Untitled
110 Questions
336 Views
4.6 Stars

Untitled

Created by
@ComfortingAquamarine

Questions and Answers

Information Ethics may be described as the study of the moral issues arising from “the triple

all the above.

What does IE stand for in the context of computer ethics?

Information Ethics

The term “ecopoiesis” refers to

the morally informed construction of the environment

what is a morally qualifiable action?

<p>An action that can cause moral good or evil.</p> Signup and view all the answers

what sort of moral agents inhabit the infosphere?

<p>The short answer is that IE defines as a moral agent</p> Signup and view all the answers

transition system is:

<p>All of the above</p> Signup and view all the answers

Which one of the stages does IE have?

<p>All of the above</p> Signup and view all the answers

information ethics was used as a general label to discuss issues regarding information (or data) confidentiality, reliability, quality, and usage.

<p>True</p> Signup and view all the answers

information-intensive services are business and property services, communications, finance, and insurance

<p>True</p> Signup and view all the answers

consideration of artificial agents as moral agents IE does not refer to the moral value of meaningful data such as an e-mail.

<p>True</p> Signup and view all the answers

Justice requires “the liberty of each human being to develop in his freedom the full measure of the human possibilities embodied in him.”:

<p>The Principle of Freedom.</p> Signup and view all the answers

Justice requires “the equality by which what is just for A and B remains just when the positions of A and B are interchanged.”:

<p>The Principle of Equality.</p> Signup and view all the answers

Justice requires “a good will between man and man that knows no limits short of those of humanity itself.”:

<p>The Principle of Benevolence.</p> Signup and view all the answers

Enables human beings to do an enormous number of new things that they never were able to do before:

<p>all the mentioned.</p> Signup and view all the answers

Many people found Moor's account of computer ethics to be _________ way to understand and deal with emerging computer ethics issues:

<p>insightful and a helpful</p> Signup and view all the answers

His account of the nature of computer ethics quickly became the most influential one among a growing number of scholars across America who were joining the computer ethics research community

<p>James Moor.</p> Signup and view all the answers

Moor provided a very effective problem-solving method:

<p>All the mentioned.</p> Signup and view all the answers

"Fundamental Principles" of information ethics offered by Floridi.

<p>All the mentioned.</p> Signup and view all the answers

Since everything that exists, according to Floridi's theory, is an informational object or process, he calls the totality of all that exists:

<p>The infosphere</p> Signup and view all the answers

A typical problem in computer ethics arise because there is a _____________ about how computer technology shoulde be used.

<p>policy vacuum.</p> Signup and view all the answers

After a focus on normative ethical theory and its application and justification, emphasis is now placed by some authors on the ................. of institutions, infrastructure, and technology, as shaping factors in our lives and in society.

<p>design</p> Signup and view all the answers

Until now ................ (was/were) treated in moral philosophy as a mere supplier of thought experiments and counter-examples to arguments and theories.

<p>All of that above</p> Signup and view all the answers

This/These developments in ethics come in the idea of Value Sensitive Design (VSD).

<p>All of the above.</p> Signup and view all the answers

Was first proposed in connection with information and communication technology, and that is still its main area of application.

<p>VSD</p> Signup and view all the answers

Focuses on existing moral controversies and practices and on use, although it should also explore uncharted terrain and focus on the technology and its design.

<p>Traditional applied ethics.</p> Signup and view all the answers

Ethics was in the beginning of the twentieth century predominantly a .............

<p>Metaethical Enterprise.</p> Signup and view all the answers

Ethics has seen notable changes in the course of the past 100 years

<p>True</p> Signup and view all the answers

The simplest way to be a generalist is to think that there are fairly accurate general moral rules or principles that may be captured and codified, for example, in codes of conduct, which can be applied to particular cases.

<p>True</p> Signup and view all the answers

Jonathan Dancy defines particularism in Ethics Without Principles as follows: “The possibility of moral thought and judgment depend on the provision of a suitable supply of moral principles.”

<p>False</p> Signup and view all the answers

onathan Dancy defines particularism in Ethics Without Principles as follows: “The possibility of moral thought and judgment does not depend on the provision of a suitable supply of moral principles.”

<p>True</p> Signup and view all the answers

Computer ethicists should probe beyond the technicalstatus quo and ask how the problem came into being, and what are the designs and architectural decisions that have led up to it.

<p>True</p> Signup and view all the answers

………………. refer to parties (individuals or organizations) who interact directly with the computer system or its output.

