Week 9

¡Supera tus tareas y exámenes ahora con Quizwiz!

When you revisit a website, your browser will send the website's_ (a small text file) to the Web server that uses this information to customize and optimize your experience.

cookie

The third step in the five-step process of conducting an ethical analysis is searching for .

precedents or examples

A wide-ranging term that refers to a variety of considerations including; how data and information is used, who has access to data and information, the techniques and technologies used to protect sensitive and private data, communications, and preferences is Internet ___.

privacy

Which type of cookie is lost only if deleted or if is created with an expiration date?

Choice A persistent cookie

Which two of the following potential workplace computer ethics violations are also illegal activities.

Computer scams launched from work computers. Software piracy using an employer's computer network.

Small text files created by websites you visit that your web browser stores on your hard disk are called _____.

Cookies

Select three categories of intellectual property

Copyrights Trade secrets Patents

In the settings area of each browser you should consider adjusting which three of the following?

Deciding from which sites you want to allow cookies Blocking or customizing your cookie settings Deleting cookies

When you order a pizza online and are asked to provide your address, the company stores this information. This manner of data collection is referred to as ___.

Direct inquiry

Determining how much time employees should be allowed to browse their social media sites while at work falls under which dimension of ethical behavior in the digital age?

Establishing standards

Cookies are stored on the hard drive and are not lost when the web browser is closed are called ___ cookies.

Persistent

The Cybersecurity Information _Act, passed in December 2015, allows private companies to share threat warnings with the U.S. government.

Sharing

Direct inquiry, indirect tracking, and 3rd party data purchase are three common methods of _ data.

collecting, gathering, getting, obtaining, or finding

Which three of the following can encourage ethical computer use in the workplace?

Remote desktop software Setting a good example Employee monitoring software

The PATRIOT Act was enacted to monitor terrorist activities and communications following the 9/11 attacks and the 2001 Anthrax attack on Congress. PATRIOT stands for Providing Appropriate Tools Required to Intercept and Obstruct _

Terrorism

Which law or set of laws implements two World Intellectual Property Organization (WIPO) treaties and was created to update copyright laws dealing with the issues of regulating digital material.

The Digital Millennium Copyright Act (DMCA)

Which Act protects email and VoIP communications by making it illegal to intercept calls or messages without a warrant.

The Electronic Communications Privacy Act

Select two important considerations for managing cookies.

Users should be aware that cookie settings must be adjusted in each browser. Users should determine what cookie settings is appropriate for your browser use and privacy protection.

Select the two major types of patents.

Utility Design

Select three privacy concerns associated with cookies.

Websites that use cookies can collect information about surfing habits and sell that information to a variety of third-parties. Websites can use cookies to track your surfing behavior and use this information to create specific user profiles. Corporate and government entities can use cookies to monitor your surfing behavior.

Encouraging communication with minimal barriers can help to ensure that management has the pulse of the organization. Managers should ensure that a system exists in which employees can report malfeasance to their superiors _

anonymously, privately, or anonymous

A form of protection for original works of literature is called a ___.

copyright

Which two of the following guidelines should you follow when reporting a co-worker's computer ethics violations.

Only report incidences that you have personally witnessed. Be brief and remember that your employer probably did not hire you monitor inappropriate computer use.

Which Act, signed into law in December 2015, allows companies to share cyber-security threat information with the U.S. government?

The Cybersecurity Information Sharing Act

This Act outlines a plan to protect government information and assets against cyber threats. It requires each federal agency to develop a plan for information security.

The Federal Information Security Management Act

Which Act outlines a plan to protect government information and assets against cyber threats.

The Federal Information Security Management Act (FISMA

Which principle of ethical conduct attempts to distribute rewards equitably to individuals based on their level of productivity?

The Principle of Distributive Justice

Which principle of ethical conduct states that there exist certain moral values that should always be upheld or never be violated.

The Principle of Moral Rights

What Act was enacted to monitor terrorist activities and communications following the 9/11 attacks and the 2001 Anthrax attack on Congress?

The US PATRIOT Act/USA Freedom Act

Which principle of ethical conduct states that a manager must attempt to determine if a decision is fair for all involved.

The Universalist Principle

The Act that protects person-to-person wire, oral, and electronic communications is ___.

The Wiretap Act

Many sales managers, including those in information technology-related fields, use commissions in an attempt to incentivize productivity and to reward more successful salespeople. The principle of ethical conduct that this exemplifies is ___.

The principle of distributive justice

Companies that purchase consumer behavior information from other organizations are engaged in __

Third party data purchase

You own a real estate brokerage and need a list of high-income residents. You buy the list from a data marketing company. This is called ___.

