CH9 ethics and concerns smartbook

¡Supera tus tareas y exámenes ahora con Quizwiz!

The ethical concerns of the digital age can be divided into ___ dimensions (categories).

5

Which type of cookie is lost only if deleted or if is created with an expiration date?

A persistent cookie

Which three of the following are considered intellectual property and entitled to protection?

A story that you published. A mural that you painted. A song that you wrote.

Which two of the following guidelines should you follow when reporting a co-worker's computer ethics violations.

Be brief and remember that your employer probably did not hire you monitor inappropriate computer use. Only report incidences that you have personally witnessed

Select two ways managers encourage employees to act unethically.

By failing to act ethically themselves. By not enforcing strong ethical behavior.

This is a small text file of information created by websites you visit that your web browser stores on your hard disk.

Cookie

Small text files created by websites you visit that your web browser stores on your hard disk are called _____.

Cookies correct Reason: Correct. A cookie is a small text file of information created by websites you visit that your web browser stores on your hard disk.

Ethical challenges raised by the use of information systems fall into 5 dimensions (categories). Which 3 of the following are included in these 5 dimensions?

Copyright and intellectual property rights Information privacy rights Quality of life

Your gym provides child care during your spinning class. Can the care play a Disney movie for the toddlers?

Copyrights and Intellectual Property Rights

Select three privacy concerns associated with cookies.

Corporate and government entities can use cookies to monitor your surfing behavior. Websites that use cookies can collect information about surfing habits and sell that information to a variety of third-parties. Websites can use cookies to track your surfing behavior and use this information to create specific user profiles.

Because it is difficult to trace and it is accessible through any Internet connected device, cyber criminals often request payment in ___ .

Cryptocurrency

In the settings area of each browser you should consider adjusting which three of the following?

Deciding from which sites you want to allow cookies Blocking or customizing your cookie settings Deleting cookies

A religious leader might instruct you on how to uphold high morals, but the reasons for acting morally are based on your ___.

Ethics

A form of spyware that records all actions typed on a keyboard is called a __ logger.

Keystroke

Which of the following statements accurately describes spyware? More than one answer may be correct.

Spyware captures private information by monitoring how users interact online. Downloading software or documents from unvetted sources is one way spyware can be installed.

Property rights that allow creators to profit from their work, thereby encouraging creativity, are called property rights.

intellectual

Even though the Child Online Protection Act of 1998 was sponsored by both Democrats and Republicans and was passed by both Houses of Congress and signed into law by President Clinton, you cannot be punished for violating law because ___ .

the law violated the 1st Amendment (freedom of speech) rights and was found unconstitutional.

The principle of ethical conduct that states that a manager must attempt to determine if this decision is fair for all involved is the principle.

universalist

The fourth step in the process of making an ethical analysis is to list __.

Action committees

The second step in the five steps of an ethical analysis is to determine the __.

Affected

Novel

Choice Copyright

Invention

Choice Patent

This federal law protects person-to-person wire, oral, and electronic communications.

Choice The Wiretap Act

If the box is not already checked by default, this is called an ___ mechanism.

Choice opt-in

Which two of the following potential workplace computer ethics violations are also illegal activities.

Computer scams launched from work computers. Software piracy using an employer's computer network.

Jose, a branch manager, determines that one of his employees has inappropriately used the person digital information of a client. Jose, reprimands the employee and withholds an expected promotion. Jose is exercising which dimension of ethical behavior in the digital age?

Control and accountability

Your organization has set strict policies prohibiting the use of company computers for personal activities. Which of the following policy violations would also be an illegal activity?

Distributing company-owned software without authorization.

Determining how much time employees should be allowed to browse their social media sites while at work falls under which dimension of ethical behavior in the digital age?

Establishing standards

Acting with high morals means you live a virtuous life, while your ___ provide a rational framework for your morals.

Ethics correct Reason: Correct. Ethics are the reasons for acting morally.

