Information systems-Chapter 4 bold terms

Description

Flashcards on Information systems-Chapter 4 bold terms, created by Kamron White on 27/09/2017.
Kamron White
Flashcards by Kamron White, updated more than 1 year ago
Kamron White
Created by Kamron White over 6 years ago
161
1

Resource summary

Question Answer
The dark side of big data: predictive policing intent was to prevent crime by providing the targeted individuals with information about job training programs or informing them about increased penalties for people with certain crimes. law enforcement used data to identify who would likely commit a crime in the future
The dark side of big data: insurance rates Flo's chip could be considered discriminatory, system weeds out people who drive late at night and don't spend much time in their cars
the dark side of big data: computerized hiring computerized systems filtering job applicants. discriminatory when job applicants are filtered by their commute times, a statistic that correlates a long commute time to less valuable worker
dark side of big data: targeting financially vulnerable individuals example: data broker might provide a report n retirees with little or no savings to a company offering reverse mortgages, high-cost loans, or other financially risky products
ethics refers to the principles of right and wrong that individuals, acting as free moral agents, use to make choices to guide their behaviors
five moral dimensions of the information age are? information rights and obligations, property rights and obligations, accountability and control, system quality, quality of life
five trends raising ethical issues computing power doubles every 18 months, data storage costs rapidly decline, data analysis advances, networking advances, mobile device growth impact
profiling the use of computers to combine data from multiple sources and create digital dossiers of detailed information on indvidiuals
non obvious relationship awareness (NORA) data analysis technology giving both the government and private sector even more powerful profiling capabilities
responsibility you accept the potential costs, duties, and obligations for the decisions you make
accountability feature of both systems and social institutions; means that mechanisms are in place to determine who took action, and who is responsible
due process feature of law governed societies and is a process in which laws are known and understood, and ability exists to appeal to higher authorities to ensure that the laws applied correctly
five step process to ethical analysis is? identify and describe the facts clearly, define the conflict or dilemma and identify the higher-order values involved identify the stakeholders, identify the options that you can reasonably take, identify the potential consequences of your options
golden rule putting yourself in someone else's shoes;empathy
Immanuel Kant's categorical imperative If everyone did this, could the organization or society survive?
slippery slope rule an action that brings about small change now, but if repeated it will bring unacceptable change in the long run
utilitarian principle rule assumes you can prioritize values in a rank order to understand the consequences of various courses of action
risk aversion principle building a nuclear generating facility in an urban area; high failure cost over very low probability, by slight chance that something goes wrong you are screwed
ethical "no free lunch" rule if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work
privacy claim of individuals to be left alone, free from surveillance or interference from other individuals or organizations, including the state
Fair Information Practices (FIP) 1973 written report, updated 2010, takes into account new privacy-invading technology
informed consent customers must provide this before any company can legally use data about them, and they have the right to access that information, correct it, and request that no further data be collected
safe harbor private, self regulating policy and enforcement mechanism that meets the objectives of government regulators and legislation but does not involve government regulation or enforcement
cookies small text files deposited on a computer hard drive when a user visits websites
web beacons web bugs (tracking files), tiny software programs that keep a record of users online clickstreams
spyware can secretly install itself on an internets users computer by piggybacking on larger applications
opt out model of informed consent permits the collection of personal information until the consumer specifically requests the data not to be collected
opt-in model of informed consent in which a business is prohibited from collecting any personal information unless the consumer specifically takes action to approve information collection and use
intellectual property considered to be both tangible and intangible products of the mind created by individuals or corporations
trade secret any intellectual work product--a formula, device, pattern, or compilation of data-- used for a business purpose.coke secret recipe
copyright statutory grant that protects creators of intellectual property from having their work copied by others for any purpose during the life of the author plus an additional 70 years after the authors death
patent grants the owner an exclusive monopoly on the ideas behind an invention for 20 years
digital millennium copyright act (DMCA) 1998 also provides some copyright protection, implemented a World Intellectual Property Organization for the purpose of catching people who try to find loopholes
computer crime commission of illegal acts by using a computer or against a computer system
computer abuse commission of acts involving a computer that may not be illegal but are considered unethical
spam originally junk email an organization or individual sent to a mass audience of internet users who have expressed no interest in the product or service being marketed, spread to cell phones
digital divide could lead to a society of information haves--computer literate and skilled--versus a large group of information have nots, computer illiterate/unskilled
repetitive stress injury (RSI) occurs when muscle groups are forced through repetitive actions often with high impact loads, or tens of thousands of repititions with low impact loads (typing on a computer all day)
carpal tunnel syndrome pressure on the median nerve through the wrist that causes pain
computer vision syndrome refers to any eyestrain condition related to display screen use in desktop computers, laptops, e-readers, smartphones, and handheld video games
Show full summary Hide full summary

Similar

Memory Key words
Sammy :P
Biology AQA 3.1.3 Absorption
evie.daines
Resumo para o exame nacional - Fernando Pessoa Ortónimo, Alberto Caeiro , Ricardo Reis e Álvaro Campos
miminoma
Biology AQA 3.1.3 Osmosis and Diffusion
evie.daines
AQA GCSE Physics Unit 2.1
Matthew T
PMP Prep quiz
Andrea Leyden
Statistics Equations & Graphs
Andrea Leyden
A-level Maths: Key Differention Formulae
Andrea Leyden
English Poetry Key Words
Oliviax
Edexcel Additional Science Chemistry Topics 1+2
El Smith
Biology B1
Kelsey Phillips