module 16 : ethics and privacy concerns

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which amendment to the U.S. Constitution protects freedom of speech from government censorship?

1st

There are ___ basic principles of ethical conduct.

5

Select two examples of the direct inquiry method of data collection.

A fitness app that tracks your workouts A loyalty card that awards points for every purchase

A computer program that scans files to identify and remove computer viruses and other malicious programs is called _____.

Antivirus software

Select two ways managers encourage employees to act unethically.

By not enforcing strong ethical behavior. By failing to act ethically themselves.

Select three correct statements regarding international Internet privacy laws.

International laws on Internet privacy vary greatly. It is very difficult to get nations across the globe to agree on standardized Internet privacy laws. The European Union (EU) European Commission Data Protection Directive states that under EU law, personal data can only be gathered legally under strict conditions.

The principle of ethical conduct that attempts to distribute rewards equitably to individuals based on their level of effort or productivity level is called the principle of distributive __.

Justice

Which principle of ethical conduct states that when faced with an ethical dilemma the manager should choose the option that does the greatest good for the most involved?

Listing options

The fourth step in the process of making an ethical analysis is to list __.

Options

This Act outlines a plan to protect government information and assets against cyber threats. It requires each federal agency to develop a plan for information security.

The Federal Information Security Management Act

When facing a moral dilemma, it is useful to be aware of the five principles of ethical____

conduct

If the box is not already checked by default, this is called an ___ mechanism.

opt-in

If the box is already checked by default, this is called an ___ mechanism.

opt-out

A wide-ranging term that refers to a variety of considerations including; how data and information is used, who has access to data and information, the techniques and technologies used to protect sensitive and private data, communications, and preferences is Internet ___.

privacy

Managers must protect the online ___ of employees and organization stakeholders.

privacy

Which three of the following are widely used tactics that can help keep you safe on the Web?

Consider using a VPN Use your browser's private browsing mode. Make sure the sites you visit use HTTPS if entering personal information

Which law or set of laws implements two World Intellectual Property Organization (WIPO) treaties and was created to update copyright laws dealing with the issues of regulating digital material.

The Digital Millennium Copyright Act (DMCA)

Which Act outlines a plan to protect government information and assets against cyber threats.

The Federal Information Security Management Act (FISMA)

Credit institutions use big data to anticipate the likelihood of___and to more accurately report credit ratings.

loan default

Part of making an ethical decision is understanding that your decision will most like result in_____

unintended consequences

Will the decision impact the privacy or property rights of any individuals or corporations? This question should be asked in which step of the 5 steps of an ethical analysis.

Determining the affected.

Select three common methods in which organizations collect data.

Direct inquiry Indirect tracking Third-party data purchase

A Wi-Fi tracker follows a shopper's path from store to store.

Indirect tracking

Which two of the following are examples of an organization using big data and analyzing predictive behavior with the goal of creating new offerings?

Netflix tracks what users who viewed all three seasons of Stranger Things also had in their queues. An in-home healthcare provider tracks the hospital readmission rates of elderly people who live alone after they received care for falling in their home.

Select two common techniques used by anti-virus software to identify malware.

Signature-based detection Heuristic-based detection

Because every ethical decision will have ramifications, many of them unseen, the final step in the process of an ethical analysis includes making a decision and __ for the consequence

Preparing

Which principle of ethical conduct states that there exist certain moral values that should always be upheld or never be violated.

The Principle of Moral Rights

Data that is typically used in commercially available relational databases, where the data resides in a fixed field and can easily be queried, is called ___ data.

structured

Even though the Child Online Protection Act of 1998 was sponsored by both Democrats and Republicans and was passed by both Houses of Congress and signed into law by President Clinton, you cannot be punished for violating law because ___ .

the law violated the 1st Amendment (freedom of speech) rights and was found unconstitutional.

There are five basic ethical principles that we can look to when facing an ethical dilemma. Select the three ethical principles from the choices offered.

The Principle of Distributive Justice The Principle of Moral Rights The Principle of Virtue

Which principle of ethical conduct asks the decision-maker to consider what a highly moral person would do when faced with this question.

The Principle of Virtue

What Act was enacted to monitor terrorist activities and communications following the 9/11 attacks and the 2001 Anthrax attack on Congress?

The US PATRIOT Act/USA Freedom Act

This principle states that a manager must attempt to determine if this decision is fair for all involved.

The Universalist Principle

Which principle of ethical conduct states that a manager must attempt to determine if a decision is fair for all involved.

The Universalist Principle

Which principle of ethical conduct states that when faced with an ethical dilemma the manager should choose the option that does the greatest good for the most involved?

The Utilitarian Principle

The Act that protects person-to-person wire, oral, and electronic communications is ___.

The Wiretap Act

Due to the lack of normalized laws, it is important to use discretion on the Internet when traveling or living abroad.

True

This principle simply states that when faced with an ethical dilemma the manager should choose that option that does the greatest good for the most involved is the __ principle.

Utilitarian

Select two reasons why a credit card offers more protection than a debit card when shopping online.

With a credit card you have a layer of security between your cash and hackers on the Internet. Using your debit card can give hackers direct access to your checking accounts.


Ensembles d'études connexes

Chapter 1: Basic Elements Of C++

View Set

Lifetime Fitness and Wellness Unit 8 Lessons 1-2 & Quiz 1

View Set

khan academy answers computer science

View Set

Rel 101 Web Midterm (Shinto) Bos

View Set