C961 Ethics in Technology

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

What is the approximate value of lost revenue for unauthorized software copying and piracy in North America?

$10 billion North America has the lowest regional rate of software piracy at 17%, which represents a commercial value of $10 billion in lost revenue for software development companies.

What is the maximum fine for any individual found in violation of Foreign Corrupt Practices Act (FCPA)?

$100,000 Penalties for violating the FCPA are severe with individual violators being fined up to $100,000 and imprisoned for up to 5 years.

What does obtaining a certification do for your professional career?

-A validation of your skills and knowledge -It is more than another bullet point on your résumé

The Association for Computing Machinery (ACM) is the world's largest educational and scientific computing society. What opportunities do the ACM members receive?

-Access to ACM's Job Center to find targeted job opportunities -Join one or more of ACM's Special Interest Groups in 37 areas of information technology (IT). -Join a network of nearly 100,000 highly dedicated student and professional peers

What purpose does a code of ethics serve?

-An outline to what the organization aspires to become -A list of rules and principles to which members of the organization are expected to conform -A high-level guideline

What are benefits for professionals who are members of a recognized organization?

-Are known to be experts in their occupation -Have identified themselves as individuals of ethical integrity

What traits should information technology professionals have?

-Being experts in the tools and skills needed to do their job -Producing high-quality results, meet commitments, and communicate effectively -Adhering to high ethical and moral standards

What are included in membership with recognized information technology (IT) professional organizations?

-Benefit for employees and vendor consultants by delivering to potential opportunities -Increased awareness of IT trends by attending conferences -The chance to improve technical skills

According to the economist Alex Wagner, what are required for an organization to select the right people to save a lot of money and trouble?

-Characteristics -Values

What can the nonbreaching party do when there is a material breach of contract?

-Continue keeping the contract in effect and sue the breaching party to recover damages -Rescind the contract, seek restitution of any compensation paid under the contract to the breaching party, and be discharged from any further performance under the contract

A computer malpractice claim must first establish that the computer consultant is a professional before a computer malpractice suit should be taken. Which questions should establish a professional in legal terms?

-Did the computer consultant exercise independent judgment and provide advice with the client concerning design, development, and installation? -Does the computer consultant belong to a recognized industry association that has a code of ethics? -Is the computer consultant certified by a recognized industry organization?

A professional code of ethics produces benefits for the individual, the profession, and society as a whole by means of what?

-Ethical decision-making -Evaluation benchmarks -High standards of practice and ethical behavior

What characteristics should a professional possess?

-Good judgment -The skills -Good work habits

Which ethical behaviors do IT workers need to make sure end users follow?

-IT workers must discourage any software piracy. -IT workers should make users aware to avoid inappropriately sharing information. -IT workers should minimize the inappropriate use of corporate computing resources.

The case for software engineering licensing has come about because complex computer systems and software can impact public safety. What are some software engineering examples where public safety is entrusted?

-Medical information systems that monitor critical life support -Autopilot control of passenger planes

There are several frequent causes of problems in IT projects. Which cause is not a frequent cause?

-Misrepresentation: is the misstatement or incomplete statement of a material fact that is an unethical act and not a frequent cause of IT project problems.

By providing information technology professionals with high-quality certifications, how do vendor certification providers help generate revenue?

-Multitiered certifications -Aftermarket sales -Third-party licensing

What are the benefits to joining a professional organization?

-Networking by means of the organization's conference opportunities -Professional development via courses, workshops, publications, and information on their website -Mentoring to potentially pair one with another professional with more experience

The IEEE-Computing Society is the world's leading organization of computing and information technology (IT) professionals. What do the IEEE-Computing Society members receive?

-Opportunity to take up to 20 IT professional certifications and 9 business desktop certifications -Opportunity to learn, collaborate, and network at 225 international conferences, 350 worldwide chapters, and 40 technical communities -Leadership opportunities to publish and speak

Where can a person new in the IT industry get some mentoring help?

-Other IT professionals -An IT Professional Association

In 2013, NCEES began offering testing for software engineers. What are the mandatory requirements for a software engineering license holder as per the certification by the license?

-Pass the two NCEES engineering exams (FE and PE) -Complete an appropriate engineering education and a minimum of four years' software engineering experience -To keep current by meeting the state's minimum continuing education requirements

Which information is inappropriate to share with others?

-Private information -Confidential information

To participate in the SANS Affiliate Program, what must the organization affiliate do?

-Provide a customer reference case study to prove successful delivery of the product/service. -Offer a product/service that provides a solution for cybersecurity professionals.

Vendors have a lot to gain from providing certification programs. In creating these programs, what do they strive to ensure they do?

-Provide the certification seeker with quality training and credentials -Build a reputation that will last well past the end of the examination -Be recognized as the "preferred" or "premier" certification program

Information technology certification is a positive for companies hiring and retaining good employees. What does research indicate about employees with certifications?

-Reach job proficiency quicker and perform at a higher level -More knowledgeable -More confident

The CompTIA AITP association helps to foster a skilled workforce. What are the benefits for IT professionals?

-Skills improvement with access to a library of Lynda.com self-paced training modules -Professional networking with local chapters across the United States -CompTIA AITP employment resources, tips, and research

What are the key questions to ask in the step "evaluate results"?

-Were the success criteria fully met? -Were there any unintended consequences?

What are the key questions that you ask in this step?

-Why are we doing this? -What are the benefits of the new way for you? -What is wrong with the current way we do things?

What are the terms in years of a design patent?

15 years A design patent protects the invention for 14 years if issued before May 13, 2015, and for 15 years if issued after that date.

Which U.S. code makes it a federal crime for any person to travel across state lines with the intent to injure or harass another person?

18 USC §2261A Code 18 USC §2261A makes it a federal crime for any person to travel across state lines with the intent to injure or harass another person.

What percentage of employees has been fired by private employers surveyed?

18% While state and federal government employees have protection from retaliation for exercising certain First Amendment rights, some 18% of private employers surveyed say they have dismissed employees because of something they posted on social media.

What percentage of U.S. internet users has personally experienced cyberabuse?

47% This is true among U.S. internet users.

For the EPEAT Silver tier of performance, what is the minimum requirement that all 23 required criteria must meet?

50%

How long can an H-1B employee work for a U.S. employer legally?

6 years

A recent study revealed that between ______________ percent of workers' time online has nothing to do with work.

60 and 80

According to Spacey (2016b), which environmental issues that are human-driven processes is not considered destructive?

A Economy This is not one of the areas impacted directly.

How were the trade secrets stolen in the Move v. Zillow case?

A Move executive stole the trade secrets before resigning and joining Zillow. Move's chief strategy officer resigned and, on the same day, joined Zillow as its second highest paid executive. Move filed suit against Zillow, alleging that its former employee, and by extension Zillow, stole trade secrets and proprietary information by copying thousands of documents and deleting texts and emails from this employee's company-issued computer and smartphone before resigning.

Trojan horses are seemingly harmless programs in which malicious code is hidden. Which statement is NOT true concerning a Trojan horse?

A Trojan horse is normally user activated, with immediate results being evident to the user. This is the same way the Greek Trojan horse, once "activated," caused immediate harm. The results from the activation of a Trojan horse are usually unknown to the user, with no indicative signs.

blended threat

A blended threat is a sophisticated threat that combines the features of a virus, worm, Trojan horse, and other malicious code into a single payload. A blended threat attack might use server and internet vulnerabilities to initiate and then transmit and spread an attack on an organization's computing devices, using multiple modes to transport itself.

What is an example of a misrepresentation?

A casino company hired an information security (IS) company named Trustwave to investigate and contain and stop a large data breach it had found. The IS company claimed to have done this, but the same data breach happened again.

What is the correct statement about consumer profiling data?

A company can actually sell personal data about you to another company without your permission. Opponents of consumer profiling are concerned that personal data are being gathered and sold to other companies without the permission of consumers who provide the data. After the data have been collected, consumers have no way of knowing how or who is using the data. In fact, consumer data privacy has grown into a major marketing issue.

What should be a correct definition of a cross-licensing agreement?

A cross-licensing agreement is an agreement not to sue the other party over patent infringements. A cross-licensing agreement is an agreement not to sue the other party over patent infringements.

What is an ecosystem according to Spacey (2016b)?

A cycle that supports life

What is a social networking platform?

A forum for communities to develop and share ideas and events and break down barriers in cultures, time, and distance Social networking platforms allow people to share interests and ideas regardless of time, distance, or origin.

How can managerial behavior encourage ethical employee behavior?

A manager should regularly evaluate and provide feedback to employees on their corporate ethics compliance. Evaluating employees on how they operate in respect to principles and values in the code of ethics is an effective way to ensure ethics compliance in the workplace. Such evaluations should be a part of regular performance appraisals.

A logic bomb is a type of Trojan horse triggered by the execution of a specific event. Which example is NOT included in logic bomb triggers?

A naturally occurring event The presence of a naturally occurring event is by its nature random; therefore, it is an unreliable and unused trigger for a logic bomb.

What will make a noncompete agreement difficult to enforce by law?

A noncompete agreement prohibiting an employee from working for a specific competitor for a period of 60 months Courts will usually consider a reasonable period of time for not working for a competitor to be one to two years. Sixty months is 5 years and would be an unreasonable restriction.

What stops an employee from taking home an electronic copy of software code written for the company?

A nondisclosure clause Employees cannot take copies of computer programs or reveal the details of software owned by the company when they sign an employment contract with a nondisclosure clause to prohibit employees from revealing secrets.

What is two-factor authentication?

A password and an additional identity check Two-factor authentication uses a password and an additional identity check.

What is NOT a biometric method of authentication?

A password is not a biometric method of authentication.

Which method is a common way to gain access to the network through a router?

A person can access a network if his or her MAC address is a match to the one listed in the router.

What is the most important piece of personal profiling data to a targeted advertising company?

A person's online purchase history Knowing a person's online purchase history will effectively provide product advertisements that the consumer will click on and possibly buy.

Which resource is best to use in order to reconcile legal and ethical requirements in a difficult business case?

A professional code of ethics should help one to clarify what is legal and what is ethical and further guide toward the right decision.

Which statement is true about proxy servers?

A proxy server hides the users behind it. This is one of the key benefits of a proxy server.

What will a small company usually do when a large company is caught infringing a patent belonging to the small company?

A small company usually settles out of court and licenses its patents to the large company. Considering that the average patent lawsuit costs $3 to $10 million and takes two to three years to litigate, a small firm often simply cannot afford to fight; instead, it usually settles and licenses its patents to the large company.

Which statement about software copyright protection is true?

A software manufacturer can observe the operation of a competitor's copyrighted program and then create a program that accomplishes the same result and performs in the same manner without infringing the competitor's copyright.

What is a kickback?

A supplier sales representative offering money to another company to get business

Which statement is NOT part of the definition of a trade secret?

A trade secret is protected and cannot be reverse engineered. Unlike with patents, it is perfectly legal to reverse engineer and copy a trade secret.

What are the conditions under which a warrant could be approved under Title III of the Omnibus Crime Control and Safe Streets Act?

A warrant may be approved if there is probable cause that an individual is committing or about to commit or has committed a particular offense. Probable cause should be shown in order for the warrant to be approved.

Cookies are utilized by many websites. Which scenarios present examples of a breach of privacy?

A website that uses cookies is now asking you to enter your full name and phone number, but you see no use for that information within the website. The cookie records all websites you visit, and the host site aggregates the data to create consumer profile databases. The online shopping site you are visiting is displaying promotions for items you have recently bought through a different website. In trying to determine how this is happening, you find a disclosure that states, "Tracking of all browsing history is stored on you."

What is NOT a characteristic of a worm?

A worm is a harmless program that resides in the active memory of your computer and duplicates itself. A worm is actually a harmful program that resides in the active memory of a computer.

What percent of instances of reported misconduct are nonmanagers responsible for?