Place the 5 steps of an ethical analysis in order.

Getting all the pertinent facts Determining who is affected Searching for precedents Listing and researching options Making a decision and preparing for the consequences of the decision

A friend calls and says she is interviewing a former employee of yours. She asked if he used many sick days. Can you provide this information?

Information Privacy Rights

Which dimension of ethical behavior in the digital age is represented by the following question? You are interviewing 3 applicants for a management position in your firm and wish to ensure that they will represent your company with professionalism and maturity. Should you check the applicants' social media sites prior to making your hiring decision?

Information Privacy Rights

Which dimension of ethical behavior in the digital age is represented by the following question? You are interviewing 3 applicants for a management position in your firm and wish to ensure that they will represent your company with professionalism and maturity. Should you check the applicants' social media sites prior to making your hiring decision?

Information Privacy Rights correct Reason: Correct. This category of ethical dilemmas involves the rights of individuals and organizations to privacy.

The principle of ethical conduct that attempts to distribute rewards equitably to individuals based on their level of effort or productivity level is called the principle of distributive __.

Justice

Spyware is software that collects information about your Internet surfing habits and behaviors. Spyware includes the collection of which three of the following?

Keystrokes Account numbers Passwords

Select the fourth step in the five steps of an ethical analysis.

Listing options

Along with the employee, which of the following is most responsible for an employee's ethical behavior?

Management

Technology has brought about many ethical challenges. One of these technologies is Deepfake. Deepfake refers to ___.

Modifying images or video by replacing one person's likeness with that of another. correct Reason: Correct - Deepfake technology can bring history to life, but it can also present enormous ethical challenges.

Which three of the following situations involve information privacy rights?

One of your new-hires has a large Twitter following under a pseudonym. Should you let your boss know? You allow an employee to take 2-hour lunch breaks because her daughter is receiving chemotherapy. Can you tell her colleagues why she is getting the special treatment? Your neighbor has a history of abusing children, do you have a right to know this?

Cookies stored on your device's hard drive and remain even if your computer has been restarted are called __ cookies.

Persistent

The third step in the five-step process of conducting an ethical analysis is searching for __ .

Precedents

Because every ethical decision will have ramifications, many of them unseen, the final step in the process of an ethical analysis includes making a decision and __ for the consequences.

Preparing

This principle asks the decision-maker to consider what a highly moral person would do when faced with this question.

Principle of Virtue

As a manager, you are entitled to 2 PTO (paid time off) days per month. Your boss encourages to use this time off and only asks that you check your email once per day to answer employee questions.

Quality of Life

Childhood obesity may be associated with the increased use of video games. Which dimension of ethical concerns in the digital age would examine this issue?

Quality of life

This software allows managers to take control of an employee's computer remotely.

Remote desktop software

Which type of cookie is not stored on your computer's hard drive but instead just resides in memory while you visit a website?

Session cookie

Which three of the following can encourage ethical computer use in the workplace?

Setting a good example Remote desktop software Employee monitoring software

Which of the following is not one of the steps included in the 5 steps of an ethical analysis?

Setting a strong example.

The dimension (category) of ethical concerns in the digital age that refers to determining what constitutes proper levels of protection of digital information is called establishing __.

Standards

Will the decision impact the privacy or property rights of any individuals or corporations? This question should be asked in which step of the 5 steps of an ethical analysis.

Step 2 - Determining the affected.

Which Act, signed into law in December 2015, allows companies to share cyber-security threat information with the U.S. government?

The Cybersecurity Information Sharing Act

Which of the following allows, but does not require, private companies to warn the U.S. government about cyber-security threats?

The Cybersecurity Information Sharing Act

The laws that were created to update copyright laws dealing with the issues of regulating digital material in accordance with World Intellectual Property Organization treaties is called:

The Digital Millennium Copyright Act (DMCA)

Which law or set of laws implements two World Intellectual Property Organization (WIPO) treaties and was created to update copyright laws dealing with the issues of regulating digital material.

