MIS Chapter 8
Which of the following is part of the outermost level of an individual's ethical structure?
Actions that most people would not consider unacceptable or unethical.
_____ refers to software that generates advertisements and installs itself on your computer when you download some other, usually free, program from the Web.
Adware
_____ refers to the use of physiological characteristics such as fingerprints, the blood vessels in the iris of the eye, and the sound of one's voice to provide identification.
Biometrics
_____ are types of hackers who break into other people's computer systems and may just look around. They may steal credit card numbers or destroy information, or otherwise do damage.
Black-hat hackers
The _____ sought to regulate interstate commerce by imposing limitations and penalties on businesses sending unsolicited e-mail to consumers.
CAN-Spam Act
Which of the following is an example of the unethical use of computers?
Employees searching organizational databases for information on celebrities and friends.
_____ is a way of protecting messages and files by scrambling the contents of a file so that one cannot read it without having the right key.
Encryption
Which of the following is part of the innermost level of an individual's ethical structure?
Ethical violations that one would consider extremely serious.
_____ can be defined as the principles and standards that guide our behavior toward other people.
Ethics
The _____ says that you may use copyrighted material in certain situations, for example, in the creation of new work or, within certain limits, for teaching purposes.
Fair Use Doctrine
_____ is a kind of identity theft where the victim knows the person who stole his/her identity.
Friendly fraud
_____ have philosophical and political reasons for breaking into systems and often deface Web sites as a sign of protest.
Hacktivists
The _____ provided new authority to government agencies to mine data on individuals and groups including e-mails and Web site visits, and put limits on the information available under the Freedom of Information Act.
Homeland Security Act
An architectural firm's blueprints, sketches and other proprietary documents are examples of ____.
Intellectual property
_____ refers to intangible creative work that is embodied in physical form.
Intellectual property
Which of the following is true of an ethical dilemma?
It occurs when one's responsibilities seem to lead in opposite directions.
The _____ allows law enforcement to get access to almost any information, including library records, video rentals, bookstore purchases, and business records when investigating any act of terrorism or hostile intelligence activities.
USA Patriot Act
_____ is the use of phishing targeted at senior business executives, government leaders, and other types of high-profile individuals.
Whaling
A _____ records information about you during a Web surfing session such as what Web sites you visited, how long you were there, what ads you looked at, and what you bought.
clickstream
A _____ is a small file that contains information about a person and his/her Web activities, which a Web site one visits places on their computer.
cookie
A _____ refers to the legal protection offered for the expression of an idea, such as a song, video game, and some types of proprietary documents.
copyright
A _____ floods a server or network with so many requests for service that it slows down or crashes.
denial-of-service attack
A(n) ______ is hardware and/or software that protects a computer or a network from intruders.
firewall
An assessment of what is right or wrong can be determined by considering ____, which can be understood as the benefit or harm that will come from a particular decision.
the consequences
An assessment of what is right or wrong can be determined by considering ____, which refers to the probability that the harm or benefit will occur if one undertakes an action.
the likelihood of effect
An assessment of what is right or wrong can be made by considering _____ which focuses on the number of people that will be affected by one's action.
the reach of result
An assessment of what is right or wrong can be determined by considering the ____, which may be defined as how long it will take for the benefit or harm to take effect.
time to consequences
A _____ consists of one line of information for every visitor to a Web site and is usually stored on a Web server.
web log
Which of the following is a program that, when installed on a computer, records every mouse click?
Key logger
_____ is a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail.
Phishing
_____ is the unauthorized use, duplication, distribution, or sale of copyrighted software.
Pirated software
_____ is the right to be left alone when one wants to be, to have control over one's own personal possessions, and not to be observed without one's consent.
Privacy
_____ refers to the extent to which one identifies with the person or persons who will receive the benefit or suffer the harm associated with a particular decision.
Relatedness
_____ refer(s) to devices on networks that connect computers to each other.
Routers
The _____ sought to protect investors by improving the accuracy and reliability of corporate disclosures and requires companies to implement extensive and detailed policies to prevent illegal activity within the company and respond in a timely manner to investigate illegal activity.
Sarbanes-Oxley Act
Claytons and Sons, a finance firm in Manhattan, has a large number of employees who handle huge amounts of online transactions everyday. The management feels that it is crucial to monitor their online activities. Which of the following can the company use for this purpose?
Snoopware
_____ refers to programs that Web sites offer to help people monitor what is happening on a computer.
Snoopware
_____ refers to unsolicited e-mail (electronic junk mail) from businesses that advertise goods and services.
Spam
_____ is a technique to gain personal information for the purpose of identity theft, where specific individuals are targeted and the creator of a fraudulent e-mail already has some of the victim's personal information and wants more.
Spear phishing
_____ refers to malicious software that collects information about a person and his/her computer and reports it to someone without their permission.
Spyware