C961 Review

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

The leader of an IT department is approached by one of her managers to ask for a salary increase. The manager does a fantastic job of presenting a solid rationale for the increase. At the end his presentation, he says he knows the salaries of all his colleagues because he accessed the payroll file on the company network. Which law may this leader's organization use against this manager?

Computer Fraud and Abuse Act

The leader of an information technology department is made aware of brute-force attacks on her organization. The attacks are being conducted from a remote site and are a threat to data access and accuracy. Which law may this leader's organization use against the attackers?

Computer Fraud and Abuse Act

The leader of an IT department is approached by one of her managers to ask for a salary increase. The manager does a fantastic job of presenting a solid rationale for the increase. At the end his presentation, he says he knows the salaries of all his colleagues because he accessed the payroll file on the company network. Which part of the security triad was violated?

Confidentiality

A remote U.S. programmer is hired by a foreign European video game company. He recently discovered that the company was secretly collecting images and videos (data) of U.S. users, including children, without their permission or parental consent. Assortments of images and videos were uploaded to a third-party social media website the company uses. Images and videos included children, 12 years and younger, and assigned names, home addresses, and reviews that were all fake. Which action should this programmer take to handle this situation?

Contact and inform the FBI and the social media site of the company's activities.

What must business leaders do to make sound decisions?

Follow established policies and procedures

What is the first step in investigating an ethical challenge?

Gather the facts

There is a news story about employees of a pharmacy at a local grocery store inadvertently releasing patient information. According to the story, the pharmacy employees printed patient records to review them and later threw them into the grocery store dumpster. Which privacy law was violated by these pharmacy employees?

HIPAA

There are eight cities that impose a sugary drink tax. The purpose of this tax is to provide revenue for the city for additional educational support while reducing consumption of sugary drinks. An algorithmic decision-making process is used to collect data from different sources for a research project. The goal of the research project is to explore behaviors of the people in those cities before and after the tax. The agency the researcher works for has many resources to mine data. What concerns should this researcher have about these resources?

Rights and ownership of the data

Which element states what actions will be taken against an individual who violates an acceptable use policy (AUP)?

Sanctions

What issue can be avoided when a well-defined problem statement and exceptional communication are present during an IT project?

Scope creep

The leader of an IT department is approached by one of her managers to ask for a salary increase. The manager does a fantastic job of presenting a solid rationale for the increase. At the end his presentation, he says he knows the salaries of all his colleagues because he accessed the payroll file on the company network. Which method may have mitigated the threat posed by the manager?

Proper access control

There are eight cities that impose a sugary drink tax. The purpose of this tax is to provide revenue for the city for additional educational support while reducing consumption of sugary drinks. An algorithmic decision-making process is used to collect data from different sources for a research project. The goal of the research project is to explore behaviors of the people in those cities before and after the tax. Which best practice standard should be enforced to ensure IT personnel are properly trained?

Reasonable professional standard

There are eight cities that impose a sugary drink tax. The purpose of this tax is to provide revenue for the city for additional educational support while reducing consumption of sugary drinks. An algorithmic decision-making process is used to collect data from different sources for a research project. The goal of the research project is to explore behaviors of the people in those cities before and after the tax. What can a novice researcher use to ensure data is accurate?

Sites that promote information accuracy and objectivity

Why is it important for IT professionals to incorporate good ethical practices?

So that employees are prepared to handle situations that could lead to misconduct.

A student makes two copies of a software package that he just purchased and sells one to a friend. Which assessment describes this student's action?

Unethical and illegal

Data collection methods and processes continue to emerge into more industries, fields, and agencies. Meanwhile, the regulations governing the use and sharing of this data continue to evolve. However, data collection is still somewhat new, and there is a tangible gap in the legislation of ethical codes and guidelines to establish clear principles of collection and use. What may providing unrestricted access to consumers' data without protecting each individual's privacy or identity be to consumers?

Unethical and risky

What is an example of corporate social responsibility (CSR)?

A local IT firm invests in green energy by partnering with a small business to install solar panels in the office.

Which entity provides a technology code of ethics to its constituents?

A professional organization

Most organizations with a published code of ethics have a provision for an employee to report expected wrongdoing by others within the organization. What is the person exercising this right known as?

A whistle-blower

The implementation deadline for a highly visible IT project that will improve global client services is going to be missed due to a data integrity issue. An IT team member from an international country is confident that he has the solution code, but he does not have the resources to the test code. The project leader is receiving a lot of pressure to complete the project. What should this project leader do?

Accept the code, test it, and implement the project late

A code of ethics is a set of principles and rules used by companies, professional organizations, and individuals to govern their decision making in choosing between right and wrong. Intellectual property covers protections that involve copyrights, trademarks, trade secrets, and patents. Which scenario is a violation of a code of conduct?