About 40 percent

For years, intelligence services of various nation-states have participated in what has been referred to as "Spy-vs-Spy" or the employment of espionage to gain access to the information of an adversary. Cyberespionage occurs when malware is deployed within systems to secretly steal data. There are a number of cyberespionage target organizations within an adversary nation. Which organization is NOT included in the list of cyberespionage target organizations?

Academic institutions Although critical to a nation's existence, these organizations are rarely the target of specific espionage activities.

Cyberterrorists are constantly trying to gain access to high-value systems and targets in order to cause havoc within those systems. Which target is NOT a potential target of cyberterrorism?

Academic institutions Although important in their own right, academic institutions are not necessarily high on the cyberterrorist target list.

What is earned media?

Additional exposure due to users' sharing posts and press mentions with no additional costs This additional exposure is due to popularity of users and the press that aids in raising Google rankings.

Computer Fraud and Abuse Act (U.S. Code Title 18, Section 1030)

Addresses fraud and related activities in association with computers, including the following: Accessing a computer without authorization or exceeding authorized access Transmitting a program, code, or command that causes harm to a computer Trafficking of computer passwords Threatening to cause damage to a protected computer

When are user profiles created?

Administrators create user and group profiles when they discover similarities within a group (e.g., finance, system admins, etc.).

Patching known vulnerabilities takes resources. Time, money, and personnel must be devoted to this dynamic and never-ending task. Which statement is NOT true regarding the need for timely vulnerability patching?

Administrators must choose whether or not to update a system based on the monetary cost to the organization. Monetary costs are only one of the reasons administrators may need to update systems.

What is an advantage of social network advertising over traditional advertising media?

Ads can be targeted to reach people with the desired demographic characteristics. Ads can be targeted to customer markets with the desired demographic characteristics.

In hospitals, where does computerized provider order entry (CPOE) have a greater than 50% decline?

Adverse drug effects CPOE use has been shown to result in a decline in adverse drug reactions.

What should be included in a social media policy?

Advice to employees on how to react to negative content regarding the company's brand This ensures that an appropriate response is given.

What is an example of a conflict of interest?

After a few weeks of analysis, the consulting firm gave a poor rating for the client's existing IT strategic plan and insisted that the firm's proprietary products and services are required to develop a new strategic plan.

What is not a protected category of Executive Order 11246 signed in 1965 by President Johnson?

Age

What are some of the ways a company can monitor worker productivity?

All telephone calls on a company phone may be recorded and reviewed. A worker cannot expect privacy at work. Many managers regularly receive employee phone usage logs. All company email communications may be monitored for appropriateness and cyberloafing activities. A worker cannot expect privacy at work. Email communications should reveal cyberloafing activities, and emails to external recipients may be monitored for legal liabilities. Drug testing and psychological testing may be administered to determine causes of lost worker productivity and adherence to corporate policy. Drug testing and psychological testing may be administered by some companies or in specific situations. These tools should reveal reasons for low productivity.

What is the government required to perform according to the Right to Financial Privacy Act to gain access to a customer's financial records?

An appropriate administrative or judicial subpoena or summons A judicial subpoena or summons is a legal method the government may use to gain access to a customer's financial records. A qualified search warrant or a formal written request by a government agency A qualified search warrant or a formal written request by a government agency is a legal method the government may use to gain access to a customer's financial records. An authorization signed by the customer that identifies the records, the reasons the records are requested, and the customer's rights under the act An authorization signed by the customer is a legal method the government may use to gain access to a customer's financial records.

Malicious insider

An employee or contractor who attempts to gain financially or disrupt a company's information systems and business operations

Industrial spy

An individual who captures trade secrets and attempts to gain an unfair competitive advantage

Cracker

An individual who causes problems, steals data, and corrupts systems

Hacktivist

An individual who hacks computers or websites in an attempt to promote a political ideology

What protects open source code from being modified and sold as proprietary software?

An open source license such as General Public License (GPL) protects open source code.

What measures can organizations take to improve their business ethics

An organization can take several actions to improve its business ethics, including appointing a corporate ethics officer, requiring its board of directors to set and model high ethical standards, establishing a corporate code of ethics, conducting social audits, requiring employees to take ethics training, including ethical criteria in employee appraisals, and creating an ethical work environment.

According to Association of Corporate Counsel and other legal organizations, under which conditions should an organization NOT be held criminally liable for misconduct of its employees?

An organization should not be held criminally liable for misconduct of its employees if such an organization acted as a responsible corporate citizen and demonstrated strong effort to prevent and detect misconduct in the workplace.

In the context of corporate social responsibility (CSR) practices, what will best characterize an organization that operates consistently?

An organization that operates with honesty and integrity, staying true to the declared mission and vision will be perceived in a local or global community as a responsible business entity.

When thinking about customer service, it is said that a happy customer tells a few people about his or her experience. What does the saying say an unhappy customer does?

An unhappy customer tells everyone. Customers also use social media to seek advice on how to use products more effectively and how to deal with special situations encountered when using a product.

What is a major reason that U.S. companies consider offshore outsourcing?

Another country has highly skilled technical resources that come with lower labor costs.

What can antivirus software do to a file when it detects malicious codes inside of that file

Antivirus software can clean, quarantine, or delete the infected file.

How did Apple appease iPhone developers complaining about the restrictive nondisclosure agreement they had to abide by?

Apple allowed developers to discuss at any time iPhone software that had already been released. Eventually, Apple admitted that its nondisclosure terms were overly restrictive and loosened them for iPhone software that was already released.

What is one of Apple's main reasons for filing the patent infringement lawsuit against Qualcomm?

Apple claims Qualcomm sought unreasonable and costly terms for use of its patented chips. Apple Inc. sued Qualcomm, alleging that Qualcomm leveraged its monopoly position as a manufacturer of baseband chips, a critical component used in cell phones, to seek "onerous, unreasonable and costly" terms for patents.

Natural language processing is an aspect of what?

Artificial intelligence

Which is a type of machine learning?

Artificial intelligence Machine learning is a type of artificial intelligence.

What does a comprehensive security risk assessment process include?

Assess the frequency of events or the likelihood of potential threats and the feasibility of implementing mitigation options. Identify the set of IT assets that the organization is most concerned and the risks or threats that may occur. Determine the impact of each threat and how the threats can be mitigated so that they are much less likely to occur. Perform a cost-benefit analysis and decide whether or not to implement the countermeasure.

Which corporate policy encourages workers to use their own cell phones, tablets, and computers at work?

BYOD Many employers permit their employees to use their own personal mobile phones or computing devices for work purposes in a policy called "bring your own device" (BYOD). Such a policy should spell out the degree to which use of such devices may be monitored.

What is the Bathsheba syndrome?

Bathsheba syndrome refers to the moral corruption of people in power.

How can social networking platforms affect employment?

Because it is in a public forum, employers can gain information on employees and prospective employees for which they cannot legally ask in a formal interview. Certain topics—such as pregnancy, origin, and other protected categories—cannot be legally asked for in the hiring process. Some employers may seek other methods to get information that may be useful in legitimate hiring decisions.

Why should a project manager be reluctant to share project status information?

Because of contractual penalties for failure to meet the schedule Most IT projects are documented in a contract with a time frame for completion. In such a situation, the client may not be informed about a problem until it has become a crisis. Because of a lack of information, tools, or experience needed to perform an accurate assessment Problems can also arise during a project if IT workers find themselves unable to provide full and accurate reporting of the project's status due to a lack of information, tools, or experience needed to perform an accurate assessment.

Which action is not a key goal of employee ethics training?

Become familiar with various philosophers and how they dealt with ethical issues.

From the employee's perspective, what makes being an independent contractor attractive?

Being able to choose assignments anywhere in the world.

Throttling

Being billed for services they were not receiving in full

The internet's role with big data is such that data are being collected infinitely at all times. With all of this structured and unstructured information, big data is powerful. On the other hand, big data is not the all-in-one answer. What are some the characteristics of big data, good and bad?

Big data analysts can manipulate the information. Big data assumptions determined may or may not be accurate. Big data can collect data information from a multitude of data sources.

The destructive nature of cybercrimes negatively impacts many organizational areas. What are the major concerns for organizations?

Brands, reputation, and earnings Brands, reputation, and earnings are organizational areas of concern during a cybercrime attack. Cyberattacks have the potential to negatively impact an organization's health and growth.

What should an employee do before becoming a whistle-blower?

Bring up the problem with management. A conscientious employee should call the problem to management's attention and try to correct it by working with appropriate resources within the company.

Prior to the American Revolution, authors wrote pamphlets urging independence from England under other names to protect themselves from whom?

British The British did not have freedom of expression when it came to criticizing the government.

What is another name for a business impact analysis to identify critical business processes and the resources that support them?

Business continuity plan Identifying the most critical processes and what it will take to restore them in an emergency is the business continuity plan.

How can businesses capture sales through social networking platforms?

Businesses can identify demographics, preferences, and behaviors by tracking data about how their customers use social media platforms. Many social networking platforms track user data in several dimensions that show demographics and trends in preferences and behaviors.

How can businesses capture sales through social media marketing platforms?

By using social networks to communicate and promote the benefits of products and services Social media marketing engages the use of social networks to communicate and promote the benefits of products and services

What is NOT an encryption method?

CIA is a security model, not an encryption key.

What was one of the primary problems with the Child Online Protection Act (COPA)?

COPA can set standards for free speech.

The Child Online Protection Act (COPA) followed the Communications Decency Act (CDA) and was also challenged in court. What was the result of the court ruling?

COPA was struck down by the court.

You recently broke off a personal relationship that ended badly. Which steps should you take?

Change your passwords to social media accounts and financial systems. While this is a stressful time, revenge is often a real motive for some people. Taking appropriate steps to be aware and protect yourself is prudent.

What is true about cities that use surveillance cameras?

Chicago's surveillance cameras have reduced crimes for its bus and rail transit systems by 25%. Chicago installed over 23,000 cameras for its rail and bus systems, reducing crime by 25%.

The Communications Decency Act (CDA), the Child Online Protection Act (COPA), and the Children's Internet Protection Act (CIPA) were all designed to protect which of the following?

Children CDA, COPA, and CIPA sought to protect children from potentially offensive content on the internet.

To date, only a few laws have been implemented to protect children online, and most of these laws have been ruled unconstitutional. What are the reasons that describe why many people feel that there is a need to protect children?

Children need to be protected against becoming the target of harassment. Many people feel that there is a need to protect children from becoming the target of harassment. Children need to be protected against being exposed to inappropriate material and online predators. Many people feel that there is a need to protect children from being exposed to inappropriate material and online predators. Children need to be protected against divulging personal data. Many people feel that there is a need to protect children from divulging personal data. Children need to be protected against becoming involved in gambling or other inappropriate behavior. Many people feel that there is a need to protect children from becoming involved in gambling or other inappropriate behavior.

Which answer is an exception to the uses of Telehealth?

Claims This is not one of the uses of telehealth.

An IT project requires the participation of both IT workers who may belong to a consulting firm and clients that may be within the same company or a different company. Which statement is false about their relationships?

Clients make all decisions because they pay for the project and get the long-term benefits from it. This statement is false. The responsibility for decision-making is shared between the client and the IT worker.

In low probability/high impact, where is the innovation in relation to launch?

Close The innovation is close to launch and the probability of failure is low.

What is a statement that highlights an organization's key ethical issues and identifies the overarching values and principles that are important to the organization and its decision-making?

Code of ethics

What are healthcare organizations required to employ according to the Health Insurance Portability and Accountability Act (HIPAA) in order to make it possible to exchange medical data over the internet?

Codes and identifiers Under HIPAA provisions, codes and identifiers are required to be deployed. Standardized electronic transactions Under HIPAA provisions, standardized electronic transactions are required to be deployed.

is one in which two employers have legal rights and duties with respect to the same employee or group of employees.

Coemployment relationship

Which privacy concerns related to aggregating personal data in large databases are identified in Mason's article?

Collecting and linking information about different aspects of people's activities may negatively impact their personal or professional lives. Mining and integrating personal information in large databases may reveal intimate details about the person and make it difficult to form personal or professional relationships.

