Social Responsibility Ch 12

¡Supera tus tareas y exámenes ahora con Quizwiz!

Downloading illegal files, spreading computer viruses, and stealing from online bank accounts is collectively referred to as:

Cybercrime.

Hackers employed by businesses or governments to intentionally discover weaknesses in information systems are called:

White hatters.

An example of a hacking job motivated by retaliation is:

A woman hired a hacker to break into Facebook to find out if her boyfriend was cheating on her.

One major advantage of conducting business online is:

Cost-effective marketing and promotions

This Act makes it a crime to circumvent antipiracy measures built into most commercial software agreements between the manufacturers and their users:

Digital Millennium Copyright Act.

The purpose of the right to be forgotten is to:

Increase protection of privacy and personal information.

As of 2016 what was the average cost of a data breach in the United States?

$7 million.

According to an Oxford University study, what percentage of current jobs were expected to be overtaken by robots in the next two decades?

About 50 percent.

The ability of a digital computer or computer-controlled robot to perform tasks commonly associated with intelligent beings is called:

Artificial intelligence.

Restrictive governments often reduce or eliminate citizen access to the Internet and social media sites in order to:

Both of these answers are correct: Increase bandwidth for government usage; and suppress political dissent.

A CIO is the company's:

Chief information officer.

Buying and selling goods and services electronically is called:

E-business.

The EU law passed in 2018 that required companies to promptly report personal data breaches was called:

General Data Protection Regulation.

Software piracy is a major problem in which part of the world?

Globally.

Over time the role of the CIO:

Has become more integrated into the overall strategic direction of the firm.

One ethical concern about businesses collecting vast amounts of stakeholder data is:

If the effort actually benefits the stakeholders.

Increased cyber activity by which countries prompted NATO officials to brand them as "patriotic hackers"?

Iran and China.

The role of the CIO includes all of these tasks except:

Monitoring the appropriate level of employee productivity.

Intellectual property refers to:

Protecting one's ideas, concepts, and symbolic creations. Special laws protecting copyrights, patents, and trademarks. Prohibiting the downloading of commercial software or videogames.

Cybersecurity experts recommend including which essential elements for an incident-response plan for cyberattacks?

Support from executive leadership. Involvement by all functional departments. Focus on how to respond to a breach.

According to McKinsey and Company, which position cannot be easily replaced with robots?

Team managers.

The use of robotics in the workplace has increased recently because:

The cost of robots has decreased. Robots are more reliable than people. New collaborative machines have been invented.

One argument in favor of net neutrality is:

To fairly compete, small, medium, and large firms should have the same Internet bandwidth.

One of the biggest challenges for autonomous vehicle manufacturers, according to the case The Arrival of Autonomous Cars—Bright Future or Looming Threat? was:

Ensuring the vehicles were safer than driver-controlled automobiles.

A critical characteristic of a successful CIO is:

A leader with the ability to speak the language of the business.


Conjuntos de estudio relacionados

BECOMING HUMAN: Theories of emotion

View Set

ATI_AQ-Leadership_and_Management

View Set

Ch1: Life Insurance: General Insurance

View Set