Chapter 9 ALA - Ethics & Privacy

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which two of the following are examples of an organization using big data and analyzing predictive behavior with the goal of creating new offerings?

An in-home healthcare provider tracks the hospital readmission rates of elderly people who live alone after they received care for falling in their home. Netflix tracks what users who viewed all three seasons of Stranger Things also had in their queues.

Childhood obesity may be associated with the increased use of video games. Which dimension of ethical concerns in the digital age would examine this issue?

Quality of life

Which law, passed in 1986, protects email and VoIP communications by making it illegal to intercept calls or messages without a warrant.

The Electronic Communications Privacy Act

This principle simply states that when faced with an ethical dilemma the manager should choose the option that does the greatest good for the most involved.

Utilitarian Principle

Select two major types of patents.

Utility Design

Select three privacy concerns associated with cookies.

Websites that use cookies can collect information about surfing habits and sell that information to a variety of third-parties. Websites can use cookies to track your surfing behavior and use this information to create specific user profiles. Corporate and government entities can use cookies to monitor your surfing behavior.

A starting point to investigate the complex topic of a society's ethics is first to understand the society's _____ and the history behind the enacting of them.

law or laws

In analyzing transactions, Walmart discovered that many people who buy Children's Tylenol in their stores also buy orange juice in the same transaction. They used this information to discount Children's Tylenol but raise the price of orange juice during flu season. What is the name of the approach Walmart used to discover this information?

Big Data

Select two ways managers encourage employees to act unethically.

By failing to act ethically themselves. By not enforcing strong ethical behavior.

Which three of the following situations involve information privacy rights?

One of your new-hires has a large Twitter following under a pseudonym. Should you let your boss know? You allow an employee to take 2-hour lunch breaks because her daughter is receiving chemotherapy. Can you tell her colleagues why she is getting the special treatment? Your neighbor has a history of abusing children, do you have a right to know this?

When the government grants an inventor the right to exclude others from the use of the invention for a period of time, this is called a _______.

Patent

Cookies are stored on the hard drive and are not lost when the web browser is closed are called ___ cookies.

Persistent

This principle asks the decision-maker to consider what a highly moral person would do when faced with this question.

Principle of Virtue

Property rights that allow creators to profit from their work, thereby encouraging creativity, are called property rights.

intellectual

With regard to Internet privacy, the First Amendment to the U.S. Constitution is relevant because ___

it provides freedom of speech protection that extends to the Internet which means there is little government filtering of content.

Select three of steps included in the 5 steps of an ethical analysis.

1. Getting all the pertinent facts 2. Determining who is affected 3. Searching for precedents 4. Listing and researching options 5. Making a decision and preparing for the consequences of the decision

Studies indicate that the more time teens spend on social media the more likely they are to suffer from depression. This concern falls in the ethical dimension of ______ of life.

1. information privacy rights 2. copyright and intellectual property rights 3. control and accountability 4. establishment of quality standards of privacy protection 5. quality of life quality

Which amendment to the U.S. Constitution protects freedom of speech from government censorship?

1st

The ethical concerns of the digital age can be divided into _____ dimensions (categories).

5

Select two examples of the direct inquiry method of data collection.

A loyalty card that awards points for every purchase A fitness app that tracks your workouts

Which Act, signed into law in December 2015, allows companies to share cyber-security threat information with the U.S. government?

Choice The Cybersecurity Information Sharing Act

Direct inquiry, indirect tracking, and 3rd party data purchase are three common methods of bigField 1Field 1 big , Incorrect Unavailable data.

Collecting, gathering, getting, obtaining, or finding

Select the dimension (category) of ethical behavior that is illustrated by the following concern. Fourteen-year-olds are interested in cannabis shops but a state has determined that in order to view the websites of these shops you must be at least 21. How should this be managed and who should be responsible in case of violations?

Control and accountability

When you revisit a website, your browser will send the website's __ (a small text file) to the Web server that uses this information to customize and optimize your experience.

Cookie

Match the intellectual property with the device that protects it. A portrait that you paint. A new type of flower that you invent. The logo of your company.

Copyright Patent Trademark

Because it is difficult to trace and it is accessible through any Internet connected device, cyber criminals often request payment in ___

Cryptocurrency

Which two of the following are examples of ethical concerns that have been created as a result of new technologies?

Digital piracy Cyberbullying

When you order a pizza online and are asked to provide your address, the company stores this information. This manner of data collection is referred to as ___.

Direct Inquiry

Which of the following statements accurately describes spyware? More than one answer may be correct.

Downloading software or documents from unvetted sources is one way spyware can be installed. Spyware captures private information by monitoring how users interact online.

Determining how much time employees should be allowed to browse their social media sites while at work falls under which dimension of ethical behavior in the digital age?

