Term
|
Definition
| Accountability is a feature of systems and social institutions: It means that mechanisms are in place to determine who took responsible action, who is responsible. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Computer abuse is the commission of acts involving a computer that may not be illegal but that are considered unethical. |
|
|
Term
|
Definition
| Computer crime is the commission of illegal acts through the use of a computer or against a computer system. |
|
|
Term
|
Definition
| Computer vision syndrome (CVS) refers to any eyestrain condition related to computer display screen use. |
|
|
Term
|
Definition
| Cookies are tiny files deposited on a computer hard drive when a user visits certain Web sites. |
|
|
Term
|
Definition
| Copyright is a statutory grant that protects creators of intellectual property from having their work copied by others for any purpose during the life of the author plus an additional 70 years after the author’s death. |
|
|
Term
| Descartes’ rule of change |
|
Definition
| If an action cannot be taken repeatedly, it is not right to take at all (Descartes’ rule of change). This is the slippery-slope rule: An action may bring about a small change now that is acceptable, but if it is repeated, it would bring unacceptable changes in the long run. In the vernacular, it might be stated as “once started down a slippery path, you may not be able to stop.” |
|
|
Term
|
Definition
| A similar digital divide exists in U.S. schools, with schools in high-poverty areas less likely to have computers, high-quality educational technology programs, or Internet access availability for their students. |
|
|
Term
| Digital Millennium Copyright Act (DMCA), |
|
Definition
| The DMCA implemented a World Intellectual Property Organization Treaty that makes it illegal to circumvent technology-based protections of copyrighted materials. |
|
|
Term
|
Definition
| Due process is a related feature of law-governed societies and is a process in which laws are known and understood and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly. |
|
|
Term
| Ethical “no free lunch” rule |
|
Definition
Assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise. (This is the ethical “no free lunch” rule.) If something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work. |
|
|
Term
|
Definition
| Ethics refers to the principles of right and wrong that individuals, acting as free moral agents, use to make choices to guide their behaviors. |
|
|
Term
| Fair Information Practices (FIP), |
|
Definition
| air Information Practices (FIP) is a set of principles gov- erning the collection and use of information about individuals. |
|
|
Term
|
Definition
| 1. Do unto others as you would have them do unto you |
|
|
Term
| Immanuel Kant’s Categorical Imperative, |
|
Definition
| If an action is not right for everyone to take, it is not right for anyone |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Informed consent can be defined as consent given with knowledge of all the facts needed to make a rational decision. |
|
|
Term
|
Definition
| Intellectual property is considered to be intangible property created by individuals or corporations. |
|
|
Term
|
Definition
| Liability is a feature of political systems in which a body of laws is in place that permits individuals to recover the damages done to them by other actors, systems, or organizations. |
|
|
Term
| Nonobvious relationship awareness |
|
Definition
| NORA can take information about people from many disparate sources, such as employment applications, telephone records, customer listings, and “wanted” lists, and correlate relationships to find obscure hidden connections that might help identify criminals or terrorists |
|
|
Term
|
Definition
| opt-in model of informed consent in which a business is prohibited from collecting any personal information unless the consumer specifically takes action to approve information collection and use. |
|
|
Term
|
Definition
| An opt-out model of informed consent permits the collection of personal information until the consumer specifically requests that the data not be collected. |
|
|
Term
|
Definition
| The Platform for Privacy Preferences, known as P3P, enables automatic communication of privacy policies between an e-commerce site and its visitors. |
|
|
Term
|
Definition
| A patent grants the owner an exclusive monopoly on the ideas behind an invention for 20 years. |
|
|
Term
|
Definition
| Privacy is the claim of individuals to be left alone, free from surveillance or interference from other individuals or organizations, including the state. |
|
|
Term
|
Definition
| The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called profiling. |
|
|
Term
| Repetitive Stress Syndrome |
|
Definition
| RSI occurs when muscle groups are forced through repetitive actions often with high-impact loads (such as tennis) or tens of thousands of repetitions under low-impact loads (such as working at a computer keyboard). |
|
|
Term
|
Definition
| Responsibility means that you accept the potential costs, duties, and obligations for the decisions you make. |
|
|
Term
|
Definition
| Take the action that produces the least harm or the least potential cost |
|
|
Term
|
Definition
| A safe harbor is a private, self-regulating policy and enforcement mechanism that meets the objectives of government regulators and legislation but does not involve government regulation or enforcement. |
|
|
Term
|
Definition
| Spam is junk e-mail sent by an organization or individual to a mass audience of Internet users who have expressed no interest in the product or service being marketed. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| stress induced by computer use. |
|
|
Term
|
Definition
| Any intellectual work product—a formula, device, pattern, or compilation of data-used for a business purpose can be classified as a trade secret, |
|
|
Term
|
Definition
| Take the action that achieves the higher or greater value |
|
|
Term
|
Definition
| Web bugs are tiny graphic files embedded in e-mail messages and Web pages that are designed to monitor who is reading the e-mail message or Web page and transmit that information to another computer. |
|
|