<p>Direct stakeholders</p> Signup and view all the answers

……………… refer to all other parties who are affected by the use of the system

<p>Indirect stakeholders</p> Signup and view all the answers

Focus on the design and performance of the technology itself:

<p>Technical investigations</p> Signup and view all the answers

Focus on the individuals, groups, or larger social systems that configure, use, or are otherwise affected by the technology:

<p>Empirical Investigations</p> Signup and view all the answers

theoretically grounded approach to the design of technology that accounts for human values in a principled and comprehensive manner throughout the design process:

<p>Value sensitive Design</p> Signup and view all the answers

Heuristics for Interviewing Stakeholders:

<p>As part of an Empirical investigation.</p> Signup and view all the answers

When systematically determining the benefits and harms for each group of stakeholders, attention must be paid to:

<p>All of the above</p> Signup and view all the answers

Empirical investigations are not need to evaluate the success of a particular design.

<p>False</p> Signup and view all the answers

Empirical investigations need to evaluate the success of a particular design.

<p>True</p> Signup and view all the answers

conceptual investigation entails a philosophically informed analysis of the central value constructs.

<p>True</p> Signup and view all the answers

Technical investigations provides a critical protection for privacy, and supports other human values such as autonomy and trust

<p>False</p> Signup and view all the answers

Informed consent provides a critical protection for privacy, and supports other human values such as autonomy and trust

<p>True</p> Signup and view all the answers

. …………………. `s ground intellectual property rights in social progress and incentives to innovate.

<p>Rule-utilitarian</p> Signup and view all the answers

…………………… is generally characterized as nonphysical property that is the product of cognitive processes and whose value is based up on some idea or collection of ideas

<p>Intellectual property</p> Signup and view all the answers

……………. protection extends to original works of authorship fixed in any tangible medium of expression.

<p>Copyright</p> Signup and view all the answers

…………… yield the strongest form of protection, in that a 20 years exclusive monopoly is granted over any expression or implementation of the protected work.

<p>Patents</p> Signup and view all the answers

A …………………. may consist of any formula, pattern, device, or compilation of information that is used in one's business

<p>Trade secret</p> Signup and view all the answers

The two major restrictions on the domain of trade secrets are:

<p>All of the above</p> Signup and view all the answers

…………………… defenders maintain that intellectual property is an extension of individual personality.

<p>Personality-based</p> Signup and view all the answers

Intellectual property falls under the umbrella of tangible property.

<p>False</p> Signup and view all the answers

Intellectual property falls under the umbrella of intangible property

<p>True</p> Signup and view all the answers

One alternative to granting patent rights to inventors as incentive is government support of intellectual labor.

<p>True</p> Signup and view all the answers

personality-based theories of intellectual property aren’t appeal to other moral considerations.

<p>False</p> Signup and view all the answers

personality-based theories of intellectual property often appeal to other moral considerations

<p>True</p> Signup and view all the answers

…………………. one has informational privacy when she is able to limit or restrict others from access to information about herself.

<p>The Restricted Access Theory</p> Signup and view all the answers

One's having privacy is directly linked to one's having control over information about oneself.

<p>The Control Theory</p> Signup and view all the answers

Distinguishes between the concept of privacy, which it defines in terms of restricted access, and the management of privacy.

<p>)RALC) Theory</p> Signup and view all the answers

The way individuals can easily become associated with and linked to newly created groups that are made possible by technologies such as KDD (Knowledge Discovery in Databases).

<p>Categorial Privacy</p> Signup and view all the answers

…………………………… are relatively recent expressions used to refer to a conception of privacy.

<p>Physical privacy and Accessibility privacy</p> Signup and view all the answers

…………… concerns affected by the amount of personal data collected

<p>Informational privacy</p> Signup and view all the answers

privacy protects the interest individuals have in sustaining a personal space, free from interference by other people and organizations.

<p>True</p> Signup and view all the answers

privacy is conceived of as a “utility” in that it can help to preserve human dignity

<p>True</p> Signup and view all the answers

. Individual privacy is much more difficult to achieve in highly technological societies.

<p>True</p> Signup and view all the answers

Informational privacy concerns can affect many aspects of an individual's life from commerce to healthcare to work to recreation

<p>True</p> Signup and view all the answers

Informational privacy concerns cannot affect many aspects of an individual's life from commerce to healthcare to work to recreation

<p>False</p> Signup and view all the answers

. ………. are choices between good and bad.

<p>Morals</p> Signup and view all the answers

………. is fundamental laws that govern human behavior; i.e. Golden Rule.

<p>Principle</p> Signup and view all the answers

………. is something a group holds to be valuable or worthwhile

<p>Value</p> Signup and view all the answers

Copyrights protect published works such as books, articles, software, etc.

<p>True</p> Signup and view all the answers

Universality is reasons for action that all people in society could accept.

<p>True</p> Signup and view all the answers

Transitivity is reasons for action that all people in society could accept.

<p>False</p> Signup and view all the answers

Utilitarian Ethics is the decision that produces the highest good for all people involved.

<p>True</p> Signup and view all the answers

. ………. is a legal protection for a design or invention.

