• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

WGU D333 Ethics in Technology - WGU

Latest WGU Jan 9, 2026 ★★★★☆ (4.0/5)
Loading...

Loading document viewer...

Page 0 of 0

Document Text

WGU D333 Ethics in Technology - WGU 27 studiers today 4.9 (81 reviews) Students also studied Terms in this set (332) Western Governors UniversityD 333 Save WGU C851 (Linux Foundations) 81 terms aurielcofieldPreview D278 Exam Prep 53 terms Sergeantsavage1 Preview Digital Forensics Overview and Key ...329 terms hedanielPreview WGU - 85 terms Pon acceptable use policy (AUP)A document that stipulates restrictions and practices that a user must agree in order to use organizational computing and network resources.acceptanceWhen an organization decides to accept a risk because the cost of avoiding the risk outweighs the potential loss of the risk. A decision to accept a risk can be extremely difficult and controversial when dealing with safety-critical systems because making that determination involves forming personal judgments about the value of human life, assessing potential liability in case of an accident, evaluating the potential impact on the surrounding natural environment, and estimating the system's costs and benefits.advanced persistent threat (APT)A network attack in which an intruder gains access to a network and stays there— undetected—with the intention of stealing data over a long period of time (weeks or even months).agile developmentA software development methodology in which a system is developed in iterations lasting from one to four weeks. Unlike the waterfall system development model, agile development accepts the fact that system requirements are evolving and cannot be fully understood or defined at the start of the project.Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS) An agreement of the World Trade Organization that requires member governments to ensure that intellectual property rights can be enforced under their laws and that penalties for infringement are tough enough to deter further violations.

American Recovery and Reinvestment ActA wide-ranging act that authorized $787 billion in spending and tax cuts over a 10- year period and included strong privacy provisions for electronic health records, such as banning the sale of health information, promoting the use of audit trails and encryption, and providing rights of access for patients.annualized loss expectancy (ALE)The estimated loss from a potential risk event over the course of a year. The following equation is used to calculate the annual loss expectancy: ARO × SLE = ALE. Where ARO is the annualized rate of occurrence, an estimate of the probability that this event will occur over the course of a year and SLE is the single loss expectancy, the estimated loss that would be incurred if the event happens.annualized rate of occurrence (ARO)An estimate of the probability that a risk event will occur over the course of a year.anonymous expressionThe expression of opinions by people who do not reveal their identity.anonymous remailer serviceA service that allows anonymity on the Internet by using a computer program that strips the originating header and/or IP address from the message and then forwards the message to its intended recipient.anti-SLAPP lawsLaws designed to reduce frivolous SLAPPs (strategic lawsuit against public participation (SLAPP), which is a lawsuit filed by corporations, government officials, and others against citizens and community groups who oppose them on matters of concern).antivirus softwareSoftware that scans for a specific sequence of bytes, known as a virus signature, that indicates the presence of a specific virus.artificial intelligence systemsThe people, procedures, hardware, software, data, and knowledge needed to develop computer systems and machines that can simulate human intelligence processes, including learning (the acquisition of information and rules for using the information), reasoning (using rules to reach conclusions), and self-correction (using the outcome from one scenario to improve its performance on future scenarios).audit committeeA group that provides assistance to the board of directors in fulfilling its responsibilities with respect to the oversight of the quality and integrity of the organization's accounting and reporting practices and controls, including financial statements and reports; the organization's compliance with legal and regulatory requirements; the qualifications, independence, and performance of the company's independent auditor; and the performance of the company's internal audit team.avoidanceThe elimination of a vulnerability that gives rise to a particular risk in order to avoid the risk altogether. This is the most effective solution but often not possible due to organizational requirements and factors beyond an organization's control.Bathsheba syndromeThe moral corruption of people in power, which is often facilitated by a tendency for people to look the other way when their leaders act inappropriately.

