Adaptive Learning Assignment - Ethics and Privacy Concerns

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

When the government grants an inventor the right to exclude others from the use of the invention for a period of time, this is called a

patent

The federal law that protects person-to-person wire, oral, and electronic communications and also includes a variety of network crime statutes that include identity theft and unlawful access to stored communications is The ___ Act

Wiretap

The ethical concerns of the digital age can be divided into ___ dimensions (categories).

5

There are ___ basic principles of ethical conduct.

5

Select two examples of the direct inquiry method of data collection. A company purchases a list of potential buyers A web beacon that tracks Wi-Fi enabled phones A fitness app that tracks your workouts A loyalty card that awards points for every purchase

A fitness app that tracks your workouts A loyalty card that awards points for every purchase

Select two common methods of using indirect tracking to gather data. A mobile game app uploads your phone's browser activity A rating site asks for your opinion of a local restaurant A cookie tracks your purchasing searches Your grocery store loyalty card tracks your purchase

A mobile game app uploads your phone's browser activity A cookie tracks your purchasing searches

Which three of the following are considered intellectual property and entitled to protection? A mural that you painted. An idea that you conceived. A song that you wrote. A story that you published.

A mural that you painted. A song that you wrote. A story that you published.

Select the three correct statements regarding patents. In the U.S., patents are granted by the Federal Trade Commission. A patent will only be granted for something that is useful. To qualify for a patent, the invention must be non-obvious, meaning that a skilled artisan would find the invention surprising or unexpected. To qualify for a patent, the invention must be novel, or different, from other similar inventions.

A patent will only be granted for something that is useful. To qualify for a patent, the invention must be non-obvious, meaning that a skilled artisan would find the invention surprising or unexpected. To qualify for a patent, the invention must be novel, or different, from other similar inventions.

Which type of cookie is lost only if deleted or if is created with an expiration date?

A persistent cookie

Select the three correct statements regarding credit monitoring. An easy way to monitor your credit rating is simply to order your FICO score from each different agency every four months and check for unusual activity. Checking your own credit score is referred to as making a "soft inquiry" and does not affect your credit rating. Every time you check your credit score it causes your score to drop slightly. Three major credit agencies, TransUnion, Equifax, and Experian provide credit reports to lenders.

An easy way to monitor your credit rating is simply to order your FICO score from each different agency every four months and check for unusual activity. Checking your own credit score is referred to as making a "soft inquiry" and does not affect your credit rating. Three major credit agencies, TransUnion, Equifax, and Experian provide credit reports to lenders.

Which two of the following are examples of an organization using big data and analyzing predictive behavior with the goal of creating new offerings? An in-home healthcare provider tracks the hospital readmission rates of elderly people who live alone after they received care for falling in their home. DropBox tracks how many people subscribe to their services after viewing a specific marketing e-mail. Target keeps track of how many shoppers visit their stores on Sundays. Netflix tracks what users who viewed all three seasons of Stranger Things also had in their queues.

An in-home healthcare provider tracks the hospital readmission rates of elderly people who live alone after they received care for falling in their home. Netflix tracks what users who viewed all three seasons of Stranger Things also had in their queues.

A computer program that scans files to identify and remove computer viruses and other malicious programs is called _____.

Antivirus software

In analyzing transactions, Walmart discovered that many people who buy Children's Tylenol in their stores also buy orange juice in the same transaction. They used this information to discount Children's Tylenol but raise the price of orange juice during flu season. What is the name of the approach Walmart used to discover this information?

Big data

In the settings area of each browser you should consider adjusting which three of the following? Blocking or customizing your cookie settings Adjusting your firewall settings Deciding from which sites you want to allow cookies Deleting cookies

Blocking or customizing your cookie settings Deciding from which sites you want to allow cookies Deleting cookies

Select two ways managers encourage employees to act unethically. By accepting a higher salaries than their employees. By not enforcing strong ethical behavior. By failing to act ethically themselves. By setting high ethical standards and enforcing them rigorously.

By not enforcing strong ethical behavior. By failing to act ethically themselves.

Managers must protect the online ___ of employees and organization stakeholders.

Choice privacy

Which two of the following can be awarded copyright protection? Choreography Names Procedures Sculptures

Choreography Sculptures

Select the dimension (category) of ethical behavior that is illustrated by the following concern. Fourteen-year-olds are interested in cannabis shops but a state has determined that in order to view the websites of these shops you must be at least 21. How should this be managed and who should be responsible in case of violations?

Control and accountability

This is a small text file of information created by websites you visit that your web browser stores on your hard disk.

