Across
- 5. An ethic. The fundamental truths or rules that support your personal values. should be focused on honesty, integrity, and respect for others.
- 7. The study of how people function most effectively in their work environment.
- 8. The ethical standard for respecting the privacy and dignity of other human beings.
- 9. Employees using their company's internet connection for personal use on company time.
- 11. A set of rules or standards you adopt that dictate how you act.
- 15. An ethic. reinforces your adherence to your values and principles. In essence, defining a BLANK dictates how you will act even if no one is watching.
- 16. The ethical standard for observing rules of "netiquette" that promote online civility.
- 19. An area of computer science that focuses on intelligent machines.
- 20. A range of the visible light spectrum, typically used to refer to light emitted from electronic devices, which can lead to eyestrain, headaches, fatigue, and long-term vision problems.
- 21. A network of encrypted content that allows users to engage in untraceable activity.
- 24. Law enforcement practice that involves analyzing data from traffic cameras, surveillance footage, and social media postings for the purpose of preventing crimes before they are actually committed.
- 25. The ethical standard for refusing to violate the intellectual property rights of others.
Down
- 1. Observing and recording the activities of employees, sometimes without their direct consent.
- 2. A discipline that is dedicated to meeting the computer needs of businesses, schools, governments, and other organizations.
- 3. The study of computers and computing concepts. Deals with creating software and using computers to solve problems.
- 4. Environmentally sound policies that prescribe energy efficiency, recycling, and eco-friendly disposal of electronic equipment.
- 6. The ethical standard for protecting confidential data and information.
- 10. An ethic that provides the basis for your code of ethics.
- 12. A discipline that involves collecting and utilizing data to help organizations know what information they need, how to generate it, and how to turn it into meaningful decisions.
- 13. Publishing the private contact information of one's political opponents online.
- 14. A government policy that required Internet Service Providers to allow equal access to all web content.
- 17. Content that is owned by a copyright holder.
- 18. Personal behaviors that build responsibility and trust.
- 22. Malicious attacks on networks and websites for the purpose of promoting social change, regarded by some as civil disobedience and others as cyberterrorism.
- 23. An ethic. involves obeying laws that regulate how computers are used. For example, installing key-logger software on your instructor's computer to obtain her password is a violation of the law, which could subject you to prosecution.
