BCIS 1305 Ch 10 Study Guide New
Federal permitting employers to monitor emails sent and received by employees, emails erased from hard disks and retrieved in case of lawsuits, and the use of email among public officials that might violate "open meeting" laws are part of privacy and _____
Preventing waste and mistakes involves establishing, implementing, monitoring, and ______ policies and procedures
reviewing
Questions such as: Do current policies cover existing practices adequately? Does the organization plan any new activities in the future? Who will handle them and what must be done? Are contingencies and disasters covered? are examples of _______
reviewing policies and procedures
In order to be accredited by the Better Business Bureau, a business is required to publish a privacy notice on its website that includes all of the following elements EXCEPT a. updates b. sharing and selling c. access d. choice
sharing and selling
Wasting time online costs U.S. businesses more than _____ annually. a. $385 billion b. $285 billion c. $185 billion d. $85 billion
$85 billion
The Children's Online Privacy Protection Act (COPPA) was passed by Congress in October 1998. This act, directed at Web sites catering to children, requires site owners to post comprehensive privacy policies and to obtain parental consent before they collect any personal information from children under _______ years of age. a. 10 b. 13 c. 18 d. 21
13
Miranda works at a small-batch soda pop manufacturing plant. For eight hours a day, she uses her right hand to lift individual bottles of soda pop off the production line and place them in packing crates. Lately her right elbow has been hurting, so she visited her doctor, who diagnosed her with _______. a. a repetitive strain injury b. carpal tunnel syndrome c. a thromboembolism d. none of these answers
a repetitive strain injury
Founded in 1977, the Association for Computing Machinery (ACM) is the oldest computing society and boasts more than 200,000 members in more than 120 countries. a. True b. False
False
Some companies offer health and wellness programs that require employee participants to share personal data. This data is protected under the same HIPAA privacy regulations as data shared with health insurance companies and doctors. a. True b. False
False
The Fair Credit Reporting Act of 1970, the Family Educations Privacy Act of 1974, the Tax Reform Act of 1976, the Right to Financial Privacy Act of 1978 and other Laws are part of ______
Federal Privacy Laws
_______ software is used to protect personal data and screens Internet content.
Filtering
The ________ requires financial institutions to provide "clear, conspicuous, and accurate statements" of their information-sharing practices.
Gramm-Leach-Bliley Act
The _____ requires all financial institutions to protect and secure customers' nonpublic data from unauthorized access or use. a. E-Government Act of 2002 b. USA Patriot Act of 2001 c. Gramm-Leach-Bliley Act of 1999 d. Sarbanes-Oxley Act of 2002
Gramm-Leach-Bliley Act of 1999
The ______ is the privacy rules that require notice in writing of the privacy practices of health care services
HIPAA (Health Insurance Portability and Accountability Act)
Although Roberta had signed a form preventing her doctor from sharing her personal medical records with the company she worked for, she later discovered that the doctor's office had, in fact, shared her data with her health insurance provider and her employer, which caused her to be terminated. Because the doctor's practice violated its own privacy policy, she was able to file a lawsuit under the ________. a. Health Insurance Portability and Accountability Act b. Health and Medical Records Privacy Act c. Gramm-Leach-Bliley Act d. none of these answers
Health Insurance Portability and Accountability Act
Which of the following statements is true of the E-Government Act of 2002? a. It requires federal agencies to post machine-readable privacy policies on their Web sites and to perform privacy impact assessments on all new collections of data of ten or more people. b. It restricts government access to certain records held by financial institutions. c. It renews the U.S. government's authority to monitor electronic communications of foreigners abroad and authorizes foreign surveillance programs by the National Security Agency (NSA). d. It defines procedures to request judicial authorization for electronic surveillance of persons engaged in espionage against the United States on behalf of a foreign power
It requires federal agencies to post machine-readable privacy policies on their Web sites and to perform privacy impact assessments on all new collections of data of ten or more people.
_______ is a system of rules that tells us what we can and cannot do. They are enforced by a set of institutions.
Law
_____ involves publishing an intentionally false written statement that is damaging to a person's or an organization's reputation. a. Libel b. Phishing c. Vishing d. Slander
Libel
______ involves publishing and intentionally false written statement that is damaging to a person's or organization's reputation
Libel
Which of the following is a computer-related mistake? a. Acquiring redundant systems. b. Mishandling computer outputs. c. Operating unintegrated information systems. d. Exhausting information system resources.
Mishandling computer outputs.
