BIS 3233 chapter 2 study questions

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

The Cybersecurity Information ___ Act, passed in December 2015, allows private companies to share threat warnings with the U.S. government.

Sharing

Will the decision impact the privacy or property rights of any individuals or corporations? This question should be asked in which step of the 5 steps of an ethical analysis.

Step 2 - Determining the affected.

Select three common methods in which organizations collect data.

Third-party data purchase Direct inquiry Indirect tracking

The Universalist Principle states that

a decision must be fair for all involved.

In terms of the Internet, a cookie is

a small text file stored on a user's hard disk.

The second step in the five steps of an ethical analysis is to determine the

affected or impacted

Insurance companies use big ___ in actuarial analysis in order to more accurately estimate risk, often lowering the cost of their services.

data

Getting all the pertinent ___ is the first step in an ethical analysis

facts

The dimensions (categories) of ethical dilemmas raised by the use of information systems include challenges in which of these areas? More than one answer may be correct.

information privacy rights copyright and intellectual property rights quality of life honesty of content

Which amendment to the U.S. Constitution protects freedom of speech from government censorship?

1st

The ethical concerns of the digital age can be divided into ___ dimensions (categories).

5

There are ___ basic principles of ethical conduct.

5

Methodologies that attempt to deal with the vast amount of complex information that accumulates at high, and accelerating, velocity use ___ data.

Big

Which three of the following can encourage ethical computer use in the workplace?

Employee monitoring software Remote desktop software Setting a good example

Select the first step in the five steps of an ethical analysis.

Getting the facts

Using cookies to follow a customer's search history

Indirect tracking

A friend calls and says she is interviewing a former employee of yours. She asked if he used many sick days. Can you provide this information?

Information privacy rights

A starting point to investigate the complex topic of a society's ethics is first to understand the society's __ and the history behind the enacting of them.

laws

How have businesses reduced the likelihood of experiencing a data breach?

moving data storage to a cloud service provider such as Amazon Web Services

Cookies that are created by a website other than the one you are currently visiting and are used to track your surfing habits are called third- ___ cookies. These cookies are considered an invasion of privacy.

party

Cookies stored on your device's hard drive and remain even if your computer has been restarted are called ___ cookies.

persistent

Managers must protect the online ___ of employees and organization stakeholders.

privacy

Because prior management decisions might provide guidance on your current situation, the third step of an ethical analysis is to ___ .

search for precedents

Keystroke loggers and packet analyzers (sniffers) are two common types of ___.

spyware

Because it is difficult to trace and it is accessible through any internet connected device, cyber criminals often request payment in ____

Cryptocurrency

Acting with high morals means you live a virtuous life, while your ___ provide a rationals framework for your morals

Ethics

This keeps your computer from storing cookies, but doesn't securely hide your identity beyond the device because your IP address can still be tracked.

Private browsing

As a manager, you are entitled to 2 PTO (paid time off) days per month. Your boss encourages to use this time off and only asks that you check your email once per day to answer employee questions.

Quality of life

This software allows managers to take control of an employee's computer remotely. This also can capture the employee's computer's mouse and keyboard entries.

Remote desktop software

Select three of steps included in the 5 steps of an ethical analysis.

Searching for precedents. Determining who is affected. Getting all the pertinent facts.

The PATRIOT Act was enacted to monitor terrorist activities and communications following the 9/11 attacks and the 2001 Anthrax attack on Congress. PATRIOT stands for Providing Appropriate Tools Required to Intercept and Obstruct .

Terrorism

The Act that signed into law to monitor terrorist activities and communications following the 9/11 attacks and the 2001 anthrax attack on Congress is the

The USA PATRIOT Act/USA Freedom Act.

This essentially hides your IP address to outside websites by running your communications through a secure network.

Virtual private network (VPN)

In analyzing transactions, Target discovered that many people who buy diapers also buy milk in the same transaction. They use this information to discount the diapers, but raise the price of milk. What is the name of the approach Target used to discover this information?

big data

Direct inquiry, indirect tracking, and 3rd party data purchase are three common methods of ___ data.

collecting, gathering, getting, obtaining, or finding

This is a small text file of information created by websites you visit that your web browser stores on your hard disk.

cookie

Which of the following is the first of the five steps in an ethical analysis?

getting the facts

When conducting a five-step ethical analysis, the first step in the process is

getting the facts.

With regard to Internet privacy, the First Amendment to the U.S. Constitution is relevant because ___

it provides freedom of speech protection that extends to the Internet which means there is little government filtering of content.

The third step in the five-step process of conducting an ethical analysis is searching for

precedents

Making an ethical decision will most likely result in

unintended consequences

Select three privacy concerns associated with cookies.

