Ethics and Security in the Digital Age Flashcards

1
Q

What is Ethics?

A

making a principle-based choice
between competing alternatives, the choice is between right and wrong.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The PAPA Framework

A

P- Privacy
A- Accuracy
P- property
A- Accessibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Privacy, concerns about personal privacy

A

When it comes to privacy in the digital age; the speed and ease of gathering personal information about another person has drastically increased. There is more personal information about a person available on the internet about a person than there ever was before the digital age.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

accuracy, who is responsible for checking the accuracy of the information? and who should be held responsible for error?

A
  1. Data Quality and System Errors
    this can cause serious hard to individuals an organizations as they are being fed inaccurate information
  2. Critical Systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

accuracy, what are critical systems?

A

systems that can have a life threatening impact:

aircraft control systems
missile systems
medical systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Property

A

Who owns the information, where can we access information?

  1. Intellectual Property
    a product based on someone’s
    knowledge, experience and education (reports, documents, music, art)

2.Copyright
a form of intellectual property legal protection, meaning someone can’t use your intellectual property without getting your permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Channels and Net Neutrality

A

the principle that Internet service providers must treat all Internet communications equally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Accessibility

A

what information should we be allowed to access

  1. Security and Cybercrime
    -information and data is in risk of being accessed by hackers, attacks (phishing), computer parts failing

-Data and programs that use customer data must be kept
secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Distributed Denial of Service
(DDoS)

A

An attack where a firm’s computer systems are flooded
with requests sent via botnets and it slows or shuts the site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Internet of Things (IoT) and Smart
Devices

A

increase of smart devices –> increase of security and privacy risks such as controlling smart devices remotely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Biometrics

A

The measurement of one of an individuals unique traits (making it more reliable than passwords):

physical: fingerprint, facescan, retinal scan
behavior: voice detection, signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Multi-Factor Authentication

A

providing more than one item to prove authentication or credentials. This can include a password and a code sent via. email, or fingerprint, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CAPTCHA

A

completely automated public Turing test to tell computers and humans apart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Accessibility and the Digital
Divide

A

Not everyone has equal opportunity when it comes to accessing the internet due to the digital divide. The digital divide refers to less fortunate regions/countries who are unable to access the same resources/internet. This leads to a big gap which some people are highly computer literate and others are not.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Web Content Accessibility Guidelines (WCAG)

A

four principles:
Perceivable- available to the senses
operable- users can interact
understandable- content is clear
robust- a wide range of technologies can access the content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Identity Theft

A

it happens when individuals claim an existing identity or changing own identify
and it happens because of multiple things that result in personal gain. This includes money laundering, avoiding detection, etc.

17
Q

Organisational Concerns

A
  1. health and safety issues
  2. change Organzational Structure issues: loss of employment due to the implementation of AI and changing the structure of how organizations are run completely
  3. IS Auditing issues: organizations must preventively identify and reduce cyber risks; in different ways such as though white hat hackers
18
Q

Software Piracy

A

unauthorized copying of software

19
Q

measures to combat software
piracy:

A

1.watermarks
2. copyright and intellectual property laws
3. restriction from doing a range of different functions

20
Q

Free Speech Versus Censorship

A

a governmental attempt to
control online material

21
Q

Hacktivists

A

A protester seeking to make a political point by leveraging technology tools, often through
system infiltration, defacement, or damage

22
Q

Cyber Terrorism

A

Cyber terrorists launch computer based attacks to advance their own political or social objectives

23
Q

Cyber Bullying

A

a form of bullying which is carried out through an electronic service