_______ is a means of acquiring data (such as location, noise level, traffic conditions) through sensor-enhanced mobile devices and then is shared with individuals, healthcare providers, utility firms, causing privacy risks if people are unaware their personal mobile data is shared.
Mobile crowd sensing (MCS)
______ are one's personal beliefs about right and wrong.
Morals
________ is a tool used by the NSA and FBI to access the servers of major Internet services such as Facebook, Google, YouTube, and others to collect the content of emails, video, photos, file transfers, and live chats.
PRISM
_______ is also required for minors on social network services such as Facebook, Twitter, LinkedIn, Pinterest, Google Plus, Tumblr, and Instagram. Parents should monitor children's activities.
Parental consent
________ are pieces of data tied to a particular user or device, to serve advertising to children
Persistent identifiers
_______ deals with the "right to be left alone" or to be withdrawn from public view.
Privacy Issues
The ______ tags, are microchips with antenna that generate radio transmissions that can lead to potential privacy concerns. These that are embedded in products we buy.
RFID
A health concern in a job where someone has an injury or disorder of the muscles, nerves, tendons, ligaments, or joints cause by repetitive motion on a tendon is called ______
RSI (Repetitive strain injury)
During a recent brainstorming session, one of Franklin's co-workers suggested that their company could sell some of the data contained in its customer databases to earn extra revenue for the business. As a long-time member of the ACM (Association for Computing Machinery), Franklin is opposed to the idea because it violates which of the following imperatives in the ACM code of ethics? a. Be honest and trustworthy. b. Respect the privacy of others. c. Honor property rights d. Avoid harm to others.
Respect the privacy of others
A health concern in a job that requires sitting at a desk and using a computer for hours can have the risk of ________, which is the formation of blood clots in the legs or lung.
SIT (Seated immobility thromboembolism)
Which of the following is not a common computer-related mistake? a. Programming errors b. Shopping online while at work c. Data-entry or data-capture errors d. Errors in handling files
Shopping online while at work
Suppose you have been receiving unsolicited phone calls from telemarketers. Which agency should you contact to prevent these 'junk' calls? a. The Federal Trade Commission b. your local police department c. Better Business Bureau d. The Department of Justice
The Federal Trade Commission
The _______ imposes limitations on the bulk collection of the telecommunications metadata of U.S. citizens; prohibits large-scale indiscriminate data collection (such as all records from an entire zip code); and requires the NSA to obtain permission from the Foreign Intelligence Surveillance Court (FISC) to access the metadata records, which are now held by telecommunication companies rather than by the government.
USA Freedom Act (2015)
The __________ requires telephone companies to turn over customer information, including numbers called, without a court order if the Federal Bureau of Investigation (FBI) claims that the records are relevant to a terrorism investigation. a. USA Patriot Act of 2001 b. Gramm-Leach-Bliley Act of 1999 c. Electronic Communications Privacy Act of 1986 d. Cable Act of 1992
USA Patriot Act of 2001
In today's workplace, most employers issue a policy stating that they will monitor employees' use of any company-owned computer, server, or email system, thus eliminating any expectation of privacy. How many organizations actually monitor, retain, and review employees' emails? a. about one-fourth b. about half c. about three-quarters d. nearly all
about half
Federal law permits employers to monitor their employees' use of company-owned computer equipment, specifically _______. a. e-mails b. instant messages c. website views d. all of these answers
all of these answers
Flexibility is a major component of ergonomic design, mainly because: _______. a. people come in a wide range of shapes and sizes b. people have their own preferences c. people need to be able to position equipment in different ways for best results d. all of these answers
all of these answers
Harold is thinking about setting up profiles on Facebook and Twitter. Which of the following categories of data should he avoid sharing on these social media platforms? a. his location b. his religious and political affiliations c. his health conditions d. all of these answers
all of these answers
To minimize waste and mistakes, organizations often develop and implement policies and procedures which focus on: ________ a. the use of data editing to ensure data accuracy and completeness b. the assignment of clear responsibility for data accuracy within each information system c. the implementation of source data automation d. all of these answers
all of these answers
The ________ states the principles and core values that are essential to their work and, therefore, govern their behavior. It can become a reference point for weighing what is legal and what is ethical.
