Deck 19: Legal and Ethical Aspects

Full screen (f)
exit full mode
Question
Any intangible asset that consists of human knowledge and ideas is _______.

A)cyber property
B)personal property
C)intellectual property
D)real property
Use Space or
up arrow
down arrow
to flip the card.
Question
Computer technology has involved the creation of new types of
entities for which no agreed ethical rules have previously been formed.
Question
The successful use of law enforcement depends much more on
technical skills than on people skills.
Question
Concerns about the extent to which personal privacy has been and
may be compromised have led to a variety of legal and technical approaches to reinforcing privacy rights.
Question
Anyone can join the Ad Hoc Committee on Responsible Computing.
Question
An example of a patent from the computer security realm is the RSA
public-key cryptosystem.
Question
No cybercriminal databases exist that can point investigators to
likely suspects.
Question
Software is an example of real property.
Question
Land and things permanently attached to the land,such as trees,buildings,and stationary mobile homes are _______.

A)real property
B)cyber property
C)personal property
D)intellectual property
Question
The legal and ethical aspects of computer security encompass a broad
range of topics.
Question
Computer attacks are considered crimes but do not carry criminal
sanctions.
Question
The relative lack of success in bringing cybercriminals to justice has
led to an increase in their numbers,boldness,and the global scale of their operations.
Question
The Common Criteria specification is primarily concerned with the
privacy of personal information concerning the individual rather than the privacy of an individual with respect to that individual's use of computer resources.
Question
Computers as targets is a form of crime that involves an attack on data
integrity,system integrity,data confidentiality,privacy,or availability.
Question
_______ is a form of crime that targets a computer system to acquire information stored on that computer system,to control the target system without authorization or payment,or to alter the integrity of data or interfere with the availability of the computer or server.

A)Computers as targets
B)Computers as storage devices
C)Computers as mediums
D)Computers as communication tools
Question
The success of cybercriminals,and the relative lack of success of law enforcement,influence the behavior of _______.

A)cyber thieves
B)cybercrime victims
C)cybercrime acts
D)cyber detectives
Question
A servicemark is the same as a trademark except that it identifies and
distinguishes the source of a service rather than a product.
Question
The purpose of the privacy functions is to provide a user protection
against discovery and misuse of identity by other users.
Question
Personal effects,moveable property and goods,such as cars,bank accounts,wages,securities,a small business,furniture,insurance policies,jewelry,patents,and pets are all examples of _________.

A)intellectual property
B)real property
C)personal property
D)cyber property
Question
The first comprehensive privacy legislation adopted in the United
States was the Privacy Act of 1974.
Question
_____ strengthens the protection of copyrighted materials in digital format.

A)HIPPA
B)DMCA
C)WIPO
D)DRM
Question
The invasion of the rights secured by patents,copyrights,and trademarks is ________.
Question
A ________ provides distribution channels,such as an online shop or a Web retailer.

A)content provider
B)distributor
C)consumer
D)clearinghouse
Question
________ ensures that a user may make multiple uses of resources or services without others being able to link these uses together.

A)Anonymity
B)Pseudonymity
C)Unobservability
D)Unlinkability
Question
A _______ for an invention is the grant of a property right to the inventor.

A)patent
B)copyright
C)trademark
D)claim
Question
A ______ is a word,name,symbol,or device that is used in trade with goods to indicate the source of the goods and to distinguish them from the goods of others.

A)copyright
B)patent
C)trademark
D)none of the above
Question
________ rights may be used to prevent others from using a confusingly similar mark,but not to prevent others from making the same goods or from selling the same goods or services under a clearly different mark.
Question
_____ can be copyrighted.

A)Dramatic works
B)Architectural works
C)Software-related works
D)All of the above
Question
A ______ handles the financial transaction for issuing the digital license to the consumer and pays royalty fees to the content provider and distribution fees to the distributor accordingly.
Question
______ is intended to permit others to perform,show,quote,copy,and otherwise distribute portions of the work for certain purposes.

