module 16 : ethics and privacy concerns
Which amendment to the U.S. Constitution protects freedom of speech from government censorship?
1st
There are ___ basic principles of ethical conduct.
5
Select two examples of the direct inquiry method of data collection.
A fitness app that tracks your workouts A loyalty card that awards points for every purchase
A computer program that scans files to identify and remove computer viruses and other malicious programs is called _____.
Antivirus software
Select two ways managers encourage employees to act unethically.
By not enforcing strong ethical behavior. By failing to act ethically themselves.
Select three correct statements regarding international Internet privacy laws.
International laws on Internet privacy vary greatly. It is very difficult to get nations across the globe to agree on standardized Internet privacy laws. The European Union (EU) European Commission Data Protection Directive states that under EU law, personal data can only be gathered legally under strict conditions.
The principle of ethical conduct that attempts to distribute rewards equitably to individuals based on their level of effort or productivity level is called the principle of distributive __.
Justice
Which principle of ethical conduct states that when faced with an ethical dilemma the manager should choose the option that does the greatest good for the most involved?
Listing options
The fourth step in the process of making an ethical analysis is to list __.
Options
This Act outlines a plan to protect government information and assets against cyber threats. It requires each federal agency to develop a plan for information security.
The Federal Information Security Management Act
When facing a moral dilemma, it is useful to be aware of the five principles of ethical____
conduct
If the box is not already checked by default, this is called an ___ mechanism.
opt-in
If the box is already checked by default, this is called an ___ mechanism.
opt-out
A wide-ranging term that refers to a variety of considerations including; how data and information is used, who has access to data and information, the techniques and technologies used to protect sensitive and private data, communications, and preferences is Internet ___.
privacy
Managers must protect the online ___ of employees and organization stakeholders.
privacy
Which three of the following are widely used tactics that can help keep you safe on the Web?
Consider using a VPN Use your browser's private browsing mode. Make sure the sites you visit use HTTPS if entering personal information
Which law or set of laws implements two World Intellectual Property Organization (WIPO) treaties and was created to update copyright laws dealing with the issues of regulating digital material.
The Digital Millennium Copyright Act (DMCA)
Which Act outlines a plan to protect government information and assets against cyber threats.
The Federal Information Security Management Act (FISMA)
Credit institutions use big data to anticipate the likelihood of___and to more accurately report credit ratings.
loan default
Part of making an ethical decision is understanding that your decision will most like result in_____
unintended consequences
Will the decision impact the privacy or property rights of any individuals or corporations? This question should be asked in which step of the 5 steps of an ethical analysis.
Determining the affected.
Select three common methods in which organizations collect data.
Direct inquiry Indirect tracking Third-party data purchase
A Wi-Fi tracker follows a shopper's path from store to store.
Indirect tracking
Which two of the following are examples of an organization using big data and analyzing predictive behavior with the goal of creating new offerings?
Netflix tracks what users who viewed all three seasons of Stranger Things also had in their queues. An in-home healthcare provider tracks the hospital readmission rates of elderly people who live alone after they received care for falling in their home.
Select two common techniques used by anti-virus software to identify malware.
Signature-based detection Heuristic-based detection
Because every ethical decision will have ramifications, many of them unseen, the final step in the process of an ethical analysis includes making a decision and __ for the consequence
Preparing
Which principle of ethical conduct states that there exist certain moral values that should always be upheld or never be violated.
The Principle of Moral Rights
Data that is typically used in commercially available relational databases, where the data resides in a fixed field and can easily be queried, is called ___ data.
structured
Even though the Child Online Protection Act of 1998 was sponsored by both Democrats and Republicans and was passed by both Houses of Congress and signed into law by President Clinton, you cannot be punished for violating law because ___ .
the law violated the 1st Amendment (freedom of speech) rights and was found unconstitutional.
There are five basic ethical principles that we can look to when facing an ethical dilemma. Select the three ethical principles from the choices offered.
The Principle of Distributive Justice The Principle of Moral Rights The Principle of Virtue
Which principle of ethical conduct asks the decision-maker to consider what a highly moral person would do when faced with this question.
The Principle of Virtue
What Act was enacted to monitor terrorist activities and communications following the 9/11 attacks and the 2001 Anthrax attack on Congress?
The US PATRIOT Act/USA Freedom Act
This principle states that a manager must attempt to determine if this decision is fair for all involved.
The Universalist Principle
Which principle of ethical conduct states that a manager must attempt to determine if a decision is fair for all involved.
The Universalist Principle
Which principle of ethical conduct states that when faced with an ethical dilemma the manager should choose the option that does the greatest good for the most involved?
The Utilitarian Principle
The Act that protects person-to-person wire, oral, and electronic communications is ___.
The Wiretap Act
Due to the lack of normalized laws, it is important to use discretion on the Internet when traveling or living abroad.
True
This principle simply states that when faced with an ethical dilemma the manager should choose that option that does the greatest good for the most involved is the __ principle.
Utilitarian
Select two reasons why a credit card offers more protection than a debit card when shopping online.
With a credit card you have a layer of security between your cash and hackers on the Internet. Using your debit card can give hackers direct access to your checking accounts.