Which statement about IT workers and society is false?

Combinations of international, federal, and state laws will effectively eliminate IT risks to society.

Which of the following statements is not true?

Companies cannot use an H-1B worker classified as an entry-level IT employee to fill the position of a higher paid experienced worker.

Statement that describes the connection between CSR activities and organizational consistency

Companies engaged in business activities based on the system of values reflected in the organizational culture are likely to develop and practice a consistent approach for dealing with stakeholders and community. The moral and social system of values is at the core of CSR practices that are instrumental in establishing consistent approaches toward employees, customers, and other stakeholders.

In the context of ethical business practices, what might a company do as a result of a difficult economic climate?

Companies may overstate their revenue and profits in a difficult economic climate.

What is an example of a fraud crime?

Concealing and negligently failing to disclose material facts is an example of fraud. (In 2013 Bridgestone Americas, Inc. v. International Business Machines Corporation case, Bridgestone contended that IBM concealed or negligently failed or both to disclose material facts regarding the implementation of the system that will have resulted in different decisions regarding the project.)

What is a reasonable approach to testing a disaster recovery plan?

Conduct a test of a portion of the plan. This approach is reasonable.

What does CIA mean in the security triad model?

Confidentiality, integrity, and availability

According to Spacey (2017), technology risks long-term problems may be unresolved due to which of the following?

Conflict Conflict and political obstacles are reasons why these problems may be unresolve

What is a way to assess the feasibility of automating a job?

Consider types of activities. This is a way to examine how a job might be automated.

Integrity ensures that data can only be changed by authorized individuals so that data integrity is guaranteed by means of what?

Consistency Data integrity implies that the data are consistent. Accuracy Data integrity implies that the data are accurate. Trustworthiness Data integrity implies that the data are trustworthy.

What is an essential element of a successful internet filtering program?

Constituents signing agreements Ensuring constituents understand filtering program is essential.

Which answer best supports using contingent labor to help fill labor gaps in specific situations?

Contingent workers come already trained for the most part, work as long as you need them, and are cost-effective.

Which method is the most effective to ensure employees' compliance with professional ethics?

Continually communicating to employees the corporate code of ethics and conducting regular training workshops. Modeling for employees the corporate code of ethics in all interactions and conducting regular training workshops are the most effective ways to ensure employees' ethics compliance.

Many companies obtain information about web surfers through the use of , which are text files that can be downloaded to the hard drives of users so that the website is able to identify visitors on subsequent visits.

Cookies

Which systems gather data about individuals?

Cookies Cookies capture website browsing history data and use the information for targeted marketing purposes. Google location services Google location services store history data from all devices. Facebook tags Facebook tags use the photos and videos of its more than one billion users to identify and reference people. Tracking systems in YouTube videos YouTube does gather and share data about individuals.

Which cases use John Doe lawsuits frequently?

Copyright infringement The plaintiff files the lawsuit based on the content being downloaded but without knowing who did it.

Which statement about eligible works for copyrights is true?

Copyright law has proven to be extremely flexible in covering new technologies; thus, software, video games, multimedia works, and web pages can all be protected.

Which right is not protected by the First Amendment to the U.S. Constitution?

Copyright of materials created by an individual

What is corporate social responsibility, and why is fostering good business ethics important?

Corporate social responsibility is the concept that an organization should act ethically by taking responsibility for the impact of its actions on its shareholders, consumers, employees, community, environment, and suppliers. Supply chain sustainability is a component of CSR that focuses on developing and maintaining a supply chain that meets the needs of the present without compromising the ability of future generations to meet their needs. Each organization must decide if CSR is a priority and, if so, what its specific CSR goals are. Organizations have five good reasons for pursuing CSR goals and promoting a work environment in which they encourage employees to act ethically: 1) to gain the goodwill of the community, 2) to create an organization that operates consistently, 3) to foster good business practices, 4) to protect the organization and its employees from legal action, and 5) to avoid unfavorable publicity.

What is the focus of the concept of reasonable assurance?

Cost and benefit This is the focus of reasonable assurance

Fraud and Related Activity in Connection with Access Devices Statute (U.S. Code Title 18, Section 1029)

Covers false claims regarding the unauthorized use of credit cards

What is a way to stop or reduce workplace monitoring to improve employee privacy rights?

Create state or federal laws to limit the actions an employer can take to monitor employee behavior and work ethic in the workplace. Privacy bills are being introduced and debated at the state and federal levels. As the laws governing employee privacy and monitoring continue to evolve, business managers must stay informed in order to avoid enforcing outdated usage policies.

What is a potential downside in creating a corporate compliance officer position, according to critics?

Creating a corporate compliance officer position may lead others to think that they have no responsibilities in ensuring compliance with ethical standards and regulations.

Censorship efforts may focus on Domain Name Server (DNS) because of which of the following?

DNS points devices toward correct servers. Eliminating the path from the DNS to the server should censor expression.

For some problems, you have abundant sources of high-quality relevant data and for other problems you do not. What should data analysts do?

Data analysts should consider more economical and practical solutions. Data analysts should not employ inappropriate solutions. Data analysts should not ignore problems that might require other kinds of solutions.

Which privacy dimensions define information privacy?

Data privacy (the ability to limit access to one's personal data by others) Data privacy is one of two key information privacy dimensions. Communications privacy (the ability to communicate with others without being monitored) Communications privacy is one of two key information privacy dimensions.

What is not included in the definition of sexting?

Date invitation The definition includes sexual messages or photos.

Which system can translate machine language into C++ or Java?

Decompilers, also called reverse engineering compilers, can read the computer machine language and produce the source code.

According to the 2013 National Ethics Business Survey, what is the most pronounced positive trend in the implementation of good corporate ethics?

Decreased percentage of employees who say they witnessed a violation of the law or ethics standards on the job. The percentage of employees who say they witnessed a violation of the law or ethics standards on the job steadily decreased from 56 to 41% between 2007 and 2013.

Which federal trade secret law aimed at providing some standardization over state laws governing trade secret misappropriation?

Defend Trade Secrets Act (DTSA) of 2016 The DTSA of 2016 amended the Economic Espionage Act of 1996 (EEA) to create a federal civil remedy for trade secret misappropriation. Prior to its enactment, civil claims for trade secret misappropriation were primarily governed by state law. The wide variety in state statutes governing trade secret misappropriation prior to the passage of DTSA created great uncertainty in the application of trade secret law across the United States.

Which step begins the implementation of CIA in an organization?

Define an overall security strategy. The first step is to define an overall security strategy.

Identifying the stakeholders and their positions on an issue is a part of which decision-making step?

Define the problem

USA Patriot Act (Public Law 107-56)

Defines cyberterrorism and associated penalties

DHS

Department of Homeland Security is responsible for providing a "safer, more secure America, which is resilient against terrorism and other potential threats." The agency's Office of Cybersecurity and Communications is responsible for enhancing the security, resilience, and reliability of U.S. cyber and communications infrastructure.

How is a work of intellectual property protected?

Depending upon the type of intellectual property, the work is protected through copyright, patent, or trade secret laws.

What is the first step in the decision-making process?

Develop a problem statement. A problem statement is the logical first step and needs to be a clear, concise description of the issue that needs to be addressed.

In the early years of software development, patents were not granted for software. Which lawsuit changed this?

Diamond v. Diehr In the 1981 Diamond v. Diehr case, the Supreme Court granted a patent to Diehr, who had developed a process control computer and sensors to monitor the temperature inside a rubber mold. Based on this ruling, courts broadened the scope of protection for software-related inventions.

What offers protection to whistle-blowers?

Different laws requiring an experienced attorney to determine the law

What describes the effort required to quantify how much the use of IT has contributed to worker productivity?

Difficult There are a number of dynamic factors that make this difficult to measure.

What do you call documenting the process for recovering an organization's business information system assets?

Disaster recovery plan Documenting the recovery process for an organization is called a disaster recovery plan.

Which decision should be included in the incident response plan?

Disconnect or shut down the compromised system

Which example should be classified as hate speech?

Discussion that threatens a group Legal action is possible when speech turns into threats.

Which statement will best reflect an organization's effort in gaining the goodwill of the community?

Donating equipment to nonprofit organizations is an example of socially responsible activities likely to be met with approval by local or global community.

If you find yourself rationalizing a decision with the statement "Well, our competitors are doing something far worse"—what action should you not take?

Drop this option, and implement the same policy as your competitors.

Which key piece of surveillance legislation was amended by CALEA?

ECPA CALEA amended ECPA. It also amended the Wiretap Act. It allows state and federal law enforcement officials to use wiretapping and electronic eavesdropping, but only under strict limitations.

High probability/low impact is likely to occur at which stage of an innovation?

Early The probability of failure is high and impact of innovation is low.

What does labor productivity measure?

Economic performance It compares the amount produced with the number of hours used to produce.

What does the acronym EPEAT stand for?

Electronic Product Environmental Assessment Tool

Which source is not a nontraditional source for news and information?

Email Email is not one of the nontraditional sources for news and information.

What is the most common form of résumé exaggeration?

Embellished skill set

What does natural language processing not allow a computer to do?

Empathize

What is the largest benefit of implementing a social media policy?

Employees can feel empowered to share their creativity and opinions within boundaries without fear of reprisal. With a policy in place, employees can feel empowered to exercise creativity and express their opinions without concern that what they are sharing on social media can negatively impact their career.

A company has an obligation to keep a trade secret confidential, but current employees are a great threat to the loss of company trade secrets. Which statement will NOT be a good option to mitigate this threat?

Employees should sign a trade secret agreement outlining the individual protected items. Unless a job description specifically requires details of and access to a trade secret item, the employee should not be given an outline or list of trade secrets.

What is the best way to secure your computer?

Encryption of the entire hard drive is the best way to secure a computer.

What is robotics a branch of?

Engineering Robotics is a branch of engineering.

What should users be required to do first?

Enter a successful passcode. This validates the user as an authorized and appropriate user on the computer and network.

What does ethical behavior conform to?

Ethical behavior conforms to generally accepted community norms. There is not just one generally accepted set of community norms, but many different such sets may exist for different communities, which may come into conflict.

What is ethics?

Ethics is a code of behavior that is defined by the group to which an individual belongs. Morals are the personal principles upon which an individual bases his or her decisions about what is right and what is wrong. A person who acts with integrity acts in accordance with a personal code of principles. Law is defined as a system of rules that defines what a people can and cannot do.Laws are enforced by a set of institutions (the police, courts, and law-making bodies). A code of ethics states the principles and core values that are essential to one's work. Just because an activity is defined as legal does not mean that it is ethical.

How is ethics defined?

Ethics is defined as a particular kind of code of behavior, namely, the kind defined by a group to which one belongs.

What do experts consider in artificial intelligence (AI)?

Ethics of giving human-like intelligence to an object This is one of the things experts consider in AI.

When choosing among available alternative solutions to the problem, what will be the most appropriate course of action to choose from the utilitarian perspective?

Evaluate the expected outcome for each alternative solution and choose one to provide most benefits in terms of productivity, growth, or other applicable business metric. The principle of utility requires choosing a course of action that produces the best balance of benefits over costs for the majority of stakeholders involved. On this account, the expected outcome should be calculated by evaluating the balance of financial and other business benefits over the implementation costs and risks involved.

(The) ______________ approves the use of any intelligence collection techniques that are in accordance with procedures established by the head of the intelligence community and approved by the attorney general.

Executive Order 12333

What is commonly considered to be an element of one's moral value system, as opposed to mere good ideas in a practical sense?

Exhibiting fairness, generosity, and loyalty toward others are elements of one's moral value system.

Cyberterrorists have been at work around the world in recent years attempting to disrupt or degrade utility operations. In 2015, one group of cyberterrorists was particularly successful in Western Ukraine against a large power production and distribution facility. The hackers conducted several operations. Which operation did the attackers NOT use as a part of this wide-ranging terrorist event?