A)Reverse engineering
B)Personal privacy
C)Fair use
D)Encryption research
Question
The three main types of intellectual property for which legal protection is available are: copyrights,patents,and _______.
Question
The 2001 _________ is the first international treaty seeking to address Internet crimes by harmonizing national laws,improving investigative techniques,and increasing cooperation among nations.
Question
The U.S.legal system distinguishes three primary types of property: real property,personal property,and _________ property.
Question
The copyright owner has which exclusive right(s)?

A)reproduction right
B)distribution right
C)modification right
D)all of the above
Question
________ is a function that removes specific identifying information from query results,such as last name and telephone number,but creates some sort of unique identifier so that analysts can detect connections between queries.

A)Anonymization
B)Data transformation
C)Immutable audit
D)Selective revelation
Question
_______ or cybercrime,is a term used broadly to describe criminal activity in which computers or computer networks are a tool,a target,or a place of criminal activity.
Question
The three types of patents are: utility patents,design patents,and ________.
Question
________ is a method for minimizing exposure of individual information while enabling continuous analysis of potentially interconnected data.

A)Immutable audit
B)Selective revelation
C)Associative memory
D)Anonymization
Question
A(n)_________ may be granted to anyone who invents or discovers any new and useful process,machine,article of manufacture,or composition of matter,or any new and useful improvement thereof.
Question
The right to seek civil recourse against anyone infringing his or her property is granted to the ________.
Question
The ___________ Act places restrictions on online organizations in the collection of data from children under the age of 13.
Question
_______ refers to a system of moral principles that relates to the benefits and harms of particular actions,and to the rightness and wrongness of motives and ends of those actions.
Question
Both policy and ________ approaches are needed to protect privacy when both government and nongovernment organization seek to learn as much as possible about individuals.
Question
Privacy is broken down into four major areas: anonymity,unlinkability,unobservability,and _________.
Question
The _________ Act confers certain rights on individuals and obligations on credit reporting agencies.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/45
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 19: Legal and Ethical Aspects
1
Any intangible asset that consists of human knowledge and ideas is _______.

A)cyber property
B)personal property
C)intellectual property
D)real property
C
2
Computer technology has involved the creation of new types of
entities for which no agreed ethical rules have previously been formed.
True
3
The successful use of law enforcement depends much more on
technical skills than on people skills.
False
4
Concerns about the extent to which personal privacy has been and
may be compromised have led to a variety of legal and technical approaches to reinforcing privacy rights.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
5
Anyone can join the Ad Hoc Committee on Responsible Computing.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
6
An example of a patent from the computer security realm is the RSA
public-key cryptosystem.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
7
No cybercriminal databases exist that can point investigators to
likely suspects.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
8
Software is an example of real property.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
9
Land and things permanently attached to the land,such as trees,buildings,and stationary mobile homes are _______.

A)real property
B)cyber property
C)personal property
D)intellectual property
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
10
The legal and ethical aspects of computer security encompass a broad
range of topics.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
11
Computer attacks are considered crimes but do not carry criminal
sanctions.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
12
The relative lack of success in bringing cybercriminals to justice has
led to an increase in their numbers,boldness,and the global scale of their operations.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
13
The Common Criteria specification is primarily concerned with the
privacy of personal information concerning the individual rather than the privacy of an individual with respect to that individual's use of computer resources.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
14
Computers as targets is a form of crime that involves an attack on data
integrity,system integrity,data confidentiality,privacy,or availability.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
15
_______ is a form of crime that targets a computer system to acquire information stored on that computer system,to control the target system without authorization or payment,or to alter the integrity of data or interfere with the availability of the computer or server.

A)Computers as targets
B)Computers as storage devices
C)Computers as mediums
D)Computers as communication tools
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
16
The success of cybercriminals,and the relative lack of success of law enforcement,influence the behavior of _______.