Cookie

Match the intellectual property with the device that protects it. A portrait you paint A new of type of flower you invent The logo of your company

Copyright Patent Trademark

To determine the interest rate you will be charged or the amount of money you are qualified to borrow, lenders will check your ___.

Credit report

Because it is difficult to trace and it is accessible through any Internet connected device, cyber criminals often request payment in ___ .

Cryptocurrency

Which two of the following are examples of ethical concerns that have been created as a result of new technologies? Shoplifting Cyberbullying Digital piracy Insurance fraud

Cyberbullying Digital piracy

Select three of steps included in the 5 steps of an ethical analysis. Setting a strong example. Determining who is affected. Searching for precedents. Getting all the pertinent facts.

Determining who is affected. Searching for precedents. Getting all the pertinent facts.

When you order a pizza online and are asked to provide your address, the company stores this information. This manner of data collection is referred to as ___.

Direct inquiry

Select three common methods in which organizations collect data. Indirect tracking Third-party data purchase Predictive analysis Direct inquiry

Direct inquiry Indirect tracking Third-party data purchase

Select three common methods in which organizations collect data. Predictive analysis Direct inquiry Third-party data purchase Indirect tracking

Direct inquiry Third-party data purchase Indirect tracking

Your organization has set strict policies prohibiting the use of company computers for personal activities. Which of the following policy violations would also be an illegal activity?

Distributing company-owned software without authorization.

Which of the following statements accurately describes spyware? More than one answer may be correct. Spyware captures private information by monitoring how users interact online. Browsing history is a common way users are exposed to spyware. Downloading software or documents from unvetted sources is one way spyware can be installed. Spyware can be replicated and passed from user to user.

Downloading software or documents from unvetted sources is one way spyware can be installed. Spyware captures private information by monitoring how users interact online.

Determining how much time employees should be allowed to browse their social media sites while at work falls under which dimension of ethical behavior in the digital age?

Establishing standards

Acting with high morals means you live a virtuous life, while your ___ provide a rational framework for your morals.

Ethics

T/F: Changing cookie settings in one browser (Chrome, for example) will automatically change your cookie settings in your other browsers (Safari, Firefox, Edge, for example).

False

Select the first step in the five steps of an ethical analysis.

Getting the facts

A Wi-Fi tracker follows a shopper's path from store to store.

Indirect tracking

Which dimension of ethical behavior in the digital age is represented by the following question? You are interviewing 3 applicants for a management position in your firm and wish to ensure that they will represent your company with professionalism and maturity. Should you check the applicants' social media sites prior to making your hiring decision?

Information Privacy Rights

Match the issue with the appropriate dimension (category) of ethical behavior in the digital age. A friend calls and says she is interviewing a former employee of yours. She asked if he used many sick days. Can you provide this information? Your gym provides child care during your spinning class. Can the care play a Disney movie for the toddlers? As a manager, you are entitled to 2 PTO (paid time off) days per month. Your boss encourages to use this time off and only asks that you check your email once per day to answer employee questions.

Information Privacy Rights Copyrights and Intellectual Property Rights Quality of Life

Select three correct statements regarding international Internet privacy laws. It is very difficult to get nations across the globe to agree on standardized Internet privacy laws. Internet users can be assured of their privacy when traveling in Europe. The European Union (EU) European Commission Data Protection Directive states that under EU law, personal data can only be gathered legally under strict conditions. International laws on Internet privacy vary greatly.

It is very difficult to get nations across the globe to agree on standardized Internet privacy laws. The European Union (EU) European Commission Data Protection Directive states that under EU law, personal data can only be gathered legally under strict conditions. International laws on Internet privacy vary greatly.

Select two concerns that fall into the dimension of establishing standards in the digital age. Lynn checks her personal social media sites approximately 16 times per day while she is at work. Is this too much? Craig observes his daughter becoming depressed after increasing her time on social media. A hotel allows employees to use its Wi-Fi to stream audio and video while they are working. Should the amount of streaming be limited? Maria notices that a band has recorded one of her copyrighted songs without her permission.

Lynn checks her personal social media sites approximately 16 times per day while she is at work. Is this too much? A hotel allows employees to use its Wi-Fi to stream audio and video while they are working. Should the amount of streaming be limited?

Along with the employee, which of the following is most responsible for an employee's ethical behavior?

Management

Select three steps you can take to help to safeguard your privacy in the digital age. Use the same strong password on all accounts Monitor your credit reports Incorporate anti-virus protection Practice safe online purchasing techniques

Monitor your credit reports Incorporate anti-virus protection Practice safe online purchasing techniques

Which two of the following guidelines should you follow when reporting a co-worker's computer ethics violations. Report activity that others have witnessed and reported to you. Only report incidences that you have personally witnessed. Be brief and remember that your employer probably did not hire you monitor inappropriate computer use. If in doubt, report the activity.

