Ethics and Privacy

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Will the decision impact the privacy or property rights of any individuals or corporations? This question should be asked in which step of the 5 steps of an ethical analysis.

Step 2 - Determining the affected.

The PATRIOT Act was enacted to monitor terrorist activities and communications following the 9/11 attacks and the 2001 Anthrax attack on Congress. PATRIOT stands for Providing Appropriate Tools Required to Intercept and Obstruct ___

Terrorism

Customers are offered a 20% off coupon if they complete a survey. This is an example of direct inquiry.

True A survey is an example of a way in which an organization can directly engage with a customer to gather data and is an example of direct inquiry.

Methodologies that attempt to deal with the vast amount of complex information that accumulates at high, and accelerating, velocity use ____ data.

big

The purpose of spyware is to ______.

capture the user's account data, passwords, key strokes, and more

When facing a moral dilemma, it is useful to be aware of the five principles of ethical __

conduct

Small text files created by websites you visit that your web browser stores on your hard disk are called

cookies

Which ethical concern has developed as a result of new technologies? More than one answer may be correct.

cyberbullying digital privacy

While a religious leader may provide guidance on how to uphold high morals, ________ provide the reasons for acting morally.

ethics

Living a virtuous life involves acting with high morals that are logically defined or shaped by

ethics.

Direct inquiry, indirect tracking, and third-party data purchase are three common methods of predictive analytics.

false Direct inquiry, indirect tracking, and third-party data purchase are three common methods of collecting data.

The ethical concerns of the digital age can be divided into ___ dimensions (categories).

5

There are ___ basic principles of ethical conduct.

5

In the settings area of each browser you should consider adjusting which three of the following?

Deleting cookies Blocking or customizing your cookie settings Deciding from which sites you want to allow cookies

Having a customer fill out a survey

Direct inquiry

Acting with high morals means you live a virtuous life, while your ___ provide a rational framework for your morals

Ethics

Before an ethical analysis can begin, one must get all the pertinent facts surrounding the situation.

False Getting facts is the first step

The software code of a particular computer virus is called the virus DNA.

False The software code of a particular computer virus is called the virus signature.

Select three of steps included in the 5 steps of an ethical analysis.

Getting all the pertinent facts. Determining who is affected. Searching for precedents.

Select three steps you can take to help to safeguard your privacy in the digital age.

Incorporate anti-virus protection Monitor your credit reports Practice safe online purchasing techniques

Using cookies to follow a customer's search history

Indirect tracking

Select three common methods in which organizations collect data.

Indirect tracking Direct inquiry Third-party data purchase

With regard to Internet privacy, the First Amendment to the U.S. Constitution is relevant because ___

it provides freedom of speech protection that extends to the Internet which means there is little government filtering of content.

Cookies that are created by a website other than the one you are currently visiting and are used to track your surfing habits are called third- ____ cookies. These cookies are considered an invasion of privacy.

party

Monitoring your credit, creating strong passwords, using anti-virus protection, and practicing safe browsing techniques are methods of protecting your personal ___ while using the Internet.

privacy , identity, reputation

How your private data and information are used, who has access to them, which techniques and technologies protect them, and the communications and preferences surrounding how they are handled are components of Internet.

privacy.

Keystroke loggers and packet analyzers (sniffers) are two common types of ___.

spyware

Data that is typically used in commercially available relational databases, where the data resides in a fixed field and can easily be queried, is called ___ data.

structured

The principle of ethical conduct that states that you should think of someone you truly admire, perhaps a mentor, and ask yourself what decision they would make is the principle of ____

virtue

Match the issue with the appropriate dimension (category) of ethical behavior in the digital age.

A friend calls and says she is interviewing a former employee of yours. She asked if he used many sick days. Can you provide this information? - Information Privacy Rights Your gym provides child care during your spinning class. Can the care play a Disney movie for the toddlers? - Copyrights and Intellectual Property Rights As a manager, you are entitled to 2 PTO (paid time off) days per month. Your boss encourages to use this time off and only asks that you check your email once per day to answer employee questions. - Quality of Life

Which type of cookie is lost only if deleted or if is created with an expiration date?

A persistent cookie

Small text files created by websites you visit that your web browser stores on your hard disk are called _____.

Cookies

Which two of the following are examples of ethical concerns that have been created as a result of new technologies?

Digital piracy Cyberbullying

This keeps your computer from storing cookies, but doesn't securely hide your identity beyond the device because your IP address can still be tracked.

Private browsing

This software allows managers to take control of an employee's computer remotely.

Remote desktop software

The Cybersecurity Information ___ Act, passed in December 2015, allows private companies to share threat warnings with the U.S. government.

