the use of information technology to gain unauthorized access to computer systems or password-protected sites
What is Cybertrespass
The notion that individual and corporate users are surrounded by technologies which collect user data as these technologies are incorporated into more everyday devices.
What is Ubiquitous Computing
The obligation a rational individual has to their moral code or system.
What is Moral Responsibility
An area of uncertainty where the norms and laws are not yet clear or resolved, often because the problem which is being address is new and/or novel.
What is Grey Area
The territory in which legal decisions can be said to be valid, and where legal authority can be extended and enforced.
What is Jurisdiction
the use of information technology to unleash programs that disrupt the operations of computer networks or corrupt data
What is Cybervandalism
A theory which suggests that people can rationally decide to ‘trade’ privacy or their personal information in return for a specific payoff
What is Privacy Calculus
A firm or agency which is legally and ethically responsible for storing and safeguarding personal and corporate user data and making decisions regarding the release and sharing of that data with others.
What is Data Trustee
The notion that the originator of an idea owns that idea. He or she is entitled to determine how it is used and to be compensated for its use.
What is Intellectual Property
Hackers who perform illegal or illicit operations with the intent to harm or destroy.
What is Black Hat Hacker
the use of deception for personal gain in online business transactions by assuming a false online identity or by altering or misrepresenting data
What is Computer Fraud
Revealing someone’s personal information publicly, without their knowledge or consent.
What is Doxing
The ability to act as an individual with free will and without being coerced or controlled by another.
What is Autonomy
Claiming another person’s ideas or intellectual property as your own.
What is Plagiarism
A military tactic in which defenders can launch an automatic counterattack against any suspected incursion or attack without waiting for authorization or permission.
What is Active Cyberdefense
the execution of politically motivated hacking operations intended to cause grave harm that is, resulting in either loss of life or severe economic loss or both.
What is Cyberterrorism
The use of encryption protocols to ensure that all users of a system or all participants in a transaction are who they say they are. Usually carried out through the issuance of certificates.
What is Authentication
The disparate application of surveillance primarily on the lower classes of society or some other minority group.
What is Differential Surveillance
Practices by which people upload, download, share, distribute or transmit media or data protected by copyright.
What is Piracy
Activities of warfare taking place in cyberspace or attacks on conventional targets waged through the use of cyber assets.
What is Cyberwarfare
A form of sanctioned hacking in which hackers carry out activities aimed at identifying flaws in computer systems, and are rewarded by defending systems for their efforts.
What is Bug Bounty Program
Methods that allow online users to protect the privacy of their personal information.
What is (PET)
Privacy Enhancing Technologies
Legal consent to an action with knowledge of possible consequences.
What is Informed Consent
The number of pirated software units divided by the total number of software units put into use, or the percentage of software acquired illegally.
What is Piracy Rate
Protocols for limiting incursions and damage caused by attacks without having an active counterattack protocol.
What is Passive Defense