code of ethics
Poorly designed work environment and failure to take regular breaks to stretch the muscles and rest the eyes are two primary causes of ______
computer-related health problems
Data-entry or data-capture errors, programming errors, errors in handling files, mishandling of computer output, and an inadequate planning for and control of equipment malfunctions are examples of ______
computer-related mistakes
Unclear expectations, inadequate training and feedback, program development that contains errors, incorrect input by a data-entry clerk are the causes of _____
computer-related mistakes
Organizations operating unintegrated IS, acquiring redundant systems (systems performing the same function), and wasting IS resources (Improper use of IS and resources by employees) are examples of ______
computer-related waste
Heavy computer users who experience red, dry, itchy eyes should _____. a. keep their focus on their screens for long hours b. consider the use of artificial tears c. consider the use of older, but more human friendly CRT monitors d. avoid blinking often
consider the use of artificial tears
Invasion of privacy can damage an organization reputation, turn away customers, and dramatically reduce revenues and profits if organizations don't have _____
corporate privacy policies
The ability to _______, involves data storage control, and database usage consent.
decide
Gathering information, developing a problem statement, consulting those involved as well as other appropriate resources, identifying options, weighing options, choosing an option, implementing a solution and reviewing results are the steps involved in the __________
decision-making process
Anne and Jordan have two pre-teen sons and they're concerned about what their kids might see and share on the Internet. They should probably invest in a. privacy screening b. security passwords c. filtering software d. Internet licensing
filtering software
The NetNanny, SpyAgent, Qustodio, Safe Eyes, Spector Pro are the top-rated Internet ___________ that prevent children from broadcasting their name, address, phone number or other personal information.
filtering software examples
The ______ recommends BBB accredited businesses have sort of privacy notice on their Web site.
BBB Code of Business Practices
The _______ requires Web sites that collect information about children under the age of 13 to post privacy policy and adhere to certain information-sharing restrictions
COPPA (Children's Online Privacy Protection Act)
A health concern where there is an inflammation of the nerve that connects the forearm to the palm of the wrist causing wrist pain, a feeling of tingling and numbness, and difficulty and holding objects is called the _______
CTS (Carpal tunnel syndrome)
_______ is is an inflammation of the nerve that connects the forearm to the palm of the wrist. a. Seated immobility thromboembolism (SIT) b. Carpal tunnel syndrome (CTS) c. Behcet's syndrome d. Chronic idiopathic mylofibrosis
Carpal tunnel syndrome (CTS)
The ______ Act doesn't allow schools to receive discounts offered by the E-Rate program (libraries support to purchase Internet access and computers) unless they certify that they have certain Internet safety measures in place to block or filter "visual depictions that are obscene, child pornography, or are harmful to minors."
Children's Internet Protection Act (CIPA)
The ____ Act was passed by congress directed at Web sites catering for children requiring site owners to post comprehensive privacy policies and to obtain parental consent before they collect any personal information form children under 13 year of age.
Children's Online Privacy Protection Act (COPPA)
_____ states the principles and core values that are essential to a set of people and that, therefore, govern these people's behavior. a. Code of civil procedure b. Code of criminal procedure c. Code of conduct d. Code of ethics
Code of ethics
_______ refers to wasting time online
Cyberloafing
________ conforms to generally accepted social norms, many of which are universally accepted.
Ethical behavior
______ describes standards or codes of behavior expected of an individual by a group (nation, organization, and profession) who which an individual belong.
Ethics
The _______ enforces federal consumer protection laws that prevent fraud, deception, and unfair business practices.
FTC (Federal Trade Commission)
Amy is doing some online research for a term paper. She'd like to access some information on a particular website, but the website is asking her to put in her email address before allowing her to view the information. She wonders what the website owner will do with that information, but there is never any way for her to know how data collected via a website will be used. a. True b. False
False
Few companies have found it necessary to limit employee access to non-work-related Web sites. a. True b. False
False
Heavy computer use can negatively affect one's physical health. a. True b. False
True
In 2015, the European Court of Justice found that the Safe Harbor Framework (an agreement that had been in place since 2000 between the United States and the European Union (EU), allowing the transfer of personal data from the EU to the United States) did not adequately protect the personal data of citizens residing in EU countries. a. True b. False
True
Just because an activity is defined as legal does not mean that it is ethical. a. True b. False
True
One idea for reducing cyberloafing is to develop software that recognizes and categorizes Internet sites into sites that employees can always visit, sometimes visit, and never visit. a. True b. False
True
The Government Accounting Office uncovered a total of $321 million spent in the six-year period 2008 to 2013 on projects that duplicated other efforts within the Defense Department, Department of Homeland Security, and the Department of Health and Human Services. a. True b. False
True
Which of the following is a useful policy to minimize waste and mistakes? a. Users should implement proper procedures to ensure correct input data. b. Changes to HTML and URLs should be documented and authorized by end users. c. Tight control should be avoided over critical tables. d. System report
Users should implement proper procedures to ensure correct input data.
