ethics and privacy

Ace your homework & exams now with Quizwiz!

The law passed in 1986 that protects email and VoIP communications by making it illegal to intercept calls or messages without a warrant is The Electronic Communications ___ Act.

Privacy

As a manager, you are entitled to 2 PTO (paid time off) days per month. Your boss encourages to use this time off and only asks that you check your email once per day to answer employee questions

Quality of Life

This software allows managers to take control of an employee's computer remotely.

Remote desktop software

Which three of the following can encourage ethical computer use in the workplace?

Remote desktop software Employee monitoring software Setting a good example

Which two of the following can be awarded copyright protection?

Sculptures Choreography

The Act that outlines a plan to protect government information and assets against cyber threats and requires each federal agency to develop a plan for information security is The Federal Information ____ Management Act (FISMA).

Security

What type of cookie is stored in temporary memory and is lost when the web browser is closed?

Session

Which type of cookie is not stored on your computer's hard drive but instead just resides in memory while you visit a website?

Session cookie

Which of the following is not one of the steps included in the 5 steps of an ethical analysis?

Setting a strong example.

Will the decision impact the privacy or property rights of any individuals or corporations? This question should be asked in which step of the 5 steps of an ethical analysis. Multiple choice question.

Step 2 - Determining the affected.

Which Act, signed into law in December 2015, allows companies to share cyber-security threat information with the U.S. government?

The Cybersecurity Information Sharing Act

Which of the following allows, but does not require, private companies to warn the U.S. government about cyber-security threats?

The Cybersecurity Information Sharing Act

Which law or set of laws implements two World Intellectual Property Organization (WIPO) treaties and was created to update copyright laws dealing with the issues of regulating digital material.

The Digital Millennium Copyright Act (DMCA)

Which law, passed in 1986, protects email and VoIP communications by making it illegal to intercept calls or messages without a warrant.

The Electronic Communications Privacy Act

This Act outlines a plan to protect government information and assets against cyber threats. It requires each federal agency to develop a plan for information security.

The Federal Information Security Management Act

Which principle of ethical conduct attempts to distribute rewards equitably to individuals based on their level of productivity?

The Principle of Distributive Justice

What Act was enacted to monitor terrorist activities and communications following the 9/11 attacks and the 2001 Anthrax attack on Congress?

The US PATRIOT Act/USA Freedom Act

Which law, passed after the 9/11 attacks allowed law enforcement to obtain information about online and offline communications related to terrorist activities without a warrant.

The US PATRIOT Act/USA Freedom Act

Which principle of ethical conduct states that a manager must attempt to determine if a decision is fair for all involved.

The Universalist Principle

This federal law protects person-to-person wire, oral, and electronic communications.

The Wiretap Act

Many sales managers, including those in information technology-related fields, use commissions in an attempt to incentivize productivity and to reward more successful salespeople. The principle of ethical conduct that this exemplifies is ___.

The principle of distributive justice

Which statement encompasses the third step of the five-step process of an ethical analysis?

There is an extremely good chance that other managers, perhaps in your own organization, have faced similar dilemmas.

Buying a list of potential customers from an outside agency

Third party data purchase

Select the three major titles of the Digital Millennium Copyright Act (DMCA) that impact digital copyright protection.

Title 1 - This act requires that measures be taken to make it difficult to copy analog video recordings. Title 4 - This act facilitates distance learning by allowing educational institutions latitude with regard to the use of copyrighted material. Title 2 - This act protects Internet Service Providers (ISPs) from being sued for copyright infringement when the ISP's user wrongfully copies items from the Internet.

Logo

Trademark

The logo of your company

Trademark

Due to the lack of normalized laws, it is important to use discretion on the Internet when traveling or living abroad.

True

Select two important considerations for managing cookies.

Users should determine what cookie settings is appropriate for your browser use and privacy protection. Users should be aware that cookie settings must be adjusted in each browser.

This principle simply states that when faced with an ethical dilemma the manager should choose the option that does the greatest good for the most involved.

Utilitarian Principle

Select the two major types of patents.

Utility Design

Select three privacy concerns associated with cookies.

Websites can use cookies to track your surfing behavior and use this information to create specific user profiles. Corporate and government entities can use cookies to monitor your surfing behavior. Websites that use cookies can collect information about surfing habits and sell that information to a variety of third-parties.

The federal law that protects person-to-person wire, oral, and electronic communications and also includes a variety of network crime statutes that include identity theft and unlawful access to stored communications is The ___ Act.

Wiretap

Under what circumstance should you report a computer ethics violation to your employer?

