Untitled
110 Questions
336 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Information Ethics may be described as the study of the moral issues arising from “the triple

  • availability
  • accessibility
  • all the above. (correct)
  • accuracy
  • What does IE stand for in the context of computer ethics?

  • Internet Ethics
  • Intellectual Ethics
  • Information Engineering
  • Information Ethics (correct)
  • The term “ecopoiesis” refers to

  • the normal construction of sky
  • the morally informed construction of the environment (correct)
  • the moral construction of Vans
  • none of above
  • what is a morally qualifiable action?

    <p>An action that can cause moral good or evil.</p> Signup and view all the answers

    what sort of moral agents inhabit the infosphere?

    <p>The short answer is that IE defines as a moral agent</p> Signup and view all the answers

    transition system is:

    <p>All of the above</p> Signup and view all the answers

    Which one of the stages does IE have?

    <p>All of the above</p> Signup and view all the answers

    information ethics was used as a general label to discuss issues regarding information (or data) confidentiality, reliability, quality, and usage.

    <p>True</p> Signup and view all the answers

    information-intensive services are business and property services, communications, finance, and insurance

    <p>True</p> Signup and view all the answers

    consideration of artificial agents as moral agents IE does not refer to the moral value of meaningful data such as an e-mail.

    <p>True</p> Signup and view all the answers

    Justice requires “the liberty of each human being to develop in his freedom the full measure of the human possibilities embodied in him.”:

    <p>The Principle of Freedom.</p> Signup and view all the answers

    Justice requires “the equality by which what is just for A and B remains just when the positions of A and B are interchanged.”:

    <p>The Principle of Equality.</p> Signup and view all the answers

    Justice requires “a good will between man and man that knows no limits short of those of humanity itself.”:

    <p>The Principle of Benevolence.</p> Signup and view all the answers

    Enables human beings to do an enormous number of new things that they never were able to do before:

    <p>all the mentioned.</p> Signup and view all the answers

    Many people found Moor's account of computer ethics to be _________ way to understand and deal with emerging computer ethics issues:

    <p>insightful and a helpful</p> Signup and view all the answers

    His account of the nature of computer ethics quickly became the most influential one among a growing number of scholars across America who were joining the computer ethics research community

    <p>James Moor.</p> Signup and view all the answers

    Moor provided a very effective problem-solving method:

    <p>All the mentioned.</p> Signup and view all the answers

    "Fundamental Principles" of information ethics offered by Floridi.

    <p>All the mentioned.</p> Signup and view all the answers

    Since everything that exists, according to Floridi's theory, is an informational object or process, he calls the totality of all that exists:

    <p>The infosphere</p> Signup and view all the answers

    A typical problem in computer ethics arise because there is a _____________ about how computer technology shoulde be used.

    <p>policy vacuum.</p> Signup and view all the answers

    After a focus on normative ethical theory and its application and justification, emphasis is now placed by some authors on the ................. of institutions, infrastructure, and technology, as shaping factors in our lives and in society.

    <p>design</p> Signup and view all the answers

    Until now ................ (was/were) treated in moral philosophy as a mere supplier of thought experiments and counter-examples to arguments and theories.

    <p>All of that above</p> Signup and view all the answers

    This/These developments in ethics come in the idea of Value Sensitive Design (VSD).

    <p>All of the above.</p> Signup and view all the answers

    Was first proposed in connection with information and communication technology, and that is still its main area of application.

    <p>VSD</p> Signup and view all the answers

    Focuses on existing moral controversies and practices and on use, although it should also explore uncharted terrain and focus on the technology and its design.

    <p>Traditional applied ethics.</p> Signup and view all the answers

    Ethics was in the beginning of the twentieth century predominantly a .............

    <p>Metaethical Enterprise.</p> Signup and view all the answers

    Ethics has seen notable changes in the course of the past 100 years

    <p>True</p> Signup and view all the answers

    The simplest way to be a generalist is to think that there are fairly accurate general moral rules or principles that may be captured and codified, for example, in codes of conduct, which can be applied to particular cases.

    <p>True</p> Signup and view all the answers

    Jonathan Dancy defines particularism in Ethics Without Principles as follows: “The possibility of moral thought and judgment depend on the provision of a suitable supply of moral principles.”

    <p>False</p> Signup and view all the answers

    onathan Dancy defines particularism in Ethics Without Principles as follows: “The possibility of moral thought and judgment does not depend on the provision of a suitable supply of moral principles.”

    <p>True</p> Signup and view all the answers

    Computer ethicists should probe beyond the technicalstatus quo and ask how the problem came into being, and what are the designs and architectural decisions that have led up to it.

    <p>True</p> Signup and view all the answers

    ………………. refer to parties (individuals or organizations) who interact directly with the computer system or its output.