Third party data purchase

Select three common methods in which organizations collect data.

Third-party data purchase Indirect tracking Direct inquiry

The second step in the five steps of an ethical analysis is to determine the__

affected or impacted

Methodologies that attempt to deal with the vast amount of complex information that accumulates at high, and accelerating, velocity use_ data.

big

Predicting the impact of weather phenomenon of transportation routes, allowing logisticians to anticipate risks and the associated expense involved, is an example of organizational use of ___.

big data

When facing a moral dilemma, it is useful to be aware of the five principles of ethical

conduct

The fourth step in the process of making an ethical analysis is to list

options, choices, or alternatives

Managers must protect the online ___ of employees and organization stakeholders.

privacy

A type of cookie, sometimes called a transient cookie, that is not stored but just kept in memory when a user visits a website is called a_ cookie.

session

What type of cookie is stored in temporary memory and is lost when the web browser is closed?

session

A computer program that scans files to identify and remove computer viruses and other malicious programs is called _____.

Antivirus software

Your organization has set strict policies prohibiting the use of company computers for personal activities. Which of the following policy violations would also be an illegal activity?

Distributing company-owned software without authorization.

Select the first step in the five steps of an ethical analysis.

Getting the facts

Select three steps you can take to help to safeguard your privacy in the digital age.

Incorporate anti-virus protection Monitor your credit reports Practice safe online purchasing techniques

Select the fourth step in the five steps of an ethical analysis.

Listing options

Computer ethics violations fall in two major categories; illegal activity and organizational _violations.

policy

Because every ethical decision will have ramifications, many of them unseen, the final step in the process of an ethical analysis includes making a decision and ____for the consequences.

preparing

An important part of an ethical analysis is to prepare for the consequences of the decision, many of which may be unintended. Part of this preparation should include __

preparing to defend your decision

Monitoring your credit, creating strong passwords, using anti-virus protection, and practicing safe browsing techniques are methods of protecting your personal_ while using the Internet.

privacy, identity, or reputation

Studies indicate that the more time teens spend on social media the more likely they are to suffer from depression. This concern falls in the ethical dimension of ______of life.

quality

Keystroke loggers and packet analyzers (sniffers) are two common types of ___

spyware

Keystroke loggers and packet analyzers (sniffers) are two common types of ___.

spyware

Data that has a defined length, type, and format, including items as numbers, dates, or strings such as a customer profile is referred to as ___ data.

structured

Data that is typically used in commercially available relational databases, where the data resides in a fixed field and can easily be queried, is called ___ data.

structured

Even though the Child Online Protection Act of 1998 was sponsored by both Democrats and Republicans and was passed by both Houses of Congress and signed into law by President Clinton, you cannot be punished for violating law because ___ .

the law violated the 1st Amendment (freedom of speech) rights and was found unconstitutional.

This principle simply states that when faced with an ethical dilemma the manager should choose that option that does the greatest good for the most involved is the _principle.

utilitarian

The principle of ethical conduct that states that you should think of someone you truly admire, perhaps a mentor, and ask yourself what decision they would make is the principle of

virtue

After getting all the pertinent facts, the next step in making an ethical analysis is to ___ .

determine the affected

Customers are offered a free dessert if they complete a survey. This method of data collection is referred to as _inquiry.

direct

The U.N. General Assembly adopted resolution 68/167 in December 2013 that affirms that the rights held by people offline must also be protected online, and it called upon all Member States (nations) to respect and protect the right to privacy in digital communication. This means that ___

even though it sounds good, Internet users should be aware that digital privacy is not honored by many on the Internet.

Getting all the pertinen___t is the first step in an ethical analysis.

facts

Which principle of ethical conduct states that there exist certain moral values that should always be upheld or never be violated?

The Principle of Moral Rights

Select three correct statements regarding international Internet privacy laws

The European Union (EU) European Commission Data Protection Directive states that under EU law, personal data can only be gathered legally under strict conditions. It is very difficult to get nations across the globe to agree on standardized Internet privacy laws. International laws on Internet privacy vary greatly.

Place the 5 steps of an ethical analysis in order.

1. Getting all the fact 2. Determining affected 3. Finding Precedents 4. Listing Options 5. Deciding & Preparing Consequences

There are ___ basic principles of ethical conduct.

5

Select two concerns that fall into the dimension of establishing standards in the digital age.

A hotel allows employees to use its Wi-Fi to stream audio and video while they are working. Should the amount of streaming be limited? Lynn checks her personal social media sites approximately 16 times per day while she is at work. Is this too much?

Select two common methods of using indirect tracking to gather data.

A mobile game app uploads your phone's browser activity A cookie tracks your purchasing searches

Select the three correct statements regarding patents.

