Ethics and Privacy Concerns Quiz

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following are correct statements regarding credit monitoring? More than one answer may be selected.

-Ordering your FICO score from each major credit agency multiple times a year is an easy way to keep track of your credit score. -Soft inquiries do not affect your credit rating. -The three major credit reporting agencies are TransUnion, Equifax, and Experian.

Describe categories of intellectual property rights. More than one answer may be correct.

-patents Correct -copyrights -trade secrets

When facing an ethical decision regarding how to act, which three basic principles provide guidance?

-the Principle of Moral Rights -the Principle of Virtue -the Principle of Distributive Justice

Which intellectual property is correctly matched with the legal device or tool that protects it?

A portrait that you paint can be copyrighted.

Describe qualifications necessary to obtain a patent on an invention. More than one answer may be correct.

-To qualify for a patent, the invention must be novel, or different, from other similar inventions. -To qualify for a patent, the invention must be non-obvious, meaning that a skilled artisan would find the invention surprising or unexpected. -A patent will only be granted for something that is useful.

From the following list, select the items that are considered intellectual property and entitled to protection.

-a mural that you painted -a song that you wrote -a story that you published

Which of the following are true about privacy protection techniques? More than one answer may be selected.

-antivirus software uses a variety of techniques to identify and remove viruses and malware -a virtual private network (VPN) hides your IP address by running communications through a secure network -credit monitoring includes watching your monthly bills to look for fraudulent charges

A form of protection for original works of literature is called a trademark.

FALSE

A form of protection provided by the laws of the United States for "original works of authorship," including literary, dramatic, musical, architectural, cartographic, choreographic, pantomimic, pictorial, graphic, sculptural, and audiovisual creations is called a patent.

FALSE

The Act that requires that public schools and libraries must comply with Internet safety policies imposed by the government under this legislation and specifically requires all pornographic sites to include some sort of age verification is The Children's Internet Privacy Act of 2000 (CIPA).

FALSE

The Children's Internet Protection Act of 2000 (CIPA) seeks to keep children off the Internet.

FALSE

The Digital Millennium Copyright Act is the law that protects email and VoIP communications by requiring a warrant to intercept calls and messages.

FALSE

Which of the following are true about protecting big data? More than one answer may be selected.

-A data breach can cause a company great expense. -Human error causes the majority of data breaches. -An advantage of cloud storage is that it reduces the potential for human error.

Direct inquiry, indirect tracking, and third-party data purchase are three common methods of predictive analytics.

FALSE

If you are downloading a game or software onto a device, there may be an empty box asking you to check the box to agree to Terms of Use and the site's Privacy Policy. This checkbox is called an authorization box.

FALSE

Insurance companies use big data in actuarial analysis in order to better understand their customers' needs.

FALSE

Raw facts that describe the characteristics of an event, object, or set of information that can be entered into a computer are known as cookies.

FALSE

The Universalist Principle advocates for the greatest good for greatest number of people.

FALSE

The disciplinary dimension of ethical dilemmas addresses how individuals or corporations can be held responsible in case of violations of privacy or intellectual property rights.

FALSE

The federal law that protects person-to-person wire, oral, and electronic communications and also includes a variety of network crime statutes that include identity theft and unlawful access to stored communications is the Cybersecurity Information Sharing Act.

FALSE

The least that employers can do to discourage employees from misusing business computers is to use employee monitoring software and inform employees of their computer usage policies.

FALSE

The two major categories of computer ethics violations are personal activities and organizational policy violations.

FALSE

Victims of a data breach should consider purchasing antivirus software.

FALSE

When a manager thinks of someone they truly admire, whether a mentor or a historical figure, and asks how that person would decide, they are following the Universalist Principle.

FALSE

When the government grants an inventor the right to exclude others from the use of the invention for a period of time, this is called a copyright.

FALSE

What is the benefit to using a password manager? More than one answer may be selected.

It allows you to create strong, unique passwords without requiring you to remember them. It automatically completes the login procedure for you at sites where you have saved your password.

Which of the following is a benefit of antivirus software that charges a fee? More than one answer may be selected.

It includes identity theft protection and parental controls. It provides technical support.

Which Act requires all government agencies to have a plan in place in the event of a cyberattack?

Federal Information Security Management Act (FISMA)

The U.S. Constitution specifically protects freedom of speech from government censorship through the

First Amendment.

In 2013 the U.N. General Assembly adopted a resolution affirming that the rights held by people offline must also be protected online, calling for its member nations to respect the right to privacy in digital communication. Which of the following statements applies to the real-life impact of this resolution?

This sounds good, but users should be aware that digital privacy is not honored by many on the Internet.

The principle that states that when faced with an ethical dilemma a manager should choose the option that does the greatest good for the most people involved is called the

Utilitarian Principle.

Which situation involves a computer ethics violation that you should report to your employer?

You pass a coworker's computer screen and see him surfing through child pornography.

Which of the following is an example of direct inquiry?

asking a customer to fill out a survey after calling customer service

What is predicting the impact of a hurricane that is predicted to make landfall in New Orleans on a trucking route that goes from Houston, TX to Miami, FL an example of?

big data

Small text files created by websites you visit that your web browser stores on your hard disk are called

cookies

Which of the following determines the interest rate you'll be charged when you want to borrow money?

credit report

Cyber criminals often demand ________ as a ransom payment because this type of money is difficult to trace and accessible through any Internet-connected device.

cryptocurrency

Which of the following points is part of the fifth, or final, step in an ethical analysis?

cultivating the ability to defend your decision

When making an ethical analysis, you should get all the pertinent facts and then

determine the affected.