A)cyber thieves
B)cybercrime victims
C)cybercrime acts
D)cyber detectives
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
17
A servicemark is the same as a trademark except that it identifies and
distinguishes the source of a service rather than a product.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
18
The purpose of the privacy functions is to provide a user protection
against discovery and misuse of identity by other users.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
19
Personal effects,moveable property and goods,such as cars,bank accounts,wages,securities,a small business,furniture,insurance policies,jewelry,patents,and pets are all examples of _________.

A)intellectual property
B)real property
C)personal property
D)cyber property
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
20
The first comprehensive privacy legislation adopted in the United
States was the Privacy Act of 1974.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
21
_____ strengthens the protection of copyrighted materials in digital format.

A)HIPPA
B)DMCA
C)WIPO
D)DRM
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
22
The invasion of the rights secured by patents,copyrights,and trademarks is ________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
23
A ________ provides distribution channels,such as an online shop or a Web retailer.

A)content provider
B)distributor
C)consumer
D)clearinghouse
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
24
________ ensures that a user may make multiple uses of resources or services without others being able to link these uses together.

A)Anonymity
B)Pseudonymity
C)Unobservability
D)Unlinkability
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
25
A _______ for an invention is the grant of a property right to the inventor.

A)patent
B)copyright
C)trademark
D)claim
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
26
A ______ is a word,name,symbol,or device that is used in trade with goods to indicate the source of the goods and to distinguish them from the goods of others.

A)copyright
B)patent
C)trademark
D)none of the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
27
________ rights may be used to prevent others from using a confusingly similar mark,but not to prevent others from making the same goods or from selling the same goods or services under a clearly different mark.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
28
_____ can be copyrighted.

A)Dramatic works
B)Architectural works
C)Software-related works
D)All of the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
29
A ______ handles the financial transaction for issuing the digital license to the consumer and pays royalty fees to the content provider and distribution fees to the distributor accordingly.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
30
______ is intended to permit others to perform,show,quote,copy,and otherwise distribute portions of the work for certain purposes.

A)Reverse engineering
B)Personal privacy
C)Fair use
D)Encryption research
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
31
The three main types of intellectual property for which legal protection is available are: copyrights,patents,and _______.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
32
The 2001 _________ is the first international treaty seeking to address Internet crimes by harmonizing national laws,improving investigative techniques,and increasing cooperation among nations.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
33
The U.S.legal system distinguishes three primary types of property: real property,personal property,and _________ property.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
34
The copyright owner has which exclusive right(s)?

A)reproduction right
B)distribution right
C)modification right
D)all of the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
35
________ is a function that removes specific identifying information from query results,such as last name and telephone number,but creates some sort of unique identifier so that analysts can detect connections between queries.

A)Anonymization
B)Data transformation
C)Immutable audit
D)Selective revelation
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
36
_______ or cybercrime,is a term used broadly to describe criminal activity in which computers or computer networks are a tool,a target,or a place of criminal activity.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
37
The three types of patents are: utility patents,design patents,and ________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
38
________ is a method for minimizing exposure of individual information while enabling continuous analysis of potentially interconnected data.

A)Immutable audit
B)Selective revelation
C)Associative memory
D)Anonymization
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
39
A(n)_________ may be granted to anyone who invents or discovers any new and useful process,machine,article of manufacture,or composition of matter,or any new and useful improvement thereof.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
40
The right to seek civil recourse against anyone infringing his or her property is granted to the ________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
41
The ___________ Act places restrictions on online organizations in the collection of data from children under the age of 13.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
42
_______ refers to a system of moral principles that relates to the benefits and harms of particular actions,and to the rightness and wrongness of motives and ends of those actions.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
43
Both policy and ________ approaches are needed to protect privacy when both government and nongovernment organization seek to learn as much as possible about individuals.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
44
Privacy is broken down into four major areas: anonymity,unlinkability,unobservability,and _________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
45
The _________ Act confers certain rights on individuals and obligations on credit reporting agencies.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 45 flashcards in this deck.