Extricated large amounts of capital funds from the power company The hackers did not exfiltrate funds. Their goal was to cripple the infrastructure.

When does FISA allow the conduct of surveillance activities within the United States without a court order?

FISA allows warrantless surveillance within the United States for up to a year if "no" known U.S. personnel are involved as a communication party. The warrantless surveillance within the United States is permissible for up to a year if "no" known U.S. personnel are involved as a communication party.

In the high-probability/low-impact stage, risk management is focused on what?

Fail cheaply and safely The probability of failure is high and the impact is low.

This act allows consumers to request and obtain a free credit report once each year from each of the three primary consumer credit reporting companies.

Fair and Accurate Credit Transactions Act

The Digital Millennium Copyright Act (DMCA) can be used to remove data from a website for copyright infringement. What needs to be considered before removing data access?

Fair use Copyrighted data can be used for a limited purpose.

Although a number of independent laws and acts have been implemented over time, no single, overarching data privacy policy has been developed in the United States. However, there is an established advisory agency that recommends acceptable privacy practices to U.S. businesses.

False

If an employee acts in a manner contrary to corporate policy and their employer's directions, the employer cannot be held responsible for these actions.

False

Laws provide a complete guide to ethical behavior.

False

Publicly traded organizations have an obligation to report all data breaches to the Securities and Exchange Commission (SEC).

False

The National Labor Relations Act, Civil Rights Act, Air Labor Standards, and Employee Retirement Income Security Act each all have a uniform, consistent definition of employee and the same way of distinguishing between employees and independent contractors.

False

The Supreme Court has stated that American citizens are protected by the Fourth Amendment with no exception.

False

The goodwill that CSR activities generate can make it easier for corporations to conduct their business but is unlikely to affect the profitability of the firm.

False

Under (the) ______________, the presumption is that a student's records are private and not available to the public without the consent of the student.

Family Educational Rights and Privacy Act (FERPA)

FCC

Federal Communications Commission

Which law requires each federal agency to provide information security for the data and information systems that support the agency's operations and assets?

Federal Information Security Management Act (44 U.S.C. 3541, et seq.) This applies to agencies and information managed by other agencies, contractors, or other sources.

Which government agency is responsible for enforcing Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN-SPAM)?

Federal Trade Commission (FTC) The FTC is responsible and maintains a database of consumer complaints.

Experiencing a data breach can cost a business millions of dollars. Besides costs to the company, which other entities may experience direct recovery costs?

Financial institutions The cost to banks and credit unions should be for issuing replacement cards that may be requested by some customers. Because consumers are not held responsible for fraudulent charges on their cards, there may also be an additional cost for fraudulent activity.

When referring to "something you have" for data access, which example will not be correct?

Fingerprint This is an example of something you are.

Which feature is absent in routers?

Firewall protection Routers use other methods to block certain traffic or intruders.

Stored Wire and Electronic Communications and Transactional Records Access Statutes (U.S. Code Title 18, Chapter 121)

Focuses on unlawful access to stored communications to obtain, alter, or prevent authorized access to a wire or electronic communication while it is in electronic storage

Federal agencies receiving a request must acknowledge that the request has been received and indicate when the request will be fulfilled, with an initial response within 20 working days unless an unusual circumstance occurs.

Freedom of Information

What is a major issue around pornography?

Freedom of expression and protecting children Some people do not see anything wrong with pornography, while some people worry about the impact on children.

You are a doctor who is asked by a terminally ill patient about the diagnosis. In the context of Kant's ethics, what would you do?

From a deontological perspective, the obligation to tell the truth has no exceptions.

Which of the following statements about whistle-blowing is true?

From the moment an employee becomes known as a whistle-blower, a public battle may ensue, with negative publicity attacks on the individual's personal integrity.

Statement that is true concerning goodwill

Gaining the goodwill of the community contributes to establishing positive connections with a company's stakeholders, including shareholders, local government, and customers.

The Children's Internet Protection Act (CIPA) act did not require blocking computer access to which of the following?

Gaming The act did not specify blocking computer access to gaming.

Who is most likely to use social networking platforms?

Gen Xers and women According to the Nielsen study, Gen Xers spend almost seven hours per week and women roughly six hours per week on social networking platforms.

The______________ is designed to strengthen the data protection for individuals within the EU and includes stiff penalties for privacy violations.

General Data Protection Regulation

What are the actions that can cause harm to the good working relationship between IT workers and their suppliers?

Getting a supplier to deliver needed equipment faster than the normal delivery lead time can cause harm to the relationship between IT workers and their suppliers. Accepting payment of entry fees for a sport tournament can cause harm to the relationship between IT workers and their suppliers.

Which statements apply to valid gifts in business relationships?

Gifts come with no expectation of a future favor for the donor. Gifts are made directly from donor to recipient.

What trends have increased the likelihood of unethical behavior?

Globalization has created a much more complex work environment, making it more difficult to apply principles and codes of ethics consistently. Organizations may be tempted to resort to unethical behavior to maintain profits in today's more challenging and uncertain economic climate. It is not unusual for powerful, highly successful individuals to fail to act in morally appropriate ways as such people are often aggressive in striving for what they want and are used to having privileged access to information, people, and other resources. Furthermore, their success often inflates their belief that they have the ability and the right to manipulate the outcome of any situation

Where does good antivirus software look for infected files?

Good antivirus software checks for viruses in system files and computer memory.

Why are good business practices essential for business success?

Good business practices help retain customers and contribute to the long-term growth of the company. Good business practices have a positive impact on customers and help develop a loyal customer base.

In the context of virtue ethics, should a good moral leader always tell the truth?

Good moral leaders would exercise their judgment to choose the time and the place most appropriate for telling what would be considered as truth under the circumstances.

Who typically employs a strategic lawsuit against public participation (SLAPP)?

Government officials A SLAPP is employed by corporations and government officials.

Gramm-Leach-Bliley Act (Public Law 106-102)

Governs the collection, disclosure, and protection of consumers' nonpublic personal information or personally identifiable information

What is another name for the Ray Baum Act of 2018?

H.R. 4986, also known as Ray Baum's Act of 2018, passed the U.S. House of Representatives on March 6, 2018.

In the context of IT risk assessment, which assets are used by the organization to achieve its business objective?

Hardware and software A database A network

Which of the following can health information exchange (HIE) result in?

Higher quality care The sharing of information can result in better patient care.

What is green computing not concerned with?

Higher taxes for environmental impact

Critics of fake news say that fake news accounts is which of the following?

Highly opinionated Critics of fake news indicate that accounts might take one side or another.

What does doxing-researching someone on the internet reveal?

Home address This information may be readily available on the internet.

Why should IT professionals care about how their profession is perceived?

How a profession is perceived affects how individual members are viewed and treated.

What should the data collector consider when collecting or handling personal or otherwise sensitive data?

How data disclosure and use policy expectations might be inflated concerning how safe users' data are from cyberthreats Whether the data collected for a disclosed purpose might later be used for additional purposes beyond what the consenting subjects might know Whether the data subjects fully understand the risks of data disclosure from hacking, phishing, etc. How the expectations of data subjects or other stakeholders may vary from reality

According to Spacey (2017), what is not an example of technology-related existential risk?

Human conflict This is not one of the examp

According to Spacey (2016b), what are many environmental issues?

Hyperbolic They are growing at a fast rate.

What will you do if the chosen solution has not provided the expected results?

I will determine a further course of action based on the data obtained from monitoring the implemented solution. Any solution implementation is an iterative process, and monitoring provides information of the effectiveness of the chosen solution and its impact on the organization and involved stakeholders. The solutions are typically refined based on the obtained monitoring data.

Which company has obtained more utility patents than any other country and generates income from patent licensing?

IBM IBM obtained 8,088 patents in 2016, the 24th consecutive year it obtained more utility patents than any other company. By some estimates, IBM's licensing of patents, trademarks, and copyrights generates somewhere between $200 million and $2 billion in annual revenue for the company.

What can happen to IT professionals found to have lied on their résumé?

IT professionals might be fired for lying on a document relied on for hiring them.

What are the goals of risk assessment in order to protect the organization from its most likely and serious threats?

Identify which investments of time will best protect the organization. The goal of risk assessment is to identify which investments of time and resources will best protect the organization from most likely and serious threats. Identify which resources will best protect the organization. The goal of risk assessment is to identify which investments of time and resources will best protect the organization from most likely and serious threats.

Which aspect does NOT go into a risk assessment?

Identifying how much the insurance costs as compared with losing data There are many considerations presented, but the cost of insurance is not one of them.

Which concern about surveillance cameras do privacy advocates share?

Images stored by surveillance cameras create a new potential for abuse, such as intimidation of political dissenters or blackmail of people. Critics of advanced surveillance technology raise concerns about the use of surveillance to secretly store images of people, creating new potential for abuse, such as intimidation of political dissenters or blackmail of people caught with the "wrong" person or in the "wrong" place. Critics also raise the possibility that such technology may not identify people accurately.

What is an outcome of implementing a successful corporate ethics program as defined by the ERC?

Implementing a successful corporate ethics program discourages employees from seeking business success through questionable practices.

Which penalty can come because a company violated labor laws?

Imposing massive fines

You are a leader who has been considering an internal candidate for promotion to a senior manager position. What would be your criteria for a promotion from the virtue ethics perspective?

In the context of virtue ethics, the ability to consistently make apparently risky decisions to solve business problems may be qualified as courage-one of the key virtues listed by Aristotle.

What did the 2009 Health Information Technology for Economic and Clinical Health Act do to help electronic health record (EHR) adoption?

Increase reimbursement. The act provided increased Medicare and Medicaid reimbursements for adoption.

The top country of birth for H-1B workers in the United States in 2015 was

India

Which country is the best resource for offshore programmers outside of Europe and North America?

India

Which target of a strategic lawsuit against public participation (SLAPP) are anti-SLAPP laws designed to protect?

Individuals Anti-SLAPP laws were created to protect people who are the target of SLAPP laws.

What is a strategic lawsuit against public participation (SLAPP), which is typically without merit, used to do?

Induce fear of cost and effort in a major legal battle. A SLAPP seeks to increase the cost for the defendant.

Which factor is a key factor in productivity improvement?

Innovation Innovation and innovation enabled by IT are key factors.

Which answer is an exception to all that the computerized provider order entry (CPOE) enables?

Insurance The CPOE is not used for insurance.

What does clinical decision support (CDS) use not address?

Insurance costs CDS use does not have an impact on insurance costs.

What is the most likely outcome of integrating personal ethics into organizational culture

Integrating personal ethics into organizational culture enhances employees' commitment to organizational goals and objectives. Integrating personal ethics into organizational culture encourages employees and enhances their commitment to the company. Moreover, customers prefer service with a personal touch.

What is the process for assuring achievement of an organization's objectives in operational effectiveness and efficiency, reliable financial reporting, and compliance with laws, regulations, and policies?

Internal control Internal control is the process for assuring achievement of an organization's objectives in operational effectiveness and efficiency, reliable financial reporting, and compliance with laws, regulations, and policies.

In some countries, the three strikes law can result in the loss of which of the following?

Internet The internet service provider (ISP) is required to terminate the user's internet connection.

Why was the E-Rate program designed?

Internet access The E-Rate program was designed to pay for internet access for schools and libraries.

Which power does wearable technology use?

Internet of Things Wearables are one example of the Internet of Things.

When a domain name is deregistered, it becomes which of the following to users seeking access

Invisible Devices can no longer "see" the site

Which of the following statements about the offshore outsourcing of a major IT project is not true?

It advances the development of permanent IT workers in the United States.

What is the purpose of the Making Opportunities for Broadband Investment and Limiting Excessive and Needless Obstacles to Wireless Act (MOBILE NOW Act)?

It boosts the development of next-generation gigabit wireless broadband services by identifying more spectrum.

What are two benefits of using social media for customer service?

It creates a conversation to satisfy customers' concerns quicker and helps get instant feedback. While there are several compelling reasons to use social media for customer service, these two are primary.

