Midterm 1 Flashcards

1
Q

What is cyberethics?

A

Cyberethics is the study of social, legal and moral issues and the impact they have on cybertechnology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

4 phases of cybertechnology (phase 1)

A

Computing technology was in its infancy,Computers were huge and unconnected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

4 phases of cybertechnology (phase 2)

A

Computers were used as communication devices, First privately owned networks – computers can now be linked together.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

4 phases of cybertechnolog (phase 3)

A

The World Wide Web has become commonplace,As such, the general public is now “connected” all the time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

4 phases of cybertechnology (phase 4)

A

“Social Networking” makes up 1 of every 5 minutes spent online,Computers are now becoming more and more a part of us (on our clothes, in our bodies…)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

3 perspective of applied ethics:

A

Professional EthicsPhilosophical EthicsSociological Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Professional Ethics:

A

aims to identify and analyze issues of ethical responsibility for professionals in a field of study.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Philosophical Ethics:

A

uses a 3-part system called the “standard methodology” to propose solutions to more difficult ethical issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Sociological Ethics:

A

aims to describe particular moral systems and report how societies, groups and individuals view a particular moral issue.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Name some disciplines associated with professional ethics:

A

Computer Science,Engineering,Library/Information Science.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Name some disciplines associated with philosophical issues:

A

Philosophy, Law.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Name some disciplines associated with sociological issues:

A

Sociology,Behavioral sciences.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the 3 types of errors and failures?

A

Problems for individuals,System Failures,Safety-Critical Issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a Professional Error? (Give an example of a professional error)

A

Professional errors inconvenience individuals or groups of individuals. Example: Woman received $6.3 million electric bill.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a System Failure? (Give an example of a system failure)

A

Professional errors that cause either partial or complete failures and affect large numbers of people/cost huge sums of money. Example: $125 million Mars Climate Orbiter disappeared when it should have gone into orbit around Mars.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Safety-Critical Failure? (Give an example of a Safety-Critical failure)

A

Professional errors that have the potential to injure or kill people. Example: Radar System installed by Navy to monitor airspace around them accidentally shot down a passenger jet due to poor design and errors in calculation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Name the 3 fault types:

A

Responsibility, Liability,Accountability.

18
Q

Responsibility assumes _______ or _______. Focuses on ________. Guilt but ____________.

A

blame or fault,individuals,no legal punishment.

19
Q

Liability assumes ________ or ________. Focuses on __________. No _________ but __________.

A

NO blame or fault,groups of people,guilt but sometimes legal punishment.

20
Q

Accountability assumes _________ or _________. Focuses on ________ or _________. Guilt _________.

A

blame or fault, individuals or groups,and legal punishment.

21
Q

Name the 3 types of privacy:

A

Accessibility,Decisional, Informational.

22
Q

Accessibility privacy (give example):

A

speaks to harm that can be caused through physical access to a person or their possessions (i.e. Residence as a private space).

23
Q

Decisional Privacy (give example):

A

speaks to an individual’s freedom to non-interference. (i.e. Contraception, abortion, other “personal” issues).

24
Q

Informational Privacy (give example):

A

speaks to harm that can be caused through access to and control over personal information (i.e. personal information as private information)

25
Q

What are 3 ways data privacy can be threatened?

A

Data mining,Data matching,Data merging.

26
Q

Data Mining is (give example of good/bad):

A

Combining and comparing data, then identifying non-obvious trends from it. (Good: ? Bad: figuring out if people are away from their homes.)

27
Q

Data Matching is (give example of good/bad):

A

Comparing data from multiple sources to search for matches or “hits” among those sources. (Good: list of suspects, match name with existing list. Bad: stops people from going to wikileaks)

28
Q

Data Merging is (give example of good/bad):

A

Combining data from multiple sources to identify individual records or groups of individual records. (Good: Cell phone data for google maps. Bad: two different bobs and one may not have herpes)

29
Q

What is Hacktivism and what do hacktivists seek? (give an example of hacktivism)

A

Hacktivism is “political hacking”, hacktivists seek to promote their political cause. (i.e. disrupting normal operations of a website or web service but without causing major damages).

30
Q

What is Civil Disobedience?

A

Civil Disobedience is willingly and actively refusing to obey laws through nonviolent resistance.

31
Q

What are some problems hacktivism creates?

A
  1. compromises personal information2. collateral damage on other websites hosted on the same server.3. financial repercussions.
32
Q

What is CyberTerrorism and who typically performs CyberTerrorism?

A

Political hacking intended to cause “grave harm”. Typically performed by “non-state actors” to try and intimidate a government or society by fear or force.

33
Q

How to we come to make ethical conclusions, how do we decide what is right or wrong?

A
  1. society influence2. culture3. laws/rules4. religion
34
Q

What’s the problem with how we decide what is right or wrong?

A

Most of ethical conclusions originated from people, ethnocentrism, cultural differences, and fail to cover everything.

35
Q

What is Deontology?

A

right is always right, wrong is always wrong, no wiggle room. Values intrinsic values.

36
Q

What is the problem with Deontology?

A

Allows no wiggle room. Takes away from individual rights.

37
Q

What is Utilitarianism?

A

Focuses on consequences, if ends justify the means.

38
Q

What is the problem with Utilitarianism?

A

Can take away individual right, cannot know the consequences.

39
Q

What is social contract theory?

A

Universally accepted within groups as “good.” Mutual benefit. Negative/positive rights.

40
Q

What is a positive right? (give example)

A

something that requires somebody to do something, for you to get that right. (i.e. Voting, requires people to set it up. Requires some participation from society)

41
Q

What is a negative right? (give example)

A

Something that shouldn’t be interfered with. If no one impedes upon the right, the right still exists. (i.e. Free speech, you can say what you want if no one interferes)