Ethics and Privacy concerns
The group of laws created to update copyright laws concerning regulation of digital material in accordance with World Intellectual Property Organization treaties is known as the
Digital Millennium Copyright Act (DMCA).
Which of the following laws allows law enforcement to obtain information about online and offline communications related to terrorist activities without a warrant?
The USA PATRIOT Act/USA Freedom Act
Methodologies that attempt to deal with the vast amount of complex information that accumulates at high, and accelerating, velocity use big data.
True
Searching for precedents or examples is the third step in the five-step process of conducting an ethical analysis. Group starts
True
Which of the following determines the interest rate you'll be charged when you want to borrow money?
credit report
Cyber criminals often demand ________ as a ransom payment because this type of money is difficult to trace and accessible through any Internet-connected device
cryptocurrency
When making an ethical analysis, you should get all the pertinent facts and then
determine the affected.
Which of the following actions would violate an organization's prohibitions on the personal use of company computers as well as the law in most countries?
distributing company-owned software without authorization
Which dimension of ethical behavior in the digital age includes the question of how much time employees are allowed to spend browsing social media?
establishing standards
A large corporation purchases and sells consumer data. This is referred to as big data collecting.
false
A password is a biometric measure used to prevent unauthorized access to data and user accounts.
false
A type of cookie, sometimes called a transient cookie, that is not stored but just kept in memory when a user visits a website is called an authentication cookie.
false
Cookies stored on your device's hard drive and remain even if your computer has been restarted are called authentication cookies.
false
Direct inquiry, indirect tracking, and third-party data purchase are three common methods of predictive analytics.
false
Due to increased standardization of international laws, students can relax their online vigilance when traveling or studying abroad. Group starts
false
On a website that includes a checkbox for visitors to indicate whether they want to receive site news, for instance, if the box is already checked, it is an opt-in mechanism. If the checkbox is not already checked, it is called an opt-out mechanism. Group starts
false
PATRIOT stands for Providing Appropriate Tools Required for International Online Trade.
false
Raw facts that describe the characteristics of an event, object, or set of information that can be entered into a computer are known as cookies.
false
The two major categories of computer ethics violations are personal activities and organizational policy violations.
false
When managers must make a difficult choice that has a moral component, they should look to principles of ethical strategy.
false
Your right to have your personal information protected online is covered by your property rights.
false
To address the ethical concerns surrounding ________, many employee handbooks state that the organization must use data responsibly and always respect privacy.
information privacy rights
What is the fourth step in a five-step ethical analysis?
listing options
When making an ethical analysis, what is the last thing a manager should do before making a decision and preparing for the consequences?
listing options
How your private data and information are used, who has access to them, which techniques and technologies protect them, and the communications and preferences surrounding how they are handled are components of Internet
privacy.
Which dimension of ethical concerns would examine the issue of how playing video games relates to or influences childhood obesity?
quality of life
Which step of an ethical analysis is designed to enable a manager to obtain guidance or insights from other managers?
searching for precedents
What type of cookie is stored in temporary memory and is lost when the web browser is closed?
session
Which 1986 law makes it illegal to intercept calls or messages without a warrant?
the Electronic Communications Privacy ActCorrect
The Act that protects person-to-person wire, oral, and electronic communications is
the Wiretap Act.
Cookies that are created by a website other than the one you are currently visiting and are used to track your surfing habits are known as ________ cookies.
third-party
What is antivirus software used for?
to scan files to identify and remove computer viruses and other malicious programs
Establishing standards is the dimension (category) of ethical concerns that involves determining the proper levels of protection for digital information. Group starts
true
In a five-step ethical analysis, the second step is to determine whom will be affected by a decision.
true
Intellectual property laws protect against unauthorized use of software and many other digital products.
true
Listing the likely consequences of a decision is part of the fourth step in the process of making an ethical analysis.
true
One concern that falls under the ethical dimension of quality of life is the fact that the more time teens spend on social media, the more likely they are to suffer from depression
true
Using cookies to follow someone's browsing habits is a form of data collection called indirect tracking. Group starts
true