To pass this unit, please study the 18 vocabulary words below.
- commandment
- CEI (Computer Ethics Institute)
- consent
- consequences
- copyright infringement
- cracking
- dependent
- encounter
- ethics
- Internet privacy
- Norbert Wiener
- phishing
- photoshopping
- privacy policy
- reputation
- snoop
- social engineering
- tedious
USA
UK
USA
UK
a rule to be observed strictly
USA
UK
""Thou shalt not use a computer to harm other people" is the first of the 10 Commandments of Computer Ethics, laid out by the Computer Ethics Institute."
USA
UK
USA
UK
a nonprofit research, education, and public policy organization focused on the issues, dilemmas, and challenges of advancing information technology within ethical frameworks
USA
UK
"The CEI's mission is to facilitate the examination and recognition of ethical issues in the development and use of modern information technologies."
USA
UK
USA
UK
permission, agreement
USA
UK
"I needed written consent from my boss to change the security settings on the server."
USA
UK
USA
UK
results; things that happen as a result of a previous action; usually negative
USA
UK
"The server admin was unaware of the dire consequences of installing the wrong version of Apache web server."
USA
UK
USA
UK
to use somebody's content without proper permission
USA
UK
"The webmaster committed copyright infringement when he copied an article from another website."
USA
UK
USA
UK
criminal hacking; exploiting security holes to gain unauthorized access to computer systems
USA
UK
"Ethically speaking, cracking is no different from other forms of illegal trespassing or stealing."
USA
UK
USA
UK
determined or controlled by something else
USA
UK
"The software utility was dependent on a specific architecture of CPU in order to run at optimal speed."
USA
UK
USA
UK
to meet or come across
USA
UK
"If you meet an alien from another planet it is called a "close encounter of the third kind"."
USA
UK
USA
UK
a branch of philosophy that addresses questions about morality (what is right and wrong)
USA
UK
"As computers become more powerful the need for computer ethics classes is increasing."
USA
UK
USA
UK
general techniques and technologies used to protect sensitive data, communications, and preferences
USA
UK
"The US government routinely tries to expand and restrict Internet privacy laws."
USA
UK
USA
UK
(1894–1964) mathematician and cybernetics pioneer; considered the forefather of computer ethics
USA
UK
"The Norbert Wiener Award for Social and Professional Responsibility is awarded annually by CPSR."
USA
UK
USA
UK
obtaining sensitive information through a deceptive email campaign, while pretending to be a trusted person, business, or resource
USA
UK
"The man thought his bank was asking him to change his password, but it was actually a phishing scam trying to trick him into revealing it."
USA
UK
USA
UK
digitally transforming or altering a photograph in order to misrepresent the original
USA
UK
"Magazines routinely photoshop pictures of models in order to remove pimples, moles, and wrinkles"
USA
UK
USA
UK
a statement or a legal document that discloses the ways an organization gathers, uses, and stores the end user's data
USA
UK
"Every website that collects user information should have their privacy policy posted online."
USA
UK
USA
UK
the common opinion about someone or something
USA
UK
"Being hacked can negatively affect a company's online reputation."
USA
UK
USA
UK
to search for private information without permission
USA
UK
"The IT security officer was caught snooping on an employee's private email account in order to steal her personal bank account number."
USA
UK
USA
UK
a broad term for any online or offline technique that uses deception to trick people into giving out confidential information
USA
UK
"The hacker used social engineering methods to trick a bank teller into giving out another user's password."
USA
UK
USA
UK
boring, repetitive, slow or long
USA
UK
"Debugging code can be a tedious process without the correct knowledge and tools."