Sharing

Which Act, signed into law in December 2015, allows companies to share cyber-security threat information with the U.S. government?

The Cybersecurity Information Sharing Act

What Act was enacted to monitor terrorist activities and communications following the 9/11 attacks and the 2001 Anthrax attack on Congress?

The US PATRIOT Act/USA Freedom Act

The Act that protects person-to-person wire, oral, and electronic communications is ___.

The Wiretap Act

Changing cookie settings in one browser (Chrome, for example) does not automatically change your cookie settings in your other browsers (Safari, Firefox, Edge, for example).

True

Due to the lack of normalized laws, it is important to use discretion on the Internet when traveling or living abroad.

True

Select two important considerations for managing cookies.

Users should be aware that cookie settings must be adjusted in each browser. Users should determine what cookie settings is appropriate for your browser use and privacy protection.

This essentially hides your IP address to outside websites by running your communications through a secure network.

Virtual private network (VPN)

Direct inquiry, indirect tracking, and 3rd party data purchase are three common methods of ____ data

collecting

Raw facts that describe the characteristics of an event, object, or set of information that can be entered into a computer is ____ .

data

After getting all the pertinent facts, the next step in making an ethical analysis is to ___ .

determine the affected

When making an ethical analysis, you should get all the pertinent facts and then

determine the affected.

The first step in the 5 step process of an ethical analysis is ___.

getting the facts

Checking your FICO score from each different agency every four months and watching for unusual activity.

Credit monitoring

Which of the following statements accurately describes spyware? More than one answer may be correct.

Downloading software or documents from unvetted sources is one way spyware can be installed. Spyware captures private information by monitoring how users interact online.

A type of cookie, sometimes called a transient cookie, that is not stored but just kept in memory when a user visits a website is called an authentication cookie.

False

Due to increased standardization of international laws, students can relax their online vigilance when traveling or studying abroad.

False Internet laws are not consistent worldwide and vigilance concerning digital privacy remains important.

Cookies stored on your device's hard drive and remain even if your computer has been restarted are called authentication cookies

False Persistent cookies are only lost if they are designed with an expiration date or if you delete them.

The least that employers can do to discourage employees from misusing business computers is to use employee monitoring software and inform employees of their computer usage policies.

False The least that employers can do is ensure appropriate browser filters are operating on all business computers.

Your right to have your personal information protected online is covered by your property rights.

False Your right to privacy covers your right to control what happens with your personal information.

June, an IT manager at a financial institution, learns that team member Charla has a health issue and needs to take a half day off once a week for a few months. Without violating Charla's privacy, how can June make an ethical decision that maintains a perception of fairness at a very busy time?

Following the Universalist Principle, June can remind the team that flexible hours are available to all members as long as everyone logs their total hours per week.

Of the following, select three statements that correctly apply to international Internet privacy laws.

International laws on Internet privacy vary greatly. It is very difficult to get nations across the globe to agree on standardized Internet privacy laws. The European Union (EU) European Commission Data Protection Directive states that under EU law, personal data can only be gathered legally under strict conditions.

Which of the following is a benefit of antivirus software that charges a fee? More than one answer may be selected.

It provides technical support. It includes identity theft protection and parental controls.

Spyware is software that collects information about your Internet surfing habits and behaviors. Spyware includes the collection of which three of the following?

Keystrokes Passwords Account numbers

Technology has brought about many ethical challenges. One of these technologies is Deepfake. Deepfake refers to ___.

Modifying images or video by replacing one person's likeness with that of another.

Which two of the following are examples of an organization using big data and analyzing predictive behavior with the goal of creating new offerings?

Netflix tracks what users who viewed all three seasons of Stranger Things also had in their queues. An in-home healthcare provider tracks the hospital readmission rates of elderly people who live alone after they received care for falling in their home.

This principle asks the decision-maker to consider what a highly moral person would do when faced with this question.

Principle of Virtue

The law passed in 1986 that protects email and VoIP communications by making it illegal to intercept calls or messages without a warrant is The Electronic Communications ___ Act

Privacy

The Act that outlines a plan to protect government information and assets against cyber threats and requires each federal agency to develop a plan for information security is The Federal Information ___ Management Act (FISMA).

Security

What type of cookie is stored in temporary memory and is lost when the web browser is closed?

Session

Vidya needs a password for a new app she downloaded on her phone. Which of the following passwords is the most secure?

Sj49?zT$

Which of the following allows, but does not require, private companies to warn the U.S. government about cyber-security threats?