Corporate and government entities can use cookies to monitor your surfing behavior. Websites can use cookies to track your surfing behavior and use this information to create specific user profiles. Websites that use cookies can collect information about surfing habits and sell that information to a variety of third-parties.

Checking your FICO score from each different agency every four months and watching for unusual activity.

Credit monitoring

Changing cookie settings in one browser (Chrome, for example) will automatically change your cookie settings in your other browsers (Safari, Firefox, Edge, for example).

False

Place the 5 steps of an ethical analysis in order.

Getting all the pertinent facts Determining who is affected Searching for precedents Listing and researching options Making a decision and preparing for the consequences of the decision

Which of the following is true of structured data? More than one answer may be selected.

It has a defined length, type, and format. It can include numbers and dates. It contains confidential information such as passwords.

Select three correct statements regarding international Internet privacy laws.

It is very difficult to get nations across the globe to agree on standardized Internet privacy laws. International laws on Internet privacy vary greatly. The European Union (EU) European Commission Data Protection Directive states that under EU law, personal data can only be gathered legally under strict conditions.

Along with the employee, which of the following is most responsible for an employee's ethical behavior?

Management

Technology has brought about many ethical challenges. One of these technologies is Deepfake. Deepfake refers to ___.

Modifying images or video by replacing one person's likeness with that of another.

Cookies are stored on the hard drive and are not lost when the web browser is closed are called ___ cookies.

Persistent

Select three steps you can take to help to safeguard your privacy in the digital age.

Practice safe online purchasing techniques Incorporate anti-virus protection Monitor your credit reports

The principle that asks the decision maker to imagine the answer a highly moral person would have for the same question is the

Principle of virtue

Which type of cookie is not stored on your computer's hard drive but instead just resides in memory while you visit a website?

Session cookie

Which of the following is not one of the steps included in the 5 steps of an ethical analysis?

Setting a strong example.

Which Act, signed into law in December 2015, allows companies to share cyber-security threat information with the U.S. government?

The Cybersecurity Information Sharing Act

Which of the following allows, but does not require, private companies to warn the U.S. government about cyber-security threats?

The Cybersecurity Information Sharing Act

The laws that were created to update copyright laws dealing with the issues of regulating digital material in accordance with World Intellectual Property Organization treaties is called:

The Digital Millennium Copyright Act (DMCA)

Which Act protects email and VoIP communications by making it illegal to intercept calls or messages without a warrant.

The Electronic Communications Privacy Act

Which law, passed in 1986, protects email and VoIP communications by making it illegal to intercept calls or messages without a warrant.

The Electronic Communications Privacy Act

This Act outlines a plan to protect government information and assets against cyber threats. It requires each federal agency to develop a plan for information security. This Act outlines a plan to protect government information and assets against cyber threats. It requires each federal agency to develop a plan for information security. drop zone empty.

The Federal Information Security Management Act

Which Act outlines a plan to protect government information and assets against cyber threats.

The Federal Information Security Management Act (FISMA)

There are five basic ethical principles that we can look to when facing an ethical dilemma. Select the three ethical principles from the choices offered.

The Principle of Distributive Justice The Principle of Moral Rights The Principle of Virtue

The Act that protects person-to-person wire, oral, and electronic communications is ___.

The Wiretap Act

In 1998, the Child Online Protection Act of was sponsored by both Democrats and Republicans, passed by both houses of Congress, and signed into law by President Clinton. Why can't an offender be punished today for violating this law?

The law was later found unconstitutional for violating the First Amendment (freedom of speech).

Which statement encompasses the third step of the five-step process of an ethical analysis?

There is an extremely good chance that other managers, perhaps in your own organization, have faced similar dilemmas.

Buying a list of potential customers from an outside agency

Third party data purchase

Select the three major titles of the Digital Millennium Copyright Act (DMCA) that impact digital copyright protection.

Title 2 - This act protects Internet Service Providers (ISPs) from being sued for copyright infringement when the ISP's user wrongfully copies items from the Internet. Title 1 - This act requires that measures be taken to make it difficult to copy analog video recordings. Title 4 - This act facilitates distance learning by allowing educational institutions latitude with regard to the use of copyrighted material.

The federal law that protects person-to-person wire, oral, and electronic communications and also includes a variety of network crime statutes that include identity theft and unlawful access to stored communications is The ___ Act.

Wiretap

The U.N. General Assembly adopted resolution 68/167 in December 2013 that affirms that the rights held by people offline must also be protected online, and it called upon all Member States (nations) to respect and protect the right to privacy in digital communication. This means that ___

even though it sounds good, Internet users should be aware that digital privacy is not honored by many on the Internet.

The First Amendment to the U.S. Constitution affects Internet privacy because it

extends freedom of speech protection to the Internet, which means government does little filtering of content.

