Skip to main content
Workforce LibreTexts

5.3: End of Chapter Resources

  • Page ID
    38288
  • \( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)

    \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)

    \( \newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\)

    ( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\)

    \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)

    \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\)

    \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)

    \( \newcommand{\Span}{\mathrm{span}}\)

    \( \newcommand{\id}{\mathrm{id}}\)

    \( \newcommand{\Span}{\mathrm{span}}\)

    \( \newcommand{\kernel}{\mathrm{null}\,}\)

    \( \newcommand{\range}{\mathrm{range}\,}\)

    \( \newcommand{\RealPart}{\mathrm{Re}}\)

    \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)

    \( \newcommand{\Argument}{\mathrm{Arg}}\)

    \( \newcommand{\norm}[1]{\| #1 \|}\)

    \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)

    \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\AA}{\unicode[.8,0]{x212B}}\)

    \( \newcommand{\vectorA}[1]{\vec{#1}}      % arrow\)

    \( \newcommand{\vectorAt}[1]{\vec{\text{#1}}}      % arrow\)

    \( \newcommand{\vectorB}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)

    \( \newcommand{\vectorC}[1]{\textbf{#1}} \)

    \( \newcommand{\vectorD}[1]{\overrightarrow{#1}} \)

    \( \newcommand{\vectorDt}[1]{\overrightarrow{\text{#1}}} \)

    \( \newcommand{\vectE}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash{\mathbf {#1}}}} \)

    \( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)

    \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)

    \(\newcommand{\avec}{\mathbf a}\) \(\newcommand{\bvec}{\mathbf b}\) \(\newcommand{\cvec}{\mathbf c}\) \(\newcommand{\dvec}{\mathbf d}\) \(\newcommand{\dtil}{\widetilde{\mathbf d}}\) \(\newcommand{\evec}{\mathbf e}\) \(\newcommand{\fvec}{\mathbf f}\) \(\newcommand{\nvec}{\mathbf n}\) \(\newcommand{\pvec}{\mathbf p}\) \(\newcommand{\qvec}{\mathbf q}\) \(\newcommand{\svec}{\mathbf s}\) \(\newcommand{\tvec}{\mathbf t}\) \(\newcommand{\uvec}{\mathbf u}\) \(\newcommand{\vvec}{\mathbf v}\) \(\newcommand{\wvec}{\mathbf w}\) \(\newcommand{\xvec}{\mathbf x}\) \(\newcommand{\yvec}{\mathbf y}\) \(\newcommand{\zvec}{\mathbf z}\) \(\newcommand{\rvec}{\mathbf r}\) \(\newcommand{\mvec}{\mathbf m}\) \(\newcommand{\zerovec}{\mathbf 0}\) \(\newcommand{\onevec}{\mathbf 1}\) \(\newcommand{\real}{\mathbb R}\) \(\newcommand{\twovec}[2]{\left[\begin{array}{r}#1 \\ #2 \end{array}\right]}\) \(\newcommand{\ctwovec}[2]{\left[\begin{array}{c}#1 \\ #2 \end{array}\right]}\) \(\newcommand{\threevec}[3]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \end{array}\right]}\) \(\newcommand{\cthreevec}[3]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \end{array}\right]}\) \(\newcommand{\fourvec}[4]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \\ #4 \end{array}\right]}\) \(\newcommand{\cfourvec}[4]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \\ #4 \end{array}\right]}\) \(\newcommand{\fivevec}[5]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \\ #4 \\ #5 \\ \end{array}\right]}\) \(\newcommand{\cfivevec}[5]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \\ #4 \\ #5 \\ \end{array}\right]}\) \(\newcommand{\mattwo}[4]{\left[\begin{array}{rr}#1 \amp #2 \\ #3 \amp #4 \\ \end{array}\right]}\) \(\newcommand{\laspan}[1]{\text{Span}\{#1\}}\) \(\newcommand{\bcal}{\cal B}\) \(\newcommand{\ccal}{\cal C}\) \(\newcommand{\scal}{\cal S}\) \(\newcommand{\wcal}{\cal W}\) \(\newcommand{\ecal}{\cal E}\) \(\newcommand{\coords}[2]{\left\{#1\right\}_{#2}}\) \(\newcommand{\gray}[1]{\color{gray}{#1}}\) \(\newcommand{\lgray}[1]{\color{lightgray}{#1}}\) \(\newcommand{\rank}{\operatorname{rank}}\) \(\newcommand{\row}{\text{Row}}\) \(\newcommand{\col}{\text{Col}}\) \(\renewcommand{\row}{\text{Row}}\) \(\newcommand{\nul}{\text{Nul}}\) \(\newcommand{\var}{\text{Var}}\) \(\newcommand{\corr}{\text{corr}}\) \(\newcommand{\len}[1]{\left|#1\right|}\) \(\newcommand{\bbar}{\overline{\bvec}}\) \(\newcommand{\bhat}{\widehat{\bvec}}\) \(\newcommand{\bperp}{\bvec^\perp}\) \(\newcommand{\xhat}{\widehat{\xvec}}\) \(\newcommand{\vhat}{\widehat{\vvec}}\) \(\newcommand{\uhat}{\widehat{\uvec}}\) \(\newcommand{\what}{\widehat{\wvec}}\) \(\newcommand{\Sighat}{\widehat{\Sigma}}\) \(\newcommand{\lt}{<}\) \(\newcommand{\gt}{>}\) \(\newcommand{\amp}{&}\) \(\definecolor{fillinmathshade}{gray}{0.9}\)