Establishing standards

A religious leader might instruct you on how to uphold high morals, but the reasons for acting morally are based on your ___.

Ethics

Select the first step in the five steps of an ethical analysis.

Getting the facts

Select two common techniques used by anti-virus software to identify malware.

Heuristic-based detection Signature-based detection

Select three common methods in which organizations collect data.

Indirect Tracking Third-party data purchase direct inquiry

A Wi-Fi tracker follows a shopper's path from store to store.

Indirect tracking

Which dimension of ethical behavior in the digital age is represented by the following question? You are interviewing 3 applicants for a management position in your firm and wish to ensure that they will represent your company with professionalism and maturity. Should you check the applicants' social media sites prior to making your hiring decision?

Information Privacy Rights

Your boss states that in your organization data must be used responsibly and privacy should always be respected. This aligns with which dimension of ethical concerns in the digital age?

Information Privacy Rights

Ethical challenges raised by the use of information systems fall into 5 dimensions (categories). Which 3 of the following are included in these 5 dimensions?

Information privacy rights Copyright and intellectual property rights Quality of Life

Select three correct statements regarding international Internet privacy laws.

International laws on Internet privacy vary greatly. The European Union (EU) European Commission Data Protection Directive states that under EU law, personal data can only be gathered legally under strict conditions. It is very difficult to get nations across the globe to agree on standardized Internet privacy laws.

Select two concerns that fall into the dimension of establishing standards in the digital age.

Lynn checks her personal social media sites approximately 16 times per day while she is at work. Is this too much? A hotel allows employees to use its Wi-Fi to stream audio and video while they are working. Should the amount of streaming be limited?

Along with the employee, which of the following is most responsible for an employee's ethical behavior?

Management

Technology has brought about many ethical challenges. One of these technologies is Deepfake. Deepfake refers to ___.

Modifying images or video by replacing one person's likeness with that of another.

Which two of the following guidelines should you follow when reporting a co-worker's computer ethics violations.

Only report incidences that you have personally witnessed. Be brief and remember that your employer probably did not hire you monitor inappropriate computer use.

Select three true statements regarding protecting big data.

Over half of all data breaches can be traced to human error. One advantage of cloud storage is that it greatly reduces the human factor in data protection. Adherents argue that cloud service providers have security measures that far exceed the data security capabilities of small businesses.

Select three categories of intellectual property.

Patents Trade Secrets Copyrights

This software allows managers to take control of an employee's computer remotely.

Remote desktop software

Which three of the following can encourage ethical computer use in the workplace?

Remote desktop software Employee monitoring software Setting a good example

The Act that outlines a plan to protect government information and assets against cyber threats and requires each federal agency to develop a plan for information security is The Federal Information ______ Management Act (FISMA).

Security

What type of cookie is stored in temporary memory and is lost when the web browser is closed?

Session

The Cybersecurity Information _______ Act, passed in December 2015, allows private companies to share threat warnings with the U.S. government.

Sharing

Which two of the following potential workplace computer ethics violations are also illegal activities.

Software piracy using an employer's computer network. Computer scams launched from work computers.

The dimension (category) of ethical concerns in the digital age that refers to determining what constitutes proper levels of protection of digital information is called establishing __.

Standards

Will the decision impact the privacy or property rights of any individuals or corporations? This question should be asked in which step of the 5 steps of an ethical analysis.

Step 2 - Determining the affected.

Data that has a defined length, type, and format, including items as numbers, dates, or strings such as a customer profile is referred to as ___ data.

Structured

The PATRIOT Act was enacted to monitor terrorist activities and communications following the 9/11 attacks and the 2001 Anthrax attack on Congress. PATRIOT stands for Providing Appropriate Tools Required to Intercept and Obstruct _______.

Terrorism

Which of the following allows, but does not require, private companies to warn the U.S. government about cyber-security threats?

The Federal Information Security Management Act

Which Act outlines a plan to protect government information and assets against cyber threats.

The Federal Information Security Management Act (FISMA)

Which principle of ethical conduct attempts to distribute rewards equitably to individuals based on their level of productivity?

The Principle of Distributive Justice

Which principle of ethical conduct states that there exist certain moral values that should always be upheld or never be violated.

The Principle of Moral Rights

Which law, passed after the 9/11 attacks allowed law enforcement to obtain information about online and offline communications related to terrorist activities without a warrant.

The US PATRIOT Act/USA Freedom Act

Which principle of ethical conduct states that when faced with an ethical dilemma the manager should choose the option that does the greatest good for the most involved?

The Utilitarian Principle

The Act that protects person-to-person wire, oral, and electronic communications is _______.

The Wiretap Act

This federal law protects person-to-person wire, oral, and electronic communications.

The Wiretap Act

Many sales managers, including those in information technology-related fields, use commissions in an attempt to incentivize productivity and to reward more successful salespeople. The principle of ethical conduct that this exemplifies is ______.

