CC101 (midterm part 1) Flashcards
(29 cards)
is a money or favour given or promised in order to influence the
judgment or conduct of a person in a position of trust.
BRIBE
is the use or production of copyright protected
material without the permission of the copyright holder.
Copyright infringement
is a criminal activity that either targets or uses a computer, a
computer network or a networked device.
Cybercrime
is a branch of philosophy that used to study ideal human
behaviour and ideal ways of being.
ethics
is the repeated use of electronic communications to harass
or frighten someone, for example by sending threatening emails.
cyberstalking
is the condition of human flourishing or of living well.
Eudaimonia
is the practice of using the Internet to illegally copy software and
pass it on to other people.
Piracy
are practices and processes that give a company an
economic advantage over its competitors.
Trade secrets
is the term used when a person passes on information
concerning wrongdoing, such as corruption, sexual harassment, etc.
Whistle blowing
He believed that ideal behaviors were practices
that lead to the end goal eudaimonia, which is synonymous with a high
level of happiness or well-being.
Aristotle
an 18th-
century philosopher and ethicist, believed that ideal behaviour was acting in
accordance with once duty. For him, well-being meant having freedom to
exercise autonomy (self-determination), not being used as means to an end,
being treated with dignity, and having the capability to think rationally.
kant immanuel
A partial list of IT specialists are classified as “professionals” which
includes:
programmers, system analyst, software engineers, database
administrators, local area network (LAN) administrator, and chief
information officers (CIOS).
discuss and agree upon fundamental
aspects of this relationship before the professional accepts in employment
offer.
Relationships between IT professionals and Employers
In this type, each party agrees to provide something of value to each
other. Generally, IT professionals provides hardware, software, or services at
a certain cost and within a given time period.
Relationships between IT professionals and Clients
Most IT professional understand that building a good relationship with
———– encourages the flow of useful communication and sharing of ideas.
IT professionals should not make unreasonable demands.
Relationships between IT professionals and Suppliers
Professionals feel a degree of loyalty to other professionals and they help
each other. Experienced professionals can act as mentors and help develop
new members of the profession.
Relationships between IT professionals and Other Professionals
IT professionals develop, install, service and support the product for IT
users. IT users need the product to deliver organizational benefits.
Relationships between IT professionals and IT Users
Society not only expects professionals not to cause harm, but to provide
significant benefits. IT professionals have a relationship with others in
society who may be affected by their action. However, no formal organization
that takes responsibility for establishing and maintains standards that
protect the public.
Relationships between IT professionals and Society
Unauthorized access, colloquially called —— is the classic
example of a computer crime. In many ways, unauthorized access to a
computer or system is analogous to physical trespass, and it may include
gaining access to restricted systems or exceeding one’s authorization on a
system to which one may have legitimate access.
“hacking,”
An attacker may also seek unauthorized access to a computer in order to
convert the computer’s resources to the hacker’s own use. A common
example of this,
called a ——–is a network of compromised computers to
be used for resource-intensive tasks such as sending unwanted
advertisement e-mails, or “spam,” to a very large number of people at a time
(Anderson et al. 2012).
botnet
Information privacy exists when the usage, release and
circulation of personal information can be controlled. Invasions of privacy
occur when individuals cannot maintain a substantial degree of control over
their personal information and its usage.
online privacy (right to be let alone)
The free communication of thoughts and opinions is one of most
precious rights because it is a condition for democracy
online freedom of expression ( (France, 1789,
Declaration of the Rights of Man, Article 11).
therefore holds potential for a stronger diversity of opinions
and expressions, as they actually exist in society, thus strengthening the
public discourse and sphere.
cyberspace
codified in codes of conduct, customer contracts and/or access
criteria, chat policies, or filtering systems can be effective regulators.
norms