Across
- 2. _______ Hat Hackers often work as certified “Ethical Hackers” hired by companies to test their integrity of their systems.
- 4. one of the ways to improve privacy protection is through ___________.
- 7. The creation of information tailored to your preferences is a ___________.
- 11. study of what it means to “do the right thing”.
- 12. public _____ Right is a right to show a copy of the work directly or by means of a film, slide or television image at a public place or to transmit it to the public.
- 13. sources of ethics in Islam are ___________ and hadith.
- 15. privacy risks can be separated into 2 categories which are risks to individuals and risk to ___________.
- 16. ___________ is the use of computers and computer networks as a means of protest to promote political cause.
- 19. refusal to recognise or admit project problems is one of the causes of failures in computer system under what category?
- 20. _________ protect inventions of new things or processes.
Down
- 1. people who are anti-technology.
- 3. examples of fair use include commentary, __________, search engine, criticism, parody, news reporting, teaching, library archiving and scholarship.
- 5. analysing data to determine characteristics of people most likely to engage in a certain behaviour is called computer _____________.
- 6. a consequentialist view that increase happiness and satisfy a person’s needs and values.
- 8. the practice of moving business process to another country.
- 9. one of the examples of hacking technique is _________.
- 10. collective way of life, or way of doing things.
- 14. individual’s own principles regarding right and wrong.
- 17. an alternate method of work where the employee, works from home.
- 18. gap between individuals, households, businesses and geographic areas at different socio-economic levels with regard both to their opportunities to access ICTs and to their use of the internet is called the digital __________.
