Ethics in Technology WGU C961 4.5 (2 reviews) Students also studied Terms in this set (239) Western Governors UniversityD 333 Save WGU D333 Ethics in Technology - W...332 terms DrkintrudrPreview C961 Ethics In Technology Glossary ...186 terms silv91Preview D686 250 terms stuffjimlPreview WGU - 70 terms jeni Bathsheba SyndromeThe moral corruption of people in power, which is often facilitated by a tendency for people to look the other way when their leaders act inappropriately.Corporate Social Responsibility (CSR)The concept that an organization should act ethically by taking responsibility for the impact of its actions on its shareholders, consumers, employees, community, environment, and suppliers.EthicsA code of behavior that is defined by the group to which an individual belongs.IntegrityAdherence to a personal code of principles.MoralsThe personal principles upon which an individual bases his or her decisions about what is right and what is wrong.Supply Chain SustainabilityA component of corporate social responsibility (CSR) that focuses on developing and maintaining a supply chain that meets the needs of the present without compromising the ability of future generations to meet their needs.Acceptable Use Policy (AUP)A document that stipulates restrictions and practices that a user must agree in order to use organizational computing and network resources.Advanced Persistent Threat (APT)A network attack in which an intruder gains access to a network and stays there-- undetected--with the intention of stealing data over a long period of time (weeks/ even months)
Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS) An agreement of the World Trade Organization that requires member governments to ensure that intellectual property rights can be enforced under their laws and that penalties for infringement are tough enough to deter further violations.Anonymous ExpressionThe expression of opinions by people who do not reveal their identity.Anonymous Remailer ServiceA service that allows anonymity on the internet by using a computer program that strips the originating header and/or IP address from the message and then forwards the message to its intended recipient.Anti-SLAPP LawsLaws designed to reduce frivolous SLAPPs (strategic lawsuit against public participation), which is a lawsuit filed by corporations, government officials, and others against citizens and community groups who oppose them on matters of concern.Antivirus SoftwareSoftware that scans for a specific sequence of bytes, known as a virus signature, that indicates the presence of a specific virus.Artificial Intelligence SystemsThe people, procedures, hardware, software, data, and knowledge needed to develop computer systems and machines that can simulate human intelligence processes, including learning (the acquisition of information and rules to reach conclusions), and self-correction (using the outcome from one scenario to improve its performance on future scenarios).Audit CommitteeA group that provides assistance to the board of directors in fulfilling its responsibilities with respect to the oversight of the quality and integrity of the organization's accounting and reporting practices and controls, including financial statements and reports; the organization's compliance with legal and regulatory requirements; the qualifications, independence, and performance of the company's independent auditor; and the performance of the company's internal audit team.Blended ThreatA sophisticated threat that combines the features of a virus, worm, Trojan horse, and other malicious code into a single playload.Body of KnowledgeAn agreed upon set of skills and abilities that all licensed professionals must possess.BotnetA large group of computers, which are controlled from one or more remote locations by hackers, without the knowledge or consent of their owners.Breach of ContractThe failure of one party to meet the terms of a contract.Breach of the Duty of CareThe failure to act as a reasonable person would act.BriberyThe act of providing money, property, or favors to someone in business or government in order to obtain a business advantage.
Bring Your Own Device (BYOD)A Business policy that permits--and in some cases, encourages--employees to use their own mobile devices (smartphones, tablets, or laptops) to access company computer resources and applications, including email, corporate intranet, and the internet.BSA | The Software Alliance (BSA)The trade groups that represent the world's largest software and hardware manufacturers.Business Continuity PlanA risk-based strategy that includes an occupant emergency evacuation plan, a continuity of operations plan, and an incident management plan with an active governance process to minimize the potential impact of any security incident and to ensure business continuity in the event of a cyberattack or some form of disaster.CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart) Software that generates and grades tests that humans can pass and all but the most sophisticated computers programs cannot.CertificationIndicates that a professional possesses a particular set of skills, knowledge, or abilities, in the opinion of the certifying organization. Certification can also apply to products (e.g., the Wi-Fi CERTIFIED logo assures that the product has met rigorous interoperability testing to ensure that it will work with other Wi-Fi certified products) and is generally voluntary.Child Online Protection Act (COPA)An act signed into law in 1998 with the aim of prohibiting the making of harmful material available to minors via the internet; the law was ultimately ruled largely unconstitutional.Children's Internet Protection Act (CIPA)An act passed in 2000; it required federally financed schools and libraries to use some form of technological protection (such as an internet filter) to block computer access to obscene material, pornography, and anything else considered harmful to minors.CIA Security TriadRefers to confidentiality, integrity, and availability.Clinical Decision Support (CDS)A process and a set of tools designed to enhance healthcare related decision making through the use of clinical knowledge and patient-specific information to improve healthcare delivery.Code of EthicsA statement that highlights an organization's key ethical issues and identifies the overarching values and principles that ate important to the organization and its decision-making.Community Decency Act (CDA)Title V of the Telecommunications Act, it aimed at protecting children from pornography, including imposing $250,000 fines and prison terms of up to two years for the transmission of "indecent" material over the internet.ComplianceTo be in accordance with established policies, guidelines, specifications, or legislation.
Computer ForensicsA discipline that combines elements of law and computer science to identify, collect, examine, and preserve data from computer systems, networks, and storage devices in a manner that preserves the integrity of the data gathered so that it is admissible as evidence in a court of law.Computerized Provider Order Entry (CPOE) System A system that enables physicians to place orders (for drugs, laboratory tests, radiology, physical therapy) electronically, with the orders transmitted directly to the recipient.Conflict of InterestA conflict between a person's (or firm's) self interest and the interests of a client.Contingent WorkA job situation in which an individual does not have an explicit contract for long term employment.Controlling the Assault of Non Solicited Pornography and Marketing (CANSPAM) Act A law that specifies that it is legal to spam, provided the messages meet a few basic requirements: spammers cannot disguise their identity by using a false return address, the email must include a label specifying that it is an ad or a solicitation, and the email must include a way for recipients to indicate that they do not want future mass mailings.CopyrightThe exclusive right to distribute, display, perform, or reproduce an original work in copies or to prepare derivative works based on the work; granted to creators of original works of authorship.Copyright InfringementA violation of the rights secured by the owner of a copyright; occurs when someone copies a substantial and material part of another's copyrighted work without permission.Corporate Compliance OfficerSee Corporate Ethics Officer Corporate Ethics OfficerA senior-level manager who provides an organization with vision and leadership in the area of business conduct.Cost Per Click (CPC)One of the two common methods of charging for paid media in which ads are paid for only when someone actually clicks on them.Cost Per Thousand Impressions (CPM)One of the two common methods of charging for paid media in which ads ate billed at a flat rate per 1,000 impressions, which is a measure of the number of times an ad is displayed whether it was actually clicked or not.CyberabuseAny form of mistreatment or lack of care, both physical and mental, using an electronic communications device that causes harm and distress to others.CyberespionageThe deployment of malware that secretly steals data in the computer systems of organizations, such as government agencies, military contractors, political organizations, and manufacturing firms.CyberharassmentA form of cyberabuse in which the abusive behavior, which involves the use of an electronic communications device, is degrading, humiliating, hurtful, insulting, intimidating, malicious, or otherwise offensive to an individual or a group of individuals, causing substantial emotional distress.