Computer Security - Exam II

Card Set Information

Computer Security - Exam II
2013-10-17 23:12:09
19 Computer Security

Legal and Ethical Aspects
Show Answers:

  1. computer crime or cybercrime
    a term used broadly to describe criminal activity in which computers or computer networks are a tool, a target, or a place of criminal activity
  2. computers as targets
    computers as storage devices
    computers as communications tools
    categories of computer crimes based on the role that the computer plays in the criminal activity
  3. real property
    personal property
    intellectual property
    three primary types of property
  4. real property
    type of property categorized as land and things permanently attached to the land such as trees, buildings, and stationary mobile homes
  5. personal property
    type of property categorized as personal effects, moveable property and goods, such as cars, bank accounts, wages, securities, a small business, furniture, insurance policies, jewelry, patents, pets, and season baseball tickets
  6. intellectual property
    type of property categorized as any intangible asset that consists of human knowledge and ideas - examples include software, data, novels, sound recordings, the design of a new type of mousetrap, or a cure for a disease
  7. copyrights
    tyree main types of intellectual property for which legal protection is available
  8. infringement
    the invasion of the rights secured by copyrights, trademarks, and patents
  9. copyright
    protects the tangible or fixed expression of an idea, not the idea itself - work must be original, and in a concrete form, ex: literary works, musical works, plays, photos, software, etc.
  10. reproduction right
    modification right
    distribution right
    public-performance right
    public-display right
    exclusive rights protected against infringement
  11. patent
    the grant of a property right to the inventor - the right to exclude others from making, using, offering for sale, or selling or importing the invention into the U.S.
  12. utility patents - process, machine, etc.
    design patents - ornamental design for an article
    plant patents - invents or discovers new plants
    three types of patents
  13. trademark
    a word, name, symbol, or device that is used in trade with goods to indicate the source of the goods and to distinguish them from the goods of others
  14. servicemark
    a word, name, symbol, or device that is used in trade to indicate the source of the services and to distinguish them from the services of others - identifies and distinguishes the source of a service rather than a product
  15. Digital Millennium Copyright Act (DMCA)
    law strengthening the protection of copyrighted materials in digital format
  16. Digital Rights Management (DRM)
    law referring to systems and procedures that ensure that holders of digital rights are clearly identified and receive the stipulated payment for their works
  17. content provider
    holds the digital rights of the content and wants to protect these rights
  18. distributor
    provides distribution channels, such as an online shop or a Web retailer
  19. consumer
    uses the system to access the digital content by retreiving downloadable or streaming content through the distribution channel and then paying for the digital license
  20. clearinghouse
    handles the financial transaction for issuing the digital license to the consumer and pays royalty fees to the content provider and distribution fees to the distributor accordingly
  21. anonymity
    four major areas of computer usage privacy
  22. anonymity
    ensures that a user may use a resource or service without disclosing the user's identity
  23. pseudonymity
    ensures that a user may use a resource or service without disclosing its user identity, but can still be accountable for that use - the system provides an alias to prevent others from determining a user's identity, but the system is still able to determine the user's identity
  24. unlinkability
    ensures that a user may make multiple uses of resources or services without others beingable to link these uses together
  25. unobservability
    ensures that a user may use a resource or service without others being able to observe that the resource or service is being used
  26. 1.humanity - integrity, fairness
    2.professionalism - higher order of societal well-being
    3.each profession - profession-unique standards
    components of the ethical hierarchy
  27. technology intrusion
    ethical dilemma which includes: privacy internal & external to the firm, computer surveillance, employee monitoring, & hacking
  28. ownership issues
    ethical dilemma which includes moonlighting, proprietary rights, conflicts of interest, software copyrights, use of company assets for personal benefit, and theft of data, software, or hardware
  29. legal issues and social responsibilities
    ethical dilemma which includes embezzlement, fraud and abuse, accuracy and timliness of data, over-rated system capabilities and "smart" computers, and monopoly of data
  30. personnel issues
    ethical dilemma which includes employee sabotage, ergonomics and human factors, and training to avoid job obsolescence
  31. technology intrusion
    ownership issues
    legal issues and social responsibilities
    personnel issues
    potential ethical dilemmas for information systems