The principle of distributive justice

Which statement encompasses the third step of the five-step process of an ethical analysis?

There is an extremely good chance that other managers, perhaps in your own organization, have faced similar dilemmas.

You own a real estate brokerage and need a list of high-income residents. You buy the list from a data marketing company. This is called ___.

Third party data purchase

Select the three major titles of the Digital Millennium Copyright Act (DMCA) that impact digital copyright protection.

Titles 1, 2, and 4 directly impact digital copyright issues.

Select the three correct statements regarding patents.

To qualify for a patent, the invention must be novel, or different, from other similar inventions. To qualify for a patent, the invention must be non-obvious, meaning that a skilled artisan would find the invention surprising or unexpected. A patent will only be granted for something that is useful.

Select two important considerations for managing cookies.

Users should determine what cookie settings is appropriate for your browser use and privacy protection. Users should be aware that cookie settings must be adjusted in each browser.

Encouraging communication with minimal barriers can help to ensure that management has the pulse of the organization. Managers should ensure that a system exists in which employees can report malfeasance to their superiors ________.

anonymously

Methodologies that attempt to deal with the vast amount of complex information that accumulates at high, and accelerating, velocity use ______ data.

big

Methodologies that attempt to deal with the vast amount of complex information that accumulates at high, and accelerating, velocity use ________ data.

big

The purpose of spyware is to

capture the user's account data, passwords, key strokes, and more

A major transition in the big data security sector is to move all data storage to ______ storage.

cloud

When facing a moral dilemma, it is useful to be aware of the five principles of ethical

conduct

The dimension (category) of ethical dilemmas that examines how individuals or corporations can be held responsible in case of violations of privacy or intellectual property rights is referred to_______ and accountability.

control and accountability

A form of protection for original works of literature is called a ___.

copyright

A form of protection provided by the laws of the United States for "original works of authorship", including literary, dramatic, musical, architectural, cartographic, choreographic, pantomimic, pictorial, graphic, sculptural, and audiovisual creations is called a ___________.

copyright

Insurance companies use big _______ in actuarial analysis in order to more accurately estimate risk, often lowering the cost of their services.

data

The U.N. General Assembly adopted resolution 68/167 in December 2013 that affirms that the rights held by people offline must also be protected online, and it called upon all Member States (nations) to respect and protect the right to privacy in digital communication. This means that _____

even though it sounds good, Internet users should be aware that digital privacy is not honored by many on the Internet.

Artwork, literary works, inventions, music, and images are some of the creations that most societies believe should be protected. These works are considered ______ property and can be protected with copyrights, trademarks, and patents.

intellectual

Credit institutions use big data to anticipate the likelihood of ___ and to more accurately report credit ratings.

loan default

Cookies that are created by a website other than the one you are currently visiting and are used to track your surfing habits are called third-_______ cookies. These cookies are considered an invasion of privacy.

party

A secret code used to help prevent unauthorized access to data and user accounts is called a ______.

password

Computer ethics violations fall in two major categories; illegal activity and organizational ______ violations.

policy

Computer ethics violations fall in two major categories; illegal activity and organizational _______ violations.

policy

Because every ethical decision will have ramifications, many of them unseen, the final step in the process of an ethical analysis includes making a decision and _______ for the consequences.

preparing

Managers must protect the online ___ of employees and organization stakeholders.

privacy

Your right to control what happens with personal information about you is centered around the right to ______.

privacy

The principle of ethical conduct that states that some decisions are either morally right or morally wrong is called the principle of moral _______.

rights

The software code of a particular computer virus is called the virus

signature

Keystroke loggers and packet analyzers (sniffers) are two common types of ___.

spyware

Data that is typically used in commercially available relational databases, where the data resides in a fixed field and can easily be queried, is called ______ data.

structured

Using cookies to follow someone's browsing patterns is a form of data collection called indirect ________.

tracking

Part of making an ethical decision is understanding that your decision will most like result in ___ .

unintended consequences

Monitoring your credit, creating strong passwords, using anti-virus protection, and practicing safe browsing techniques are methods of protecting your personal ______ while using the Internet.

Privacy, identity, or reputation

Which law or set of laws implements two World Intellectual Property Organization (WIPO) treaties and was created to update copyright laws dealing with the issues of regulating digital material.

The Digital Millennium Copyright Act (DMCA)

The principle of ethical conduct that states that a manager must attempt to determine if this decision is fair for all involved is the _________ principle.

universalist

The principle of ethical conduct that states that you should think of someone you truly admire, perhaps a mentor, and ask yourself what decision they would make is the principle of ________.

virtue


Ensembles d'études connexes

IST 166- Module 1 Review Questions

View Set

Relias: Harm Reduction in Substance Use

View Set

Maths - Exponentials and Logarithms

View Set