Chapter 12 study notes

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

This software allows managers to take control of an employee's computer remotely.

Remote desktop software

The Act that outlines a plan to protect government information and assets against cyber threats and requires each federal agency to develop a plan for information security is The Federal Information __________ Management Act (FISMA).

Security

Which type of cookie is not stored on your computer's hard drive but instead just resides in memory while you visit a website?

Session cookie

The PATRIOT Act was enacted to monitor terrorist activities and communications following the 9/11 attacks and the 2001 Anthrax attack on Congress. PATRIOT stands for Providing Appropriate Tools Required to Intercept and Obstruct __________.

Terrorism

Which Act, signed into law in December 2015, allows companies to share cyber-security threat information with the U.S. government?

The Cybersecurity Information Sharing Act

Which of the following allows, but does not require, private companies to warn the U.S. government about cyber-security threats?

The Cybersecurity Information Sharing Act

Which law or set of laws implements two World Intellectual Property Organization (WIPO) treaties and was created to update copyright laws dealing with the issues of regulating digital material.

The Digital Millennium Copyright Act (DMCA)

Which Act protects email and VoIP communications by making it illegal to intercept calls or messages without a warrant.

The Electronic Communications Privacy Act

Which law, passed in 1986, protects email and VoIP communications by making it illegal to intercept calls or messages without a warrant.

The Electronic Communications Privacy Act

Select three correct statements regarding international Internet privacy laws.

The European Union (EU) European Commission Data Protection Directive states that under EU law, personal data can only be gathered legally under strict conditions. International laws on Internet privacy vary greatly. It is very difficult to get nations across the globe to agree on standardized Internet privacy laws.

This Act outlines a plan to protect government information and assets against cyber threats. It requires each federal agency to develop a plan for information security.

The Federal Information Security Management Act

Which law, passed after the 9/11 attacks allowed law enforcement to obtain information about online and offline communications related to terrorist activities without a warrant.

The US PATRIOT Act/USA Freedom Act

Select the three major titles of the Digital Millennium Copyright Act (DMCA) that impact digital copyright protection.

Title 4 - This act facilitates distance learning by allowing educational institutions latitude with regard to the use of copyrighted material. Title 2 - This act protects Internet Service Providers (ISPs) from being sued for copyright infringement when the ISP's user wrongfully copies items from the Internet. Title 1 - This act requires that measures be taken to make it difficult to copy analog video recordings.

The federal law that protects person-to-person wire, oral, and electronic communications and also includes a variety of network crime statutes that include identity theft and unlawful access to stored communications is The __________ Act.

Wiretap

Raw facts that describe the characteristics of an event, object, or set of information that can be entered into a computer is __________.

data

The U.N. General Assembly adopted resolution 68/167 in December 2013 that affirms that the rights held by people offline must also be protected online, and it called upon all Member States (nations) to respect and protect the right to privacy in digital communication. This means that ___

even though it sounds good, Internet users should be aware that digital privacy is not honored by many on the Internet.

Small text files created by websites you visit that your web browser stores on your hard disk are called _____.

Cookies

A religious leader might instruct you on how to uphold high morals, but the reasons for acting morally are based on your ___.

Ethics

Along with the employee, which of the following is most responsible for an employee's ethical behavior?

Management

Technology has brought about many ethical challenges. One of these technologies is Deepfake. Deepfake refers to ___.

Modifying images or video by replacing one person's likeness with that of another.

Select three steps you can take to help to safeguard your privacy in the digital age.

Monitor your credit reports Practice safe online purchasing techniques Incorporate anti-virus protection

A starting point to investigate the complex topic of a society's ethics is first to understand the society's ___________ and the history behind the enacting of them.

law or laws

Management can discourage the inappropriate use of business computers by publicly announcing that their organization uses employee __________ software or remote desktop software.

monitoring

A wide-ranging term that refers to a variety of considerations including; how data and information is used, who has access to data and information, the techniques and technologies used to protect sensitive and private data, communications, and preferences is Internet ___.

privacy

Managers must protect the online ___ of employees and organization stakeholders.

privacy

Monitoring your credit, creating strong passwords, using anti-virus protection, and practicing safe browsing techniques are methods of protecting your personal __________ while using the Internet.

privacy, identity, or reputation

Data that is typically used in commercially available relational databases, where the data resides in a fixed field and can easily be queried, is called ___ data.

structured

Even though the Child Online Protection Act of 1998 was sponsored by both Democrats and Republicans and was passed by both Houses of Congress and signed into law by President Clinton, you cannot be punished for violating law because ___ .

the law violated the 1st Amendment (freedom of speech) rights and was found unconstitutional.

The principle of ethical conduct that states that you should think of someone you truly admire, perhaps a mentor, and ask yourself what decision they would make is the principle of __________.

virtue

There are five basic ethical principles that we can look to when facing an ethical dilemma. Select the three ethical principles from the choices offered.

The Principle of Virtue The Principle of Moral Rights The Principle of Distributive Justice

Which two of the following are examples of ethical concerns that have been created as a result of new technologies?

Digital piracy Cyberbullying

Which principle of ethical conduct states that there exist certain moral values that should always be upheld or never be violated.

The Principle of Moral Rights

The principle of ethical conduct that states that some decisions are either morally right or morally wrong is called the principle of moral __________.

rights

A type of cookie, sometimes called a transient cookie, that is not stored but just kept in memory when a user visits a website is called a __________ cookie.

session

Which amendment to the U.S. Constitution protects freedom of speech from government censorship?

1st

There are ___ basic principles of ethical conduct.

5

Select two ways managers encourage employees to act unethically.

By not enforcing strong ethical behavior. By failing to act ethically themselves.

This is a small text file of information created by websites you visit that your web browser stores on your hard disk.

Cookie

The Act that protects person-to-person wire, oral, and electronic communications is ___.

The Wiretap Act

This principle asks the decision-maker to consider what a highly moral person would do when faced with this question.

Principle of Virtue


Set pelajaran terkait

Funds Exam 3 Ch 5 EAQs and practice questions

View Set

Combining and Dissolving Corporations

View Set

Human Development Chapter 13 Study Guide

View Set

Cardiovascular, Hematologic and Lymphatic Systems

View Set