Management Information Systems CH 2

¡Supera tus tareas y exámenes ahora con Quizwiz!

Because it is difficult to trace and it is accessible through any Internet connected device, cyber criminals often request payment in ___ .

Cryptocurrency

Acting with high morals means you live a virtuous life, while your ___ provide a rational framework for your morals. Multiple choice question.

Ethics

Ethical Analysis 5 Steps

Identify the Issues, Determining the affected Search for precedent getting the facts Make a Decision.

Which principle of ethical conduct states that there exist certain moral values that should always be upheld or never be violated.

The Principle of Moral Rights

A religious leader might instruct you on how to uphold high morals, but the reasons for acting morally are based on your ___.

ethics

With regard to Internet privacy, the First Amendment to the U.S. Constitution is relevant because ___

it provides freedom of speech protection that extends to the Internet which means there is little government filtering of content.

A form of spyware that records all actions typed on a keyboard is called a

keystroke logger

Which type of cookie is lost only if deleted or if is created with an expiration date?

persistant cookie

Your right to control what happens with personal information about you is centered around the right to

privacy

The principle of ethical conduct that states that some decisions are either morally right or morally wrong is called the principle of moral

rights

Which two of the following are examples of ethical concerns that have been created as a result of new technologies?

Cyber bullying and digital privacy

Which three of the following can encourage ethical computer use in the workplace?

Employee monitoring software, remote desktop software, and setting a good example

What is an example of something that may be copyrighted?

sculptures and choregraphy

Data that is typically used in commercially available relational databases, where the data resides in a fixed field and can easily be queried, is

structure data

Which principle of ethical conduct calls for allocating rewards equitably according to individuals' productivity?

the Principle of Distributive Justice

Of the following principles, which states that a manager must attempt to determine if a decision is fair for all employees involved?

the Universalist Principle

Cookies that are created by a website other than the one you are currently visiting and are used to track your surfing habits are known as ___ cookies.

third party

The ethical concerns of the digital age can be divided into ___ dimensions

5

Which two of the following are examples of an organization using big data and analyzing predictive behavior with the goal of creating new offerings?

An in-home healthcare provider tracks the hospital readmission rates of elderly people who live alone after they received care for falling in their home. Netflix tracks what users who viewed all three seasons of Stranger Things also had in their queues.

Select three correct statements regarding international Internet privacy laws

International laws on Internet privacy vary greatly. It is very difficult to get nations across the globe to agree on standardized Internet privacy laws. The European Union (EU) European Commission Data Protection Directive states that under EU law, personal data can only be gathered legally under strict conditions.

A starting point to investigate the complex topic of a society's ethics is first to understand the society's _ and the history behind the enacting of them.

Laws

Spyware is software that collects information about your Internet surfing habits and behaviors. Spyware includes the collection of which three of the following?

Passwords Account numbers Keystrokes

Cookies are stored on the hard drive and are not lost when the web browser is closed are called ___ cookies.

Persistent

The PATRIOT Act was enacted to monitor terrorist activities and communications following the 9/11 attacks and the 2001 Anthrax attack on Congress. PATRIOT stands for

Providing Appropriate Tools Required to Intercept and Obstruct Terrorism

This software allows managers to take control of an employee's computer remotely. This also can capture the employee's computer's mouse and keyboard entries.

Remote Desktop Software

What type of cookie is stored in temporary memory and is lost when the web browser is closed?

Session cookies are also called transient cookies because they are not stored, but just held in temporary memory.

Will the decision impact the privacy or property rights of any individuals or corporations? This question should be asked in which step of the 5 steps of an ethical analysis.

Step 2 Determining the affected

Which of the following allows, but does not require, private companies to warn the U.S. government about cyber-security threats?

The Cybersecurity Information Sharing Act, signed into law in December 2015, allows companies to share threat information with the U.S. government.

Which law or set of laws implements two World Intellectual Property Organization (WIPO) treaties and was created to update copyright laws dealing with the issues of regulating digital material.

The Digital Millennium Copyright Act (DMCA) was signed into law by President Clinton in 1998.

Which Act protects email and VoIP communications by making it illegal to intercept calls or messages without a warrant.

The Electronic Communications Privacy Act

The law passed in 1986 that protects email and VoIP communications by making it illegal to intercept calls or messages without a warrant is

The Electronic Privacy Communications Act.

Which Act outlines a plan to protect government information and assets against cyber threats.

The Federal Information Security Management Act (FISMA)

There are five basic ethical principles that we can look to when facing an ethical dilemma

The Principle of Virtue The Principle of Moral Rights The Principle of Distributive Justice The Universal Principle The utilitarian principle

The federal law that protects person-to-person wire, oral, and electronic communications and also includes a variety of network crime statutes that include identity theft and unlawful access to stored communications is

The Wiretap Act

Which statement encompasses the third step of the five-step process of an ethical analysis?

There is an extremely good chance that other managers, perhaps in your own organization, have faced similar dilemmas.

two important considerations for managing cookies.

Users should be aware that cookie settings must be adjusted in each browser. Users should determine what cookie settings is appropriate for your browser use and privacy protection.

What are the two major types of patents?

Utility and desgin

Which situation involves a computer ethics violation that you should report to your employer?

You pass a coworker's computer screen and see him surfing through child pornography.

select all the situations that involve information privacy rights.

Your neighbor has a history of abusing children. Do you and others living in the neighborhood (or about to move in) have a right to know this? You allow an employee to take two-hour lunch breaks because her daughter is receiving chemotherapy. Can you tell her colleagues why she is getting the special treatment? One of your new hires has a large Twitter following under a pseudonym. Should you let your boss know?

Predicting the impact of weather phenomenon of transportation routes, allowing logisticians to anticipate risks and the associated expense involved, is an example of organizational use of ___.

big data

Which browser settings should you consider adjusting?

deleting cookies deleting cookies blocking or customizing your cookie settings blocking or customizing your cookie settings deciding from which sites you want to allow cookies

Which of the following actions would violate an organization's prohibitions on the personal use of company computers as well as the law in most countries?

distributing company-owned software without authorization

Which dimension of ethical behavior in the digital age includes the question of how much time employees are allowed to spend browsing social media?

establishing standards


Conjuntos de estudio relacionados

Marketing Ch. 5 Overview Assignment

View Set

Chapter 11- Federal Reserve System

View Set

principles of real estate part 3

View Set

False claim act- corporate complaince

View Set

EarthSci: MINERALS AND ROCKS - EARTH MATERIALS AND PROCESSES

View Set

Network+ 8th Edition Chapter 9, Ch.7 Quiz CTS1134, Chapter 7, Ch 8 Network, Ch 8, Networking Quiz: Ch. 08

View Set

purchasing and cost control final chapters 21-26

View Set