Ethics and Privacy concerns

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

The group of laws created to update copyright laws concerning regulation of digital material in accordance with World Intellectual Property Organization treaties is known as the

Digital Millennium Copyright Act (DMCA).

Which of the following laws allows law enforcement to obtain information about online and offline communications related to terrorist activities without a warrant?

The USA PATRIOT Act/USA Freedom Act

Methodologies that attempt to deal with the vast amount of complex information that accumulates at high, and accelerating, velocity use big data.

True

Searching for precedents or examples is the third step in the five-step process of conducting an ethical analysis. Group starts

True

Which of the following determines the interest rate you'll be charged when you want to borrow money?

credit report

Cyber criminals often demand ________ as a ransom payment because this type of money is difficult to trace and accessible through any Internet-connected device

cryptocurrency

When making an ethical analysis, you should get all the pertinent facts and then

determine the affected.

Which of the following actions would violate an organization's prohibitions on the personal use of company computers as well as the law in most countries?

distributing company-owned software without authorization

Which dimension of ethical behavior in the digital age includes the question of how much time employees are allowed to spend browsing social media?

establishing standards

A large corporation purchases and sells consumer data. This is referred to as big data collecting.

false

A password is a biometric measure used to prevent unauthorized access to data and user accounts.

false

A type of cookie, sometimes called a transient cookie, that is not stored but just kept in memory when a user visits a website is called an authentication cookie.

false

Cookies stored on your device's hard drive and remain even if your computer has been restarted are called authentication cookies.

false

Direct inquiry, indirect tracking, and third-party data purchase are three common methods of predictive analytics.

false

Due to increased standardization of international laws, students can relax their online vigilance when traveling or studying abroad. Group starts

false

On a website that includes a checkbox for visitors to indicate whether they want to receive site news, for instance, if the box is already checked, it is an opt-in mechanism. If the checkbox is not already checked, it is called an opt-out mechanism. Group starts

false

PATRIOT stands for Providing Appropriate Tools Required for International Online Trade.

false

Raw facts that describe the characteristics of an event, object, or set of information that can be entered into a computer are known as cookies.

false

The two major categories of computer ethics violations are personal activities and organizational policy violations.

false

When managers must make a difficult choice that has a moral component, they should look to principles of ethical strategy.

false

Your right to have your personal information protected online is covered by your property rights.

false

To address the ethical concerns surrounding ________, many employee handbooks state that the organization must use data responsibly and always respect privacy.

information privacy rights

What is the fourth step in a five-step ethical analysis?

listing options

When making an ethical analysis, what is the last thing a manager should do before making a decision and preparing for the consequences?

listing options

How your private data and information are used, who has access to them, which techniques and technologies protect them, and the communications and preferences surrounding how they are handled are components of Internet

privacy.

Which dimension of ethical concerns would examine the issue of how playing video games relates to or influences childhood obesity?

quality of life

Which step of an ethical analysis is designed to enable a manager to obtain guidance or insights from other managers?

searching for precedents

What type of cookie is stored in temporary memory and is lost when the web browser is closed?

session

Which 1986 law makes it illegal to intercept calls or messages without a warrant?

the Electronic Communications Privacy ActCorrect

The Act that protects person-to-person wire, oral, and electronic communications is

the Wiretap Act.

Cookies that are created by a website other than the one you are currently visiting and are used to track your surfing habits are known as ________ cookies.

third-party

What is antivirus software used for?

to scan files to identify and remove computer viruses and other malicious programs

Establishing standards is the dimension (category) of ethical concerns that involves determining the proper levels of protection for digital information. Group starts

true

In a five-step ethical analysis, the second step is to determine whom will be affected by a decision.

true

Intellectual property laws protect against unauthorized use of software and many other digital products.

true

Listing the likely consequences of a decision is part of the fourth step in the process of making an ethical analysis.

true

One concern that falls under the ethical dimension of quality of life is the fact that the more time teens spend on social media, the more likely they are to suffer from depression

true

Using cookies to follow someone's browsing habits is a form of data collection called indirect tracking. Group starts

true


संबंधित स्टडी सेट्स

Exam 2 practice questions for ch 7

View Set

Declaration of Independence Principles

View Set

Chapter 11 - Intrapartum and Postpartum Care of Cesarean Birth Families

View Set

Ch 8 Process Management -Lean and Six sigma in the supply chain

View Set

Becoming a DEI Ally and Agent for Change

View Set