<p>Patent</p> Signup and view all the answers

………. is something that one owes; an obligation; debt.

<p>Liability</p> Signup and view all the answers

………. is any wrongful act that does not involve a breach of contract and for which civil suit can be brought.

<p>Tort</p> Signup and view all the answers

.………. not following reasonable rules and standards that apply and committed a wrongful act

<p>Negligence</p> Signup and view all the answers

In consequentialism ethical theory, human actions are judged good or bad, right or wrong, depending on the results of such actions.

<p>True</p> Signup and view all the answers

Act utilitarianism tells one to obey those rules that bring the maximum happiness to the greatest number of people.

<p>False</p> Signup and view all the answers

Rule utilitarianism tells one to obey those rules that bring the maximum happiness to the greatest number of people.

<p>True</p> Signup and view all the answers

This theory considers human beings as endowed with all faculties and capabilities to live in happiness.

<p>Human Nature</p> Signup and view all the answers

………. states how people ought to behave as they pursue their own interests.

<p>Ethical egoism</p> Signup and view all the answers

It claims that pleasure is the only good thing in human life.

<p>Hedonism</p> Signup and view all the answers

………. maintains that ethical statements are neither true nor false and cannot be proven; they are really only statement about how someone feels

<p>Emotivism</p> Signup and view all the answers

Asymmetric encryption commonly known as ……….

<p>Public key encryption</p> Signup and view all the answers

Act in accordance with your duties, following the appropriate rules.

<p>Deontology</p> Signup and view all the answers

This theory is negatively formulated, denying the existence of universal moral norms.

<p>Relativism</p> Signup and view all the answers

………. prevents unauthorized withholding of information from those who need it when they need it.

<p>Availability</p> Signup and view all the answers

A loss of privacy online and risk of hacking creates more deceit

<p>True</p> Signup and view all the answers

A loss of privacy online and risk of hacking creates more deceit

<p>True</p> Signup and view all the answers

………. causes more energy consumption and pollution

<p>Technology</p> Signup and view all the answers

Bad Effects of New Technology on Society are

<p>All of them</p> Signup and view all the answers

A loss of privacy online and risk of hacking creates more ……….

<p>Deceit</p> Signup and view all the answers

It is much easier to be a bully while hidden away ………

<p>Online</p> Signup and view all the answers

………. is set of moral principles that regulate the use of computers.

<p>Computer ethics</p> Signup and view all the answers

This may be one of the biggest drawbacks of device-filled world.

<p>Technology promotes a more sedentary lifestyle</p> Signup and view all the answers

Technology addiction is becoming more ……….

<p>Widespread</p> Signup and view all the answers

………. is a process of exploration and analysis of large quantities of data by automatic or semi-automatic means.

<p>Data mining</p> Signup and view all the answers

Principles of right and wrong.

<p>Ethics</p> Signup and view all the answers

Privacy and Freedom in the Internet Age.

<p>Information Rights</p> Signup and view all the answers

What are some potential motives for targeting a computer system while committing an offense, such as gaining entry to a computer system in order to cause damage to the computer or the data it contains?

<p>All of the above</p> Signup and view all the answers

A grant to the creator of an invention granting the owner an exclusive monopoly on the ideas behind an invention for between 17 and 20 years.

<p>Patents</p> Signup and view all the answers

The Computer Ethics Institute developed these guidelines for ethical computer use that prohibit all the following behaviors EXCEPT

<p>Respecting other people's privacy</p> Signup and view all the answers

What is the illegal action through using a computer?

<p>Attacks via the Internet</p> Signup and view all the answers

………. is an organized attempt by a country's military to disrupt or destroy the information and communications systems of another country.

<p>Cyberwar</p> Signup and view all the answers

Three main ways that intellectual property is protected:

<p>All of the above</p> Signup and view all the answers

Spyware is a Software downloaded onto a user’s computer - usually without the user’s knowledge - that tracks Web behaviour and reports that behaviour to a third-party server

<p>True</p> Signup and view all the answers

. Spyware is a Software downloaded onto a user’s computer - usually with the user’s knowledge - that tracks Web behaviour and reports that behaviour to a third-party server

<p>False</p> Signup and view all the answers

Organizations can easily maintain detailed databases on individuals.

<p>True</p> Signup and view all the answers

Organizations can not easily maintain detailed databases on individuals

<p>False</p> Signup and view all the answers

More Quizzes Like This

Data Ethics Quiz
2 questions

Data Ethics Quiz

FeasibleSquirrel avatar
FeasibleSquirrel
Computer Ethics HUM 120 Chapter 4: Privacy
10 questions
Computer Ethics Debate
16 questions

Computer Ethics Debate

IrreplaceablePoplar avatar
IrreplaceablePoplar
Use Quizgecko on...
Browser
Browser