BCIS 1305 Ch 10 Study Guide New

¡Supera tus tareas y exámenes ahora con Quizwiz!

Federal permitting employers to monitor emails sent and received by employees, emails erased from hard disks and retrieved in case of lawsuits, and the use of email among public officials that might violate "open meeting" laws are part of privacy and _____

email

Preventing waste and mistakes involves establishing, implementing, monitoring, and ______ policies and procedures

reviewing

Questions such as: Do current policies cover existing practices adequately? Does the organization plan any new activities in the future? Who will handle them and what must be done? Are contingencies and disasters covered? are examples of _______

reviewing policies and procedures

In order to be accredited by the Better Business Bureau, a business is required to publish a privacy notice on its website that includes all of the following elements EXCEPT a. updates b. sharing and selling c. access d. choice

sharing and selling

Wasting time online costs U.S. businesses more than _____ annually. a. $385 billion b. $285 billion c. $185 billion d. $85 billion

$85 billion

The Children's Online Privacy Protection Act (COPPA) was passed by Congress in October 1998. This act, directed at Web sites catering to children, requires site owners to post comprehensive privacy policies and to obtain parental consent before they collect any personal information from children under _______ years of age. a. 10 b. 13 c. 18 d. 21

13

Miranda works at a small-batch soda pop manufacturing plant. For eight hours a day, she uses her right hand to lift individual bottles of soda pop off the production line and place them in packing crates. Lately her right elbow has been hurting, so she visited her doctor, who diagnosed her with _______. a. a repetitive strain injury b. carpal tunnel syndrome c. a thromboembolism d. none of these answers

a repetitive strain injury

Founded in 1977, the Association for Computing Machinery (ACM) is the oldest computing society and boasts more than 200,000 members in more than 120 countries. a. True b. False

False

Some companies offer health and wellness programs that require employee participants to share personal data. This data is protected under the same HIPAA privacy regulations as data shared with health insurance companies and doctors. a. True b. False

False

The Fair Credit Reporting Act of 1970, the Family Educations Privacy Act of 1974, the Tax Reform Act of 1976, the Right to Financial Privacy Act of 1978 and other Laws are part of ______

Federal Privacy Laws

_______ software is used to protect personal data and screens Internet content.

Filtering

The ________ requires financial institutions to provide "clear, conspicuous, and accurate statements" of their information-sharing practices.

Gramm-Leach-Bliley Act

The _____ requires all financial institutions to protect and secure customers' nonpublic data from unauthorized access or use. a. E-Government Act of 2002 b. USA Patriot Act of 2001 c. Gramm-Leach-Bliley Act of 1999 d. Sarbanes-Oxley Act of 2002

Gramm-Leach-Bliley Act of 1999

The ______ is the privacy rules that require notice in writing of the privacy practices of health care services

HIPAA (Health Insurance Portability and Accountability Act)

Although Roberta had signed a form preventing her doctor from sharing her personal medical records with the company she worked for, she later discovered that the doctor's office had, in fact, shared her data with her health insurance provider and her employer, which caused her to be terminated. Because the doctor's practice violated its own privacy policy, she was able to file a lawsuit under the ________. a. Health Insurance Portability and Accountability Act b. Health and Medical Records Privacy Act c. Gramm-Leach-Bliley Act d. none of these answers

Health Insurance Portability and Accountability Act

Which of the following statements is true of the E-Government Act of 2002? a. It requires federal agencies to post machine-readable privacy policies on their Web sites and to perform privacy impact assessments on all new collections of data of ten or more people. b. It restricts government access to certain records held by financial institutions. c. It renews the U.S. government's authority to monitor electronic communications of foreigners abroad and authorizes foreign surveillance programs by the National Security Agency (NSA). d. It defines procedures to request judicial authorization for electronic surveillance of persons engaged in espionage against the United States on behalf of a foreign power

It requires federal agencies to post machine-readable privacy policies on their Web sites and to perform privacy impact assessments on all new collections of data of ten or more people.

_______ is a system of rules that tells us what we can and cannot do. They are enforced by a set of institutions.

Law

_____ involves publishing an intentionally false written statement that is damaging to a person's or an organization's reputation. a. Libel b. Phishing c. Vishing d. Slander

Libel

______ involves publishing and intentionally false written statement that is damaging to a person's or organization's reputation

Libel

Which of the following is a computer-related mistake? a. Acquiring redundant systems. b. Mishandling computer outputs. c. Operating unintegrated information systems. d. Exhausting information system resources.

Mishandling computer outputs.