    <p>Direct stakeholders</p> Signup and view all the answers

    ……………… refer to all other parties who are affected by the use of the system

    <p>Indirect stakeholders</p> Signup and view all the answers

    Focus on the design and performance of the technology itself:

    <p>Technical investigations</p> Signup and view all the answers

    Focus on the individuals, groups, or larger social systems that configure, use, or are otherwise affected by the technology:

    <p>Empirical Investigations</p> Signup and view all the answers

    theoretically grounded approach to the design of technology that accounts for human values in a principled and comprehensive manner throughout the design process:

    <p>Value sensitive Design</p> Signup and view all the answers

    Heuristics for Interviewing Stakeholders:

    <p>As part of an Empirical investigation.</p> Signup and view all the answers

    When systematically determining the benefits and harms for each group of stakeholders, attention must be paid to:

    <p>All of the above</p> Signup and view all the answers

    Empirical investigations are not need to evaluate the success of a particular design.

    <p>False</p> Signup and view all the answers

    Empirical investigations need to evaluate the success of a particular design.

    <p>True</p> Signup and view all the answers

    conceptual investigation entails a philosophically informed analysis of the central value constructs.

    <p>True</p> Signup and view all the answers

    Technical investigations provides a critical protection for privacy, and supports other human values such as autonomy and trust

    <p>False</p> Signup and view all the answers

    Informed consent provides a critical protection for privacy, and supports other human values such as autonomy and trust

    <p>True</p> Signup and view all the answers

    . …………………. `s ground intellectual property rights in social progress and incentives to innovate.

    <p>Rule-utilitarian</p> Signup and view all the answers

    …………………… is generally characterized as nonphysical property that is the product of cognitive processes and whose value is based up on some idea or collection of ideas

    <p>Intellectual property</p> Signup and view all the answers

    ……………. protection extends to original works of authorship fixed in any tangible medium of expression.

    <p>Copyright</p> Signup and view all the answers

    …………… yield the strongest form of protection, in that a 20 years exclusive monopoly is granted over any expression or implementation of the protected work.

    <p>Patents</p> Signup and view all the answers

    A …………………. may consist of any formula, pattern, device, or compilation of information that is used in one's business

    <p>Trade secret</p> Signup and view all the answers

    The two major restrictions on the domain of trade secrets are:

    <p>All of the above</p> Signup and view all the answers

    …………………… defenders maintain that intellectual property is an extension of individual personality.

    <p>Personality-based</p> Signup and view all the answers

    Intellectual property falls under the umbrella of tangible property.

    <p>False</p> Signup and view all the answers

    Intellectual property falls under the umbrella of intangible property

    <p>True</p> Signup and view all the answers

    One alternative to granting patent rights to inventors as incentive is government support of intellectual labor.

    <p>True</p> Signup and view all the answers

    personality-based theories of intellectual property aren’t appeal to other moral considerations.

    <p>False</p> Signup and view all the answers

    personality-based theories of intellectual property often appeal to other moral considerations

    <p>True</p> Signup and view all the answers

    …………………. one has informational privacy when she is able to limit or restrict others from access to information about herself.

    <p>The Restricted Access Theory</p> Signup and view all the answers

    One's having privacy is directly linked to one's having control over information about oneself.

    <p>The Control Theory</p> Signup and view all the answers

    Distinguishes between the concept of privacy, which it defines in terms of restricted access, and the management of privacy.

    <p>)RALC) Theory</p> Signup and view all the answers

    The way individuals can easily become associated with and linked to newly created groups that are made possible by technologies such as KDD (Knowledge Discovery in Databases).

    <p>Categorial Privacy</p> Signup and view all the answers

    …………………………… are relatively recent expressions used to refer to a conception of privacy.

    <p>Physical privacy and Accessibility privacy</p> Signup and view all the answers

    …………… concerns affected by the amount of personal data collected

    <p>Informational privacy</p> Signup and view all the answers

    privacy protects the interest individuals have in sustaining a personal space, free from interference by other people and organizations.

    <p>True</p> Signup and view all the answers

    privacy is conceived of as a “utility” in that it can help to preserve human dignity

    <p>True</p> Signup and view all the answers

    . Individual privacy is much more difficult to achieve in highly technological societies.

    <p>True</p> Signup and view all the answers

    Informational privacy concerns can affect many aspects of an individual's life from commerce to healthcare to work to recreation

    <p>True</p> Signup and view all the answers

    Informational privacy concerns cannot affect many aspects of an individual's life from commerce to healthcare to work to recreation

    <p>False</p> Signup and view all the answers

    . ………. are choices between good and bad.

    <p>Morals</p> Signup and view all the answers

    ………. is fundamental laws that govern human behavior; i.e. Golden Rule.

    <p>Principle</p> Signup and view all the answers

    ………. is something a group holds to be valuable or worthwhile

    <p>Value</p> Signup and view all the answers

    Copyrights protect published works such as books, articles, software, etc.

    <p>True</p> Signup and view all the answers

    Universality is reasons for action that all people in society could accept.

    <p>True</p> Signup and view all the answers

    Transitivity is reasons for action that all people in society could accept.

    <p>False</p> Signup and view all the answers

    Utilitarian Ethics is the decision that produces the highest good for all people involved.

    <p>True</p> Signup and view all the answers

    . ………. is a legal protection for a design or invention.