From the following list, select all the scenarios that illustrate the named dimension (category) of ethical behavior in the digital age.

information privacy rights: A friend calls and says she is interviewing a former employee of yours. She asked if he used many sick days. Can you provide this information? copyrights and intellectual property rights: Your gym provides childcare during your spinning class. Can the caregiver play a Disney movie for the toddlers? quality of life: As a manager, you are entitled to two PTO (paid time off) days per month. Can your boss ask you to check your work email once per day to answer employee questions?

Management can discourage the inappropriate use of business computers by publicly announcing that their organization uses employee ___ software or remote desktop software.

monitoring

A wide-ranging term that refers to a variety of considerations including; how data and information is used, who has access to data and information, the techniques and technologies used to protect sensitive and private data, communications, and preferences is Internet ___.

privacy

The principle of ethical conduct that states that some decisions are either morally right or morally wrong is called the principle of moral

rights

Which of the following are common techniques used by antivirus software to identify malware? More than one answer may be selected.

searching for the specific set of data that makes up a virus' signature examining files for suspicious characteristics without an exact signature match quarantining all emails that are sent by someone who is not in the user's contact list

A type of cookie, sometimes called a transient cookie, that is not stored but just kept in memory when a user visits a website is called a ___ cookie.

session

Even though the Child Online Protection Act of 1998 was sponsored by both Democrats and Republicans and was passed by both Houses of Congress and signed into law by President Clinton, you cannot be punished for violating law because ___ .

the law violated the 1st Amendment (freedom of speech) rights and was found unconstitutional.

Which principle of ethical conduct states that there exist certain moral values that should always be upheld or never be violated?

The Principle of Moral Rights

Which law, passed after the 9/11 attacks allowed law enforcement to obtain information about online and offline communications related to terrorist activities without a warrant.

The US PATRIOT Act/USA Freedom Act

Data that has a defined length, type, and format, including items as numbers, dates, or strings such as a customer profile is referred to as ___ data.

structured

Which type of cookie is lost only if deleted or if is created with an expiration date?

A persistent cookie

Which two of the following are examples of ethical concerns that have been created as a result of new technologies?

Cyberbullying Digital piracy

Having a customer fill out a survey

Direct inquiry

This federal law protects person-to-person wire, oral, and electronic communications.

The wiretap act

What are important considerations for managing cookies? More than one answer may be correct

Users should determine what cookie settings is appropriate for your browser use and privacy protection. Users should be aware that cookie settings must be adjusted in each browser. Most users appreciate third-party cookies and the value they bring to browsing.

Which of the following is an example of direct inquiry?

asking a customer to fill out a survey after calling customer service

When facing a moral dilemma, it is useful to be aware of the five principles of ethical

conduct

Raw facts that describe the characteristics of an event, object, or set of information that can be entered into a computer is.

data

Describe categories of intellectual property rights. More than one answer may be correct.

patents, copyrights, trade secrets

Which of the following are correct statements regarding credit monitoring? More than one answer may be selected.

Ordering your FICO score from each major credit agency multiple times a year is an easy way to keep track of your credit score. Soft inquiries do not affect your credit rating. Credit monitoring and identity theft protection are the same thing.

Spyware is software that collects information about your Internet surfing habits and behaviors. Spyware includes the collection of which three of the following?

Account numbers Passwords Keystrokes

Which of the following are examples of an organization using big data and analyzing predictive behavior with the goal of creating new offerings? More than one answer may be selected.

Amazon tracks what people who viewed inflatable water slides ultimately put in their cart and purchased. Facebook tracks which news stories a user clicks on. The Gap tracks which promotional emails people cause people to go to their site and make a purchase.

These programs use a variety of techniques to identify and remove viruses and malware.

Anti-virus software

In analyzing transactions, Walmart discovered that many people who buy Children's Tylenol in their stores also buy orange juice in the same transaction. They used this information to discount Children's Tylenol but raise the price of orange juice during flu season. What is the name of the approach Walmart used to discover this information?

Big data

Predicting the impact of weather phenomenon of transportation routes, allowing logisticians to anticipate risks and the associated expense involved, is an example of organizational use of ___.

Big data

In the settings area of each browser you should consider adjusting which three of the following?

Blocking or customizing your cookie settings Deleting cookies Deciding from which sites you want to allow cookies

Select two ways managers encourage employees to act unethically.

By failing to act ethically themselves. By not enforcing strong ethical behavior.

Small text files created by websites you visit that your web browser stores on your hard disk are called _____.

Cookies

Your gym provides child care during your spinning class. Can the care play a Disney movie for the toddlers?

Copyright and Intellectual property rights


Set pelajaran terkait

TUCKER ECON2013 EXAM 3-CH9/10 MULTIPLE CHOICE

View Set

Maternal Child Nursing Care Chapter 8 Nursing Care of the Family During Pregnancy

View Set