Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
132 Cards in this Set
- Front
- Back
If we argue that privacy is important for trust and friendship, we are arguing it has what kind of value? |
Instrumental |
|
"Illinois CS students should use their expertise to make the world a better place" What kind of statement is this? |
normative |
|
"The Earth is clearly flat,because there is no evidence that the Earth is round" What kind of logical fallacy? |
Appeal to ignorance |
|
Which of the following security objectives is concerned with trust and verification of data? |
Authenticity |
|
What do we call public information about a person |
PPI, public personal information |
|
Illinois CS students have created software that makes people safer and happier. What kind of statement is this? |
Descriptive or positive |
|
What kinds of arguments are considered strong |
sound and inductive |
|
When I weigh the social utility of preserving individual privacy against the safety risks, maintaining privacy leads to greater overall happiness. Preserving privacy is therefore morally right" What kind of ethical reasoning? |
utilitarian |
|
After a study indicated this feature might undermine a reader's comprehension of scientific articles, Popular Science disabled this feature on their website |
comment sections |
|
What do we call data used to uniquely identify a person |
PII, personal identifying information |
|
What odo we call the philosophical stance that there are multiple plausible answers to ethical dilemmas, as long as rational criteria are satisfied, but some answers are more right than others? |
ethical/moral objectivism |
|
Which of the following is an example of cybercrime |
cyberpiracy, cyberharassment, cybervandilism,cybertrespass, cyberterrorism, cyberextortion |
|
When we say a person is a "Aristotelian" to what ethical theory do they subscribe? |
Virtue (character) based |
|
Two researchers discuss whether or not it is ethical to collect the names of subjects in a psychological study. What are they wrestling with? |
Norms of appropriateness |
|
If we argue that privacy is a "means to an end" we are arguing it has what kind of value |
Instrumental |
|
Two employees for a cell phone company discuss whether or not it is ethical to share user data with a marketing firm. What are they wrestling with |
norms of distribution |
|
What do we call the situation that arises when a technology creates non-obvious ethical concerns? |
Morally opaque |
|
Which of these philosophers is associated with deotological ethics? |
Kant |
|
What do we call our tendency to believe that people ultimately deserve the things that happen to them? |
just-world hypothesis |
|
"I aspire to be an honest, just, and disciplined person. If I cannot afford to pay for copyrighted material, I will cultivate these virtues by refusing to pirate it." What ehtical theory? |
Virtue based |
|
"Cyberbullying and trolling are unethical. While they might at first seem like fun, the abusers are using humans as a means to an end. Violating moral rules" ethical theory? |
Rule deontology |
|
Which of these terms means "having a right to privacy"? |
normative privacy |
|
"Thomas Jefferson was a slave owner. His ideas about democracy are flawed" logical fallacy? |
Poisoning the well |
|
Which definition of privacy means "freedom from interference in one's choices" |
decisional privacy |
|
"Though a sentient machine might seem like something out of science fiction. I would strive to be just and tolerant in my interactions with one. Perhaps a sufficeintly advanced AI could pursue eudaemonia" Ethical reasoning? |
virtue/character based |
|
When does a valid argument contain all true premises |
it is sound |
|
When we question whether personal information should be gathered or divulged within a given context, what are we talking about? |
norm of appropriateness |
|
What is the definition of a logical argument? |
A set of premises and a conclusion |
|
In which of the following practices is implicit personal data discovered? |
data mining |
|
"You think this house is worth a million dollars The appraiser thinks it's worth three millions dollars. The true value is probably around two million dollars" Logical fallacy? |
argument to moderation |
|
The practices of merging and matching personal info potentially violate which of the following |
contextual integrity |
|
"A neuron is not sentient, so the brain cannot be sentient" logical fallacy? |
fallacy of composition |
|
which of the following laws protects private medical records in the US? |
HIPAA |
|
What do we call confidential info about a person? |
Nonpublic personal info (NPI) |
|
Which of these terms means "having privacy"? |
Descriptive privacy |
|
"Regardless of how intelligent a computer is, people should ultimately use it as they would any other machine: to promote human happiness" Ethical theory? |
utilitarian |
|
When we say person is a "deontologist" what ethical theory? |
duty-based (deontology) |
|
What is another name for a "white hat" or "pentester" |
ethical hacker |
|
"Illinois CS students should strive to protect sensitive user data" statement? |
normative |
|
Which of the following is true of risk analysis in cyber security? |
Risk analysis: we quantify how likely it is that an adversary will exploit a probability. Risk analysis is de-perimeterized (security spans boundaries of multipe parties) and has the problem of many hands |
|
"Distributing copyrighted works is a form of stealing. Stealing violates moral laws which we believe to be universal, so we should not distribute copyrighted material" What ethical theory is being employed in this argument? |
Duty based |
|
"These doughnuts are healthy. They're made using only organically-grown locally-sourced ingredients" Logical fallacy? |
composition fallacy or non sequitur:appeal to nature |
|
What kinds of arguments are considered weak? |
unsound and fallacious |
|
