MIS 200: Final exam
Ethics - ANS-the principles and standards that guide our behavior toward other people; rooted
in history, culture, and religion.
Circumstances of the Situation - ANS-Consequences of the action or inaction;
Society's opinion of the action or inaction;
Likelihood of effect of action or inaction;
Time to consequences of action or inaction;
Relatedness of people who will be affected by action or inaction;
Reach of result of action or inaction.
Intellectual property - ANS-intangible creative work that is embodied in physical form
Copyright - ANS-legal protection afforded an expression of an idea
Fair Use Doctrine - ANS-may use copyrighted material in certain situations; Using copyrighted
software without permission violates copyright law
Pirated software - ANS-the unauthorized use, duplication, distribution, or sale of copyrighted
software
Privacy - ANS-the right to left alone when you want to be, to have control over your own
personal possessions, and not to be observed without your consent
Dimensions of privacy - ANS-Psychological: to have a sense of control; Legal: to be able to
protect yourself
Key logger (key trapper) software - ANS-a program that, when installed on a computer, records
every keystroke and mouse click
Screen capture programs - ANS-capture screen from video card
E-mail is stored on many computers as it travels from sender to recipient
Hardware key logger - ANS-hardware device that captures keystrokes moving between
keyboard and motherboard
Event Data Recorders (EDR) - ANS-located in the airbag control module and collects data from
your car as you are driving.
Identity theft - ANS-the forging of someone's identity for the purpose of fraud
, Phishing (carding, brand spoofing) - ANS-a technique to gain personal information for the
purpose of identity theft
Spear phishing - ANS-targeted to specific individuals
Whaling - ANS-targeted to senior business executives and government leaders
Pharming - ANS-rerouting your request for a legitimate Web site
sending it to a slightly different Web address, or by redirecting you after you are already on the
legitimate site; Pharming gains access to the giant databases that Internet providers use to
route Web traffic; Hard to spot.
Reasons for Monitoring Employee computers - ANS-Hire the best people possible
Ensure appropriate behavior on the job
Avoid litigation for employee misconduct
Cookie - ANS-small file that contains information about you and your Web activities, which a
Web site places on your computer
Spam - ANS-unsolicited e-mail from businesses advertising goods and services
Adware - ANS-software to generate ads that installs itself when you download another program
Spyware (sneakware, stealthware) - ANS-software that comes hidden in downloaded software
and helps itself to your computer resources
Trojan horse software - ANS-software you don't want inside software you do want
Web log - ANS-one line of information for every visitor to a Web site
Clickstream - ANS-records information about you such as what Web sites you visited, how long
you were there, what ads you looked at, and what you bought.
Anonymous Web browsing (AWB) - ANS-hides your identity from the Web sites you visit
Hackers - ANS-knowledgeable computer users who invade other people's computers
Computer virus (virus) - ANS-software that is written with malicious intent to cause annoyance
or damage
Worm - ANS-virus that spreads itself from computer to computer usually via e-mail
Denial-of-service (DoS) attack - ANS-floods a Web site with so many requests for service that it
slows down or crashes
Ethics - ANS-the principles and standards that guide our behavior toward other people; rooted
in history, culture, and religion.
Circumstances of the Situation - ANS-Consequences of the action or inaction;
Society's opinion of the action or inaction;
Likelihood of effect of action or inaction;
Time to consequences of action or inaction;
Relatedness of people who will be affected by action or inaction;
Reach of result of action or inaction.
Intellectual property - ANS-intangible creative work that is embodied in physical form
Copyright - ANS-legal protection afforded an expression of an idea
Fair Use Doctrine - ANS-may use copyrighted material in certain situations; Using copyrighted
software without permission violates copyright law
Pirated software - ANS-the unauthorized use, duplication, distribution, or sale of copyrighted
software
Privacy - ANS-the right to left alone when you want to be, to have control over your own
personal possessions, and not to be observed without your consent
Dimensions of privacy - ANS-Psychological: to have a sense of control; Legal: to be able to
protect yourself
Key logger (key trapper) software - ANS-a program that, when installed on a computer, records
every keystroke and mouse click
Screen capture programs - ANS-capture screen from video card
E-mail is stored on many computers as it travels from sender to recipient
Hardware key logger - ANS-hardware device that captures keystrokes moving between
keyboard and motherboard
Event Data Recorders (EDR) - ANS-located in the airbag control module and collects data from
your car as you are driving.
Identity theft - ANS-the forging of someone's identity for the purpose of fraud
, Phishing (carding, brand spoofing) - ANS-a technique to gain personal information for the
purpose of identity theft
Spear phishing - ANS-targeted to specific individuals
Whaling - ANS-targeted to senior business executives and government leaders
Pharming - ANS-rerouting your request for a legitimate Web site
sending it to a slightly different Web address, or by redirecting you after you are already on the
legitimate site; Pharming gains access to the giant databases that Internet providers use to
route Web traffic; Hard to spot.
Reasons for Monitoring Employee computers - ANS-Hire the best people possible
Ensure appropriate behavior on the job
Avoid litigation for employee misconduct
Cookie - ANS-small file that contains information about you and your Web activities, which a
Web site places on your computer
Spam - ANS-unsolicited e-mail from businesses advertising goods and services
Adware - ANS-software to generate ads that installs itself when you download another program
Spyware (sneakware, stealthware) - ANS-software that comes hidden in downloaded software
and helps itself to your computer resources
Trojan horse software - ANS-software you don't want inside software you do want
Web log - ANS-one line of information for every visitor to a Web site
Clickstream - ANS-records information about you such as what Web sites you visited, how long
you were there, what ads you looked at, and what you bought.
Anonymous Web browsing (AWB) - ANS-hides your identity from the Web sites you visit
Hackers - ANS-knowledgeable computer users who invade other people's computers
Computer virus (virus) - ANS-software that is written with malicious intent to cause annoyance
or damage
Worm - ANS-virus that spreads itself from computer to computer usually via e-mail
Denial-of-service (DoS) attack - ANS-floods a Web site with so many requests for service that it
slows down or crashes