Only report incidences that you have personally witnessed. Be brief and remember that your employer probably did not hire you monitor inappropriate computer use.

A checkbox may ask if you want to receive news and updates, or participate in surveys from the site. When creating or browsing websites, this checkbox is referred to as an ___.

Opt-in and Opt-out

Select three true statements regarding protecting big data. Over half of all data breaches can be traced to human error. Adherents argue that cloud service providers have security measures that far exceed the data security capabilities of small businesses. One advantage of cloud storage is that it greatly reduces the human factor in data protection. Many small business have transitioned from using cloud storage to on-site data storage.

Over half of all data breaches can be traced to human error. Adherents argue that cloud service providers have security measures that far exceed the data security capabilities of small businesses. One advantage of cloud storage is that it greatly reduces the human factor in data protection.

Cookies are stored on the hard drive and are not lost when the web browser is closed are called ___ cookies.

Persistent

This principle asks the decision-maker to consider what a highly moral person would do when faced with this question.

Principle of Virtue

The law passed in 1986 that protects email and VoIP communications by making it illegal to intercept calls or messages without a warrant is The Electronic Communications ___ Act

Privacy

Ethical challenges raised by the use of information systems fall into 5 dimensions (categories). Which 3 of the following are included in these 5 dimensions? Quality of life Honesty of content Information privacy rights Copyright and intellectual property rights

Quality of life Information privacy rights Copyright and intellectual property rights

The Act that outlines a plan to protect government information and assets against cyber threats and requires each federal agency to develop a plan for information security is The Federal Information ____ Management Act

Security

A type of cookie, sometimes called a transient cookie, that is not stored but just kept in memory when a user visits a website is called a ____ cookie

Session

What type of cookie is stored in temporary memory and is lost when the web browser is closed?

Session

Which three of the following can encourage ethical computer use in the workplace? Setting a good example Remote desktop software Employee monitoring software Promoting synergies

Setting a good example Remote desktop software Employee monitoring software

Which of the following is not one of the steps included in the 5 steps of an ethical analysis? Setting a strong example. Getting all the pertinent facts. Searching for precedents. Determining who is affected.

Setting a strong example.

Select two common techniques used by anti-virus software to identify malware. Packet-based detection Activity-based detection Signature-based detection Heuristic-based detection

Signature-based detection Heuristic-based detection

Will the decision impact the privacy or property rights of any individuals or corporations? This question should be asked in which step of the 5 steps of an ethical analysis.

Step 2 - Determining the affected.

Kevin needs to create a password to access his bank's online banking system. He is considering the passwords below. Which is most secure?

Sxf6512@fg%

Which Act, signed into law in December 2015, allows companies to share cyber-security threat information with the U.S. government?

The Cybersecurity Information Sharing Act

Which of the following allows, but does not require, private companies to warn the U.S. government about cyber-security threats?

The Cybersecurity Information Sharing Act

The laws that were created to update copyright laws dealing with the issues of regulating digital material in accordance with World Intellectual Property Organization treaties is called:

The Digital Millennium Copyright Act (DMCA)

Which law or set of laws implements two World Intellectual Property Organization (WIPO) treaties and was created to update copyright laws dealing with the issues of regulating digital material.

The Digital Millennium Copyright Act (DMCA)

Which law, passed in 1986, protects email and VoIP communications by making it illegal to intercept calls or messages without a warrant.

The Electronic Communications Privacy Act

This Act outlines a plan to protect government information and assets against cyber threats. It requires each federal agency to develop a plan for information security.

The Federal Information Security Management Act

Which principle of ethical conduct attempts to distribute rewards equitably to individuals based on their level of productivity?

The Principle of Distributive Justice

Which principle of ethical conduct states that there exist certain moral values that should always be upheld or never be violated.

The Principle of Moral Rights

What Act was enacted to monitor terrorist activities and communications following the 9/11 attacks and the 2001 Anthrax attack on Congress?

The US PATRIOT Act/USA Freedom Act

Which law, passed after the 9/11 attacks allowed law enforcement to obtain information about online and offline communications related to terrorist activities without a warrant.

The US PATRIOT Act/USA Freedom Act`

Which principle of ethical conduct states that a manager must attempt to determine if a decision is fair for all involved.

The Universalist Principle

Which principle of ethical conduct states that when faced with an ethical dilemma the manager should choose the option that does the greatest good for the most involved?

The Utilitarian Principle

The Act that protects person-to-person wire, oral, and electronic communications is ___.