An employee makes a copy of company software and takes it home to share with his friends.

Many computer-enabled equipment including tablets, smartphones, and vehicles is used to track the location of users. Corporations issue these devices to their employees to help them perform their jobs more efficiently. IT personnel can work remotely to assist customers and clients with various technology issues and projects. Some professionals are also provided a company-owned vehicle with GPS capabilities, which gives the employer 24/7 access to the employee's movements. An IT worker uses a company-owned vehicle to transport illegal drugs. How does the use of auto-tracking devices explain the ethical issue in this scenario?

An employer can use GPS-tracking data as evidence for the investigation.

What does the Bathsheba syndrome refer to?

Ethical failure of people in power

An avid software developer opens a software business and registers the company using SIC 7371 and NAICS 541511 codes. The product the firm produces dictates its viability, but the software has a reputation of being defective. To ensure the success of the firm, several developers were terminated for producing malicious software. What may these terminated employees be classified as?

Black hat hackers

As part of a college's requirement for degree completion, a student is required to work in a team of three to create a business plan for a company of her choice. She has two good friends who started the program with her, and all have agreed to work together. After several brainstorming meetings, everyone agrees that the company would be a startup. The main focus of this business would be providing services for nonprofessional caregivers. The company defines nonprofessional caretakers as family members taking care of relatives in a private home environment. Three years after graduation, this individual invites friends and business leaders to the launch of her startup. Halfway through the celebration, her two friends from school realize she implemented the business plan without asking them for permission or inviting them to be partners. She offers to pay them a set amount to walk away. What are the two ethical issues violated?

Bribery,Piracy

As part of a college's requirement for degree completion, a student is required to work in a team of three to create a business plan for a company of her choice. She has two good friends who started the program with her, and all have agreed to work together. After several brainstorming meetings, everyone agrees that the company would be a startup. The main focus of this business would be providing services for nonprofessional caregivers. The company defines nonprofessional caretakers as family members taking care of relatives in a private home environment. Which organization would offer more comprehensive training programs to support caregivers?

Centers for Medicare & Medicaid Services (CMS)

A remote U.S. programmer is hired by a foreign European video game company. He recently discovered that the company was secretly collecting images and videos (data) of U.S. users, including children, without their permission or parental consent. Assortments of images and videos were uploaded to a third-party social media website the company uses. Images and videos included children, 12 years and younger, and assigned names, home addresses, and reviews that were all fake. Which regulation would address this video game company's actions concerning the child user?

Children's Online Privacy Protection Act (COPPA)

What is the first step in an ethical decision-making process?

Develop a problem statement

There are eight cities that impose a sugary drink tax. The purpose of this tax is to provide revenue for the city for additional educational support while reducing consumption of sugary drinks. An algorithmic decision-making process is used to collect data from different sources for a research project. The goal of the research project is to explore behaviors of the people in those cities before and after the tax. The researcher is not familiar with IT and visits a data site outside of the resources provided by the organization. Within an hour of access, employees are having difficulties performing job duties because their computer is frozen. The IT department identified the DDoS source and eradicated it. What should this IT department do to avoid this happening again?

Develop and maintain a risk management plan

A remote U.S. programmer is hired by a foreign European video game company. He recently discovered that the company was secretly collecting images and videos (data) of U.S. users, including children, without their permission or parental consent. Assortments of images and videos were uploaded to a third-party social media website the company uses. Images and videos included children, 12 years and younger, and assigned names, home addresses, and reviews that were all fake. What is the IT issue concerning this videotaping of these unsuspecting users?

Electronic surveillance

What may be a representation of data that may be inappropriately shared by an IT professional?

Employee records

Which best practice should help reduce the different ethical problems IT professionals face on a daily basis?

Establishing and implementing an acceptable use policy

As part of a college's requirement for degree completion, a student is required to work in a team of three to create a business plan for a company of her choice. She has two good friends who started the program with her, and all have agreed to work together. After several brainstorming meetings, everyone agrees that the company would be a startup. The main focus of this business would be providing services for nonprofessional caregivers. The company defines nonprofessional caretakers as family members taking care of relatives in a private home environment. During operating hours, caregivers come in to get information and use computers. Many of the websites that caregivers visit ask for personal information when filling out forms. When the caregiver leaves the facility, completed forms (including confidential patient information) are left on the computer for others to view. What should these caregivers be educated on to help reduce this practice?

