Module 9 Quiz
Which of the following statements encapsulates the purpose of the Federal Information Security Management Act?
protect government assets against cybersecurity events
________ software allows managers to take control of an employee's computer remotely and record the computer's mouse and keyboard entries.
remote desktop
It is common for sales representatives in information technology fields to receive commissions for the sales they make. At play in this case is the Principle of
distributive justice
What is a company that purchases consumer behavior information from other organizations engaged in?
third-party data purchase
Making an ethical decision will most likely result in ___
unintended consequences
When a decision maker considers what a highly moral person would do when faced a particular question, which principle of ethical conduct is in play?
The Principle of Virtue
In 1998, the Child Online Protection Act was sponsored by both Democrats and Republicans, passed by both houses of Congress, and signed into law by President Clinton. Why can't an offender be punished today for violating this law?
The law was later found unconstitutional for violating the First Amendment (freedom of speech).
In analyzing transactions, Target discovered that many people who buy diapers also buy milk in the same transaction. They use this information to discount the diapers, but raise the price of milk. What is the name of the approach Target used to discover this information?
big data
A state requires all visitors to online cannabis shops to be at least 21 years old. However, it is unclear who should screen the website visitors and who should be responsible for any violations. Which dimension (category) of ethical behavior does this issue fall under?
control and accountability
Which dimension of ethical behavior in the digital age includes the question of how much time employees are allowed to spend browsing social media?
establishing standards
While a religious leader may provide guidance on how to uphold high morals, ________ provide the reasons for acting morally.
ethics
The First Amendment to the U.S. Constitution affects Internet privacy because it
extends freedom of speech protection to the Internet, which means government does little filtering of content.
How many dimensions or categories can the ethical concerns of the digital age be divided into?
five
What does the Wiretap Act aim to protect against?
identity theft and unlawful access to stored communications
To address the ethical concerns surrounding ________, many employee handbooks state that the organization must use data responsibly and always respect privacy.
information privacy rights
What is the fourth step in a five-step ethical analysis?
listing options
What does the third step of a five-step ethical analysis involve?
making a physical list of all the options and the potential outcomes
The ________ step of an ethical analysis involves asking whether the decision will impact the privacy or property rights of any individuals or corporations.
second
What type of cookie is stored in temporary memory and is lost when the web browser is closed?
session
The Act that specifically requires all pornographic sites to include some sort of age verification is
the Children's Internet Protection Act of 2000 (CIPA).