Which of the following statements about the European Union's Restriction of Hazardous Substances Directive is not true?

It enables purchasers to evaluate, compare, and select electronic products based on a total of 51 environmental criteria.

Why is software piracy sometimes allowed by IT staff?

It is a way to reduce IT-related spending. Software piracy in a corporate setting is sometimes directly traceable to IT staff members—either they allow it to happen or actively engage in it, often to reduce IT-related spending.

Which statements about cyberloafing are true?

It is estimated that cyberloafing costs U.S. businesses as much as $85 billion a year. Because cyberloafing is so costly to organizations in reduced worker productivity and potential harassment lawsuits, many employers have developed policies on the use of IT in the workplace in order to protect against these possibilities. Many organizations have developed policies on the use of IT in the workplace to combat cyberloafing. Many organizations have developed policies on the use of IT in the workplace in order to protect against employees' abuses that reduce worker productivity or that expose the employer to harassment lawsuits. Some of the least productive workers cyberloaf more than 60% of their time at work. Many U.S. businesses now monitor most worker activities while at work in an effort to improve worker productivity.

What is the most important ethical consideration to be aware of with a stalking app?

It is illegal to install the spy software on a phone without the permission of the phone owner. Ethically, it is irresponsible to use spy software without consent from the device owner, but this behavior may also violate a number of laws. The Computer Fraud and Abuse Act states that you cannot access a protected computer (which now includes smartphones) without authorization and that you cannot exceed whatever authorization you have been given.

Why is it important to document everything in a logbook?

It may become court evidence.

Which advantage does social networking have over traditional advertising?

It provides for a two-way conversation between the business and the customer. Traditional advertising casts out a one-way message, but there is no way to know if the prospect saw the message. Social media is very interactive with customers and can yield instant feedback.

What are not elements of computer forensics?

It punishes hackers

What is the purpose of a security dashboard?

It reduces the time to monitor, identify, and act on security threats The purpose of the security dashboard is to reduce the time to monitor, identify, and act on security threats.

Which statement about predictive coding is true?

It will review the documents and learn to recognize the relevant ones within the set of electronic documents. Predictive coding works with human guidance to review the documents and recognize the relevant ones within the set of electronic documents. It utilizes artificial intelligence (AI).

In what ways can organizations use customer data to impact a person's life?

Job offer Information gathered about a job candidate's financial history or background character can be used to determine if a job candidate should be hired. Scholarship offer Information gathered about an individual's financial history or background character can be used to determine whether a scholarship is offered. Loan approval Information gathered about an individual's financial history or background character can be used to determine whether a loan is approved.

How can IT workers better understand how to enhance their relationship with society?

Join a professional organization that provides useful professional codes of ethics to guide actions that support the ethical behavior of IT workers, which directly affects their relationship with society.

For which purpose is encryption used?

Keeping data secure Encryption is used to secure and protect data.

Behavior-based is an approach to intrusion detection. What is another fundamentally different approach?

Knowledge-based Knowledge-based intrusion detection is another approach.

Some consider Edward Snowden as a whistleblower and a hero while others see him as a traitor. Which statement most accurately addresses this controversy?

Laws may declare an act as legal while some may consider it immoral either from deontological or utilitarian perspectives. Snowden claimed that his moral duty to reveal the truth about surveillance practices overrides any legal authority. The controversy further extends to utilitarian moral argument, with each side claiming that their actions were intended to benefit the public.

What is the precautionary principle?

Legal and ethical guideline for safe release of products, technologies, and materials A guideline states that products, technologies and materials that may harm the public should not be released on the market until they can be shown to be safe.

What are the purposes of privacy legislative regulation?

Legislation exists to require healthcare providers to obtain written consent from patients before disclosing any medical record information. HIPPA protects individual patient medical record privacy by not allowing disclosure without the patient's written consent. Legislation exists to ensure the accuracy, fairness, and privacy of information gathered by credit reporting companies. The Fair Credit Reporting Act is designed to ensure the accuracy, fairness, and privacy of information gathered by credit reporting companies. Legislation exists to access educational records maintained by a school. FERPA allows parents to access their children's educational records up to the age of 18. Students aged 18 and above may also demand access to their individual educational records.

The loss of funds under the E-Rate program could lead to which of the following?

Less capable internet at poor schools Poor schools have fewer funding alternatives.

Which term or concept pertains to electronic discovery?

Litigation hold notice A company must preserve records when it learns of pending or imminent litigation or when litigation is reasonably anticipated. An attorney may issue a litigation hold letter, or a company may issue a hold order internally to its employees. The order applies not only to paper-based documents but also to ESI.

Anti-SLAPP lawsuits can be abused. To combat potential abuse, which actions are taken?

Loser pays all legal fees. The side that loses the lawsuit pays the legal fees for the other side.

While a whistle-blower may be doing the right thing in their mind, which items can be a consequence?

Losing faith and confidence of coworkers and family

What are some offline sources a marketing firm might include in a personal profile about you?

Loyalty shopping card use Merchants may share or sell these personal data. Frequent flyer points use Airlines may share or sell these personal data. Vehicle registration data Most DMV data are public records.

Robots do not have the capacity to do which tasks?

Make moral judgments

Foreign Corrupt Practices Act (15 U.S.C. § 78dd-1, et seq.)

Makes certain payments to foreign officials and other foreign persons illegal and requires companies to maintain accurate records

U.S. code 18 USC §875(c)

Makes it a federal crime to transmit any communication in interstate or foreign commerce containing a threat to injure another person

U.S. code 47 USC §223

Makes it a federal crime to use a telephone or telecommunications device to annoy, abuse, harass, or threaten any person at the called number

What do the initials MSSP stand for?

Managed Security Service Provider

Which statement concerning Amazon's work culture is true?

Managers were overzealous in implementing legal regulations and neglected the human aspect of business practice.By squeezing the workforce and neglecting employees' personal needs and concerns, managers created dehumanizing work environment. Employees were often treated in undignified manner and personal requests were denied. The managers acted within the legal constraints but failed to exhibit the virtues required from the leaders. From deontological perspective, employees were treated as means to success rather than human beings with intrinsic worth.

The primary role of information technology stewards is to protect organizational information and assets. How do they do this?

Managing authentication access and control Information technology stewards protect organizational assets by managing authentication access and control. Implementation of security protections like encryption, firewall, proxy, virtual private network (VPN), intruder detection systems (IDS), and disaster recovery. Information technology stewards protect organizational assets by implementing security protections like encryption, firewall, proxy, VPN, IDS, and disaster recovery. Organization-wide security education and training Information technology stewards protect organizational assets by providing organization-wide security education and training.

What does a computer not have problems with?

Manipulating objects Computers have been programmed to manipulate objects.

Which statement best describes viral marketing?

Marketing that creates a buzz that spreads wide and fast by the exponential sharing of a message to friends and friends of friends and so on Viral marketing is the exponential growth of sharing information by encouraging people to share among their networks, creating a buzz about a product, service, or event.

Which penalty is included for violation of FERPA provisions?

May include a cut-off of federal funding to the educational institution FERPA provisions may include a cut-off of federal funding to the educational institution if FERPA rules are not followed.

Which plagiarism detection system should be used during software development?

Measure of Software Similarity (MOSS) is a software used to measure the similarities among computer programs written in languages such as Ada, C, C++, Java, Lisp, and Paschal. It is used to detect plagiarism in computer programming classes and commercial software.

What is one business outcome of meeting supply chain sustainability goals?

Meeting supply chain sustainability goals may lead to a decrease in profits.

Which materials, commonly found in computers, are harmful to humans?

Mercury

When was anonymity first addressed by the Supreme Court of the United States?

Mid 1900s The court took up the first case over a National Association for the Advancement of Colored People (NAACP) membership list anonymity.

What is the difference between the ethics of hedonism advocated by Epicurus and utilitarian ethics as developed by J. S. Mill?

Mill maintained that people must adopt a disinterested view in their moral judgment. Epicurus was focused on pursuing one's pleasures and avoiding pain.

According to the Ethics Resource Center, which action is the most commonly observed form of employee misconduct?

Misuse of company time

Which activity is the most common form of employee misconduct according to the National Business Ethics Survey (2011)?

Misuse of company time was found in the National Business Ethics Survey (2011) to represent the most common form of employee misconduct.

Which answer is an exception to patient benefits for a personal health record (PHR)?

Mobile application A mobile application might be a part of a PHR, but it is not a patient benefit.

Speech on the internet requires each of the intermediaries below except which one?

Mobile device Speech on the internet can use any type of device. A mobile device is not a service intermediary.

What is the definition of moral integrity?

Moral integrity is the ability to act in accordance with a personal code of principles.

What are moral principles based on?

Moral principles are based on personal beliefs formed and adhered to by an individual.

In the context of deontological ethics, how would you assess actions based on personal feelings such as love or anger?

Morally right actions are an expression of goodwill, which is based on personal duty. Therefore, actions motivated by personal feelings do not have moral worth.

To open a software engineering consulting practice or to claim that one is a software engineer in a formal context may now require a license. What should be potential professional malpractice legal issues?

Negligence A licensed software engineer is legally liable for negligence: not doing something that a reasonable person should do or doing something a reasonable person should not do. Duty of care A licensed software engineer is legally liable for duty of care—the obligation to protect people against any unreasonable harm or risk.

Which one is easier to enforce, a noncompete agreement or a nondisclosure agreement?

Neither a noncompete nor a nondisclosure agreement Both types of agreements are very difficult to enforce and hold up in court when the terms are too restrictive.

What do the initials NGFW stand for?

Next-generation firewall

Which net neutrality rule stops internet traffic from being singled out based on who sends it?

No Throttling The Federal Communications Commission (FCC) created a separate rule that prohibits broadband providers from slowing down specific applications or services, a practice known as throttling. More to the point, the FCC said providers cannot single out internet traffic based on who sends it, where it is going, what the content happens to be, or whether that content competes with the provider's business.

What does serving a court order to reveal anonymous remailer information allow to be retrieved?

No information on the sender There is nothing to turn over.

According to statistica.com, which region uses social networking platforms the most?

North America According to Statistica.com, North America has the highest penetration (usage) rate at 58%.

What is the purpose of notice and takedown procedures?

Notice and takedown procedures grant copyright holders a quick and simple way to halt access to allegedly infringing content. Copyright holders are granted the right to issue subpoenas.

What is a critical ethical decision when a cyberattack occurs?

Notifying the public may cause bad publicity and lose customers This is a legitimate concern, but many laws in place may force this decision.

Obscenity is one of the protection exceptions under the First Amendment to the U.S. Constitution. Which community has defined this standard?

Obscenity has not been defined.

How can you include ethical considerations in your decision-making?

Often, people employ a simple decision-making model that includes five steps: define the problem, identify alternatives, choose an alternative, implement the decision, and monitor the results. You can incorporate ethical considerations into decision-making by identifying and involving the stakeholders; weighing various laws, guidelines, and principles (including the organization's code of ethics) that may apply; and considering the impact of the decision on you and your organization, stakeholders, customers, and suppliers, and on the environment.

Which statement is NOT true about antivirus software?

Once antivirus software is installed, the program will do the rest. It needs frequent updates but does not catch everything.

What is one of the key ethical issues to consider in the context of maintaining supply chain sustainability?

One of the key ethical issues to consider in the context of maintaining supply chain sustainability is maintaining fair labor practices.

What is one of the tactics utilized to implement the corporate social responsibility (CSR) practices?

One of the tactics utilized to implement the CSR practices involves donating a portion of net profits to charities.

Which element does not require encryption?

Open-source software is already free and available.

Which cloud services company countersued a whistle-blower stating accounting irregularities for malicious prosecution?

Oracle The whistle-blower, a former Oracle employee, accused management of pressuring the whistle-blower to add millions of dollars in accruals to financial reports for expected cloud-based software and services revenue. Oracle strongly denies any allegations of wrongdoing and has vowed to countersue the whistle-blower for malicious prosecution.