"We both agree that slavery is wrong and people should be free. Why are you asking me to pay you for your work? Shouldn't you be free?" Logical fallacy? |
equivocation |
|
Which of the following laws concerns the "right to be forgotten" |
EU DIrective 95/46/EC |
|
"If we let him eat just one doughnut, we'll have to let him eat the whole box" logical fallacy? |
slippery slope |
|
"People born in July are bad drivers. They are responsible 1 in 12 traffic accidents!" what kind of fallacy is this? |
Post hoc ergo propter hoc, texas sharpshooter, non-sequitur |
|
"The lion preys upon the slowest gazelle. If I get rich by taking advantage of the foolish, it's not immoral. It's evolution" logical fallacy? |
Naturalistic fallacy |
|
Which of the following security objectives is concerned with preventing unauthorized access? |
Confidentiality |
|
What do we call the descriptive proposition that cultures have different beliefs about what is moral and immoral? |
Cultural relativism |
|
When does a sound argument contain all true premises |
by definition, always |
|
What do we call the situation where technological development outpaces a society's development of relevant norms? |
Policy vacuum |
|
When we question whether personal information should be transferred from its original context, what are we talking about? |
Norms of distribution |
|
"Why should anyone listen to you? You're a liar and a thief" Logical fallacy? |
Ad hominem or poisoning the well |
|
"Distributing copyrighted material robs the creator of wealth, which discourages artists from creating more works for the public to enjoy. Distributing copyrighted works is therefore unethical" ethical theory? |
utilitarian or contract based? |
|
"The Earth is flat. The surface is obviously smooth and level" Logical fallacy? |
Composition fallacy or begging the question |
|
Which definition of privacy means "freedom from physical intrusion" |
accessibility privacy |
|
Which definition of privacy protects against unwarranted search and seizure |
Accessibility privacy |
|
"Either my magic coffee beans can cure diseases, or all the people who bought them are mindless fools" Logical fallacy? |
false dillema |
|
Whic definition of privacy protects freedom of conscience? |
Decisional privacy |
|
When is an argument that is valid also inductive? |
Valid arguments are never inductive, only invalid arguments can be inductive |
|
Under Brey's comprehensive and disclosive method, which perspective of applied ethics does he advocate we use? |
All of them |
|
What do we cal our tendency to judge the strength of an argument by our belief in the conclusion? |
belief bias |
|
A hacker floods an online poll to skew the results in favor of a political issue. Which of the following is she engaged in? |
Hacktivism or cybervandalism |
|
"I refuse to take part in cyberbullying or trolling, because I strive to be a kind and honorable person" What ethical theory is being employed in this argument? |
Virtue based |
|
A hacker has permission to hack systems for a company. She finds a vulnerability in the network and reports it to the company. Which of the following is she engaged in? |
Ethical hacking |
|
Which of the following is the name of the Naxi forced euthanasia program which lead to the development of technologies eventually used in the Holocaust? |
Action T4 |
|
Which of the following is the name given to a telegram decoded in Bletchley Park that contained information about the Holocaust? |
Hofle Telegram |
|
"How can you doubt the Nof ghosts? Millions of people believe in them!" Logical fallacy? |
Appeal to popularity - non sequitur |
|
When Gotterbarn argued that we don't need "automobile ethics" but we do need "auto mechanic ethics" which perspective was he advocation for applied ethics? |
professional |
|
A hacker working for a national government shuts down the power grid of an enemy nation. Which of the following is she engaged in? |
Information Warfare |
|
Which of the following cybersecurity terms refers to the things we want to protect? |
assets |
|
Which of the following is an example of cybercrime? |
Crime carried out exclusively using cybertech and takes place entirely in cyberspace |
|
"Illinois CS students have a flawless history of protecting sensitive user data" statement? |
Descriptive |
|
"As a human, your life is sacred, so each cell in a person's body is also sacred" WHat kind of logical fallacy is this? |
division/composition |
|
Which branch of applied ethics focuses on what is the case rather than what ought to be the case? |
Sociological, descriptive |
|
What do we call our tendency to attribute our own behavior to our situation while attributing |
actor-observer asymmetry |
|
What do we call the philosophical stance that we cannot morally evaluate the ethical behavior of a person from another culture? |
moral relativism |
|
Which of the following is an example of cyber related crime? |
cyberstalking, harrassment, drug trafficking, identity theft, fraud, phishing, distributing cp, spam, slander, counterfeiting, undustrial espionage |
|
Which of these philosophers is associated with virute-based ethics |
aristotle |
|
Which of the following is the name of an early information technology that used punch cards to store and tabulate data? |
Hollerith Machine |
|
The practice of dataveillance potentially violates which of the following? |
Contextual integrity |
|
When we say a person is a utilitarian what ethical theory? |
consequence based |
|
What do we call our tendency to believe that, after an event occurred, the outcome was obvious all along? |
Hindsight bias |
|
"All doughnuts are chocolate-covered. If you put anything else on one, its just not a doughnut anymore" logical fallacy? |
no true scotsman |
|
What do we call our tendency to explain other people's behavior by their internal attributes while ignoring external factors? |
fundamental attribution error |
|