The Wiretap Act

This federal law protects person-to-person wire, oral, and electronic communications.

The Wiretap Act

Many sales managers, including those in information technology-related fields, use commissions in an attempt to incentivize productivity and to reward more successful salespeople. The principle of ethical conduct that this exemplifies is ___.

The principle of distributive justice

Which statement encompasses the third step of the five-step process of an ethical analysis?

There is an extremely good chance that other managers, perhaps in your own organization, have faced similar dilemmas.

Companies that purchase consumer behavior information from other organizations are engaged in ___.

Third party data purchase

You own a real estate brokerage and need a list of high-income residents. You buy the list from a data marketing company. This is called ___.

Third party data purchase

Select the three correct statements regarding patents. To qualify for a patent, the invention must be novel, or different, from other similar inventions. A patent will only be granted for something that is useful. In the U.S., patents are granted by the Federal Trade Commission. To qualify for a patent, the invention must be non-obvious, meaning that a skilled artisan would find the invention surprising or unexpected.

To qualify for a patent, the invention must be novel, or different, from other similar inventions. To qualify for a patent, the invention must be non-obvious, meaning that a skilled artisan would find the invention surprising or unexpected. A patent will only be granted for something that is useful.

Select three categories of intellectual property. Trade secrets Patents Ideas Copyrights

Trade secrets Patents Copyrights

T/F: Due to the lack of normalized laws, it is important to use discretion on the Internet when traveling or living abroad.

True

Which three of the following are widely used tactics that can help keep you safe on the Web? Use your browser's private browsing mode. Make sure the sites you visit use HTTPS if entering personal information Use a debit card rather than a credit card when making online purchases. Consider using a VPN

Use your browser's private browsing mode. Make sure the sites you visit use HTTPS if entering personal information Consider using a VPN

This principle simply states that when faced with an ethical dilemma the manager should choose the option that does the greatest good for the most involved.

Utilitarian Principle

Which three of the following situations involve information privacy rights? Multiple select question. You allow an employee to take 2-hour lunch breaks because her daughter is receiving chemotherapy. Can you tell her colleagues why she is getting the special treatment? An employee has some paid/personal time off due and asks if she can take Friday and Monday off. You say it's fine, but only if she can spare 45 minutes to join a Zoom meeting with an important client Monday morning. Your neighbor has a history of abusing children, do you have a right to know this? One of your new-hires has a large Twitter following under a pseudonym. Should you let your boss know?

You allow an employee to take 2-hour lunch breaks because her daughter is receiving chemotherapy. Can you tell her colleagues why she is getting the special treatment? Your neighbor has a history of abusing children, do you have a right to know this? One of your new-hires has a large Twitter following under a pseudonym. Should you let your boss know?

Which two of the following describe concerns that might be categorized in the ethical dimension of quality of life You need to use airport restroom but the stalls are all occupied by people using their smartphones. Craig observes that his daughter's growing depression seems exacerbated by the amount of time she spends on social media sites. A painting you created was copied and being sold without your consent. You're annoyed by a colleague who spends inordinate amounts of time shopping online during working hours.

You need to use airport restroom but the stalls are all occupied by people using their smartphones. Craig observes that his daughter's growing depression seems exacerbated by the amount of time she spends on social media sites.

Encouraging communication with minimal barriers can help to ensure that management has the pulse of the organization. Managers should ensure that a system exists in which employees can report malfeasance to their superiors ____

anonymously

Methodologies that attempt to deal with the vast amount of complex information that accumulates at high, and accelerating, velocity use ___ data.

big

Predicting the impact of weather phenomenon of transportation routes, allowing logisticians to anticipate risks and the associated expense involved, is an example of organizational use of ___.

big data

The purpose of spyware is to

capture the user's account data, passwords, key strokes, and more

A major transition in the big data security sector is to move all data storage to ___ storage

cloud

When facing a moral dilemma, it is useful to be aware of the five principles of ethical ___

conduct

The dimension (category) of ethical dilemmas that examines how individuals or corporations can be held responsible in case of violations of privacy or intellectual property rights is referred to ____ and accountability.

control

When you revisit a website, your browser will send the website's ____ (a small text file) to the Web server that uses this information to customize and optimize your experience.

cookie

Small text files created by websites you visit that your web browser stores on your hard disk are called _____.

cookies

A form of protection for original works of literature is called a ___.

copyright

A form of protection provided by the laws of the United States for "original works of authorship", including literary, dramatic, musical, architectural, cartographic, choreographic, pantomimic, pictorial, graphic, sculptural, and audiovisual creations is called a ____.

