Module Assessment - Ethics and Privacy Concerns
Insurance companies use big data in actuarial analysis in order to better understand their customers' needs.
False
The Act that requires that public schools and libraries must comply with Internet safety policies imposed by the government under this legislation and specifically requires all pornographic sites to include some sort of age verification is The Children's Internet Privacy Act of 2000 (CIPA).
False
The Children's Internet Protection Act of 2000 (CIPA) seeks to keep children off the Internet.
False
Victims of a data breach should consider purchasing antivirus software.
False
Which of the following is true of structured data? More than one answer may be selected
It has a defined length, type, and format. It can include numbers and dates. It is designed for input into databases.
It is common for sales representatives in information technology fields to receive commissions for the sales they make. At play in this case is the Principle of
Distributive Justice.
In a five-step ethical analysis, the second step is to determine whom will be affected by a decision.
True
Living a virtuous life involves acting with high morals that are logically defined or shaped by
ethics
What type of cookie is stored in temporary memory and is lost when the web browser is closed?
session
One concern that falls under the ethical dimension of quality of life is the fact that the more time teens spend on social media, the more likely they are to suffer from depression.
true
Which of the following laws allows law enforcement to obtain information about online and offline communications related to terrorist activities without a warrant?
The USA PATRIOT Act/USA Freedom Act
Monitoring your credit, creating strong passwords, using antivirus protection, and practicing safe browsing techniques are methods of protecting your personal identity while browsing the Internet.
True
Which browser settings should you consider adjusting? More than one answer may be correct.
deleting cookies blocking or customizing your cookie settings deciding from which sites you want to allow cookies
What is the fourth step in a five-step ethical analysis?
listing options
The Act that signed into law to monitor terrorist activities and communications following the 9/11 attacks and the 2001 anthrax attack on Congress is the
USA PATRIOT Act/USA Freedom Act.
The principle that states that when faced with an ethical dilemma a manager should choose the option that does the greatest good for the most people involved is called the
Utilitarian Principle
The Act that comprises a variety of crime statutes including identity theft and unlawful access to stored communications is the
Wiretap Act
Which situation involves a computer ethics violation that you should report to your employer?
You pass a coworker's computer screen and see him surfing through child pornography.
From the following list, select the activities that are both violations of workplace computer ethics and illegal.
computer scams launched from work computers software piracy using an employer's computer network
A form of protection provided by the laws of the United States for "original works of authorship," including literary, dramatic, musical, architectural, cartographic, choreographic, pantomimic, pictorial, graphic, sculptural, and audiovisual creations is called a patent.
false
A password is a biometric measure used to prevent unauthorized access to data and user accounts.
false
Cookies stored on your device's hard drive and remain even if your computer has been restarted are called authentication cookies.
false
Data that is traditionally used in commercially available relational databases, where the data resides in a fixed field and can easily be queried is called big data.
false
The Universalist Principle advocates for the greatest good for greatest number of people.
false
Your right to have your personal information protected online is covered by your property rights.
false
Which of the following is a step in an ethical analysis? More than one answer may be correct.
getting all the pertinent facts determining who is affected searching for precedents
What does the Wiretap Act aim to protect against?
identity theft and unlawful access to stored communications
Spyware is software that collects information about your Internet surfing habits and behaviors. Spyware includes the collection of which of the following?
keystrokes account numbers passwords
When making an ethical analysis, what is the last thing a manager should do before making a decision and preparing for the consequences?
listing options
Deepfake technology raises questions about the ethics of
modifying images or video by replacing one person's likeness with another's.
Cookies that are stored on the hard drive and are not lost when the web browser is closed are called
persistent cookies
Keystroke loggers and packet analyzers (sniffers) are two common types of
spyware
Which law or set of laws was created to implement two World Intellectual Property Organization (WIPO) treaties and to update copyright laws regulating digital material?
the Digital Millennium Copyright Act (DMCA)
When a decision maker considers what a highly moral person would do when faced a particular question, which principle of ethical conduct is in play?
the Principle of Virtue
A form of spyware that records all actions typed on a keyboard is called a keystroke logger.
true
Methodologies that attempt to deal with the vast amount of complex information that accumulates at high, and accelerating, velocity use big data.
true