Chapter 12 SOCIAL RESPONSIBILITY AND ETHICS IN MANAGEMENT

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

An example of a hacking job motivated by retaliation is:

A person hacks a government website to act against inaction by the government.

Cybersecurity experts recommend including which essential elements for an incident-response plan for cyberattacks?

All of these answers are correct: Support from executive leadership. Involvement by all functional departments. Focus on how to respond to a breach.

The use of robotics in the workplace has increased recently because:

All of these answers are correct: The cost of robots has decreased. Robots are more reliable than people. New collaborative machines have been invented.

Downloading illegal files, spreading computer viruses, and stealing from online bank accounts is collectively referred to as:

Cybercrime.

The idea that every distribution channel must work together to deliver a unified and consistent customer experience is called:

Omnichannel.

As of 2016 what was the average cost of a data breach in the United States?

$7 million.

A critical characteristic of a successful CIO is:

A leader with the ability to speak the language of the business.

The ability of a digital computer or computer-controlled robot to perform tasks commonly associated with intelligent beings is called:

Artificial intelligence.

Restrictive governments often reduce or eliminate citizen access to the Internet and social media sites in order to:

Both of these answers are correct: Increase bandwidth for government usage; and suppress political dissent.

MIT researchers determined that 90 percent of shopper's credit-card transactions could be used to:

Both to uniquely identify an individual's shopping habits and preferences and to identify an individual shopper using only four bits of secondary information.

A CIO is the company's:

Chief information officer.

One major advantage of conducting business online is:

Cost-effective marketing and promotions

This annual international gathering on January 28 brought together leaders from the U.S. and dozens of European countries to address the global nature of cyberattacks:

Data Privacy Day.

This Act makes it a crime to circumvent antipiracy measures built into most commercial software agreements between the manufacturers and their users:

Digital Millennium Copyright Act.

Buying and selling goods and services electronically is called:

E-business.

One of the biggest challenges for autonomous vehicle manufacturers, according to the case The Arrival of Autonomous Cars—Bright Future or Looming Threat? was:

Ensuring the vehicles were safer than driver-controlled automobiles.

The EU law passed in 2018 that required companies to promptly report personal data breaches was called:

General Data Protection Regulation.

Software piracy is a major problem in which part of the world?

Globally.

Over time the role of the CIO:

Has become more integrated into the overall strategic direction of the firm.

One ethical concern about businesses collecting vast amounts of stakeholder data is:

If the effort actually benefits the stakeholders.

The purpose of the right to be forgotten is to:

Increase protection of privacy and personal information.

Increased cyber activity by which countries prompted NATO officials to brand them as "patriotic hackers"?

Iran and China.

The role of the CIO includes all of these tasks except:

Monitoring the appropriate level of employee productivity.

According to McKinsey and Company, which position cannot be easily replaced with robots?

Team managers.

According to an Oxford University study, what percentage of current jobs were expected to be overtaken by robots in the next two decades?

About 50 percent.


Ensembles d'études connexes

Manage Microsoft 365 subscription and tenant health

View Set

CH 17 White collar crime Computer related

View Set

Chapter 28: Management of Patients with Structural, Infectious and Inflammatory Cardiac Disorders: Part 3

View Set

Surgery (3) اسئلة الامتياز

View Set

Chapter 5: Devices and Infrastructure 5.9-5.13

View Set