copyright

If you believe you are at significant risk of fraud, for example, if you have been the victim of a data breach, you should consider purchasing ___ monitoring

credit

Insurance companies use big ___ in actuarial analysis in order to more accurately estimate risk, often lowering the cost of their services.

data

Raw facts that describe the characteristics of an event, object, or set of information that can be entered into a computer is

data

After getting all the pertinent facts, the next step in making an ethical analysis is to ___ .

determine the affected

Customers are offered a free dessert if they complete a survey. This method of data collection is referred to as ____ inquiry

direct

The U.N. General Assembly adopted resolution 68/167 in December 2013 that affirms that the rights held by people offline must also be protected online, and it called upon all Member States (nations) to respect and protect the right to privacy in digital communication. This means that ___

even though it sounds good, Internet users should be aware that digital privacy is not honored by many on the Internet.

Getting all the pertinent ___ is the first step in an ethical analysis.

facts

Direct inquiry, indirect tracking, and 3rd party data purchase are three common methods of ___ data.

finding

Property rights that allow creators to profit from their work, thereby encouraging creativity, are called ____ property rights.

intellectual

A form of spyware that records all actions typed on a keyboard is called a ___ logger

keystroke

A starting point to investigate the complex topic of a society's ethics is first to understand the society's _____ and the history behind the enacting of them.

laws

The final step when making an ethical analysis is to make a decision and to prepare for the consequences. Preceding this is the fourth step, which has the manager ___ .

listing options

Management can discourage the inappropriate use of business computers by publicly announcing that their organization uses employee ____ software or remote desktop software.

monitoring

Which amendment to the U.S. Constitution protects freedom of speech from government censorship?

one

If you are downloading a game or software onto a device, there may be an empty box asking you to check the box to agree to Terms of Use and the site's Privacy Policy. This checkbox is called a(n) ___ in

opt

The fourth step in the process of making an ethical analysis is to list ___

options

Cookies that are created by a website other than the one you are currently visiting and are used to track your surfing habits are called third- ___ cookies. These cookies are considered an invasion of privacy.

party

Computer ethics violations fall in two major categories; illegal activity and organizational ___ violations

policy

Computer ethics violations fall in two major categories; illegal activity and organizational ____ violations

policy

The third step in the five-step process of conducting an ethical analysis is searching for ___

precedents

An important part of an ethical analysis is to prepare for the consequences of the decision, many of which may be unintended. Part of this preparation should include __.

preparing to defend your decision

A wide-ranging term that refers to a variety of considerations including; how data and information is used, who has access to data and information, the techniques and technologies used to protect sensitive and private data, communications, and preferences is Internet ___.

privacy

Monitoring your credit, creating strong passwords, using anti-virus protection, and practicing safe browsing techniques are methods of protecting your personal ____ while using the Internet

privacy

Monitoring your credit, creating strong passwords, using anti-virus protection, and practicing safe browsing techniques are methods of protecting your personal ____ while using the Internet.

privacy

Many users enjoy the protection that a VPN provides. VPN stands for virtual ___ network

private

Studies indicate that the more time teens spend on social media the more likely they are to suffer from depression. This concern falls in the ethical dimension of ____ of life

quality

The principle of ethical conduct that states that some decisions are either morally right or morally wrong is called the principle of moral ___

rights

The software code of a particular computer virus is called the virus

signature

Keystroke loggers and packet analyzers (sniffers) are two common types of ___.

spyware

Data that has a defined length, type, and format, including items as numbers, dates, or strings such as a customer profile is referred to as ___ data.

structured

Even though the Child Online Protection Act of 1998 was sponsored by both Democrats and Republicans and was passed by both Houses of Congress and signed into law by President Clinton, you cannot be punished for violating law because ___

the law violated the 1st Amendment (freedom of speech) rights and was found unconstitutional.

Cookies that are created by a website other than the one you are currently visiting and are used to track your surfing habits are known as ___ cookies.

third-party

Part of making an ethical decision is understanding that your decision will most like result in ___ .

unintended consequences

The principle of ethical conduct that states that a manager must attempt to determine if this decision is fair for all involved is the ___ principle

universalist

The principle of ethical conduct that states that you should think of someone you truly admire, perhaps a mentor, and ask yourself what decision they would make is the principle of ____

virtue


Ensembles d'études connexes

Chapter 39: Drugs Used in Obstetrics

View Set

Chapter 39: Activity and Exercise

View Set

nitrogenous bases, their main differences, phosphate group & sugar

View Set

Thirteen logical reasoning question types

View Set

MGMT 320 Chapter 5 Click and Drag Connect

View Set

AP Physics midterm MC (no graphs)

View Set

Discrete Math Midterm 2 Practice Problems

View Set