The Digital Millennium Copyright Act (DMCA) correct Reason: Correct. The Digital Millennium Copyright Act (DMCA) was signed into law by President Clinton in 1998.

Which law, passed in 1986, protects email and VoIP communications by making it illegal to intercept calls or messages without a warrant.

The Electronic Communications Privacy Act correct Reason: Correct. This law was enacted to restrict government wire taps of telephone calls as well as the transmission of electronic data.

Select three correct statements regarding international Internet privacy laws.

The European Union (EU) European Commission Data Protection Directive states that under EU law, personal data can only be gathered legally under strict conditions. It is very difficult to get nations across the globe to agree on standardized Internet privacy laws. International laws on Internet privacy vary greatly.

This Act outlines a plan to protect government information and assets against cyber threats. It requires each federal agency to develop a plan for information security.

The Federal Information Security Management Act

Which Act outlines a plan to protect government information and assets against cyber threats.

The Federal Information Security Management Act (FISMA) correct Reason: Correct. The FISMA requires each federal agency to develop a plan for information security.

Which principle of ethical conduct attempts to distribute rewards equitably to individuals based on their level of productivity?

The Principle of Distributive Justice

Which principle of ethical conduct asks the decision-maker to consider what a highly moral person would do when faced with this question.

The Principle of Virtue correct Reason: Correct. This principle asks the decision-maker to consider what a highly moral person would do when faced with this question.

What Act was enacted to monitor terrorist activities and communications following the 9/11 attacks and the 2001 Anthrax attack on Congress?

The US PATRIOT Act/USA Freedom Act

Which principle of ethical conduct states that a manager must attempt to determine if a decision is fair for all involved.

The Universalist Principle

The Act that protects person-to-person wire, oral, and electronic communications is ___.

The Wiretap Act correct Reason: Correct. This act also includes variety of network crime statutes that include identity theft and unlawful access to stored communications.

Which statement encompasses the third step of the five-step process of an ethical analysis?

There is an extremely good chance that other managers, perhaps in your own organization, have faced similar dilemmas.

Select the three major titles of the Digital Millennium Copyright Act (DMCA) that impact digital copyright protection.

Title 1 - This act requires that measures be taken to make it difficult to copy analog video recordings. Title 4 - This act facilitates distance learning by allowing educational institutions latitude with regard to the use of copyrighted material. Title 2 - This act protects Internet Service Providers (ISPs) from being sued for copyright infringement when the ISP's user wrongfully copies items from the Internet.

Select two important considerations for managing cookies.

Users should be aware that cookie settings must be adjusted in each browser. Users should determine what cookie settings is appropriate for your browser use and privacy protection.

This principle simply states that when faced with an ethical dilemma the manager should choose that option that does the greatest good for the most involved is the __ principle.

Utilitarian correct Reason: This choice should be selected.

This principle simply states that when faced with an ethical dilemma the manager should choose the option that does the greatest good for the most involved.

Utilitarian Principle

The federal law that protects person-to-person wire, oral, and electronic communications and also includes a variety of network crime statutes that include identity theft and unlawful access to stored communications is The Act.

Wiretap

Which two of the following describe concerns that might be categorized in the ethical dimension of quality of life.

You need to use airport restroom but the stalls are all occupied by people using their smartphones. Craig observes that his daughter's growing depression seems exacerbated by the amount of time she spends on social media sites.

Under what circumstance should you report a computer ethics violation to your employer?

You pass a co-worker's computer screen and see him surfing through child pornography. correct Reason: Correct. If you personally witness illegal activity you should report it.

Encouraging communication with minimal barriers can help to ensure that management has the pulse of the organization. Managers should ensure that a system exists in which employees can report malfeasance to their superiors .

anonymously

The purpose of spyware is to ______.

capture the user's account data, passwords, key strokes, and more correct Reason: Correct. Spyware targets a user's confidential information.