You pass a co-worker's computer screen and see him surfing through child pornography.

Encouraging communication with minimal barriers can help to ensure that management has the pulse of the organization. Managers should ensure that a system exists in which employees can report malfeasance to their superiors

anonymously or privately

Methodologies that attempt to deal with the vast amount of complex information that accumulates at high, and accelerating, velocity use ____ data.

big

Predicting the impact of weather phenomenon of transportation routes, allowing logisticians to anticipate risks and the associated expense involved, is an example of organizational use of ___.

big data

The purpose of spyware is to ______.

capture the user's account data, passwords, key strokes, and more

When facing a moral dilemma, it is useful to be aware of the five principles of ethical

conduct

The dimension (category) of ethical dilemmas that examines how individuals or corporations can be held responsible in case of violations of privacy or intellectual property rights is referred to ____ and accountability.

control

When you revisit a website, your browser will send the website's ____ (a small text file) to the Web server that uses this information to customize and optimize your experience.

cookie

A form of protection provided by the laws of the United States for "original works of authorship", including literary, dramatic, musical, architectural, cartographic, choreographic, pantomimic, pictorial, graphic, sculptural, and audiovisual creations is called a ____

copyright

Raw facts that describe the characteristics of an event, object, or set of information that can be entered into a computer is _____

data

After getting all the pertinent facts, the next step in making an ethical analysis is to ___ .

determine the affected

Acting with high morals means you live a virtuous life, while your ___ provide a rational framework for your morals.

ethics

The U.N. General Assembly adopted resolution 68/167 in December 2013 that affirms that the rights held by people offline must also be protected online, and it called upon all Member States (nations) to respect and protect the right to privacy in digital communication. This means that ___

even though it sounds good, Internet users should be aware that digital privacy is not honored by many on the Internet.

Getting all the pertinent __ is the first step in an ethical analysis.

facts

The first step in the 5 step process of an ethical analysis is ___.

getting the facts

The ethical concerns of the digital age can be divided into ___ dimensions (categories).

5

There are ___ basic principles of ethical conduct.

5

Select two concerns that fall into the dimension of establishing standards in the digital age.

A hotel allows employees to use its Wi-Fi to stream audio and video while they are working. Should the amount of streaming be limited? Lynn checks her personal social media sites approximately 16 times per day while she is at work. Is this too much?

Which type of cookie is lost only if deleted or if is created with an expiration date?

A persistent cookie

Which three of the following are considered intellectual property and entitled to protection? Multiple select question.

A story that you published. A song that you wrote. A mural that you painted.

Which two of the following guidelines should you follow when reporting a co-worker's computer ethics violations.

Be brief and remember that your employer probably did not hire you monitor inappropriate computer use. Only report incidences that you have personally witnessed.

Select two ways managers encourage employees to act unethically.

By not enforcing strong ethical behavior. By failing to act ethically themselves.

Your boss states that in your organization data must be used responsibly and privacy should always be respected. This aligns with which dimension of ethical concerns in the digital age?

Choice Information Privacy Rights

Which two of the following potential workplace computer ethics violations are also illegal activities.

Computer scams launched from work computers. Software piracy using an employer's computer network.

Select the dimension (category) of ethical behavior that is illustrated by the following concern. Fourteen-year-olds are interested in cannabis shops but a state has determined that in order to view the websites of these shops you must be at least 21. How should this be managed and who should be responsible in case of violations?

Control and accountability

Small text files created by websites you visit that your web browser stores on your hard disk are called _____.

Cookies

A portrait that you paint.

Copyright

Novel

Copyright

Your gym provides child care during your spinning class. Can the care play a Disney movie for the toddlers?

Copyrights and Intellectual Property Rights

Which two of the following describe concerns that might be categorized in the ethical dimension of quality of life.

Craig observes that his daughter's growing depression seems exacerbated by the amount of time she spends on social media sites. You need to use airport restroom but the stalls are all occupied by people using their smartphones.

Which two of the following are examples of ethical concerns that have been created as a result of new technologies?

Cyberbullying Digital piracy

Having a customer fill out a survey

Direct inquiry

Which of the following statements accurately describes spyware?

Downloading software or documents from unvetted sources is one way spyware can be installed. Spyware captures private information by monitoring how users interact online.

Determining how much time employees should be allowed to browse their social media sites while at work falls under which dimension of ethical behavior in the digital age?

Establishing standards

Changing cookie settings in one browser (Chrome, for example) will automatically change your cookie settings in your other browsers (Safari, Firefox, Edge, for example).

