Ethics and Privacy Concerns
Select two ways managers encourage employees to act unethically.
By failing to act ethically themselves. By not enforcing strong ethical behavior.
Which of the following statements accurately describes spyware? More than one answer may be correct.
Downloading software or documents from unvetted sources is one way spyware can be installed. Spyware captures private information by monitoring how users interact online.
Which three of the following can encourage ethical computer use in the workplace?
Employee monitoring software Setting a good example Remote desktop software
The law passed in 1986 that protects email and VoIP communications by making it illegal to intercept calls or messages without a warrant is The Electronic Communications _____ Act.
Field 1: Privacy
The Cybersecurity Information _______ Act, passed in December 2015, allows private companies to share threat warnings with the U.S. government.
Field 1: Sharing
The PATRIOT Act was enacted to monitor terrorist activities and communications following the 9/11 attacks and the 2001 Anthrax attack on Congress. PATRIOT stands for Providing Appropriate Tools Required to Intercept and Obstruct _______.
Field 1: Terrorism
If you are downloading a game or software onto a device, there may be an empty box asking you to check the box to agree to Terms of Use and the site's Privacy Policy. This checkbox is called a(n) -in.
Field 1: opt
Computer ethics violations fall in two major categories; illegal activity and organizational ____ violations.
Field 1: policy
Your right to control what happens with personal information about you is centered around the right to ___.
Field 1: privacy
Select the fourth step in the five steps of an ethical analysis.
Listing options Reason: Correct. Listing options is the fourth step. Remember that not making a decision might also be an option.
The principle of ethical conduct that states that a manager must attempt to determine if this decision is fair for all involved is the ____ principle.
Universalist
Select two important considerations for managing cookies.
Users should be aware that cookie settings must be adjusted in each browser. Users should determine what cookie settings is appropriate for your browser use and privacy protection.
Part of making an ethical decision is understanding that your decision will most like result in ___ .
unintended consequences
Place the 5 steps of an ethical analysis in order.
1. Getting all the pertinent facts 2. determining the affected 3. searching for precedents 4. listing possible options 5. deciding and preparing for consequences.
Which amendment to the U.S. Constitution protects freedom of speech from government censorship?
1st
The ethical concerns of the digital age can be divided into ___ dimensions (categories).
5
Select the three correct statements regarding patents.
A patent will only be granted for something that is useful. To qualify for a patent, the invention must be novel, or different, from other similar inventions. To qualify for a patent, the invention must be non-obvious, meaning that a skilled artisan would find the invention surprising or unexpected.
Which type of cookie is lost only if deleted or if is created with an expiration date?
A persistent cookie
Spyware is software that collects information about your Internet surfing habits and behaviors. Spyware includes the collection of which three of the following?
Account numbers Passwords Keystrokes
The second step in the five steps of an ethical analysis is to determine the __.
Affected
Which two of the following guidelines should you follow when reporting a co-worker's computer ethics violations.
Be brief and remember that your employer probably did not hire you monitor inappropriate computer use. Only report incidences that you have personally witnessed.
Jose, a branch manager, determines that one of his employees has inappropriately used the person digital information of a client. Jose, reprimands the employee and withholds an expected promotion. Jose is exercising which dimension of ethical behavior in the digital age?
Control and accountability
When you revisit a website, your browser will send the website's ____ (a small text file) to the Web server that uses this information to customize and optimize your experience.
Cookie
A form of protection for original works of literature is called a ___.
Copyright
Match the intellectual property with the device that protects it. Instructions A portrait that you paint.
Copyright
Select three categories of intellectual property.
Copyrights Patents Trade secrets
Your gym provides child care during your spinning class. Can the care play a Disney movie for the toddlers?
Copyrights and Intellectual Property Rights
Which two of the following describe concerns that might be categorized in the ethical dimension of quality of life.
Craig observes that his daughter's growing depression seems exacerbated by the amount of time she spends on social media sites. You need to use airport restroom but the stalls are all occupied by people using their smartphones.
In the settings area of each browser you should consider adjusting which three of the following?
Deciding from which sites you want to allow cookies Deleting cookies Blocking or customizing your cookie settings
Select three of steps included in the 5 steps of an ethical analysis.
Determining who is affected. Searching for precedents. Getting all the pertinent facts.
Determining how much time employees should be allowed to browse their social media sites while at work falls under which dimension of ethical behavior in the digital age?
Establishing standards
A religious leader might instruct you on how to uphold high morals, but the reasons for acting morally are based on your ___.
Ethics Reason: Correct. A religious leader may provide a moral compass, but a thousands-year-old religion often has difficulty addressing the vast array of ethical questions raised by today's Internet. The correct answer is ethics.
Acting with high morals means you live a virtuous life, while your ___ provide a rational framework for your morals.
Ethics Reason: Correct. Ethics are the reasons for acting morally.
The principle of ethical conduct that states that some decisions are either morally right or morally wrong is called the principle of moral ___.
Field 1: rights
A type of cookie, sometimes called a transient cookie, that is not stored but just kept in memory when a user visits a website is called a ______ cookie.