When facing a moral dilemma, it is useful to be aware of the five principles of ethical

conduct

The dimension (category) of ethical dilemmas that examines how individuals or corporations can be held responsible in case of violations of privacy or intellectual property rights is referred to and accountability.

control

A form of protection for original works of literature is called a ___.

copyright

A form of protection provided by the laws of the United States for "original works of authorship", including literary, dramatic, musical, architectural, cartographic, choreographic, pantomimic, pictorial, graphic, sculptural, and audiovisual creations is called a

copyright

After getting all the pertinent facts, the next step in making an ethical analysis is to ___ .

determine the affected

The U.N. General Assembly adopted resolution 68/167 in December 2013 that affirms that the rights held by people offline must also be protected online, and it called upon all Member States (nations) to respect and protect the right to privacy in digital communication. This means that ___

even though it sounds good, Internet users should be aware that digital privacy is not honored by many on the Internet. correct Reason: Correct. Despite this resolution, the right to digital privacy under international law is not absolute.

Getting all the pertinent is the first step in an ethical analysis.

facts

The first step in the 5 step process of an ethical analysis is ___.

getting the facts

Artwork, literary works, inventions, music, and images are some of the creations that most societies believe should be protected. These works are considered property and can be protected with copyrights, trademarks, and patents.

intellectual

With regard to Internet privacy, the First Amendment to the U.S. Constitution is relevant because ___

it provides freedom of speech protection that extends to the Internet which means there is little government filtering of content.

The final step when making an ethical analysis is to make a decision and to prepare for the consequences. Preceding this is the fourth step, which has the manager ___ .

listing options

This principle states that a manager must attempt to determine if this decision is fair for all involved.

matches Choice The Universalist Principle

Logo

matches Choice Trademark

If the box is already checked by default, this is called an ___ mechanism.

matches Choice opt-out

Management can discourage the inappropriate use of business computers by publicly announcing that their organization uses employee software or remote desktop software.

monitoring

If you are downloading a game or software onto a device, there may be an empty box asking you to check the box to agree to Terms of Use and the site's Privacy Policy. This checkbox is called a(n)

opt

Cookies that are created by a website other than the one you are currently visiting and are used to track your surfing habits are called third-cookies. These cookies are considered an invasion of privacy.

party

An important part of an ethical analysis is to prepare for the consequences of the decision, many of which may be unintended. Part of this preparation should include __.

preparing to defend your decision correct Reason: Correct. Defending your ethical decision is often a good reason why you should document the process you used to make the decision.

The law passed in 1986 that protects email and VoIP communications by making it illegal to intercept calls or messages without a warrant is The Electronic Communications Act.

privacy

Your right to control what happens with personal information about you is centered around the right to

privacy

A wide-ranging term that refers to a variety of considerations including; how data and information is used, who has access to data and information, the techniques and technologies used to protect sensitive and private data, communications, and preferences is Internet ___.

privacy correct Reason: Correct. Internet privacy is the right of personal privacy concerning the storing, distributing, and displaying information concerning oneself via the Internet.

Because prior management decisions might provide guidance on your current situation, the third step of an ethical analysis is to ___ .

search for precedents

A type of cookie, sometimes called a transient cookie, that is not stored but just kept in memory when a user visits a website is called a cookie

session

The PATRIOT Act was enacted to monitor terrorist activities and communications following the 9/11 attacks and the 2001 Anthrax attack on Congress. PATRIOT stands for Providing Appropriate Tools Required to Intercept and Obstruct .

terrorism


Conjuntos de estudio relacionados

Unit 13.3 - Area of Regular Polygons

View Set

Douglas McGregor theories of human motivation and management

View Set

Client and Application Security Chapter 9 Quiz

View Set

Chapter 10- T test for related samples

View Set

Gateway to Business- Accounting Pop Quiz

View Set

Biology: Molecular Basis of Life

View Set