_______ is a means of acquiring data (such as location, noise level, traffic conditions) through sensor-enhanced mobile devices and then is shared with individuals, healthcare providers, utility firms, causing privacy risks if people are unaware their personal mobile data is shared.

Mobile crowd sensing (MCS)

______ are one's personal beliefs about right and wrong.

Morals

________ is a tool used by the NSA and FBI to access the servers of major Internet services such as Facebook, Google, YouTube, and others to collect the content of emails, video, photos, file transfers, and live chats.

PRISM

_______ is also required for minors on social network services such as Facebook, Twitter, LinkedIn, Pinterest, Google Plus, Tumblr, and Instagram. Parents should monitor children's activities.

Parental consent

________ are pieces of data tied to a particular user or device, to serve advertising to children

Persistent identifiers

_______ deals with the "right to be left alone" or to be withdrawn from public view.

Privacy Issues

The ______ tags, are microchips with antenna that generate radio transmissions that can lead to potential privacy concerns. These that are embedded in products we buy.

RFID

A health concern in a job where someone has an injury or disorder of the muscles, nerves, tendons, ligaments, or joints cause by repetitive motion on a tendon is called ______

RSI (Repetitive strain injury)

During a recent brainstorming session, one of Franklin's co-workers suggested that their company could sell some of the data contained in its customer databases to earn extra revenue for the business. As a long-time member of the ACM (Association for Computing Machinery), Franklin is opposed to the idea because it violates which of the following imperatives in the ACM code of ethics? a. Be honest and trustworthy. b. Respect the privacy of others. c. Honor property rights d. Avoid harm to others.

Respect the privacy of others

A health concern in a job that requires sitting at a desk and using a computer for hours can have the risk of ________, which is the formation of blood clots in the legs or lung.

SIT (Seated immobility thromboembolism)

Which of the following is not a common computer-related mistake? a. Programming errors b. Shopping online while at work c. Data-entry or data-capture errors d. Errors in handling files

Shopping online while at work

Suppose you have been receiving unsolicited phone calls from telemarketers. Which agency should you contact to prevent these 'junk' calls? a. The Federal Trade Commission b. your local police department c. Better Business Bureau d. The Department of Justice

The Federal Trade Commission

The _______ imposes limitations on the bulk collection of the telecommunications metadata of U.S. citizens; prohibits large-scale indiscriminate data collection (such as all records from an entire zip code); and requires the NSA to obtain permission from the Foreign Intelligence Surveillance Court (FISC) to access the metadata records, which are now held by telecommunication companies rather than by the government.

USA Freedom Act (2015)

The __________ requires telephone companies to turn over customer information, including numbers called, without a court order if the Federal Bureau of Investigation (FBI) claims that the records are relevant to a terrorism investigation. a. USA Patriot Act of 2001 b. Gramm-Leach-Bliley Act of 1999 c. Electronic Communications Privacy Act of 1986 d. Cable Act of 1992

USA Patriot Act of 2001

In today's workplace, most employers issue a policy stating that they will monitor employees' use of any company-owned computer, server, or email system, thus eliminating any expectation of privacy. How many organizations actually monitor, retain, and review employees' emails? a. about one-fourth b. about half c. about three-quarters d. nearly all

about half

Federal law permits employers to monitor their employees' use of company-owned computer equipment, specifically _______. a. e-mails b. instant messages c. website views d. all of these answers

all of these answers

Flexibility is a major component of ergonomic design, mainly because: _______. a. people come in a wide range of shapes and sizes b. people have their own preferences c. people need to be able to position equipment in different ways for best results d. all of these answers

all of these answers

Harold is thinking about setting up profiles on Facebook and Twitter. Which of the following categories of data should he avoid sharing on these social media platforms? a. his location b. his religious and political affiliations c. his health conditions d. all of these answers

all of these answers

To minimize waste and mistakes, organizations often develop and implement policies and procedures which focus on: ________ a. the use of data editing to ensure data accuracy and completeness b. the assignment of clear responsibility for data accuracy within each information system c. the implementation of source data automation d. all of these answers

all of these answers

The ________ states the principles and core values that are essential to their work and, therefore, govern their behavior. It can become a reference point for weighing what is legal and what is ethical.

