ISYS 363 Ethics and Privacy Concerns
The ethical concerns of the digital age can be divided into ___ dimensions (categories).
5
Select two examples of the direct inquiry method of data collection. Multiple select question. A fitness app that tracks your workouts A loyalty card that awards points for every purchase A web beacon that tracks Wi-Fi enabled phones A company purchases a list of potential buyers
A fitness app that tracks your workouts A loyalty card that awards points for every purchase
Match the intellectual property with the device that protects it.
A portrait that you paint. --> Copyright paintings) A new type of flower that you invent. --> Patent The logo of your company. --> Trademark
In the settings area of each browser you should consider adjusting which three of the following?
Deleting cookies Blocking or customizing your cookie settings Deciding from which sites you want to allow cookies
Select three categories of intellectual property.
Trade secrets Copyrights Patents
The principle of ethical conduct that states that a manager must attempt to determine if this decision is fair for all involved is the ___ principle
universalist
Select three true statements regarding protecting big data. Multiple select question. Many small business have transitioned from using cloud storage to on-site data storage. Adherents argue that cloud service providers have security measures that far exceed the data security capabilities of small businesses. One advantage of cloud storage is that it greatly reduces the human factor in data protection. Over half of all data breaches can be traced to human error.
Adherents argue that cloud service providers have security measures that far exceed the data security capabilities of small businesses. One advantage of cloud storage is that it greatly reduces the human factor in data protection. Over half of all data breaches can be traced to human error.
A computer program that scans files to identify and remove computer viruses and other malicious programs is called _____.
Antivirus software
Select three of steps included in the 5 steps of an ethical analysis. Multiple select question. Getting all the pertinent facts. Determining who is affected. Searching for precedents. Setting a strong example.
Getting all the pertinent facts. Determining who is affected. Searching for precedents.
Match the intellectual property with its protection. Instructions Drag and drop application. Invention Novel Logo Patent Copyright Trademark
Invention -> Patent Novel -> Copyright Logo -> Trademark
The principle of ethical conduct that attempts to distribute rewards equitably to individuals based on their level of effort or productivity level is called the principle of distributive __. The principle of ethical conduct that attempts to distribute rewards equitably to individuals based on their level of effort or productivity level is called the principle of distributive __. drop zone empty. Fairness Ethics Justice Morality
Justice
This principle asks the decision-maker to consider what a highly moral person would do when faced with this question.
Principle of Virtue
The dimension (category) of ethical concerns in the digital age that refers to determining what constitutes proper levels of protection of digital information is called establishing __.
Standards
Which law, passed after the 9/11 attacks allowed law enforcement to obtain information about online and offline communications related to terrorist activities without a warrant.
The US PATRIOT Act/USA Freedom Act
Which principle of ethical conduct states that when faced with an ethical dilemma the manager should choose the option that does the greatest good for the most involved?
The Utilitarian Principle
Match the privacy protection technique with its description. Instructions Drag and drop application. These programs use a variety of techniques to identify and remove viruses and malware. This keeps your computer from storing cookies, but doesn't securely hide your identity beyond the device because your IP address can still be tracked. This essentially hides your IP address to outside websites by running your communications through a secure network. Checking your FICO score from each different agency every four months and watching for unusual activity. Credit monitoring Private browsing Virtual private network (VPN) Anti-virus software
These programs use a variety of techniques to identify and remove viruses and malware. -> Anti-virus software This keeps your computer from storing cookies, but doesn't securely hide your identity beyond the device because your IP address can still be tracked. -> Private browsing This essentially hides your IP address to outside websites by running your communications through a secure network. -> Virtual private network (VPN) Checking your FICO score from each different agency every four months and watching for unusual activity. -> Credit monitoring
You own a real estate brokerage and need a list of high-income residents. You buy the list from a data marketing company. This is called ___.
Third party data purchase
Select the three correct statements regarding credit monitoring. Multiple select question. Three major credit agencies, TransUnion, Equifax, and Experian provide credit reports to lenders. Checking your own credit score is referred to as making a "soft inquiry" and does not affect your credit rating. An easy way to monitor your credit rating is simply to order your FICO score from each different agency every four months and check for unusual activity. Every time you check your credit score it causes your score to drop slightly.
Three major credit agencies, TransUnion, Equifax, and Experian provide credit reports to lenders. Checking your own credit score is referred to as making a "soft inquiry" and does not affect your credit rating. An easy way to monitor your credit rating is simply to order your FICO score from each different agency every four months and check for unusual activity.
Due to the lack of normalized laws, it is important to use discretion on the Internet when traveling or living abroad.
True
Select two important considerations for managing cookies.
Users should determine what cookie settings is appropriate for your browser use and privacy protection. Users should be aware that cookie settings must be adjusted in each browser.
Select two reasons why a credit card offers more protection than a debit card when shopping online. Multiple select question. Using your debit card can give hackers direct access to your checking accounts. With a debit card you can earn more reward points With a credit card you have a layer of security between your cash and hackers on the Internet. A debit card has a maximum liability of $50.
Using your debit card can give hackers direct access to your checking accounts. With a credit card you have a layer of security between your cash and hackers on the Internet.
This principle simply states that when faced with an ethical dilemma the manager should choose the option that does the greatest good for the most involved.
Utilitarian Principle
Select three privacy concerns associated with cookies.
Websites that use cookies can collect information about surfing habits and sell that information to a variety of third-parties. Corporate and government entities can use cookies to monitor your surfing behavior. Websites can use cookies to track your surfing behavior and use this information to create specific user profiles.
A form of protection for original works of literature is called a ___.
copyright
A form of protection provided by the laws of the United States for "original works of authorship", including literary, dramatic, musical, architectural, cartographic, choreographic, pantomimic, pictorial, graphic, sculptural, and audiovisual creations is called a
copyright
If you believe you are at significant risk of fraud, for example, if you have been the victim of a data breach, you should consider ___ purchasing
credit
Raw facts that describe the characteristics of an event, object, or set of information that can be entered into a computer is
data
The final step when making an ethical analysis is to make a decision and to prepare for the consequences. Preceding this is the fourth step, which has the manager ___ . The final step when making an ethical analysis is to make a decision and to prepare for the consequences. Preceding this is the fourth step, which has the manager ___ . drop zone empty. determining who is affected searching for precedents listing options getting pertinent facts
listing options
Childhood obesity may be associated with the increased use of video games. Which dimension of ethical concerns in the digital age would examine this issue?
matches Choice Quality of life
Several large corporations purchase and sell consumer data. This is referred to as third ___ data collection.
party
The law passed in 1986 that protects email and VoIP communications by making it illegal to intercept calls or messages without a warrant is The Electronic Communications ___ Act.
privacy
The principle of ethical conduct that states that some decisions are either morally right or morally wrong is called the principle of moral ___
rights
The Act that outlines a plan to protect government information and assets against cyber threats and requires each federal agency to develop a plan for information security is The Federal Information ___ Act
security