A patent will only be granted for something that is useful. To qualify for a patent, the invention must be novel, or different, from other similar inventions. To qualify for a patent, the invention must be non-obvious, meaning that a skilled artisan would find the invention surprising or unexpected.

Which of the following is not one of the steps included in the 5 steps of an ethical analysis?

Setting a strong example

With regard to Internet privacy, the First Amendment to the U.S. Constitution is relevant because ___

it provides freedom of speech protection that extends to the Internet which means there is little government filtering of content.

A form of spyware that records all actions typed on a keyboard is called a _ logger.

keystroke

Credit institutions use big data to anticipate the likelihood of ___ and to more accurately report credit ratings.

loan default

Many businesses have reduced the likelihood of experiencing an expensive data breach by moving data storage to __

major cloud storage service providers such as Amazon Web Services.

If you are downloading a game or software onto a device, there may be an empty box asking you to check the box to agree to Terms of Use and the site's Privacy Policy. This checkbox is called a(n) -in.

opt

The dimension (category) of ethical concerns in the digital age that refers to determining what constitutes proper levels of protection of digital information is called establishing

standards

Using cookies to follow someone's browsing patterns is a form of data collection called indirect_

tracking

Select two ways managers encourage employees to act unethically.

By failing to act ethically themselves. By not enforcing strong ethical behavior.

Because prior management decisions might provide guidance on your current situation, the third step of an ethical analysis is to ___

Choice search for precedents

A checkbox may ask if you want to receive news and updates, or participate in surveys from the site. When creating or browsing websites, this checkbox is referred to as an ___.

Opt-in and Opt-out

This principle asks the decision-maker to consider what a highly moral person would do when faced with this question.

Principle of Virtue

Along with the employee, which of the following is most responsible for an employee's ethical behavior?

Management

Which law, passed in 1986, protects email and VoIP communications by making it illegal to intercept calls or messages without a warrant.

The Electronic Communications Privacy Act

The laws that were created to update copyright laws dealing with the issues of regulating digital material in accordance with World Intellectual Property Organization treaties is called:

Choice The Digital Millennium Copyright Act (DMCA)

Which two of the following can be awarded copyright protection?

Choreography Sculptures

Jose, a branch manager, determines that one of his employees has inappropriately used the person digital information of a client. Jose, reprimands the employee and withholds an expected promotion. Jose is exercising which dimension of ethical behavior in the digital age?

Control and accountability

Select the dimension (category) of ethical behavior that is illustrated by the following concern. Fourteen-year-olds are interested in cannabis shops but a state has determined that in order to view the websites of these shops you must be at least 21. How should this be managed and who should be responsible in case of violations?

Control and accountability

Changing cookie settings in one browser (Chrome, for example) will automatically change your cookie settings in your other browsers (Safari, Firefox, Edge, for example).

False

Which dimension of ethical behavior in the digital age is represented by the following question? You are interviewing 3 applicants for a management position in your firm and wish to ensure that they will represent your company with professionalism and maturity. Should you check the applicants' social media sites prior to making your hiring decision?

Information Privacy Rights

Your boss states that in your organization data must be used responsibly and privacy should always be respected. This aligns with which dimension of ethical concerns in the digital age?

Information Privacy Rights

Which two of the following are examples of an organization using big data and analyzing predictive behavior with the goal of creating new offerings?

Netflix tracks what users who viewed all three seasons of Stranger Things also had in their queues. An in-home healthcare provider tracks the hospital readmission rates of elderly people who live alone after they received care for falling in their home.

Which two of the following describe concerns that might be categorized in the ethical dimension of quality of life.

You need to use airport restroom but the stalls are all occupied by people using their smartphones. Craig observes that his daughter's growing depression seems exacerbated by the amount of time she spends on social media sites.

Under what circumstance should you report a computer ethics violation to your employer?

You pass a co-worker's computer screen and see him surfing through child pornography.

Which three of the following situations involve information privacy rights?

Your neighbor has a history of abusing children, do you have a right to know this? One of your new-hires has a large Twitter following under a pseudonym. Should you let your boss know? You allow an employee to take 2-hour lunch breaks because her daughter is receiving chemotherapy. Can you tell her colleagues why she is getting the special treatment?

A major transition in the big data security sector is to move all data storage to _ storage.

cloud


Conjuntos de estudio relacionados

personal finance test 2 (chapter 9)

View Set

intermediate accounting ifrs, chapter 7, conceptual multiple choice

View Set

Chapter 22: Accounting Changes and Errors

View Set

Assignment -7. Middle Bread Colonies

View Set

IDCPBI CISSP- Physical and Environmental Security

View Set