False

Select three of steps included in the 5 steps of an ethical analysis.

Getting all the pertinent facts. Determining who is affected. Searching for precedents.

Using cookies to follow a customer's search history

Indirect tracking

A friend calls and says she is interviewing a former employee of yours. She asked if he used many sick days. Can you provide this information?

Information Privacy Rights

The principle of ethical conduct that attempts to distribute rewards equitably to individuals based on their level of effort or productivity level is called the principle of distributive __.

Justice

Select the fourth step in the five steps of an ethical analysis.

Listing options

Along with the employee, which of the following is most responsible for an employee's ethical behavior?

Management

Technology has brought about many ethical challenges. One of these technologies is Deepfake. Deepfake refers to ___.

Modifying images or video by replacing one person's likeness with that of another.

Property rights that allow creators to profit from their work, thereby encouraging creativity, are called _____ property rights.

intellectual

With regard to Internet privacy, the First Amendment to the U.S. Constitution is relevant because ___

it provides freedom of speech protection that extends to the Internet which means there is little government filtering of content.

A form of spyware that records all actions typed on a keyboard is called a ____ logger.

keystroke

A starting point to investigate the complex topic of a society's ethics is first to understand the society's ___ and the history behind the enacting of them.

laws

If you are downloading a game or software onto a device, there may be an empty box asking you to check the box to agree to Terms of Use and the site's Privacy Policy. This checkbox is called a(n)___ -in.

opt

The fourth step in the process of making an ethical analysis is to list

options, choices, or alternatives

Cookies stored on your device's hard drive and remain even if your computer has been restarted are called ____ cookies.

persistent

Computer ethics violations fall in two major categories; illegal activity and organizational ____ violations

policy

The third step in the five-step process of conducting an ethical analysis is searching for

precedents

Because every ethical decision will have ramifications, many of them unseen, the final step in the process of an ethical analysis includes making a decision and ____ for the consequences.

preparing

Managers must protect the online ___ of employees and organization stakeholders.

privacy

Your right to control what happens with personal information about you is centered around the right to

privacy

Studies indicate that the more time teens spend on social media the more likely they are to suffer from depression. This concern falls in the ethical dimension of ___ of life

quality

Keystroke loggers and packet analyzers (sniffers) are two common types of ___.

spyware

The dimension (category) of ethical concerns in the digital age that refers to determining what constitutes proper levels of protection of digital information is called establishing

standards

Even though the Child Online Protection Act of 1998 was sponsored by both Democrats and Republicans and was passed by both Houses of Congress and signed into law by President Clinton, you cannot be punished for violating law because ___ .

the law violated the 1st Amendment (freedom of speech) rights and was found unconstitutional.

Cookies that are created by a website other than the one you are currently visiting and are used to track your surfing habits are known as ___ cookies.

third-party

Part of making an ethical decision is understanding that your decision will most like result in ___ .

unintended consequences

The principle of ethical conduct that states that a manager must attempt to determine if this decision is fair for all involved is the principle.

universalist

This principle simply states that when faced with an ethical dilemma the manager should choose that option that does the greatest good for the most involved is the ___ principle.

utilitarian

The principle of ethical conduct that states that you should think of someone you truly admire, perhaps a mentor, and ask yourself what decision they would make is the principle of

virtue

Which three of the following situations involve information privacy rights?

One of your new-hires has a large Twitter following under a pseudonym. Should you let your boss know? Your neighbor has a history of abusing children, do you have a right to know this? You allow an employee to take 2-hour lunch breaks because her daughter is receiving chemotherapy. Can you tell her colleagues why she is getting the special treatment?

A checkbox may ask if you want to receive news and updates, or participate in surveys from the site. When creating or browsing websites, this checkbox is referred to as an ___. Multiple choice question.

Opt-in and Opt-out

A new type of flower that you invent.

Patent

Invention

Patent

This principle asks the decision-maker to consider what a highly moral person would do when faced with this question.

Principle of Virtue


Related study sets

CCNA 2 Chapter 10 Device Discovery, Management, and Maintenance

View Set

Anatomy Dynamic Study Module Chapter 6

View Set

Criminal Justice Chapter 5 and 6

View Set

The Integument and Related Structures

View Set

Chp. 9: Aging and Postural Control

View Set

NC Civics Questions for the Naturalization Test

View Set

World History 1st Semester Final Units 1-5

View Set

Networking with Windows Server 2016 (Exam 70-741)

View Set

The Confederation and the Constitution, 1776-1790

View Set