What is an example of a breach of contract?

Oracle had breached its contract with HPE by dropping support for all Oracle database software being run on HP systems using Intel's Itanium processor chip. (Hewlett-Packard Enterprise (HPE) contractually uses Oracle database software for its systems that run on a specific Intel processor chip. Oracle quit supporting its software for that specific processor.)

A trade secret could be any of the following except

Oracle's cloud services Oracle's cloud services is not a trade secret.

Which four levels need security measures implemented?

Organization, network, application, and user All four of these levels need to protect the network and data.

Information-intensive systems have changed and expanded over time, which introduces new risks to an organization. What describes a "downside" to the change and expansion that has been exemplified?

Organizations keep pace with technological change, perform ongoing assessments of risk, and implement approaches to deal with these risks. Organizations cannot, in fact, keep pace with technology, perform ongoing risk assessments, and implement approaches to these risks.

What best represents an example of the problem statement identifying the needs of relevant stakeholders?

Our online customers often abandon their merchandise search, even though we have the needed items in stock. As a result, we cannot sell the products online that are in demand with customers in our physical stores, and our online sale revenue declined by 10% over the last quarter. The problem and business implications are clearly identified. Improving website design seems to be a viable alternative to consider.

What is the best argument for offshore outsourcing?

Outsourcing provides companies with a 24-hour workday.

____ is a system employed to collect internet data including search histories; photos sent and received; the contents of email, file transfers, and voice and video chats; and other internet communication data.

PRISM

Who is the personal health record (PHR) information routinely shared with?

Patient The PHR contains personal information, history, and results.

Disasters can impede data access. Which asset is not included in a disaster recovery plan?

People

Why are periodic security audits necessary?

Periodic security audits both ensure that policies are enforced and check if these policies are still relevant.

What is concerning about your personal financial data?

Personal data are not protected by businesses and other organizations. Individuals should be concerned if their personal financial data are not protected by businesses and other organizations. Personal data are shared with other people or companies without consent. Sharing personal financial data with others without customer consent is a critical concern.

What was the result of the court challenge against the Communications Decency Act (CDA)?

Portions of the CDA were struck down by the court.

cramming

Practice in which unauthorized, recurring third-party charges are added to consumers' bill

is a process that couples human guidance with computer-driven concept searching in order to train document review software to recognize relevant documents with a document universe.

Predictive coding

What are the processes of e-discovery?

Preparing stored information for an agreed upon format A part of e-discovery is the preparation of electronically stored information for use in criminal and civil actions and proceedings. Reviewing electronically stored information for a lawsuit A part of e-discovery is the review of electronically stored information for use in criminal and civil actions and proceedings. Collecting relevant electronically stored information for a lawsuit A part of e-discovery is the collection of electronically stored information for use in criminal and civil actions and proceedings.

What do user roles and accounts allow users to do?

Prevent others, even in the same department, from seeing information not allowed by their role Have appropriate access based on what role they perform within the organization

What is the definition of prior art?

Prior art is the existing body of knowledge available to a person of ordinary skill in the art. As part of the application, the USPTO searches the prior art—the existing body of knowledge available to a person of ordinary skill in the art.

Which statement describes a clinical decision support (CDS)?

Process and set of tools CDS gives providers a way to improve delivery.

What does PEO stands for?

Professional Employer Organization

Which group of foreign workers is not exempt from the annual cap on the number of H-1B visas granted?

Programmers and engineers hired to work at private technology companies.

U.S. code 18 USC §2425

Protects children against online stalking by making it a federal crime to communicate with any person with the intent to solicit or entice a child into unlawful sexual activity

Sarbanes-Oxley Act (Public Law 107-204 116 Stat. 745)

Protects shareholders and the general public from accounting errors and fraudulent practices in the enterprise

Which two things does society expect members of a profession to do in regard to technology innovation?

Provide benefits and not cause harm Society expects professionals to provide significant benefits and not cause harm through their actions.

As you are looking for available alternatives in the decision-making process, what will be the best way to involve others in solving a problem and brainstorming the problem under consideration?

Provide involved stakeholders with the problem statement, offer information on the issue to be resolved, and record the proposed solutions. At the stage of identifying alternatives, it is important not to influence stakeholders involved in the decision-making process. Offer the facts about the problem and record all proposed courses of action

What is an electronic health record (EHR) designed to be shared with?

Providers and staff from more than one organization The EHR is used across organizations.

Payment Card Industry Data Security Standard (PCI DSS)

Provides a framework of specifications, tools, measurements, and support resources to help organizations ensure the safe handling of cardholder information

European Union-United States Privacy Shield

Provides companies in the EU and the U.S. with a mechanism to comply with EU data protection requirements when transferring personal data from the European Union to the United States in support of transatlantic commerce

According to Spacey (2016b), what is not destructive to an ecosystem?

Psychology This is not a basic form of telemedicine.

What is not a basic form of telemedicine?

Psychology This is not a basic form of telemedicine.

As what is a manager's judgment of the cost of control as compared to the risk or the benefit known?

Reasonable assurance The manager uses reasonable assurance in the decision-making process.

Which list correctly identifies the five phases of an APT?

Reconnaissance, incursion, discovery, capture, export The five phases of advanced persistent threats include reconnaissance, incursion, discovery, capture, and export.

Health Insurance Portability and Accountability Act (Public Law 104-191)

Regulates the use and disclosure of an individual's health information

Suppose you are a CEO of a large corporation and found out about accounting irregularities that impacted financial reporting for the recent quarter. What will you do?

Release adjusted financial results and apologize to the shareholders. The best strategy is to correct the inaccurate data as soon as possible and to demonstrate the transparency in financial reporting. This will help you avoid negative publicity that often leads to the perception of uncertainty in the company's future performance.

Which effects can a repeal of net neutrality have?

Remote workers may pay more for internet access to do their jobs from home. A fast lane can be occupied by big internet and media companies while most everyone else will be left on the slow lane.

Federal Information Security Management Act (44 U.S.C. § 3541, et seq.)

Requires each federal agency to provide information security for the data and information systems that support the agency's operations and assets, including those provided or managed by another agency, contractor, or other source

Bank Secrecy Act of 190 (Public Law 91-507)—Amended several times, including by provisions in Title III of the USA PATRIOT Act (see 31 USC § 5311-5330 and Title 31 Code of Federal Regulations Lesson X)

Requires financial institutions in the United States to assist U.S. government agencies in detecting and preventing money laundering

What can qui tam lawsuits protect the employee from?

Retaliatory termination is not allowed.

What is involved during a computer forensics investigation?

Retrace steps when data may have been lost and also confirm or evaluate the impact of industrial espionage.

Which term describes explicit photos posted by ex-partners with the intent to shame, embarrass, or harass former partners?

Revenge porn Revenge porn content is sometimes linked to the person's other online accounts such as Facebook, LinkedIn, or even an employer's website, along with personal information, including addresses and telephone numbers. In this context, revenge porn can be considered a form of domestic abuse and stalking.

Which e-discovery procedure does predictive coding help perform?

Reviewing the documents and learning to recognize the relevant ones within the set of electronic documents Predictive coding works with human guidance to review the documents and recognize the relevant ones within the set of electronic documents. It utilizes artificial intelligence (AI).

What do roles and accounts allow users to obtain when they log in?

Roles and accounts determine different levels of access to information based on what job they have.

Which of the following are grounds for protection under whistle-blower laws?

Safety concerns

High-value data include the following

Sales and marketing information and new product development plans, schedules, and budgets Details about product designs and innovative processes Employee personal information Customer and client data Sensitive information about partners and partner agreements

Which law protects shareholders and the general public from accounting errors and fraudulent practices in the enterprise?

Sarbanes-Oxley Act The Sarbanes-Oxley Act protects the public and shareholders.

Which category of foreign workers is exempt from the annual H-1B cap?

Scientists hired to teach at American universities

Which software provides a comprehensive display of all key performance indicators related to an organization's security defenses, including threats, exposures, policy compliance, and incident alerts?

Security dashboard A security dashboard is either developed in house or purchased from a software developer to provide a single source of information from many different sources.

What defines an organization's security requirements, as well as the controls and sanctions needed to meet those requirements?

Security policy A security policy creates the framework and procedure for what must happen in cases of emergency.

Which court case ruling had a major impact on the video game industry by allowing video game makers to create software that can run on multiple machines?

Sega Enterprises v. Accolade Inc.

What is not a step in a whistle-blowing situation?

Segment the employee off to a safe place until trial.

Which is not a strategy for success when outsourcing to offshore companies.

Selecting a company that is located in a vacation area.

What is not a driver for productivity performance?

Selling lower value goods . This is not a driver for productivity performance.

Big data is generated by machines, humans, and mother nature. From what types of sources can the massive big data sets be produced?

Semistructured data sources Unstructured data sources Structured data sources

Data encryption should be used when sensitive data is stored

Sensitive data require encryption when stored in the cloud, at data centers, and most especially at third-party locations.

What does SORNA stand for?

Sex Offender Registration and Notification Act The Sex Offender Registration and Notification Act (SORNA) provisions of the Adam Walsh Child Protection and Safety Act of 2006 improved on the Wetterling Act by setting national standards that govern which sex offenders must register and what data must be captured.

Cyberespionage often infiltrates copious amounts of data and information. These data are usually of high value to the information holder. Which example is NOT included in these high-value data?

Shipping manifests Although important to the organization, these documents are not considered of high value, especially to someone engaging in cyberespionage. These shipping documents rapidly "age," so their value is time limited.

Identity theft involves obtaining personal identification information that may require more than just one piece of data. Personally identifiable pieces of information include a person's full name and which other items?

Social Security number Obtaining a person's Social Security number and pairing it with the person's full name can lead to an identity theft—for example, the theft of social security benefits. Credit card number Obtaining a person's credit card number and pairing it with the person's full name can lead to identity theft—for example, the unauthorized use of the person's credit line.

What would not be impacted by technology access?

Social standing Technology access will not have an impact on social standing.

What is not one of the three major components of machine learning?

Software This is not one of the three major components of machine learning.

Advocates of open source code software believe that better software is created with traditional proprietary software. What defines a benefit of open source software?

Software bugs are more rapidly identified and fixed with open source code. Proprietary software is usually distributed with specific revision dates scheduled. With open source software, users finding a bug have access to the source code so that they may identify the bug and fix the code themselves. The open source license will specify how the changed code should be distributed to all.

Defining and controlling the appropriate level of access to intellectual property are complex tasks. For example, protecting computer software has proven to be difficult because it has not been well categorized under the law. What are legitimate ways of protecting written software code?

Software has sometimes been treated as the expression of an idea, which can be protected under copyright law. Software has sometimes been treated as a process for changing a computer's internal structure, which can be protected under patent law.

Which item is not the one used to describe the digital divide?

Software ownership This is not one of the items used to describe the digital divide.

Which aspect is never addressed in a company's policy and procedures manual or in its code of conduct?

Software piracy Software piracy is an illegal activity that is addressed by law.

Approximately how many U.S. workers have reported worker or manager misconduct and then suffered some sort of retribution from their supervisor or negative reactions from their coworkers?

Some 6.2 million

Cybercriminal

Someone who attacks a computer system or network for financial gain

Cyberterrorist

Someone who attempts to destroy the infrastructure components of governments; financial institutions; and other corporations, utilities, and emergency response units

Black hat hacker

Someone who violates computer or internet security maliciously or for illegal personal gain (in contrast to a white hat hacker who is someone who has been hired by an organization to test the security of its information systems)

What is another name for spy software?

Stalking apps Cell phone spy software called a stalking app can be loaded onto someone's cell phone or smartphone within minutes.

As innovations near launch, which type or classification of risk management is needed?

Standard The innovation is near launch.

What is the key to health information exchange (HIE)?

Standardized data Standardization of the data is critical for sharing.

Which is true about the precautionary principle?

States a product should be generally accepted as safe before being launched on the market. In the past, it was often required to show beyond a doubt that a product is harmful to pull it from the market. But the precautionary principle is the opposite approach, that states a produce should be accepted as safe first.