The science of designing machines, products, and systems to maximize the safety, comfort, and efficiency of the people who use them and the study of designing and positioning computer equipment is called _____
ergonomics
Your cousin works at her desktop computer for prolonged period of time every day. She would like to minimize the harmful effects of such repetitive work. Her workspace should be designed with ______ in mind. a. productivity b. economics c. ergonomics d. privacy
ergonomics
To prevent and minimize waste and mistakes the company needs to first _______ such as training programs, manuals and documents covering the use and maintenance of iS, requiring all new applications be approved through a process before they are rolled out, and requiring documentation and descriptions of certain applications to be submitted to a central office
establish policies and procedures
When decision-making gets complicated because it involves significant value conflicts among the various stakeholders as to what is the fairest option pursue, then the decision represents an _______
ethical dilemma
The _________ deal with what is generally considered right or wrong.
ethical issues
Morals are one's personal beliefs about right and wrong, whereas the term ______ describes standards or codes of behavior expected of an individual by a group (nation, organization, and profession) to which an individual belongs.
ethics
Companies selling information of data collected and stored on customers to other companies is part of the privacy and _____
fairness in information use
A job that requires sitting at a desk and using a computer for many hours a day can lead to _______. a. sleep disorders b. formation of blood clots c. inflammation of the gum tissue d. undesirable weight loss
formation of blood clots
While giving her students a physics exam, Professor Thompson noticed that Jack, one of her students who has been struggling with the course material, appeared to be copying answers from Graydon, one of the best students in the class. She decides that she should compare their answers when the class period is over before deciding what to do about the situation. In which phase of the ethical decision-making process is Professor Thompson? a. gathering information b. identifying options c. weighing options d. developing a problem statement
gathering information
Federal laws protect employers by letting them monitor employers use of instant messaging using employer's IM network or employer-provided phones, this is part of privacy and ______
instant messaging
Having the right to know what Web sites are going to do with your personal information and the right to be removed from any mailing list is part of the privacy and the ______
internet
in corporate organizations ________ can danger their reputation, turn away customers, and dramatically reduce revenues and profits
invasion of privacy
The right to _____ involves the knowledge of data storage and get notice database usage
know
Internal audits to measure actual results against established goals, such as percentage of end-user reports produce on time, percentage of data-input errors detected, number of input transactions entered per eight-hour shift, and keeping track of the amount of time employees spend on no-work related Web sites are examples of _______
monitoring policies and procedures
Job insecurity, loss of control, incompetence and demotion are _____ stress that can cause health concerns in an organization
occupational
In a recent survey of 2100 human resource professionals, which two activities were listed as the biggest "productivity killers" in the workplace? a. personal cell phone use and Internet surfing b. Internet surfing and online game play c. online shopping and online game play d. personal cell phone use and online game play
personal cell phone use and Internet surfing
RIFD tags and Mobile crowd and sensing (MCS) are part of the privacy and _____
personal sensing devices
The examples of _________ are the control in changes to critical tables, HTML and URLs, availability of manuals, availability of system reports with general content, the control of unreasonable data entry, make sure that data input, HTML, and URLs are valid, and make sure employees use proper procedures to input data correctly
policies and procedures
Not sending personal or private IMs at work, selecting a texting or IM app that receives high security ratings, disabling text previews when screen is locked, not opening files or links in messages from people you don't know, never sending sensitive personal data via IM, choosing appropriate IM screen name, and not sending embarrassing message is a way to ______
protect your privacy and your employer's property
Graydon noticed Jack, his friend and classmate, cheating on a physics exam and now he is trying to decide what to do about it. He knows he could keep quiet about it, but that would violate his moral values, plus the school's code of ethics requires students to report incidents of cheating. On the other hand, if he reports the incident, both his friend and probably all of their other friends will be mad at him. In which phase of the ethical decision-making process is Graydon? a. identifying options b. developing a problem statement c. gathering information d. weighing options
weighing options
The monitoring of employees inappropriate Web surfing and email, and the court ruling in favor of employers by taking away the 4th amendment rights from employees which protects against unreasonable searches and seizures are part of privacy at ________
work
Two primary causes of computer-related health problems are a poorly designed ______ and failure to take regular breaks to stretch the muscles and rest the eyes.
work environment