lesson 5

Cards (20)

  • Social issues
    Problems or matters which have an INFLUENCE over a LARGE POPULATION
  • Causes of social issues
    • Geographical Reasons
    • Education Reasons
    • Economical Reasons
    • Political Reasons
  • Ethical issues
    Instances where people go AGAINST accepted behavioral pattern
  • Four big areas of computer ethics
    • Computer crime
    • Responsibility for computer failure
    • Protection of computer property, records, and software
    • Privacy of the company, workers, and customers
  • Computer Crime
    Intellectual, white-collar crime committed by those intelligent enough to MANIPULATE COMPUTER SYSTEM and in a position to access it
  • Hacking
    Any computer-related activity which is NOT sanctioned or APPROVED of by an employer or owner of a system or network
  • Privacy
    The computer's capacity to store, organized, and exchange records
  • Invasion of privacy
    The intrusion into the personal life of another, without just cause
  • Hacking
    Unauthorized intrusion into computer account, system or a network
  • Security
    Protecting the confidentiality, integrity and availability of data
  • Confidentiality
    Ensuring that data or information are not disclosed to unauthorized person, persons or party
  • Integrity
    Protecting data or information against unauthorized alteration
  • Availability
    An assurance that data can be accessed readily by authorized person, persons or party or those with permission to obtain the data or information
  • Copyright infringement
    Unauthorized or prohibited use of works covered by copyright law, in a way that violates one of the copyright owner's exclusive rights
  • Copyright
    A form of protection that covers the field of creative work both fiction and non fiction
  • Patent
    Protects inventions, processes, devices or methods from being copied
  • Virus / Computer virus
    A type of malicious software (malware) that replicates by inserting copies of itself into other computer programs, data file, or the boot sector or the hard drive
  • Types of computer viruses
    • Boot sector virus
    • Web scripting virus
    • Browser hijacker
    • Resident virus
    • Polymorphic virus
    • File infector virus
    • Multipartite virus
    • Macro virus
  • Unfair competition
    A branch of intellectual property law, applied to all dishonest or fraudulent rivalry in trade and commerce
  • Theft / Identity theft
    The taking of another person's property without that person's permission or consent with the intent to deprive the rightful owner of it