code of ethics

Poorly designed work environment and failure to take regular breaks to stretch the muscles and rest the eyes are two primary causes of ______

computer-related health problems

Data-entry or data-capture errors, programming errors, errors in handling files, mishandling of computer output, and an inadequate planning for and control of equipment malfunctions are examples of ______

computer-related mistakes

Unclear expectations, inadequate training and feedback, program development that contains errors, incorrect input by a data-entry clerk are the causes of _____

computer-related mistakes

Organizations operating unintegrated IS, acquiring redundant systems (systems performing the same function), and wasting IS resources (Improper use of IS and resources by employees) are examples of ______

computer-related waste

Heavy computer users who experience red, dry, itchy eyes should _____. a. keep their focus on their screens for long hours b. consider the use of artificial tears c. consider the use of older, but more human friendly CRT monitors d. avoid blinking often

consider the use of artificial tears

Invasion of privacy can damage an organization reputation, turn away customers, and dramatically reduce revenues and profits if organizations don't have _____

corporate privacy policies

The ability to _______, involves data storage control, and database usage consent.

decide

Gathering information, developing a problem statement, consulting those involved as well as other appropriate resources, identifying options, weighing options, choosing an option, implementing a solution and reviewing results are the steps involved in the __________

decision-making process

Anne and Jordan have two pre-teen sons and they're concerned about what their kids might see and share on the Internet. They should probably invest in a. privacy screening b. security passwords c. filtering software d. Internet licensing

filtering software

The NetNanny, SpyAgent, Qustodio, Safe Eyes, Spector Pro are the top-rated Internet ___________ that prevent children from broadcasting their name, address, phone number or other personal information.

filtering software examples

The ______ recommends BBB accredited businesses have sort of privacy notice on their Web site.

BBB Code of Business Practices

The _______ requires Web sites that collect information about children under the age of 13 to post privacy policy and adhere to certain information-sharing restrictions

COPPA (Children's Online Privacy Protection Act)

A health concern where there is an inflammation of the nerve that connects the forearm to the palm of the wrist causing wrist pain, a feeling of tingling and numbness, and difficulty and holding objects is called the _______

CTS (Carpal tunnel syndrome)

_______ is is an inflammation of the nerve that connects the forearm to the palm of the wrist. a. Seated immobility thromboembolism (SIT) b. Carpal tunnel syndrome (CTS) c. Behcet's syndrome d. Chronic idiopathic mylofibrosis

Carpal tunnel syndrome (CTS)

The ______ Act doesn't allow schools to receive discounts offered by the E-Rate program (libraries support to purchase Internet access and computers) unless they certify that they have certain Internet safety measures in place to block or filter "visual depictions that are obscene, child pornography, or are harmful to minors."

Children's Internet Protection Act (CIPA)

The ____ Act was passed by congress directed at Web sites catering for children requiring site owners to post comprehensive privacy policies and to obtain parental consent before they collect any personal information form children under 13 year of age.

Children's Online Privacy Protection Act (COPPA)

_____ states the principles and core values that are essential to a set of people and that, therefore, govern these people's behavior. a. Code of civil procedure b. Code of criminal procedure c. Code of conduct d. Code of ethics

Code of ethics

_______ refers to wasting time online

Cyberloafing

________ conforms to generally accepted social norms, many of which are universally accepted.

Ethical behavior

______ describes standards or codes of behavior expected of an individual by a group (nation, organization, and profession) who which an individual belong.

Ethics

The _______ enforces federal consumer protection laws that prevent fraud, deception, and unfair business practices.

FTC (Federal Trade Commission)

Amy is doing some online research for a term paper. She'd like to access some information on a particular website, but the website is asking her to put in her email address before allowing her to view the information. She wonders what the website owner will do with that information, but there is never any way for her to know how data collected via a website will be used. a. True b. False

False

Few companies have found it necessary to limit employee access to non-work-related Web sites. a. True b. False

False

Heavy computer use can negatively affect one's physical health. a. True b. False

True

In 2015, the European Court of Justice found that the Safe Harbor Framework (an agreement that had been in place since 2000 between the United States and the European Union (EU), allowing the transfer of personal data from the EU to the United States) did not adequately protect the personal data of citizens residing in EU countries. a. True b. False

True

Just because an activity is defined as legal does not mean that it is ethical. a. True b. False

True

One idea for reducing cyberloafing is to develop software that recognizes and categorizes Internet sites into sites that employees can always visit, sometimes visit, and never visit. a. True b. False

True

The Government Accounting Office uncovered a total of $321 million spent in the six-year period 2008 to 2013 on projects that duplicated other efforts within the Defense Department, Department of Homeland Security, and the Department of Health and Human Services. a. True b. False

True

Which of the following is a useful policy to minimize waste and mistakes? a. Users should implement proper procedures to ensure correct input data. b. Changes to HTML and URLs should be documented and authorized by end users. c. Tight control should be avoided over critical tables. d. System report

Users should implement proper procedures to ensure correct input data.

