COMM 205 Unit 8 Flashcards

(20 cards)

1
Q

Definition: Ethics

A

The moral principles of right and wrong that individuals use to make choices that guide their behaviour

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Definition: Code of ethics

A

A collection of PRINCIPLES that are intended to guide decision making by members of an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Fundamental principles of ethics:

A
  1. Responsibility – means that you accept the consequences of your decisions and actions.
  2. Accountability – determines who is responsible for actions that were taken.
  3. Liability – a legal concept meaning that individuals have the right to recover the damages done to them by other individuals, organizations, or systems.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Definition: PRIVACY

A

Privacy – involve collecting, storing and disseminating personal information about individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Definition: Accuracy

A

Accuracy – involve the authenticity, fidelity and accuracy of information that is collected and processed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Definition: Property

A

Property – involve the ownership and value of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Definition: Accessibility

A

Accessibility – revolve around who should have access to information and whether a fee should be paid for this access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Ethics and information technology:

A
  1. PRIVACY
  2. Accuracy
  3. Property
  4. Accessibility
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Definition: Information privacy

A

Privacy – the right to be left alone and to be free of unreasonable personal intrusion.
 Information privacy – the right to determine when, and to what extent, information about you can be gathered and/or communicated to others.
 It is about how personal information is collected and shared.
Information privacy legislation varies from Europe, the United States and Canada.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Major concerns of personal information in databases

A
Some of the major concerns are:
 Can you change inaccurate data?
Personal Information in Databases
 Do you know where the records are?
 Are the records accurate?
 Under what circumstances will personal data be released?
 How are the data used?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Opt-in vs. opt-out model

A

Opt-in Model – PROHIBITS an organization from collecting any personal information UNLESS the customer specifically authorizes it.
Opt-out model – PERMITS the company to collect personal information UNTIL the customer specifically requests that the data not be collected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Privacy policy guidelines for data collection

A

 Data should be collected on individuals only for the purpose of accomplishing a legitimate business objectives.
Data Accuracy
 Data should be kept current, where and when necessary.
Data Confidentiality
 Computer security procedures should be implemented to
ensure against unauthorized disclosure of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Definition: Information security

A

Information Security – consists of the processes and policies designed to PROTECT an organization’s information and information systems (IS) from UNAUTHORIZED access, use, disclosure, disruption, modification or destruction.
Information must be PROTECTED to maintain a company’s competitive advantage.
Information must be protected to maintain customer PRIVACY.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How much should you spend on IT?

A

“Security is a trade-off between risk and cost, and enterprises in different industries may spend more or less depending on their situation.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Definition: Vulnerability

A

Vulnerability – the POSSIBILITY that the system will be harmed by a threat.
 Five key factors that affect the vulnerability of organizational information resources:
1. Today’s interconnected, interdependent, wirelessly networked business environment
2. Smaller, faster, cheaper computers and storage devices
3. Decreasing skills necessary to be a computer hacker
4. International organized crime taking over cybercrime
5. Lack of management support.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Major categories of threats

A

There are two major categories of threats:
 unintentional threats
 deliberate threats

17
Q

The greatest threat to a business information system are (the first line of defence):

A

The greatest threat to a business information system are insiders, employees and authorized users of the IS:
 Negligence, mistakes and ignorance of the consequences of risky behavior.
 Victims of social engineering.

18
Q

Definition: Social Engineering

A

Social engineering is a non-technical method of intrusion
hackers use that relies heavily on human interaction and often involves TRICKING PEOPLE into breaking normal security procedures. It is one of the greatest threats that organizations today encounter.

19
Q

Human errors:

A

The higher the level of employee, the greater the threat he or she poses to information security.
Other employees include contract labour, consultants, and janitors and guards.
 Human errors or mistakes by employees pose a large problem as the result of laziness, carelessness, or a LACK OF AWARENESS concerning information security.
 This lack of awareness comes from POOR EDUCATION AND TRAINING efforts by the organization.

20
Q

Conclusion

A

The ethical and moral issues are largely influenced by people’s individual ethical beliefs.
 A variety of policies exist in organizations to help enforce proper information ethics and INFORMATION PRIVACY behaviours.
The effectiveness of information security measures and information POLICIES is highly dependent upon the PEOPLE in the organization who enforce and enact these measures and policies.