LU 1 - Personal, Legal, Ethical and Organisational Issues Flashcards

(20 cards)

1
Q

What do employers use social networking sites for in the hiring process?

A

To gather background information on job applicants, which can influence hiring decisions.

This can sometimes result in a numerical ranking of candidates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the potential consequences of offensive posts on social media for students?

A

Expulsion or withdrawal of admission offers.

Such actions raise questions about the impact of social media on personal and professional opportunities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define ‘Fake News’.

A

Intentionally misleading or deceptive news, stories, or hoaxes that can have serious economic and social consequences.

It is important to distinguish it from legitimate news reporting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are ‘Deepfakes’?

A

Realistic fake videos or audio recordings created using readily available software.

The ethical and legal implications of deepfakes are still unclear.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What technologies do employers use for employee monitoring?

A

GPS, Telematics, and software to monitor performance, location, communications, and keystrokes.

This raises concerns about employee privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is ‘information paranoia’?

A

A justified concern about the widespread storage and potential misuse of sensitive information.

It reflects the anxiety over personal data protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

List the three important concepts regarding web and network privacy.

A
  • Acceptable Use Policy
  • Accountability
  • Nonrepudiation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of a privacy policy?

A

To specify the legal and ethical use of a system and the consequences of noncompliance.

Clear privacy policies are essential for business trust.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the main federal data protection laws mentioned?

A
  • HIPAA
  • FACTA
  • COPPA
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does HIPAA protect?

A

The confidentiality of patient medical information.

It is crucial for healthcare organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the key components of the General Data Protection Regulation (GDPR)?

A
  • User consent required
  • Data must be anonymized
  • Data breaches reported within 72 hours
  • Secure data transfers across borders
  • Some companies must appoint a data protection officer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the expected daily volume of e-mails sent worldwide by 2022?

A

Exceed 333 billion.

In 2019, 281 billion e-mails were sent daily.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Fill in the blank: _______ refers to unsolicited advertising e-mail.

A

Spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the primary concerns regarding data collection on the web?

A
  • Credit card security
  • Unauthorized use of personal information
  • Data accuracy issues
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the Fair Use Doctrine?

A

Allows limited use of copyrighted material for certain purposes.

This doctrine is significant in copyright law.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the digital divide?

A

The gap between those with and without access to technology.

It can perpetuate social and economic inequalities.

17
Q

What are the health concerns associated with prolonged use of information technology?

A
  • Eye strain
  • Musculoskeletal disorders
  • Repetitive stress injuries
18
Q

What is green computing?

A

Focuses on environmentally sustainable practices and minimizing energy consumption in the IT sector.

It aims to reduce the environmental impact of technology.

19
Q

List some strategies for achieving green computing.

A
  • Designing longer-lasting products
  • Developing energy-efficient computing routines
  • Implementing virtualization
  • Promoting telecommuting
  • Utilizing cloud computing
20
Q

What role does Anonymizer, Inc. play in online privacy?

A

Offers services to protect user data and prevent tracking.

Their tools include digital shredders and antispyware.