The science of designing machines, products, and systems to maximize the safety, comfort, and efficiency of the people who use them and the study of designing and positioning computer equipment is called _____

ergonomics

Your cousin works at her desktop computer for prolonged period of time every day. She would like to minimize the harmful effects of such repetitive work. Her workspace should be designed with ______ in mind. a. productivity b. economics c. ergonomics d. privacy

ergonomics

To prevent and minimize waste and mistakes the company needs to first _______ such as training programs, manuals and documents covering the use and maintenance of iS, requiring all new applications be approved through a process before they are rolled out, and requiring documentation and descriptions of certain applications to be submitted to a central office

establish policies and procedures

When decision-making gets complicated because it involves significant value conflicts among the various stakeholders as to what is the fairest option pursue, then the decision represents an _______

ethical dilemma

The _________ deal with what is generally considered right or wrong.

ethical issues

Morals are one's personal beliefs about right and wrong, whereas the term ______ describes standards or codes of behavior expected of an individual by a group (nation, organization, and profession) to which an individual belongs.

ethics

Companies selling information of data collected and stored on customers to other companies is part of the privacy and _____

fairness in information use

A job that requires sitting at a desk and using a computer for many hours a day can lead to _______. a. sleep disorders b. formation of blood clots c. inflammation of the gum tissue d. undesirable weight loss

formation of blood clots

While giving her students a physics exam, Professor Thompson noticed that Jack, one of her students who has been struggling with the course material, appeared to be copying answers from Graydon, one of the best students in the class. She decides that she should compare their answers when the class period is over before deciding what to do about the situation. In which phase of the ethical decision-making process is Professor Thompson? a. gathering information b. identifying options c. weighing options d. developing a problem statement

gathering information

Federal laws protect employers by letting them monitor employers use of instant messaging using employer's IM network or employer-provided phones, this is part of privacy and ______

instant messaging

Having the right to know what Web sites are going to do with your personal information and the right to be removed from any mailing list is part of the privacy and the ______

internet

in corporate organizations ________ can danger their reputation, turn away customers, and dramatically reduce revenues and profits

invasion of privacy

The right to _____ involves the knowledge of data storage and get notice database usage

know

Internal audits to measure actual results against established goals, such as percentage of end-user reports produce on time, percentage of data-input errors detected, number of input transactions entered per eight-hour shift, and keeping track of the amount of time employees spend on no-work related Web sites are examples of _______

monitoring policies and procedures

Job insecurity, loss of control, incompetence and demotion are _____ stress that can cause health concerns in an organization

occupational

In a recent survey of 2100 human resource professionals, which two activities were listed as the biggest "productivity killers" in the workplace? a. personal cell phone use and Internet surfing b. Internet surfing and online game play c. online shopping and online game play d. personal cell phone use and online game play

personal cell phone use and Internet surfing

RIFD tags and Mobile crowd and sensing (MCS) are part of the privacy and _____

personal sensing devices

The examples of _________ are the control in changes to critical tables, HTML and URLs, availability of manuals, availability of system reports with general content, the control of unreasonable data entry, make sure that data input, HTML, and URLs are valid, and make sure employees use proper procedures to input data correctly

policies and procedures

Not sending personal or private IMs at work, selecting a texting or IM app that receives high security ratings, disabling text previews when screen is locked, not opening files or links in messages from people you don't know, never sending sensitive personal data via IM, choosing appropriate IM screen name, and not sending embarrassing message is a way to ______

protect your privacy and your employer's property

Graydon noticed Jack, his friend and classmate, cheating on a physics exam and now he is trying to decide what to do about it. He knows he could keep quiet about it, but that would violate his moral values, plus the school's code of ethics requires students to report incidents of cheating. On the other hand, if he reports the incident, both his friend and probably all of their other friends will be mad at him. In which phase of the ethical decision-making process is Graydon? a. identifying options b. developing a problem statement c. gathering information d. weighing options

weighing options

The monitoring of employees inappropriate Web surfing and email, and the court ruling in favor of employers by taking away the 4th amendment rights from employees which protects against unreasonable searches and seizures are part of privacy at ________

work

Two primary causes of computer-related health problems are a poorly designed ______ and failure to take regular breaks to stretch the muscles and rest the eyes.

work environment


Conjuntos de estudio relacionados

Chapter 2 Early River Valley Civilizations

View Set

4.REP/Vrooman Street Act/Special Tax/Property Tax/Transfer Tax/ Assessed value/ ad valorem/California's Proposition 13/MORGAN TAXPAYERS' BILL

View Set

Zad al-Talibin (Provision for the Seekers) 12- Part 2

View Set

Testing & Prescription Powerpoint 8

View Set