5.2 Legal and Ethical Concerns

Cards (70)

  • What are legal concerns in computing related to intellectual property rights?
    Laws protecting creative works
  • Legal concerns in computing include data protection regulations.
    True
  • Ethical concerns in computing address issues like privacy and security.
    True
  • Match the type of intellectual property with its example in computing:
    Copyright ↔️ Source code
    Patent ↔️ Novel algorithm
  • What do trademarks protect in computing?
    Distinctive brands and logos
  • GDPR, enforced in the European Union, protects personal data and requires informed consent
  • What is a key ethical principle in computing regarding data use?
    Transparency
  • What are the three main types of intellectual property rights in computing?
    Copyright, patents, trademarks
  • Copyright protects original literary and artistic works
  • Why is it important to protect intellectual property rights in computing?
    Incentivizes innovation
  • GDPR allows individuals to access, correct, and delete their data.

    True
  • What are examples of fair use online?
    Parody, satire, education
  • What is social responsibility in computing?
    Ethical obligation to society
  • What is the primary goal of cybersecurity?
    Protect digital systems
  • What is cybersecurity designed to protect?
    Digital systems, networks, data
  • Match the ethical concern with its explanation:
    Privacy ↔️ Infringement on individual rights
    Transparency ↔️ Communication of limitations
    Accountability ↔️ Ethical oversight mechanisms
  • Legal concerns are defined by laws and regulations.

    True
  • Patents cover new, useful, and non-obvious inventions or processes
  • GDPR, a data privacy law, is enforced by the European Union
  • One criterion for fair use is the amount and substantiality of the material used
  • Sample bias in data occurs when a model is trained on data primarily from one demographic
  • Understanding the sources of bias helps developers create more equitable algorithms.

    True
  • Match the responsible use with its corresponding irresponsible use:
    Designing accessible systems ↔️ Developing exclusionary technologies
    Implementing robust security ↔️ Collecting data without consent
    Proactively addressing biases ↔️ Deploying biased algorithms
  • Addressing ethical concerns in cybersecurity aligns with societal values and responsible technology use.

    True
  • Match the type of legal concern with its ethical counterpart:
    Intellectual property rights ↔️ Privacy and data protection
    Cybersecurity laws ↔️ Potential for misuse
  • Legal concerns in computing are governed by laws and regulations
  • What do intellectual property rights protect?
    Creative and innovative works
  • Patents protect new, useful, and non-obvious inventions or processes
  • What is the primary goal of data privacy laws and regulations?
    Protect personal data
  • Ethical concerns in computing include issues of fairness and accountability.

    True
  • Legal concerns in computing encompass intellectual property rights, privacy laws, and data protection regulations
  • What do intellectual property rights protect in computing?
    Creative and innovative works
  • Match the type of intellectual property right with its definition:
    Copyright ↔️ Protects original literary and artistic works
    Patents ↔️ Covers new, useful, and non-obvious inventions
    Trademarks ↔️ Protects brands, logos, and names
  • Match the data privacy law with its description:
    GDPR ↔️ Protects personal data in the EU
    CCPA ↔️ Gives consumers control in California
  • Steps for determining fair use in digital environments:
    1️⃣ Assess the purpose and character of the use
    2️⃣ Consider the nature of the copyrighted work
    3️⃣ Determine the amount and substantiality used
    4️⃣ Evaluate the effect on the market
  • Understanding bias helps developers create fairer algorithms.

    True
  • Computing professionals have an ethical obligation to consider the social impact of their work.
    True
  • Transparency in cybersecurity measures helps users understand the level of protection provided.

    True
  • Organizations must communicate the limitations of their cybersecurity measures to users.

    True
  • Ethical concerns in computing include privacy, security, and fairness