What does the third step of a five-step ethical analysis involve?

determining whether other managers have faced similar dilemmas

While a religious leader may provide guidance on how to uphold high morals, ________ provide the reasons for acting morally.

ethics

There are ________ basic principles of ethical conduct.

five

How your private data and information are used, who has access to them, which techniques and technologies protect them, and the communications and preferences surrounding how they are handled are components of Internet

privacy

Which dimension of ethical concerns would examine the issue of how playing video games relates to or influences childhood obesity?

quality of life

Which step of an ethical analysis is designed to enable a manager to obtain guidance or insights from other managers?

searching for precedents

June, an IT manager at a financial institution, learns that team member Charla has a health issue and needs to take a half day off once a week for a few months. Without violating Charla's privacy, how can June make an ethical decision that maintains a perception of fairness at a very busy time?

Following the Universalist Principle, June can remind the team that flexible hours are available to all members as long as everyone logs their total hours per week.

A form of spyware that records all actions typed on a keyboard is called a keystroke logger.

TRUE

Creative works are considered intellectual property and can be protected with copyrights, trademarks, and patents.

TRUE

In a five-step ethical analysis, the second step is to determine whom will be affected by a decision.

TRUE

Methodologies that attempt to deal with the vast amount of complex information that accumulates at high, and accelerating, velocity use big data.

TRUE

Cookies that are stored on the hard drive and are not lost when the web browser is closed are called

persistent cookies.

The Act that specifically requires all pornographic sites to include some sort of age verification is

the Children's Internet Protection Act of 2000 (CIPA).

Which principle of ethical conduct calls for allocating rewards equitably according to individuals' productivity?

the Principle of Distributive Justice

When a decision maker considers what a highly moral person would do when faced a particular question, which principle of ethical conduct is in play?

the Principle of Virtue

Of the following principles, which states that a manager must attempt to determine if a decision is fair for all employees involved?

the Universalist Principle

Of the principles of ethical conduct, one is said to be similar to a cost-benefit analysis. Which of the following principles does this description fit?

the Utilitarian Principle

From the following list, select the activities that are both violations of workplace computer ethics and illegal.

-computer scams launched from work computers -software piracy using an employer's computer network

________ software allows managers to take control of an employee's computer remotely and record the computer's mouse and keyboard entries.

Remote desktop

One way to stay safe while browsing the Internet is to use a VPN. VPN stands for virtual private network.

TRUE

Using cookies to follow someone's browsing habits is a form of data collection called indirect tracking.

TRUE

Which of the following is the first of the five steps in an ethical analysis?

getting the facts

When conducting a five-step ethical analysis, the first step in the process is

getting the facts.

A wi-fi tracker following a shopper's path within a store is an example of what kind of data collection?

indirect tracking

Music files and video games are examples of what kind of property in the eyes of the law?

intellectual property

What is the fourth step in a five-step ethical analysis?

listing options

Managers can encourage employees to act less than ethically through which of the following ways? More than one answer may be correct.

-by acting unethically themselves -by not enforcing strong ethical behavior

Which browser settings should you consider adjusting? More than one answer may be correct.

-deleting cookies -blocking or customizing your cookie settings -deciding from which sites you want to allow cookies

From the following list, select all the effective methods of encouraging ethical computer use in the workplace.

-employee monitoring software -remote desktop software -setting a good example

Which of the following are examples of the direct inquiry method of data collection? More than one answer may be selected.

-ordering food delivery via a smartphone app -registering an account for a new social media platform

What is an example of something that may be copyrighted? More than one answer may be correct.

-sculptures -choreography

Which of the following describes why a credit institution would use big data? More than one answer may be selected.

-to anticipate the likelihood of loan default -to accurately report credit ratings -to sell to other corporations

How have businesses reduced the likelihood of experiencing a data breach?

moving data storage to a cloud service provider such as Amazon Web Services

You own a pool installation business and need a list of high-income houses with large backyards. You buy the list from a data marketing company. What is this called?

third-party data purchase

A type of cookie, sometimes called a transient cookie, that is not stored but just kept in memory when a user visits a website is called an authentication cookie.

FALSE

Cookies stored on your device's hard drive and remain even if your computer has been restarted are called authentication cookies.

FALSE

To address the ethical concerns surrounding ________, many employee handbooks state that the organization must use data responsibly and always respect privacy.

information privacy rights

When making an ethical analysis, what is the last thing a manager should do before making a decision and preparing for the consequences?

listing options

Which type of cookie is lost only if deleted or if is created with an expiration date?

persistent cookie

Data that is traditionally used in commercially available relational databases, where the data resides in a fixed field and can easily be queried is called big data.

FALSE

Which Act outlines a plan to protect government information and assets against cyberthreats?

Federal Information Security Management Act (FISMA)


Ensembles d'études connexes

DB 19-02 Sustainability of radio database on ERS

View Set

Seven Steps Of a Simulation(Stats)

View Set

Chapter 56: Caring for Clients with Sexually Transmitted Infections

View Set

Medical Terminology Ch. 1, 2 - Review

View Set

E-1.11 - 1.12 Multiple Relationships, Giving & Receiving Gifts

View Set