The Cybersecurity Information Sharing Act

The laws that were created to update copyright laws dealing with the issues of regulating digital material in accordance with World Intellectual Property Organization treaties is called:

The Digital Millennium Copyright Act (DMCA)

Which law or set of laws implements two World Intellectual Property Organization (WIPO) treaties and was created to update copyright laws dealing with the issues of regulating digital material.

The Digital Millennium Copyright Act (DMCA)

Which Act protects email and VoIP communications by making it illegal to intercept calls or messages without a warrant.

The Electronic Communications Privacy Act

Which Act outlines a plan to protect government information and assets against cyber threats.

The Federal Information Security Management Act (FISMA)

Which principle of ethical conduct states that there exist certain moral values that should always be upheld or never be violated.

The Principle of Moral Rights

Which principle of ethical conduct states that there exist certain moral values that should always be upheld or never be violated?

The Principle of Moral Rights

This federal law protects person-to-person wire, oral, and electronic communications.

The Wiretap Act

Which statement encompasses the third step of the five-step process of an ethical analysis?

There is an extremely good chance that other managers, perhaps in your own organization, have faced similar dilemmas.

Buying a list of potential customers from an outside agency

Third party data purchase

Creative works are considered intellectual property and can be protected with copyrights, trademarks, and patents.

True

The federal law that protects person-to-person wire, oral, and electronic communications and also includes a variety of network crime statutes that include identity theft and unlawful access to stored communications is The ____ Act

Wiretap

When you revisit a website, your browser will send the website's ___ (a small text file) to the Web server that uses this information to customize and optimize your experience.

cookie

Insurance companies use big ____ in actuarial analysis in order to more accurately estimate risk, often lowering the cost of their services.

data

The U.N. General Assembly adopted resolution 68/167 in December 2013 that affirms that the rights held by people offline must also be protected online, and it called upon all Member States (nations) to respect and protect the right to privacy in digital communication. This means that ___

even though it sounds good, Internet users should be aware that digital privacy is not honored by many on the Internet.

Select the first step in the five steps of an ethical analysis

getting the facts

A starting point to investigate the complex topic of a society's ethics is first to understand the society's ____ and the history behind the enacting of them.

laws

Credit institutions use big data to anticipate the likelihood of ___ and to more accurately report credit ratings.

loan default

Along with the employee, which of the following is most responsible for an employee's ethical behavior?

management

Management can discourage the inappropriate use of business computers by publicly announcing that their organization uses employee ____ software or remote desktop software.

monitoring

A wide-ranging term that refers to a variety of considerations including; how data and information is used, who has access to data and information, the techniques and technologies used to protect sensitive and private data, communications, and preferences is Internet ___.

privacy

Managers must protect the online ___ of employees and organization stakeholders.

privacy

Which dimension of ethical concerns would examine the issue of how playing video games relates to or influences childhood obesity?

quality of life

Because prior management decisions might provide guidance on your current situation, the third step of an ethical analysis is to ___ .

search for precedents

A type of cookie, sometimes called a transient cookie, that is not stored but just kept in memory when a user visits a website is called a ___ cookie

session

Even though the Child Online Protection Act of 1998 was sponsored by both Democrats and Republicans and was passed by both Houses of Congress and signed into law by President Clinton, you cannot be punished for violating law because ___ .

the law violated the 1st Amendment (freedom of speech) rights and was found unconstitutional.

Cookies that are created by a website other than the one you are currently visiting and are used to track your surfing habits are known as ___ cookies.

third-party

When reporting a coworker's computer ethics violations, which of these guidelines should you follow? More than one answer may be correct.

Only report incidences that you have personally witnessed. Consider whether you were hired to monitor others' computer use.

What does PATRIOT stand for

PATRIOT stands for Providing Appropriate Tools Required to Intercept and Obstruct Terrorism.

Cookies are stored on the hard drive and are not lost when the web browser is closed are called ___ cookies.

Persistent

These programs use a variety of techniques to identify and remove viruses and malware.

Anti-virus software

In analyzing transactions, Walmart discovered that many people who buy Children's Tylenol in their stores also buy orange juice in the same transaction. They used this information to discount Children's Tylenol but raise the price of orange juice during flu season. What is the name of the approach Walmart used to discover this information?

Big data

Big Data

Big data refers to an organization's ability to use analytics to uncover predictive behaviors.

Select two ways managers encourage employees to act unethically.

By not enforcing strong ethical behavior. By failing to act ethically themselves.


Set pelajaran terkait

24 Quiz 6 - The Nursing Process - Diagnosis

View Set

elements of art / principles of design

View Set

ST Chapter 12: Surgical Case Management

View Set