Health Insurance Portability and Accountability Act (HIPAA)

Many computer-enabled equipment including tablets, smartphones, and vehicles is used to track the location of users. Corporations issue these devices to their employees to help them perform their jobs more efficiently. IT personnel can work remotely to assist customers and clients with various technology issues and projects. Some professionals are also provided a company-owned vehicle with GPS capabilities, which gives the employer 24/7 access to the employee's movements. An IT professional traveling for a work assignment decides to take a detour for personal business and due to excessive speed, causes an auto accident. Who is responsible for damages?

IT workers who breach the duty of care are accountable for injuries.

A remote U.S. programmer is hired by a foreign European video game company. He recently discovered that the company was secretly collecting images and videos (data) of U.S. users, including children, without their permission or parental consent. Assortments of images and videos were uploaded to a third-party social media website the company uses. Images and videos included children, 12 years and younger, and assigned names, home addresses, and reviews that were all fake. What is the ethical issue concerning these posted images or videos of unsuspecting users?

Identity theft

There is a news story about employees of a pharmacy at a local grocery store inadvertently releasing patient information. According to the story, the pharmacy employees printed patient records to review them and later threw them into the grocery store dumpster. How may the source of this IT issue be described?

Lack of internal controls

As part of a college's requirement for degree completion, a student is required to work in a team of three to create a business plan for a company of her choice. She has two good friends who started the program with her, and all have agreed to work together. After several brainstorming meetings, everyone agrees that the company would be a startup. The main focus of this business would be providing services for nonprofessional caregivers. The company defines nonprofessional caretakers as family members taking care of relatives in a private home environment. Three years after graduation, this individual invites friends and business leaders to the launch of her startup. Halfway through the celebration, her two friends from school realize she implemented the business plan without asking them for permission or inviting them to be partners. She offers to pay them a set amount to walk away. How may the actions of this business owner be described?

Illegal and unethical

In an effort to reduce costs, a start-up organization is running pirated software. How may the actions of these leaders be characterized?

Illegal and unethical

There is a news story about employees of a pharmacy at a local grocery store inadvertently releasing patient information. According to the story, the pharmacy employees printed patient records to review them and later threw them into the grocery store dumpster. How may the actions of these pharmacy employees be characterized?

Illegal and unethical

There is a news story about employees of a pharmacy at a local grocery store inadvertently releasing patient information. According to the story, the pharmacy employees printed patient records to review them and later threw them into the grocery store dumpster. What explains this ethical issue?

Inappropriate sharing

What is one outcome leaders should be aware of when making organizational decisions?

Increasing profits and revenues

Many computer-enabled equipment including tablets, smartphones, and vehicles is used to track the location of users. Corporations issue these devices to their employees to help them perform their jobs more efficiently. IT personnel can work remotely to assist customers and clients with various technology issues and projects. Some professionals are also provided a company-owned vehicle with GPS capabilities, which gives the employer 24/7 access to the employee's movements. Many IT professionals feel their privacy is violated when employers use GPS-tracking devices. What describes the employer's point of view?

Legal and ethical

An avid software developer opens a software business and registers the company using SIC 7371 and NAICS 541511 codes. A software developer's code defines the business. An employee created a product to corrupt data every couple of weeks. During the testing phase, the code worked as planned, and the company and the end user accepted it. After one week, the end user's data were corrupted. How may this threat be described?

Malware

An avid software developer opens a software business and registers the company using SIC 7371 and NAICS 541511 codes. This business is contracted to create a resource management system to automate processes. The company modified an open source code and marketed it as proprietary software, charging other companies thousands of dollars to use it. What may this open source community obtain to avoid this practice?

Open source license

Many computer-enabled equipment including tablets, smartphones, and vehicles is used to track the location of users. Corporations issue these devices to their employees to help them perform their jobs more efficiently. IT personnel can work remotely to assist customers and clients with various technology issues and projects. Some professionals are also provided a company-owned vehicle with GPS capabilities, which gives the employer 24/7 access to the employee's movements. What describes an employee's legal rights when an employer is using an auto-tracking device to monitor the employee's whereabouts?

The employer must obtain employee consent before installing an auto-tracking device.

Which ethical framework tries to identify alternatives that will produce the most good and do the least harm?

The utilitarian framework

Why is it important for leaders to understand how technology affects their organization's daily practices?

To understand possible legal ramifications

An avid software developer opens a software business and registers the company using SIC 7371 and NAICS 541511 codes. Which type of ethics is absent when workers purposely defame their employer by demonstrating unethical behaviors without considering the impact on information systems?

Virtue ethics


Set pelajaran terkait

Chapter 9: Legal Issues with a New Business

View Set

Database Fundamentals (aioTestKing)

View Set

1.06 Quiz: Power and Government Part 2

View Set