

AI Fuzzing

58
Q

Type of cybersecurity threat wherein hackers inject instructions into the machine learning models

A

Machine Learning Poisoning

59
Q

Type of cybersecurity threat that refers to programs that carry self-executing contract codes between a buyer and seller; fairly new system that is vulnerable to attacks

A

Smart Contract Hacking

60
Q

Refers to the cyberespionage campaign against managed IT service providers

A

Operation Cloud Hopper

61
Q

Refers to the malware that creates more convincing spam and avoids security detection

A

Adaptive Malicious Software

62
Q

Malware that attacks the developer wherein they learn about the system flaw but have “zero” days to fix it

A

Zero-Day Attacks

63
Q

The company that got hacked of 2 billion dollars since 2017

A

Ethereum

64
Q

Refers to the process of protecting information by mitigating information risks

A

Information Security