Podcast
Questions and Answers
Which of the following is NOT a primary privacy issue?
Which of the following is NOT a primary privacy issue?
What type of information do telephone companies typically compile?
What type of information do telephone companies typically compile?
What is one of the risks of social networking?
What is one of the risks of social networking?
Which of the following best describes information resellers?
Which of the following best describes information resellers?
Signup and view all the answers
What assumption do people often make about using personal computers online?
What assumption do people often make about using personal computers online?
Signup and view all the answers
Which organization typically collects purchase history and payment records?
Which organization typically collects purchase history and payment records?
Signup and view all the answers
What can errors in credit history result from?
What can errors in credit history result from?
Signup and view all the answers
What is a common practice among employers regarding employee monitoring?
What is a common practice among employers regarding employee monitoring?
Signup and view all the answers
What is a common technique used by cybercriminals to manipulate individuals into revealing sensitive information?
What is a common technique used by cybercriminals to manipulate individuals into revealing sensitive information?
Signup and view all the answers
Which type of malware self-replicates over a network and can cause system overload?
Which type of malware self-replicates over a network and can cause system overload?
Signup and view all the answers
What is the function of first-party cookies in web browsing?
What is the function of first-party cookies in web browsing?
Signup and view all the answers
Which anti-cybercrime law makes it illegal to access unauthorized computer systems?
Which anti-cybercrime law makes it illegal to access unauthorized computer systems?
Signup and view all the answers
What is a characteristic of a Trojan horse in cybersecurity?
What is a characteristic of a Trojan horse in cybersecurity?
Signup and view all the answers
Which of the following describes rogue Wi-Fi hotspots?
Which of the following describes rogue Wi-Fi hotspots?
Signup and view all the answers
What are cookies primarily used for?
What are cookies primarily used for?
Signup and view all the answers
Which type of cookie is created by advertising companies?
Which type of cookie is created by advertising companies?
Signup and view all the answers
What is the primary purpose of using security software?
What is the primary purpose of using security software?
Signup and view all the answers
Which online privacy concept refers to the mistaken belief that one cannot be tracked online?
Which online privacy concept refers to the mistaken belief that one cannot be tracked online?
Signup and view all the answers
What is a web bug?
What is a web bug?
Signup and view all the answers
Which of the following is NOT an aspect of computer security?
Which of the following is NOT an aspect of computer security?
Signup and view all the answers
What is the main purpose of antispyware programs?
What is the main purpose of antispyware programs?
Signup and view all the answers
Which form of cybercrime involves assuming someone's identity?
Which form of cybercrime involves assuming someone's identity?
Signup and view all the answers
What does encrypting data accomplish?
What does encrypting data accomplish?
Signup and view all the answers
Which ethical issue is related to using someone else's work without credit?
Which ethical issue is related to using someone else's work without credit?
Signup and view all the answers
Study Notes
Information Systems
- Information systems consist of people, procedures, software, hardware, data, and the internet
- Positive impacts of technology are widely acknowledged
- Negative impacts are also important to acknowledge and address
Effective Implementation of Computer Technology
- Maximizing positive effects while minimizing negative effects is crucial
- Key concerns are privacy, security, and ethics
Privacy
- Technology enables collection and use of vast data about individuals
- Web browsing, shopping, and phone calls generate data
- Concerns arise regarding data collection, usage, and accuracy
- Issues include accuracy (correctness of data), property (ownership of data), and access (control)
Large Databases
- Large organizations constantly compile information about individuals
- Government agencies alone have over 2,000 databases
- Daily data collection includes phone calls, GPS locations, credit card transactions
- Recording of shopping habits, financial records, and search histories
Privacy Concerns
- Accuracy: Responsibility of data collectors to maintain data correctness.
- Property: Determining ownership of data.
- Access: Determining who can access and use the data.
Information Resellers
- Information resellers are a new industry that collects and sells personal data.
- These individuals use public and private databases to create profiles about people.
Spreading Information Without Consent
- Employers may use social media profiles for decision-making concerning employment.
- Social networks facilitating information sharing create risks.
Sharing Information Inadvertently
- Sharing personal data without knowledge or consent is becoming more frequent.
- Examples: Being tagged in photos on social media.
Spreading Inaccurate Information
- Mistakes can lead to inaccurate information, which can lead to denial of services like home loans, or job opportunities.
- Errors in record-keeping can create erroneous profiles and prevent people from obtaining or retaining employment
Privacy Threats
- Examples include spyware, phishing information, web bugs, and malicious hardware.
The Internet and The Web
- Illusion of anonymity is commonplace: people think their information remains private
- IP (Internet Protocol) addresses uniquely identify every computer and trace activities
- Usage of IP addresses for tracking internet activities and determining origins of illegal crimes is common
Cookies
- Cookies are small data files deposited on a user's computer by websites visited.
- First-party cookies track user activity on the current website
- Third-party cookies track user activity across multiple websites.
Deleting Browsing History
- Users can delete their browsing history to protect privacy
- Browsers offer various privacy modes, like Incognito Mode and Private Browsing.
Web Bugs
- Invisible images or code used to transmit information without user knowledge.
- Examples of usage are tracking email openings, or web activity.
Spyware
- Programs designed to track user activity on the internet without consent.
- Spyware can record keystrokes, passwords, and other sensitive information.
Malicious Software
- Includes viruses, worms, and Trojan horses
- Designed to disrupt or damage computer systems
Viruses
- Designed to spread through networks or operating systems
- Attach themselves to existing programs
- May be harmless or very damaging
Worms
- Self-replicating programs that clog networks until they slow or stop functioning
Trojan Horses
- Seem like harmless software but cause harm
- These can be carriers of viruses, which cause more harm.
Malicious Hardware
- Examples include zombie botnets, rogue Wi-Fi hotspots, and infected USB flash drives
Security
- Computer security involves protecting information, hardware, and software from theft, damage, and unauthorized use.
- Care is needed regarding hardware, and software security
Cybercrime
- Illegal activities conducted using computer systems and networks, targeting millions each year
- Costs billions and affects many lives worldwide
- Identity theft is one of the most significant types
- Additional cybercrimes: internet scams, data manipulation, ransomware, and denial of service attacks (DDoS)
Ethics
- Moral conduct guidelines for computer usage
- Ethical concerns for maintaining accuracy, data ownership and access control.
- Copyright: Legal rights of content creators for use and distribution of their created content.
Copyright
- Content creators have legal rights to control use and distribution of their work (music, films, video games)
- Violations include unauthorized copying which is a copyright violation
- Software piracy involves unauthorized copying and distribution of software
- Digital rights management (DRM) used to restrict access and control the number of devices using a given file
Cyberbullying
- Using the internet, smartphones, or other devices to hurt or embarrass someone
- Cyberbullying can affect reputations, negatively impact well being, and lead to severe legal repercussions.
Plagiarism
- Presenting another person's work or ideas as one's own without proper credit
- Computer tech has made it easier to copy without proper acknowledgement.
Preventing Data Loss
- Data can be replaced; however, a company's data may not be irreplaceable
- Backups, redundancy, and off-site storage protect data from threats, like theft, fire, or floods.
Measures to Protect Computer Security
- Criminals can access computer systems in several ways, including viewing data (and potentially damaging)
- Using passwords, restricting access and encrypting data can mitigate this risk
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Explore the intricate world of information systems and their impact on society. This quiz addresses both the benefits and pitfalls of computer technology, with a particular focus on privacy, data accuracy, and ethics. Understand the dynamics of data collection and the implications for individuals.