info systems final
The _________ approach states that an ethical action is the one that provides the most good or does the least harm.
Utilitarian
The _________ approach maintains that an ethical action is the one that best protects and respects the moral rights of the affected parties.
Rights
The _________ approach states that ethical actions treat all human beings equally, or, if unequally, then fairly.
Fairness
The _________ approach highlights the interlocking relationships that underlie all societies.
Common good
The _________ approach states that the morality of an action is based on whether the action itself is right or wrong under rules, regardless of consequences.
Deontology
_________ is the first step in the general framework for ethics.
Recognize issue
“Do I have sufficient information to make a decision?” is asked in the _________ step of the general ethics framework.
Getting facts
Choosing between the five ethical approaches occurs in the _________ step of the general ethics framework.
Valuate alternate actions
_________ is the final step in the general framework for ethics.
Act and reflect on outcome
_________ is a legal concept that gives individuals the right to recover damages done to them.
Liability
Machine learning is sometimes better than humans at ___________.
Recognizing patterns and relationships
_________ are AI-enabled crimes of high concern to experts.
Deepfakes
The technological advancement that has NOT enhanced AI is _________.
Qr codes
___________ require human experts; _____ must be formally structured as rules.
Expert systems, expert systems
A _________ is a result indicating that a condition exists when it does not.
False positive
___________ is a subset of machine learning using artificial neural networks trained on large data.
Deep learning
A(n) _______________ is a set of nodes that work in parallel to simulate the human brain.
Neural network
____________ is the ability of information systems to work with text the way humans do.
Natural language processing
___________ focuses on automatically and accurately transcribing human speech.
Speech recognition
A(n) _________________ agent is a software program that assists users or acts on their behalf.
Intelligent
Companies predict customer churn using ____ systems.
Machine learning
A(n) ___________ factory is a digitized operation that continuously collects and shares data.
Smart
A _________ to an information resource is any danger to which a system may be exposed.
Threat
The _________ of an information resource is the harm, loss, or damage that can result from a threat.
Exposure
A system’s ___________ is the possibility that it will be harmed by a threat.
Vulnerability
A(n) ___________ network is internal; a(n) ___________ network is external.
Trusted, untrusted
A major category of unintentional threats is ____.
Human error
Careless Internet surfing is _________ and an ___________ mistake.
Human error, unintentional
Opening a suspicious e-mail from a friend is _________ and an ___________ mistake.
Social engineering, unintentional
___________ is an attack where someone tricks employees into giving confidential information.
Social engineering
Holding the door open for someone without a badge is ___________ and an ___________ threat.
Tailgating, unintentional
___________ occurs when an unauthorized individual attempts illegal access to organizational information.
Espianoge
___________ occur when attackers steal or threaten to steal information and demand payment.
Information extortion
Intellectual property is NOT protected under _________ laws.
IP
A ___________ is an intellectual work not based on public information.
Trade secrets
___________ targets high-value individuals to steal sensitive information.
Whaling
Hackers use a botnet to perform a ___________.
Ddos attack
___________ causes pop-up advertisements to appear.
Adware
Keystroke loggers and screen scrapers are examples of ___________.
Spyware
Taking control of equipment like power grids is a ___________ attack.
Scada
___________ refers to malicious acts using computer systems to cause physical harm for political motives.
Cyber terrorism
Accepting risk and continuing operations without controls is risk ___________.
Risk acceptance
Using insurance to shift risk is risk __________.
Risk transfer
___________ is a physical control.
Walls, doors, fencing, gates security guards, locks, alarm systems
___________ is a communications control.
Firewall
___________ controls prevent unauthorized individuals from entering facilities.
Physical controls
___________ controls secure the movement of data across networks.
Communications
A ___________ site is fully configured with all services, communication links, and operations.
hotsite