Why have many IT manufacturers made supply chain sustainability a priority?

Supply chain sustainability policies allow IT companies to sell their products in the European Union countries.

Which example is an encryption algorithm?

Symmetric This is an encryption algorithm.

Advances in which field have not changed the way work is done?

System processing These routine and ongoing improvements have not changed the way work is done.

Identify how advanced surveillance technology can deter terrorist activities.

Systems exist that can link camera surveillance data with other sensors such as radiation detectors to respond to terrorist attacks and other incidents. The Domain Awareness system is a joint effort of the New York Police Department (NYPD) and Microsoft to combat terrorist activities and reduce the time required to respond to an incident. The system links together the city's 9,000 surveillance cameras and 600 radiation detectors, as well as license plate readers and NYPD computer records.

What is a key trait associated with electronic surveillance technology? This

Systems exist that can link up camera surveillance data with other sensors to respond to crimes and other incidents. The Domain Awareness system is a joint effort of the New York Police Department (NYPD) and Microsoft to combat terrorist activities and reduce the time required to respond to an incident. The system links together the city's 9,000 surveillance cameras and 600 radiation detectors, as well as license plate readers and NYPD computer records.

According to Spacey (2016c), what does human enhancement use to alter the human body?

Technology

Children's Internet Protection Act (CIPA) required federally financed schools and libraries to use which of the following to block computer access to certain materials?

Technology The CIPA required technology to filter the Internet access.

How can workplace monitoring identify employees who often complete their college course studies online at work?

The BYOD and IT use policies state that all website URLs and emails sent while connected to the company network are monitored. The IT use policy establishes boundaries of what is acceptable use of IT resources, and the bring-your-own-device (BYOD) policy may allow monitoring of personal devices in the workplace.

What is the best resource for recommendations if you are a victim of cyberstalking?

The Center for Victims of Crime, which offers tips on how to combat cyberstalking

Which statement about copyrights is false?

The Copyright Term Extension Act of 1998, also known as the Sonny Bono Copyright Term Extension Act, was primarily championed by movie studios concerned about retaining rights to their early films.

Some independent information privacy laws and acts have been implemented. Which act ensures the accuracy, fairness, and privacy of information gathered by credit card companies?

The Fair Credit Reporting Act The Fair Credit Reporting Act, which was enacted in 1970, outlines who may access your credit information, how you can find out what is in your credit file, and how to dispute inaccurate data.

______________ describes procedures for the electronic surveillance and collection of foreign intelligence between foreign powers and agents of foreign powers. It also created a special court which meets in secret to hear applications for orders approving electronic surveillance anywhere within the United

The Foreign Intelligence Surveillance Act

Corporate policies are usually not created with worker privacy rights in mind, but which set of workers is given a reasonable expectation of privacy at the workplace?

The Fourth Amendment provides some privacy to government workers. The Fourth Amendment to the Constitution protects citizens from unreasonable government searches, so it offers a degree of privacy to government workers.

What are the uses of NGFW?

The NGFW uses hardware, software, or both.

How would you define the NSL gag provision as an element of the USA PATRIOT Act?

The NSL gag provision is used to block NSL recipients from informing anyone that the government secretly requested their records The NSL gag provision is used to block NSL recipients from informing anyone that the government secretly requested their records.

What happened after the Authors Guild, a professional organization that advocates for authors on issues of copyright, fair contracts, and free speech, sued Google saying that serving up search results from scanned books infringes on publishers' copyrights?

The Supreme Court let stand a lower court decision that rejected the writers' claims on the basis that such usage represented noninfringing fair use.

Which authorization did the USA Freedom Act restore?

The USA Freedom Act restored authorization for roving wiretaps. Roving wiretaps were originally a provision of the USA PATRIOT Act that were finally set to expire in 2015.

Which of intellectual property laws, acts, and treaties apply to multiple countries around the world?

The WIPO Copyright Treaty, adopted in 1996, ensures that computer programs are protected as literary works and that the arrangement and selection of material in databases are also protected by its 185 member countries. It provides authors with control over the rental and distribution of their work and prohibits circumvention of any technical measures put in place to protect the works. TRIPS established minimum levels of protection that each government must provide to the intellectual property of all World Trade Organization (WTO) members.

In a real-life case, a bail bounty hunter entered the house of a suspected bail fugitive at night and killed him. The person in question was innocent. Which particular concern can you identify in this case in the context of the PAPA model?

The bounty hunter's actions were based on inaccurate data records contained in the involved databases.The deadly force was used based on the inaccurate data records. Data accuracy is one of the key concern areas in the context of the PAPA model.

What is the best reason for whole-disk encryption?

The chance of computer theft

What is not a benefit to the company for using contract workers?

The company does not have a large severance package when an independent contractor's work ends.

What is the difference between Bentham's conception of utility and Epicurus's understanding of pleasure as a foundation of moral life?

The conception of utility is focused only on maximizing happiness for all affected by one's actions, while Epicurus's moral philosophy is focused on one's own personal life.

Which of the following isnotan advantage for organizations that employ contingent workers?

The contingent worker's experience may be useful to the next firm that hires him or her.

Which statement most accurately addresses the key focus of the corporate code of ethics?

The corporate code of ethics is focused on areas of potential ethical risk related to employees' responsibilities and the ways to recognize and resolve ethical issues.

What is the principle obstacle to the business solution implementation in the context of the decision-making process?

The course of action to be implemented meets resistance of employees who are used to the established work routine. People often resist change to the established work routine and see the new business practices or models in a negative light. Therefore, the key to success is to communicate all aspects of proposed changes to employees, offer training, and modify the reward system as needed.

What did the U.S. Supreme Court decide in the Alice Corporation v. CLS ruling in 2014?

The court ruled that the case was based upon an abstract idea that should not be restrained. The U.S. Supreme Court reasoned that using a third party to eliminate settlement risk is a fundamental and prevalent practice (an abstract idea) used in our modern economy. In a unanimous decision, the Supreme Court held that patent law should not restrain abstract ideas that are the "building blocks of human ingenuity."

Suppose you are a manager who fired an employee for using your company's computer to access morally questionable content. The employee has a large family and a mortgage and needs regular income.Which statement most closely addresses legal and ethical aspects of the case?

The decision to fire this employee in question was right on both legal and ethical grounds. On the legal side, the manager followed company's regulations. From ethical perspective, the employee not only used office equipment for nonprofessional activities but also accessed morally questionable content, with potentially negative impact on coworkers' morale; therefore, the employee had to be terminated on moral grounds also.

What are some of the ethical implications of moving business operations to developing countries?

The employees in the developing countries are often forced to work under conditions that are not acceptable in most developed countries.

What are the benefits generated with a good working relationship between IT workers and their suppliers?

The flow of useful communication and the sharing of ideas are benefits of the relationship between IT workers and their suppliers.

What name indicates short-term engagements or specific assignments based on performance or projects, and not necessarily hours?

The gig economy

What trends have increased the risk that information technology will be used in an unethical manner?

The growth of the internet and social networks; the ability to capture, store, and analyze vast amounts of personal data; and a greater reliance on information systems in all aspects of life have increased the risk that information technology will be used unethically. In the midst of the many IT breakthroughs in recent years, the importance of ethics and human values has been underemphasized, with a range of consequences.

What is a procedure?

The instructions for completing each task in a process

What did the Supreme Court ruling indicate about the Communications Decency Act (CDA)?

The internet must be afforded protection.

Keeping everyone informed on progress is important but not through compromised systems. Why?

The intruder may be monitoring information through the compromised system.

Which reason to learn the professional code of ethics is best?

The knowledge of professional code of ethics helps delineate legal and ethical aspects of one's professional activities and, as a result, to make the right decision in a difficult situation.

Volkswagen's engineering practices of cheating on the emission test software were both illegal and unethical. What was, according to many critics, the key corporate flaw that led engineers to engage in such practices?

The lack of moral integrity led to the corporate culture environment that led to questionable design decisions. The critics believe that in VW corporate culture engineers did not believe company manager expected them to act with integrity. This was a moral failure at the design and leadership levels. The problems involved principal inconsistency in following moral norms and adhering to the morally sound value system.

What is not a good reason to hire contingent workers?

The line between employees and contingent workers can get blurred over time.

In the 1990s the FBI was investigating nearly 800 trade secret theft cases in 23 countries. What are some estimates of the cost to U.S. companies each year due to misappropriation of trade secrets?

The misappropriation of trade secrets is estimated to cost U.S. companies somewhere between $160 billion and $480 billion each year.

Bathsheba syndrome.

The moral corruption of people in power has been given the name

Cybersecurity is a major concern among corporations working hard to use their resources to the best advantage. However, resource allocation is made up of tough decisions about their proper placement. What is NOT one of the trade-offs commonly associated with this decision process?

The products and services available from a specific vendor The chosen product or service may be the result of a trade-off when considering functionality, ease of use, or the operating system being used within the organization. However, the products and services themselves, and the vendor from which they are chosen, are not specific trade-offs when making resource allocation decisions.

Courts consider four factors in determining fair use of a copyrighted property. Three factors are the nature of the work, portion of the work being used, and effect on the value of the work. What is the fourth factor?

The purpose and character of the use (such as commercial use or nonprofit, educational purposes) is a factor.

Which statements about cyberterrorism are true?

The purpose of cyberterrorism is to disable critical national infrastructure (e.g., energy, transportation, financial, law enforcement, and emergency response) to achieve political, religious, or ideological goals. Cyberterrorism is used to disable critical national infrastructure (e.g., energy, transportation, financial, law enforcement, and emergency response) to achieve political, religious, or ideological goals. Cyberterrorism involves the intimidation of government or civilian populations by using information technology to disable critical national infrastructure. Cyberterrorism involves the intimidation of government or civilian populations by using information technology to disable critical national infrastructure.

What is the definition of the respondeat superior principle established by the Supreme Court?

The respondeat superior principle states that an employer can be held legally responsible for the acts of its employees even if employees acted in a way contrary to corporate policies and their employer's directions.

It was found that Facebook greatly overstated the viewing time of video ads on its platform. How will this likely, according to analysts, impact Facebook's operations?

The revision of viewing results and associated publicity are likely to negatively impact future advertisement revenue. According to analysts, bad publicity resulting from the results revision will likely lead to the loss of tens of billions of advertising dollars.

What is the right of privacy, and what is the basis for protecting personal privacy under the law?

The right of privacy is "the right to be left alone—the most comprehensive of rights, and the right most valued by a free people." Information privacy is the combination of communications privacy (the ability to communicate with others without having those communications monitored by other persons or organizations) and data privacy (the ability to limit access to one's personal data by other individuals and organizations in order to exercise a substantial degree of control over that data and its use). The use of information technology in business requires balancing the needs of those who use the information that is collected against the rights and desires of the people whose information is being used. A combination of approaches—new laws, technical solutions, and privacy policies—is required to balance the scales. The Fourth Amendment states, "The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized." The courts have ruled that without a reasonable expectation of privacy, there is no privacy right to protect. Today, in addition to protection from government intrusion, people want and need privacy protection from private industry. For many, the existing hodgepodge of privacy laws and practices fails to provide adequate protection and fuels a sense of distrust and skepticism, and concerns over identity theft.

One challenge is how to request new data or analytics. What do they need to know to get the information they need?

The right questions to ask The correct search terms to use The range of factors to consider

Which rights are included in the Family Educational Rights and Privacy Act (FERPA)?

The right to demand that educational records be disclosed only with student consent Students have the right for their educational records not to be disclosed unless the student provides consent. The right to amend educational records Students do have the right to amend educational records when justified. The right to file complaints against a school for disclosing educational records in violation of FERPA Students have the right to file complaints against a school for disclosing educational records in violation of FERPA. The right to access educational records maintained by a school Students have the right to access their educational records maintained by the school.

What is the purpose of a security audit?

