Intellectual Property
Technology and Work
Cyber Threats
Privacy and Technology
100

This is a legal concept that defines rights to certain kinds of intellectual property. Such as books, songs, movies, works of art, etc.

What is Copyright?

100

This device, essential to most modern jobs, is often used for emailing, video conferencing, and accessing the internet.

What is a computer?

100

This type of cyberattack tricks users into revealing sensitive information by pretending to be a trustworthy entity.

What is phishing.

-100 points

100

 One privacy principle for personal information

What is: Keep data only as long as needed.

200

This doctrine allows uses of copyrighted material that contribute to the creation of new work and uses that are likely not to deprive authors or publishers of income for their work.

What is the Fair Use Doctrine?

- 200 points

200

This is a labor market characterized by short-term contracts or freelance work instead of traditional, long-term employment.

What is Gig work

200

This process involves collecting, analyzing, and preserving electronic evidence for legal investigations.

What is digital forensics.

200

Age group is most likely to be targeted for Identity theft

What is age group 30-39

300

 DRM, a collection of techniques that control access to and use of intellectual property in digital formats

What is Digital Rights Management technologies? 

300

This term refers to working outside a traditional office, often from home, using the internet and digital tools.

What is remote work?

300

This security method requires users to verify their identity using multiple factors, such as passwords, biometrics, or security tokens.

 What is multi-factor authentication.

300

Programs that collect information about a person’s online activity based on the different colors a browser uses to display sites recently visited.

What is: History Sniffers

-300 points

400

These provisions of the DMCA (Digital Millennium Copyright Act) protect websites and social media companies from lawsuits and criminal charges for copyright infringement when users post infringing material.

What are “Safe Harbor” Provisions?

400

Employers often use this type of digital screening to verify a candidate’s criminal history, education, and employment before making a job offer.

What is a background check?

-400 points

400

What is 2+2?

Skip Turn

400

In 2021 this number of peoples identity was stolen

What is: Approximately 23.9 million

500

Is an idea, an ethic, advocated and supported by a large loose-knit group of computer programmers who allow and encourage people to copy, use, and modify their software.

What is Free Software? 

500

Technology critics such as _____ _______ consider the reduction in the human labor and time required to produce goods and services to be one of the horrific consequences of computers and automation.

Who is Jeremy Rifkin?

500

This type of attack floods a network or website with excessive traffic, causing it to become slow or unavailable.

What is a Distributed Denial-of-Service (DDoS) attack.

500

Companies collect personal and transactional data to create.

What is: Consumer scores

M
e
n
u