Field 1: session
Select the first step in the five steps of an ethical analysis.
Getting the facts
A friend calls and says she is interviewing a former employee of yours. She asked if he used many sick days. Can you provide this information?
Information Privacy Rights
Your boss states that in your organization data must be used responsibly and privacy should always be respected. This aligns with which dimension of ethical concerns in the digital age?
Information Privacy Rights
Select three correct statements regarding international Internet privacy laws.
It is very difficult to get nations across the globe to agree on standardized Internet privacy laws. The European Union (EU) European Commission Data Protection Directive states that under EU law, personal data can only be gathered legally under strict conditions. International laws on Internet privacy vary greatly.
A form of spyware that records all actions typed on a keyboard is called a __ logger.
Keystroke
Technology has brought about many ethical challenges. One of these technologies is Deepfake. Deepfake refers to ___.
Modifying images or video by replacing one person's likeness with that of another.
If the box is already checked by default, this is called an ___ mechanism.
Opt out
The fourth step in the process of making an ethical analysis is to list __.
Options
Match the intellectual property with the device that protects it. Instructions A new type of flower that you invent.
Patent
Cookies stored on your device's hard drive and remain even if your computer has been restarted are called __ cookies.
Persistent
The third step in the five-step process of conducting an ethical analysis is searching for __ .
Precedents
This principle asks the decision-maker to consider what a highly moral person would do when faced with this question.
Principle of Virtue
Which two of the following can be awarded copyright protection?
Sculptures Choreography
The Act that outlines a plan to protect government information and assets against cyber threats and requires each federal agency to develop a plan for information security is The Federal Information ----- Management Act (FISMA)
Security
Which type of cookie is not stored on your computer's hard drive but instead just resides in memory while you visit a website?
Session Cookie
Which two of the following potential workplace computer ethics violations are also illegal activities.
Software piracy using an employer's computer network. Computer scams launched from work computers.
The dimension (category) of ethical concerns in the digital age that refers to determining what constitutes proper levels of protection of digital information is called establishing __.
Standards
Will the decision impact the privacy or property rights of any individuals or corporations? This question should be asked in which step of the 5 steps of an ethical analysis.
Step 2 - Determining the affected. Reason: Correct. The rights and feeling of others must be considered any time a decision is made.
The laws that were created to update copyright laws dealing with the issues of regulating digital material in accordance with World Intellectual Property Organization treaties is called:
The Digital Millennium Copyright Act (DMCA)
Which law, passed in 1986, protects email and VoIP communications by making it illegal to intercept calls or messages without a warrant.
The Electronic Communications Privacy Act Reason: Correct. This law was enacted to restrict government wire taps of telephone calls as well as the transmission of electronic data.
Which Act outlines a plan to protect government information and assets against cyber threats.
The Federal Information Security Management Act (FISMA) Reason: Correct. The FISMA requires each federal agency to develop a plan for information security.
Which principle of ethical conduct attempts to distribute rewards equitably to individuals based on their level of productivity?
The Principle of Distributive Justice
There are five basic ethical principles that we can look to when facing an ethical dilemma. Select the three ethical principles from the choices offered.
The Principle of Distributive Justice The Principle of Moral Rights The Principle of Virtue
Which principle of ethical conduct states that there exist certain moral values that should always be upheld or never be violated?
The Principle of Moral Rights
Which principle of ethical conduct asks the decision-maker to consider what a highly moral person would do when faced with this question.
The Principle of Virtue
What Act was enacted to monitor terrorist activities and communications following the 9/11 attacks and the 2001 Anthrax attack on Congress?
The US PATRIOT Act/USA Freedom Act
This principle states that a manager must attempt to determine if this decision is fair for all involved.
The Universalist Principle
The Act that protects person-to-person wire, oral, and electronic communications is ___.
The WireTap Act
Many sales managers, including those in information technology-related fields, use commissions in an attempt to incentivize productivity and to reward more successful salespeople. The principle of ethical conduct that this exemplifies is ___.
The principle of distributive justice Reason: Correct. The principle of distributive justice attempts to distribute rewards equitable to individuals based on their level of effort or productivity level.
Select the three major titles of the Digital Millennium Copyright Act (DMCA) that impact digital copyright protection.
Title 2 - This act protects Internet Service Providers (ISPs) from being sued for copyright infringement when the ISP's user wrongfully copies items from the Internet. Title 4 - This act facilitates distance learning by allowing educational institutions latitude with regard to the use of copyrighted material. Title 1 - This act requires that measures be taken to make it difficult to copy analog video recordings.
Match the intellectual property with the device that protects it. Instructions The logo of your company.
Trademark
This principle simply states that when faced with an ethical dilemma the manager should choose the option that does the greatest good for the most involved.
Utilitarian Principle
Select the two major types of patents.
Utility and Design
Select three privacy concerns associated with cookies.
Websites can use cookies to track your surfing behavior and use this information to create specific user profiles. Websites that use cookies can collect information about surfing habits and sell that information to a variety of third-parties. Corporate and government entities can use cookies to monitor your surfing behavior.