The test proves or disproves the security compliance with policies and procedures. It is one thing to write policies, but it is another to prove that people are following those procedures and policies.

Who does Section 230 of the Communications Decency Act protect?

The website The website itself (along with the operators) is protected.

Which of the following statements indicate that the worker is not an independent contractor?

The worker is protected by workplace safety and employment antidiscrimination laws.

For whom are social networking platforms?

There is a broad range and very specific social networking platforms and groups for every interest and age group. There are special interest groups within some social networking platforms, like Facebook, and some social networking platforms that have very specific markets, like Classmates.com.

What is not a description of an independent contractor?

They are a W-2 employee. Independent contractors are not W-2 employers with the same rights and benefits as regular employees.

Why are internet service provider (ISP) and social networking hate speech guidelines not a violation of First Amendment rights?

They are in the service contracts. The ISPs or social networking providers are enforcing their contract.

Which statement is NOT true about the increased prevalence of computer incidents?

They are increasing due to the decrease in the digital divide. The increase in computer incidents is not directly connected to the digital divide.

Which characteristics are NOT included in advanced persistent threats (APTs)?

They are specifically intended to disrupt services and capabilities. APTs do not intend to disrupt services but instead to steal data.

What will be covered by a good security audit?

Those outside of the network cannot penetrate the network unless authorized. People have the appropriate level of rights based on their role. Password changes are required based on the frequency spelled out in the security policy.

What is the purpose of e-discovery software?

To analyze large volumes of ESI quickly to perform early case assessments E-discovery software can analyze large volumes of ESI quickly and at reduced costs. To streamline data collection from across all relevant data sources in multiple data formats

What is the purpose of the FISA?

To describe procedures for the electronic surveillance and collection of foreign intelligence information between foreign powers and agents of foreign powers FISA regulates electronic surveillance procedures on foreign powers and their agents.

The use of information technology in both government and business requires balancing the needs against the rights and desires of the people. For which purposes do organizations use the data collected about people?

To make better decisions Decisions such as hiring a job candidate (or not), approving a loan, or offering a scholarship can be made by gathering data about an individual To target marketing Companies use individual marketing information to target market efforts to consumers who are most likely to buy their products and services. To serve customers better Companies collect data from their customers to find out if customers are satisfied or dissatisfied and why. Customer feedback allows for companies to best meet customer needs. To better understand consumers' purchasing habits and financial conditions Companies collect individual customer financial information to better understand what an individual can afford to buy, along with what the customer likes, to offer products and services the customer will likely purchase.

What is the purpose of the Title III of the Omnibus Crime Control and Safe Streets Act?

To regulate the interception of wire and oral communications Title III of the Omnibus Crime Control and Safe Streets Act was adopted to set the limits of wire (telephone) and oral communications interception.

What is the focus of CALEA?

To require the telecommunications industry to build tools into its products that federal investigators can use to eavesdrop on conversations and intercept electronic communications CALEA specifies that equipment must contain tools that allow federal investigators to listen in conversations after getting a court order.

What is part of the mission of Software & Information Industry Association (SIIA)?

To stop the unauthorized copying of software SIIA represents the world's largest software and hardware manufacturers and tries to stop the unauthorized copying of software produced by its members.

What is the main focus of the USA Freedom Act in the area of electronic data gathering?

To terminate the bulk collection of telephone metadata by the NSA, instead requiring telecommunications carriers to hold the data and respond to the NSA queries for data The USA Freedom Act is focused on the distinction between data and metadata and sets the limits on metadata collection by the NSA.

What do marketers use, along with cookies, to provide targeted advertisements to online consumers?

Tracking software Companies use tracking software to allow their websites to analyze browsing habits and deduce personal interests and preferences. The use of cookies and tracking software is controversial.

Beginning with the model year 2011 vehicles, the National Highway Safety Administration defined a minimum set of 15 data elements that must be captured for manufacturers who voluntarily install Electronic Data Recorders on their vehicles.

True

China has more surveillance cameras per person than Great Britain.

True

Important decisions with strong ethical implications are too often left to the technical experts; general business managers must assume greater responsibility for these decisions.

True

It appears that the current supply of U.S. computer and information science graduates exceeds the long-term BLS forecast of new job openings

True

No comprehensive federal law protects all whistle-blowers from retaliatory acts.

True

The Fourth Amendment cannot be used to limit how a private employer treats its employees, and private-sector employees must seek legal protection against an invasive employer under various state statues.

True

The number of U.S. government intelligence-gathering units identified in Executive Order 12333 exceeds 18.

True

What will you most likely use for financial transactions?

Two-factor authentication

Who grants an H-1B work visa?

U.S. Citizenship and Immigration Services

Which party behaved ethically in the 2016 Ofcom headlines issues?

UKTV management

Who issues U.S. patents?

USPTO The U.S. Patent and Trademark Office (USPTO) issues patents.

Under the terms of which law can computer hardware and software qualify for trade secret protection?

Uniform Trade Secrets Act (UTSA) The UTSA was drafted in the 1970s to bring uniformity to all the United States in the area of trade secret law. Computer hardware and software are covered because the UTSA defines a trade secret as "information, including a formula, pattern, compilation, program, device, method, technique, or process".

US-CERT

United States Computer Emergency Readiness Team is a partnership between DHS and the public and private sectors that was established to protect the nation's internet infrastructure against cyberattacks by serving as a clearinghouse for information on new viruses, worms, and other computer security topics

Which steps are reasonable for an employer to stop pornography viewing in the workplace?

Use policy A policy combined with disciplinary action for violators are considered reasonable steps.

What is the best way to protect your network?

Use reliable software; install, update, and use antivirus software; and hire professionals to manage your security and network.

Electronic devices consist of many different materials, including some that are known to be harmful to humans and the environment. Which of the following groups of people are at risk of unhealthy exposure to these raw materials?

Users of these products when they are poorly designed or improperly manufactured. Residents near recycling plants. Electronic manufacturing employees and suppliers at all steps along the supply chain.

There are six types of patents. Which type is most issued for computer hardware and software?

Utility patent

What is not guaranteed by data integrity?

Validity Data integrity cannot guarantee validity of the data.

What are two ways in which vehicle EDRs are currently used?

Vehicle manufacturers use the EDR to capture and record data that can be used by them to make future changes in order to improve vehicle performance in the event of a crash. The National Highway Traffic Safety Administration (NHTSA) defined a minimum set of 15 data elements that must be captured for manufacturers who voluntarily install EDRs on their vehicles. These data can be downloaded from the EDR and used for analysis by the manufacturers. Courts can subpoena EDR data for use in court proceedings. There have been numerous cases in which EDR data have been ruled as admissible and reliable in court hearings, and there are cases in which such data have had a significant impact on the findings of the court.

What are the characteristics that best describe big data?

Velocity Volume Veracity Variety

What is not considered an advantage of a trade secret over a patent?

Violations of trade secret law can include both civil and criminal penalties. All federal intellectual property law includes penalties for civil and criminal penalties.

What does VPN stand for?

Virtual Private Network

What is NOT characteristic of a virus?

Viruses do not cause permanent or irreparable harm to a computer or network. Viruses can cause permanent or irreparable harm to a computer or network.

What are the key questions to ask in the step "identify alternative"?

What are the ideas for consideration? What are the facts of the problem, as known? What needs to be understood better, why does this happen, what might be the root cause?.

What do all professionals need to understand concerning code of conduct?

What is legal is not always ethical.

What are the key questions to ask when developing the problem statement?

What is the impact or extent of the problem and who is affected?

What are the key questions to ask when choosing an alternative?

What is the risk associated with each alternative? What are the laws, guidelines, or principles that may apply to this problem? What is the cost and time associated with each alternative?

Data practices are never isolated from a broader data ecosystem not under one's control. What must research planners consider as potential downstream risks and uses of data?

What laws and safeguard standards exist where the data will be stored Correct. Where the data might be 5 to 10 years from now How the data might impact the subject(s)

When is it best to use contingent workers?

When a company needs skills for a specific period and does not have the skills needed within the ranks of their existing employees.

There is no dollar amount limitation on the monetary penalty for a patent infringement case. What have the courts awarded?

When intentional infringement is proven, the courts have awarded up to 300% of claimed damages. Unlike copyright infringement, for which monetary penalties are limited to certain specified dollar amounts, if the court determines that a patent has been intentionally infringed, it can award up to triple the amount of the damages claimed by the patent holder.

What is a legitimate, ethical reason to use H-1B workers?

When there are needed skills that a company simply cannot find domestically.

When is full-disk encryption a good idea?

When there is sensitive data on any device or in a public space

When the right question to ask and the access to potential data sources seems to be within reason, what are the additional important data factors that need to be considered?

Whether the available data contain all of the relevant information Whether the available data are sufficient Whether the data source is unbiased

With respect to the Fourth Amendment, which action have the courts ruled in favor of?

Without a reasonable expectation of privacy, there is no privacy right.

How is wearable technology being used in construction?

Worker movement The wearables in construction are focused on reducing injury.

What does HIPPA require all medical providers to obtain from their patients prior to the release of medical records?

Written consent Written consent must be obtained by any medical provider in advance before release of any patient's medical records.

Unlike a _____, a patent prevents independent creation as well as copying.

copyright

What does trade secret law protect?

f the trade secret's owner has taken steps to maintain its secrecy, the trade secret is protected against misappropriation. Trade secret protection begins by identifying all the information that must be protected—from undisclosed patent applications to market research and business plans—and developing a comprehensive strategy for keeping the information secure. Trade secret law protects only against the misappropriation of trade secrets.

Cyberespionage

involves the deployment of malware that secretly steals data in the computer systems of organizations, such as government agencies, military contractors, political organizations, and manufacturing firms

Smishing

is a variation of phishing that involves the use of texting. In a smishing scam, people receive a legitimate-looking text message telling them to call a specific phone number or log on to a website.

Vishing

is an exploit in which victims receive a voicemail message telling them to call a phone number or access a website. It is similar to smishing.

Smishing

is another variation of phishing that involves the use of texting. In a smishing scam, people receive a legitimate-looking text message telling them to call a specific phone number or log on to a website.

Phishing

is the act of fraudulently using email to try to get the recipient to reveal personal data.

Cyberterrorism

is the intimidation of government or civilian population by using information technology to disable critical national infrastructure (e.g., energy, transportation, finance, law enforcement, and emergency response) to achieve political, religious, or ideological goals

Cyberloafing

is using the internet for purposes unrelated to work, such as posting to Facebook, sending personal emails or instant messages, or shopping online.

Morals

is/are one's personal beliefs about what is right and wrong.

A ___________ hires the employees of its clients and then assumes responsibility for all human resource functions. If this arrangement is terminated, the workers continue to be employed by the client company.

professional employer organization (PEO)

Where can one find a number of security-related policy templates that can help an organization develop effective security policies quickly?

sans.org This website is the website for the Sysadmin, Audit, Network, and Security (SANS) Institute.

With proper _____, fraud would then require the collusion of two or more parties.

separation of duties A fundamental concept of good internal controls is the careful separation of duties associated with any process that involves the handling of financial transactions so that different aspects of the process are handled by different people.

Coemployment legal problems with offshore outsourcing are minimal because

the company that contracts for the services does not generally supervise or control the contractor's employees

What does qui tam mean?

to sue on behalf of the king as well as for himself; to identify fraud by government contractors

What is social media?

web-based communication channels and tools that enable people to interact with each other by creating online communities in which they can share information, ideas, messages, and other content, including images, audio, and video. There are several websites like Facebook, LinkedIn, Twitter, and others that allow people and businesses to connect to each other with their own strengths and focuses.


Kaugnay na mga set ng pag-aaral

microsoft network admin 2 chapter 12 test

View Set

28 - The Persian Wars Study Guide

View Set

English 101 final exam (2022, Dr. Holt)

View Set

Essentials of Networking Modules 1, 2, 3

View Set

Business Law Final Exam, BLAW FINAL FOR TEST 111

View Set

FA 3 - Employee Engagement and Retention

View Set