Privacy Rights in Information Technology Chapter 3 Quiz

QuieterBouzouki avatar
QuieterBouzouki
·
·
Download

Start Quiz

Study Flashcards

Questions and Answers

What is the right to have no public personal identity referred to as?

Anonymity

Which type of privacy involves the protection of unauthorized access to information itself?

Informational Privacy

Which right includes the prevention of anyone or anything that would intrude or violate personal space?

Solitude

What does the second category of privacy rights include?

<p>Control of personal information</p> Signup and view all the answers

What is the right not to be monitored referred to as?

<p>Intimacy</p> Signup and view all the answers

Which type of privacy involves the privacy of personal attributes and the prevention of intrusion or violation of personal space?

<p>Personal Privacy</p> Signup and view all the answers

What is one of the strands of information that needs to be protected?

<p>Financial information</p> Signup and view all the answers

Why is medical information considered very personal and important?

<p>For employment insurance purposes</p> Signup and view all the answers

What does identity theft involve?

<p>Impersonating a person using stolen personal information</p> Signup and view all the answers

What may be caused by hackers breaking into a database due to carelessness or failure to follow proper security procedures?

<p>A data breach to steal personal records</p> Signup and view all the answers

Why is protecting personal identity becoming increasingly difficult?

<p>Due to advancements in computer technology</p> Signup and view all the answers

Why do people usually establish relationships with those who respect their personal autonomy?

<p>To have freedom in decision making</p> Signup and view all the answers

Why is financial information important for organizations?

<p>To compete in the market place</p> Signup and view all the answers

What do individuals with less personal information have more of?

<p>Freedom in decision making</p> Signup and view all the answers

What is a common approach used by identity thieves to capture personal data?

<p>Creating a data breach to steal personal records</p> Signup and view all the answers

What is the primary difference between ethics and morals?

<p>Ethics is a set of beliefs about right and wrong behavior, while morals are one's personal beliefs about right and wrong.</p> Signup and view all the answers

What does accreditation assure in the context of a profession?

<p>Accreditation ensures that the formal coursework meets the standards of the profession.</p> Signup and view all the answers

What is the process by which candidates are evaluated to determine their readiness to enter a profession called?

<p>Certification</p> Signup and view all the answers

What is the primary characteristic of a fully developed profession?

<p>Initial professional education</p> Signup and view all the answers

Which of the following is a calling that requires specialized knowledge and often long and intensive academic preparation?

<p>Profession</p> Signup and view all the answers

How do ethical behavior and moral acts differ?

<p>Ethical behavior conforms to generally accepted norms, while moral acts conform with what an individual believes to be the right thing to do.</p> Signup and view all the answers

What is the purpose of a professional code of ethics?

<p>To ensure the professionalism and integrity of its members</p> Signup and view all the answers

Who is considered a computer/IT professional?

<p>Anyone employed in the computing and IT fields</p> Signup and view all the answers

What does professional development refer to?

<p>Completing formal course work to maintain and develop knowledge and skills</p> Signup and view all the answers

What is the primary responsibility of data collectors with regard to privacy?

<p>To protect data about individuals</p> Signup and view all the answers

What is the mechanism by which a profession ensures that its members use their knowledge and skills for the benefit of society?

<p>Code of ethics</p> Signup and view all the answers

What is the purpose of a professional society?

<p>Promoting the welfare of the profession</p> Signup and view all the answers

What are the four primary issues regulated by computer ethics?

<p>Privacy, accuracy, property, access</p> Signup and view all the answers

What type of privacy involves protection from unauthorized access to information itself?

<p>Protection of unauthorized access to information</p> Signup and view all the answers

What do various professions use to maintain and develop their knowledge and skills?

<p>Formal course work completed by professionals</p> Signup and view all the answers

What is the set of moral principles that regulate the use of computers known as?

<p>Code of ethics</p> Signup and view all the answers

Study Notes

Privacy Rights

  • The right to have no public personal identity is referred to as the right to anonymity.
  • The right to protection of unauthorized access to information itself is referred to as informational privacy.
  • The right to prevention of anyone or anything that would intrude or violate personal space is referred to as physical privacy.

Categories of Privacy Rights

  • The second category of privacy rights includes the right to solitude, which involves the protection of personal attributes and the prevention of intrusion or violation of personal space.

Right to Non-Monitoring

  • The right not to be monitored is referred to as the right to non-surveillance.

Information Protection

  • One of the strands of information that needs to be protected is medical information, which is considered very personal and important.
  • Identity theft involves the unauthorized use of someone's personal information.

Privacy Breaches

  • Carelessness or failure to follow proper security procedures can lead to hackers breaking into a database, causing a breach of personal information.
  • Protecting personal identity is becoming increasingly difficult due to the ease of accessing and sharing personal information.

Personal Autonomy

  • People usually establish relationships with those who respect their personal autonomy.
  • Financial information is important for organizations, and individuals with less personal information have more autonomy.

Identity Theft

  • A common approach used by identity thieves to capture personal data is phishing.

Ethics and Morals

  • The primary difference between ethics and morals is that ethics refers to the rules of conduct recognized by a particular group or profession, while morals refer to the principles of right and wrong.
  • Accreditation assures that a professional has met the standards of a profession.

Professional Development

  • The process by which candidates are evaluated to determine their readiness to enter a profession is called licensure.
  • The primary characteristic of a fully developed profession is the need for specialized knowledge and long academic preparation.
  • A professional code of ethics outlines the rules of conduct for a particular profession.
  • A computer/IT professional is someone who has specialized knowledge and skills in the field of computer science.
  • Professional development refers to the ongoing education and training of professionals.

Data Collectors

  • The primary responsibility of data collectors with regard to privacy is to protect the personal information they collect.

Professional Societies

  • The mechanism by which a profession ensures that its members use their knowledge and skills for the benefit of society is through professional societies.
  • The purpose of a professional society is to establish and maintain standards for a profession.

Computer Ethics

  • The four primary issues regulated by computer ethics are privacy, intellectual property, accountability, and accessibility.
  • Various professions use continuing education to maintain and develop their knowledge and skills.
  • The set of moral principles that regulate the use of computers is known as computer ethics.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Quizzes Like This

Use Quizgecko on...
Browser
Browser