"Cyberbullying and trooling are unethical. While they might at first seem like a fun diversion, this dubious social utility is far outweighed by the emotional toll these actions take on their victims" ethical theory? |
utilitarianism |
|
What do we call a valid argument with at least one untrue premise |
unsound |
|
You are in a classroom by yourself. A classmate enters the room. Which kind of privacy have you lost? |
Descriptive privacy |
|
What do we call an invalid argument whose premises hav no bearing on the truth of the conclusion? |
Fallacious |
|
Which of the following is the name of a technology company directly involved in the Holocaust? |
Dehomag AKA IBM |
|
As you are typing you pin into an atm, someone behind you watches you enter the numbers. Which kind of privacy have they violated? |
normative |
|
"I shouldnt have to wear a seatbelt. I survived wwII" logical fallacy |
special pleading |
|
What do we call our tendency to search for, interpret, and recall info that confirms our beliefs |
confirmation bias |
|
What do we call an invalid argument whose premises lead us to believe the conclusion is likely true |
inductive |
|
What do we call the situation where technological development causes confusion between previously distinct ideas? |
conceptual muddle |
|
What do we call the philosophical stance that morality is a private individual choice? Based on Gert's definition of morality, this is an oxymoron |
moral subjectivism |
|
If we believe theres a ghost in our house, we'll just stay up all night worrying about it. fallacy? |
non sequitur: appeal to emotion or consequences |
|
Data that must be protected because it is owned by a private party |
Proprietary |
|
Which of the following security objectives is concerned with preventing unauthorized modification of data? |
integrity |
|
"You shouldn't wear your seatbelt. Seatbelts sometimes trap people in their cars" Logical fallacy? |
texas sharpshooter |
|
Which of the following security objectives is concerned with ensuring timely and reliable responses from services? |
accessibility |
|
Which of the following is not required of a moral system? |
requirements of a moral system: public, informal, rational, impartial |
|
Which of the following is an example of a moral agent? |
Anyone who faces moral decisions |
|
"privacy is a basic human right enshrined in law. Regardless of risk, the majority cannot strip a person of their constitutionally protected freedoms. We are therefore morally obligated to preserve privacy" ethical reasoning? |
rule deontology |
|
A hacker turns all of the traffic lights green in a major city, intending to cause widespread automobile accidents. engaged in? |
cyberterrorism |
|
"You should buy my magic coffee beans. After eating three of them, my friend lost 10 punds" logical fallacy? |
post hoc ergo propter hoc |
|
"Copyright is an agreement to preserve and protect the itellectual property rights of the creator. It is unethical to break this kind of formal and explicit social agreement to violate a person's rights" ethical theory? |
contract-based |
|
When does a sound argument contain one or more false premises? |
by def, never |
|
Which of the following is not a category of cybersecurity? |
categories: data security, system security, network security |
|
"Scientists can't detect ghosts, because spirits are invisible to nonbelievers" logical fallacy? |
Special pleading or no true scotsman |
|
What do we call the philosophical stance that there is one and only one correct answer to every ethical dilemma? |
moral absolutism |
|
What do we call a valid argument with all true premises |
sound |
|
Which of these philosohpers is associated with contract-based ethics? |
Thomas Hobbes |
|
"Doughbuts obviously taste like rubber, because they're shaped like tires" fallacy? |
false analogy |
|
Data that must be protected because it is intimated or confidential |
sensitive |
|
"The Earth is flat, because the Bible says that the Earth is flat" fallacy? |
Appeal to authority, begging the question |
|
"You're only telling me to wear my seatbelt because you want to control me" fallacy? |
strawman, non sequitur |
|
Which definition of privacy is concerned with the way personal data is gathered? |
informational privacy |
|
In which of the following practices is data not necessarily exchanged? |
Data mining |
|
If we argue that privacy is "an end in and of itself" what kind of value? |
intrinsic |
|
Which of the following technology companies conducted a controversial psychological study intended to manipulate the emotions of their users? |
FB |
|
Which of these philosophers is associated with utilitarinism? |
Bentham, john stuart mill |
|
"You don't believe I saw a shost. Are you calling me a liar?" fallacy? |
complex question |
|
"You doubt my magic coffee beans cure diseases, because you don't undertsand how they could possibly work. Well you don't understand how vacciens work either" fallacy |
ad hominem |
|
"im your boss. if you dont agree with me, ill fire you" fallacy? |
appeal to threat |
|
Which of the following is the name of the conference in which the Nazi "final solution" was officially established |
wannsee conference |
|
"A sentient artifical intelligence would be a moral agent. Because of this, it would have intrinsic moral worth. We would therefore have the same moral obligations to selfaware AI that we have to any other person" ethical reasoning |
deontological |
|
Which definition of privacy means control over the flow of ones personal info? |
informational privacy |
|
"Stripping someone else of their privacy to protect myself is using that person as a means to an end. We have a moral duty to protect are respect the privacy of others, so violating a person's privacy is unethical" ehtical reasoning? |
deontology |
|
"This argument is invalid, because you made an ad hominem attack" fallacy? |
fallacy fallacy |
|
What do we call our tendency to accept positive feedback as deserved while rejecting negative feedback as invalid? |
self-serving bias |