MIS (chapter B7-ethics)

21 cards

Chapter B7 Ethics

Preview Flashcards

Front Back
The principles and standars that guide our behavior toward other people
Intellectual Property
Intangible creative work that is embodied in physical form
The legal protection afforded an expression of an idea
Fair Use Doctrine
In certain situations, it is legal to use copyrighted material
Pirated Software
The unauthorized use, duplication, distribution, or sale of copyrighted software
Counterfeit Software
Software that is manufactured to look like the real thing and sold as such
The right to be left alone when you want to be, to have control over your won personal possessions, an not to be observed without your consent
The assurance that messages and information are available only to those who are authorized to view them
Policies and procedures that address the ethical use of computers and Internet usage in the business environment
Information Ethics
Concerns the ethical and moral issues arising form the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself
Ethical Computer Use Policy
Contains general principles to guide computer user behavior
Information Privacy Policy
Contains general principles regarding information privacy 
Acceptable Use Policy
A policy that a user must agree to follow in order to be provided access to a network or to the Internet
A contractual stipulation to ensure that ebusiness participants do not deny (repudiate) their online actions
Email Privacy Policy
Details the extent to which email messages may be read by others
Mail Bomb
A sending a massive amount of email to a specific person or system resulting in filling up the recipients' disk space
Internet Use Policy
Contains general principles to guide the proper use of the Internet
Unsolicited email
Anti-Spam Policy
Simply states that email users will not send unsolicited emails (or spam)
Information Technology Monitoring
Tracking people's activities by such measures as number of keystrokes, error rate, and number of transactions processed
Employee Monitoring Policies
Explicitly state how, when, and where the company monitors its employees