Term
|
Definition
Accountability is a feature of systems and social institutions: It means that mechanisms are in place to determine who took responsible action, who is responsible. |
|
|
Term
|
Definition
|
|
Term
|
Definition
Computer abuse is the commission of acts involving a computer that may not be illegal but that are considered unethical. |
|
|
Term
|
Definition
Computer crime is the commission of illegal acts through the use of a computer or against a computer system. |
|
|
Term
|
Definition
Computer vision syndrome (CVS) refers to any eyestrain condition related to computer display screen use. |
|
|
Term
|
Definition
Cookies are tiny files deposited on a computer hard drive when a user visits certain Web sites. |
|
|
Term
|
Definition
Copyright is a statutory grant that protects creators of intellectual property from having their work copied by others for any purpose during the life of the author plus an additional 70 years after the author’s death. |
|
|
Term
Descartes’ rule of change |
|
Definition
If an action cannot be taken repeatedly, it is not right to take at all (Descartes’ rule of change). This is the slippery-slope rule: An action may bring about a small change now that is acceptable, but if it is repeated, it would bring unacceptable changes in the long run. In the vernacular, it might be stated as “once started down a slippery path, you may not be able to stop.” |
|
|
Term
|
Definition
A similar digital divide exists in U.S. schools, with schools in high-poverty areas less likely to have computers, high-quality educational technology programs, or Internet access availability for their students. |
|
|
Term
Digital Millennium Copyright Act (DMCA), |
|
Definition
The DMCA implemented a World Intellectual Property Organization Treaty that makes it illegal to circumvent technology-based protections of copyrighted materials. |
|
|
Term
|
Definition
Due process is a related feature of law-governed societies and is a process in which laws are known and understood and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly. |
|
|
Term
Ethical “no free lunch” rule |
|
Definition
Assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise. (This is the ethical “no free lunch” rule.) If something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work. |
|
|
Term
|
Definition
Ethics refers to the principles of right and wrong that individuals, acting as free moral agents, use to make choices to guide their behaviors. |
|
|
Term
Fair Information Practices (FIP), |
|
Definition
air Information Practices (FIP) is a set of principles gov- erning the collection and use of information about individuals. |
|
|
Term
|
Definition
1. Do unto others as you would have them do unto you |
|
|
Term
Immanuel Kant’s Categorical Imperative, |
|
Definition
If an action is not right for everyone to take, it is not right for anyone |
|
|
Term
|
Definition
|
|
Term
|
Definition
Informed consent can be defined as consent given with knowledge of all the facts needed to make a rational decision. |
|
|
Term
|
Definition
Intellectual property is considered to be intangible property created by individuals or corporations. |
|
|
Term
|
Definition
Liability is a feature of political systems in which a body of laws is in place that permits individuals to recover the damages done to them by other actors, systems, or organizations. |
|
|
Term
Nonobvious relationship awareness |
|
Definition
NORA can take information about people from many disparate sources, such as employment applications, telephone records, customer listings, and “wanted” lists, and correlate relationships to find obscure hidden connections that might help identify criminals or terrorists |
|
|
Term
|
Definition
opt-in model of informed consent in which a business is prohibited from collecting any personal information unless the consumer specifically takes action to approve information collection and use. |
|
|
Term
|
Definition
An opt-out model of informed consent permits the collection of personal information until the consumer specifically requests that the data not be collected. |
|
|
Term
|
Definition
The Platform for Privacy Preferences, known as P3P, enables automatic communication of privacy policies between an e-commerce site and its visitors. |
|
|
Term
|
Definition
A patent grants the owner an exclusive monopoly on the ideas behind an invention for 20 years. |
|
|
Term
|
Definition
Privacy is the claim of individuals to be left alone, free from surveillance or interference from other individuals or organizations, including the state. |
|
|
Term
|
Definition
The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called profiling. |
|
|
Term
Repetitive Stress Syndrome |
|
Definition
RSI occurs when muscle groups are forced through repetitive actions often with high-impact loads (such as tennis) or tens of thousands of repetitions under low-impact loads (such as working at a computer keyboard). |
|
|
Term
|
Definition
Responsibility means that you accept the potential costs, duties, and obligations for the decisions you make. |
|
|
Term
|
Definition
Take the action that produces the least harm or the least potential cost |
|
|
Term
|
Definition
A safe harbor is a private, self-regulating policy and enforcement mechanism that meets the objectives of government regulators and legislation but does not involve government regulation or enforcement. |
|
|
Term
|
Definition
Spam is junk e-mail sent by an organization or individual to a mass audience of Internet users who have expressed no interest in the product or service being marketed. |
|
|
Term
|
Definition
|
|
Term
|
Definition
stress induced by computer use. |
|
|
Term
|
Definition
Any intellectual work product—a formula, device, pattern, or compilation of data-used for a business purpose can be classified as a trade secret, |
|
|
Term
|
Definition
Take the action that achieves the higher or greater value |
|
|
Term
|
Definition
Web bugs are tiny graphic files embedded in e-mail messages and Web pages that are designed to monitor who is reading the e-mail message or Web page and transmit that information to another computer. |
|
|