    End of Chapter Summary

    • This chapter navigates the ethical dimensions and privacy implications stemming from the influence of information systems.
    • The text introduces the ACM’s Code of Ethics and discusses the merits and drawbacks of such codes, drawing parallels with Acceptable Use Policies.
    • Intellectual property, crucially affected by digital advancements, is examined in detail, emphasizing copyright, patent, and trademark protections.
    • The chapter also scrutinizes patents and the emergence of patent trolls.
    • Concluding, it underscores the evolving landscape of ethics and privacy, emphasizing the ongoing need for adaptation to confront emerging challenges.
    • This chapter provides a comprehensive overview of computer security, covering the fundamental goals of confidentiality, integrity, and availability.
    • Dives into security measures like access restrictions, peripherals, firewalls, and antivirus software.
    • Encryption methods, including ROT13, RSA, AER, and the one-time pad are highlighted for secure communication.
    • The role and limitations of antivirus software are outlined, and firewalls are introduced, emphasizing their functions in network security.
    • This section on backups underscores their importance in data management and disaster recovery, addressing various types of backup media, reasons for performing backups, and strategies like the grandfather-father-son system for effective backup management over time.

    Security Summary

    • This chapter provides a comprehensive overview of computer security, covering the fundamental goals of confidentiality, integrity, and availability.
    • Dives into security measures like access restrictions, peripherals, firewalls, and antivirus software.
    • Encryption methods, including ROT13, RSA, AER, and the one-time pad are highlighted for secure communication.
    • The role and limitations of antivirus software are outlined, and firewalls are introduced, emphasizing their functions in network security.
    • This section on backups underscores their importance in data management and disaster recovery, addressing various types of backup media, reasons for performing backups, and strategies like the grandfather-father-son system for effective backup management over time.

    “Safe harbor” Provision: limits the liability of online service providers when someone using their services commits copyright infringement.

    Acceptable User Policy (AUP): is a document stipulating constraints and practices that a user must agree to for access to a corporate network, the internet or other resources.

    Antivirus software: if properly installed on a computer system, can prevent access to computer systems by unwanted computer programs.

    Backup: a copy of some data.

    Children’s Online Privacy Protection Act (COPPA): required the federal trade commission to issue and enforce regulations concerning children’s online privacy.

    Code of Ethics: a set of official standards of conduct that the members of a group are expected to uphold.

    Common law trademark: is a trademark established solely through use in commerce in a specific geographical area.

    Computer Security: is a branch of information technology known as information security which intended to protect computers.

    Copyright law: allows the holder of a copyright to authorize someone else to make the work public.

    Copyright: the protection given to songs, computer programs, books, and other creative works.

    Creative Commons: is a nonprofit organization that provides legal tools for artists and authors.

    Decryption: is a way to change an encrypted piece of information back into unencrypted form.

    Differential Backup: only copies the data that has changed since the last full back up.

    Digital Millennium Copyright Act (DMCA): extended copyright law to take into consideration digital technologies.

    Electronic Frontier Foundation (EFF): is the leading nonprofit organization defending civil liberties in the digital world.

    Encryption: is a method which allows information to be hidden so that it cannot be read without special knowledge.

    Ethical Dilemma: a situation in which a difficult choice has to be made between two courses of action, either of which entails transgressing a moral principle.

    Ethics: moral principles that govern a person’s behavior or the conducting of an activity.

    Family Educational Rights and Privacy Act (FERPA): is a US law that protects the privacy of student education records.

    Federal Trade Commission (FTC): a federal agency, established in 1914, that administers antitrust and consumer protection legislation in pursuit of free and fair competition in the marketplace.

    Firewall: a part of a computer system or network which is designed to block unauthorized access while permitting outward communication.

    Full Backup: copies all of the data.

    Grandfather-father-son: means that we keep different types of backup for different amounts of time.

    Health Insurance Portability and Accountability Act (HIPAA): this law gives patients specific rights to control their medical records, requires health care providers and others who maintain this information to get specific permission in order to share it, and imposes penalties on the institutions that breach this trust.

    HTTP Cookie: is a simple computer file made of text.

    Hypertext Transfer Protocol (HTTP): is a communications protocol. It is used to send and receive webpages and files on the internet.

    Incremental backup: only copies the data that has changed since the last incremental backup.

    Malware (Malicious Software): is a kind of software that can be installed on a computer without approval from the computer’s owner.

    Non-Obvious Relationship Awareness (NORA): process of collecting large quantities of a variety of information then combining it to create profiles of individuals.

    Patents: creates protection for someone who invents a new product or process.

    Personally Identifiable Information (PII): information about a person that can be used to uniquely establish that persons identity.

    Privacy: means the ability to control information about oneself.

    Registered trademark: the name or symbol of a product or company, shown by the sign ®, which is officially recorded and cannot legally be used by another producer or company.

    Trademark: a word, phrase, logo, shape or sound that identifies a source of goods or services.

    User Agent: a computer program representing a person. (Example: a browser in a web context.)

    Wi-Fi Protected Access (WPA): is the name for a number of standards to use encryption on a Wireless LAN.

    Wired Equivalent Privacy (WEP): is a standard to use encryption in Wireless LANs.

    End of Chapter Discussions

    1. What is the meaning of the term “Information systems ethics”?
    2. What safeguards are offered by a patent, and how can one be obtained?
    3. What safeguards are offered by copyright, and how can one be obtained?
    4. Reflecting on your code of ethics, would you initiate a business with the same ethical principles. What is one advantage or disadvantage of having a code of ethics?
    5. When considering computer security, what are the three primary objectives?
    6. What are some fundamental methods for computer security that can be employed?
    7. What types of malwares exist, and which is considered the more effective option?
    8. Do you consider it essential to back up your electronic data? What are the primary reasons for implementing a backup?

    5.3: End of Chapter Resources is shared under a not declared license and was authored, remixed, and/or curated by LibreTexts.

    • Was this article helpful?