    <p>Patent</p> Signup and view all the answers

    ………. is something that one owes; an obligation; debt.

    <p>Liability</p> Signup and view all the answers

    ………. is any wrongful act that does not involve a breach of contract and for which civil suit can be brought.

    <p>Tort</p> Signup and view all the answers

    .………. not following reasonable rules and standards that apply and committed a wrongful act

    <p>Negligence</p> Signup and view all the answers

    In consequentialism ethical theory, human actions are judged good or bad, right or wrong, depending on the results of such actions.

    <p>True</p> Signup and view all the answers

    Act utilitarianism tells one to obey those rules that bring the maximum happiness to the greatest number of people.

    <p>False</p> Signup and view all the answers

    Rule utilitarianism tells one to obey those rules that bring the maximum happiness to the greatest number of people.

    <p>True</p> Signup and view all the answers

    This theory considers human beings as endowed with all faculties and capabilities to live in happiness.

    <p>Human Nature</p> Signup and view all the answers

    ………. states how people ought to behave as they pursue their own interests.

    <p>Ethical egoism</p> Signup and view all the answers

    It claims that pleasure is the only good thing in human life.

    <p>Hedonism</p> Signup and view all the answers

    ………. maintains that ethical statements are neither true nor false and cannot be proven; they are really only statement about how someone feels

    <p>Emotivism</p> Signup and view all the answers

    Asymmetric encryption commonly known as ……….

    <p>Public key encryption</p> Signup and view all the answers

    Act in accordance with your duties, following the appropriate rules.

    <p>Deontology</p> Signup and view all the answers

    This theory is negatively formulated, denying the existence of universal moral norms.

    <p>Relativism</p> Signup and view all the answers

    ………. prevents unauthorized withholding of information from those who need it when they need it.

    <p>Availability</p> Signup and view all the answers

    A loss of privacy online and risk of hacking creates more deceit

    <p>True</p> Signup and view all the answers

    A loss of privacy online and risk of hacking creates more deceit

    <p>True</p> Signup and view all the answers

    ………. causes more energy consumption and pollution

    <p>Technology</p> Signup and view all the answers

    Bad Effects of New Technology on Society are

    <p>All of them</p> Signup and view all the answers

    A loss of privacy online and risk of hacking creates more ……….

    <p>Deceit</p> Signup and view all the answers

    It is much easier to be a bully while hidden away ………

    <p>Online</p> Signup and view all the answers

    ………. is set of moral principles that regulate the use of computers.

    <p>Computer ethics</p> Signup and view all the answers

    This may be one of the biggest drawbacks of device-filled world.

    <p>Technology promotes a more sedentary lifestyle</p> Signup and view all the answers

    Technology addiction is becoming more ……….

    <p>Widespread</p> Signup and view all the answers

    ………. is a process of exploration and analysis of large quantities of data by automatic or semi-automatic means.

    <p>Data mining</p> Signup and view all the answers

    Principles of right and wrong.

    <p>Ethics</p> Signup and view all the answers

    Privacy and Freedom in the Internet Age.

    <p>Information Rights</p> Signup and view all the answers

    What are some potential motives for targeting a computer system while committing an offense, such as gaining entry to a computer system in order to cause damage to the computer or the data it contains?

    <p>All of the above</p> Signup and view all the answers

    A grant to the creator of an invention granting the owner an exclusive monopoly on the ideas behind an invention for between 17 and 20 years.

    <p>Patents</p> Signup and view all the answers

    The Computer Ethics Institute developed these guidelines for ethical computer use that prohibit all the following behaviors EXCEPT

    <p>Respecting other people's privacy</p> Signup and view all the answers

    What is the illegal action through using a computer?

    <p>Attacks via the Internet</p> Signup and view all the answers

    ………. is an organized attempt by a country's military to disrupt or destroy the information and communications systems of another country.

    <p>Cyberwar</p> Signup and view all the answers

    Three main ways that intellectual property is protected:

    <p>All of the above</p> Signup and view all the answers

    Spyware is a Software downloaded onto a user’s computer - usually without the user’s knowledge - that tracks Web behaviour and reports that behaviour to a third-party server

    <p>True</p> Signup and view all the answers

    . Spyware is a Software downloaded onto a user’s computer - usually with the user’s knowledge - that tracks Web behaviour and reports that behaviour to a third-party server

    <p>False</p> Signup and view all the answers

    Organizations can easily maintain detailed databases on individuals.

    <p>True</p> Signup and view all the answers

    Organizations can not easily maintain detailed databases on individuals

    <p>False</p> Signup and view all the answers

    More Like This

    Data Ethics Quiz
    2 questions

    Data Ethics Quiz

    FeasibleSquirrel avatar
    FeasibleSquirrel
    Information Technology Basics Quiz
    19 questions
    Computer Ethics Quiz
    10 questions

    Computer Ethics Quiz

    CelebratoryWaterfall604 avatar
    CelebratoryWaterfall604
    Use Quizgecko on...
    Browser
    Browser