best practiceA method or technique that has consistently shown results superior to those achieved with other means and that is used as a benchmark within a particular industry.Bill of RightsThe first 10 amendments to the United States Constitution that spell out additional rights of individuals.black-box testingA type of dynamic testing that involves viewing the software unit as a device that has expected input and output behaviors but whose internal workings are unknown (a black box).blended threatA sophisticated threat that combines the features of a virus, worm, Trojan horse, and other malicious code into a single payload.body of knowledgeAn agreed-upon sets of skills and abilities that all licensed professionals must possess.botnetA large group of computers, which are controlled from one or more remote locations by hackers, without the knowledge or consent of their owners.breach of contractThe failure of one party to meet the terms of a contract.breach of the duty of careThe failure to act as a reasonable person would act.breach of warrantyWhen a product fails to meet the terms of its warranty.briberyThe act of providing money, property, or favors to someone in business or government in order to obtain a business advantage.bring your own device (BYOD)A business policy that permits, and in some cases, encourages employees to use their own mobile devices (smartphones, tablets, or laptops) to access company computing resources and applications, including email, corporate databases, the corporate intranet, and the Internet.BSA | The Software AllianceA trade group that represent the world's largest software and hardware manufacturers.business continuity planA risk-based strategy that includes an occupant emergency evacuation plan, a continuity of operations plan, and an incident management plan with an active governance process to minimize the potential impact of any security incident and to ensure business continuity in the event of a cyberattack or some form of disaster.business information systemA set of interrelated components—including hardware, software, databases, networks, people, and procedures—that collects and processes data and disseminates the output.Capability Maturity Model Integration (CMMI) models Collection of best practices that help organizations improve their processes.

CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart) Software that generates and grades tests that humans can pass and all but the most sophisticated computer programs cannot.certificationIndicates that a professional possesses a particular set of skills, knowledge, or abilities, in the opinion of the certifying organization. Certification can also apply to products (e.g., the Wi-Fi CERTIFIED logo assures that the product has met rigorous interoperability testing to ensure that it will work with other Wi-Fi- certified products) and is generally voluntary.Child Online Protection Act (COPA)An act signed into law in 1998 with the aim of prohibiting the making of harmful material available to minors via the Internet; the law was ultimately ruled largely unconstitutional.Children's Internet Protection Act (CIPA)An act passed in 2000; it required federally financed schools and libraries to use some form of technological protection (such as an Internet filter) to block computer access to obscene material, pornography, and anything else considered harmful to minors.Children's Online Privacy Protection Act (COPPA) An act implemented in 1998 in an attempt to give parents control over the collection, use, and disclosure of their children's personal information.CIA security triadRefers to confidentiality, integrity, and availability.clinical decision support (CDS)A process and a set of tools designed to enhance healthcare-related decision making through the use of clinical knowledge and patientspecific information to improve healthcare delivery.CMMI-Development (CMMI-DEV)A specific application of CMMI frequently used to assess and improve software development practices.code of ethicsA statement that highlights an organization's key ethical issues and identifies the overarching values and principles that are important to the organization and its decision making.coemployment relationshipA employment situation in which two employers have actual or potential legal rights and duties with respect to the same employee or group of employees.Communications Assistance for Law Enforcement Act

(CALEA)

An act passed in 1994 that amended the Wiretap Act and Electronic Communications Privacy Act, which required the telecommunications industry to build tools into its products that federal investigators could use—after obtaining a court order—to eavesdrop on conversations and intercept electronic communications.Communications Decency Act (CDA)Title V of the Telecommunications Act, it aimed at protecting children from pornography, including imposing $250,000 fines and prison terms of up to two years for the transmission of "indecent" material over the Internet.complianceTo be in accordance with established policies, guidelines, specifications, or legislation.

User Reviews

★★★★☆ (4.0/5 based on 1 reviews)
Login to Review
S
Student
May 21, 2025
★★★★☆

With its step-by-step guides, this document helped me ace my presentation. Definitely a superb choice!

Download Document

Buy This Document

$11.00 One-time purchase
Buy Now
  • Full access to this document
  • Download anytime
  • No expiration

Document Information

Category: Latest WGU
Added: Jan 9, 2026
Description:

WGU D333 Ethics in Technology - WGU 27 studiers today 4.9 (81 reviews) Students also studied Terms in this set Western Governors UniversityD 333 Save WGU C851 (Linux Foundations) 81 terms aurielcof...

Unlock Now
$ 11.00