Which three of the following situations involve information privacy rights?
Your neighbor has a history of abusing children, do you have a right to know this? One of your new-hires has a large Twitter following under a pseudonym. Should you let your boss know? You allow an employee to take 2-hour lunch breaks because her daughter is receiving chemotherapy. Can you tell her colleagues why she is getting the special treatment?
The purpose of spyware is to ______.
capture the user's account data, passwords, key strokes, and more
Raw facts that describe the characteristics of an event, object, or set of information that can be entered into a computer is
data
The U.N. General Assembly adopted resolution 68/167 in December 2013 that affirms that the rights held by people offline must also be protected online, and it called upon all Member States (nations) to respect and protect the right to privacy in digital communication. This means that ___
even though it sounds good, Internet users should be aware that digital privacy is not honored by many on the Internet. Reason: Correct. Despite this resolution, the right to digital privacy under international law is not absolute.
Management can discourage the inappropriate use of business computers by publicly announcing that their organization uses employee _____ software or remote desktop software.
monitoring
If the box is not already checked by default, this is called an ___ mechanism.
opt in
An important part of an ethical analysis is to prepare for the consequences of the decision, many of which may be unintended. Part of this preparation should include __.
preparing to defend your decision Reason: Correct. Defending your ethical decision is often a good reason why you should document the process you used to make the decision.
A wide-ranging term that refers to a variety of considerations including; how data and information is used, who has access to data and information, the techniques and technologies used to protect sensitive and private data, communications, and preferences is Internet ___.
privacy
Because prior management decisions might provide guidance on your current situation, the third step of an ethical analysis is to ___ .
search for precedents
Even though the Child Online Protection Act of 1998 was sponsored by both Democrats and Republicans and was passed by both Houses of Congress and signed into law by President Clinton, you cannot be punished for violating law because ___ .
the law violated the 1st Amendment (freedom of speech) rights and was found unconstitutional.
Cookies that are created by a website other than the one you are currently visiting and are used to track your surfing habits are known as ___ cookies.
third-party Reason: Correct. Third-party cookies are considered an invasion of privacy.
When facing a moral dilemma, it is useful to be aware of the five principles of ethical ___
Field 1: conduct
Small text files created by websites you visit that your web browser stores on your hard disk are called _____.
Cookies
Which two of the following are examples of ethical concerns that have been created as a result of new technologies?
Digital piracy Cyberbullying
Data that is typically used in commercially available relational databases, where the data resides in a fixed field and can easily be queried, is called ___ data.
Structured
Which Act, signed into law in December 2015, allows companies to share cyber-security threat information with the U.S. government?
The Cybersecurity Information Sharing Act
Select the dimension (category) of ethical behavior that is illustrated by the following concern. Fourteen-year-olds are interested in cannabis shops but a state has determined that in order to view the websites of these shops you must be at least 21. How should this be managed and who should be responsible in case of violations?
Control and accountability Reason: Correct. This category of ethical dilemmas examines how individuals or corporations can be held accountable in case of violations.
The federal law that protects person-to-person wire, oral, and electronic communications and also includes a variety of network crime statutes that include identity theft and unlawful access to stored communications is The ______ Act.
Field 1: Wiretap
Encouraging communication with minimal barriers can help to ensure that management has the pulse of the organization. Managers should ensure that a system exists in which employees can report malfeasance to their superiors ____.
Field 1: anonymously, privately, or anonymous
Methodologies that attempt to deal with the vast amount of complex information that accumulates at high, and accelerating, velocity use ______ data.
Field 1: big
Direct inquiry, indirect tracking, and 3rd party data purchase are three common methods of ______ data.
Field 1: collecting, gathering, getting, obtaining, or finding
Customers are offered a free dessert if they complete a survey. This method of data collection is referred to as ________ inquiry.
Field 1: direct
Getting all the pertinent ______ is the first step in an ethical analysis.
Field 1: facts
Artwork, literary works, inventions, music, and images are some of the creations that most societies believe should be protected. These works are considered _____ property and can be protected with copyrights, trademarks, and patents.
Field 1: intellectual
Property rights that allow creators to profit from their work, thereby encouraging creativity, are called ____ property rights.
Field 1: intellectual
Along with the employee, which of the following is most responsible for an employee's ethical behavior?
Management
Studies indicate that the more time teens spend on social media the more likely they are to suffer from depression. This concern falls in the ethical dimension of ____ of life.
Quality
As a manager, you are entitled to 2 PTO (paid time off) days per month. Your boss encourages to use this time off and only asks that you check your email once per day to answer employee questions.
Quality of Life
Which principle of ethical conduct states that when faced with an ethical dilemma the manager should choose the option that does the greatest good for the most involved?
The Utilitarian Principle Reason: Correct. The utilitarian principle is similar to a cost-benefit analysis. Essentially, do the ends justify the means?
Under what circumstance should you report a computer ethics violation to your employer?
You pass a co-worker's computer screen and see him surfing through child pornography.
Credit institutions use big data to anticipate the likelihood of ___ and to more accurately report credit ratings.
loan default