Ethics in Technology

Ace your homework & exams now with Quizwiz!

allows trademark owners to challenge foreign cybersquatters who might otherwise be beyond the jurisdiction of U.S. courts

Anticybersquatting Consumer Protection Act (ACPA)

IDS that models normal behavior of a system and its users from reference information collected by various means

Behavior-based

requires the presence of patients and healthcare providers at different sites at the same time and often involves a video conference link between the two sites

Live telemedicine

hardware- or software-based network security system that is able to detect and block sophisticated attacks by filtering network traffic dependent on the packet contents

NGFW (next generation firewall)

What can provide various data and records about a service subscriber?

NSL (National Security Letter)

Beginning with the model year 2011 vehicles, who defined a minimum set of 15 data elements that must be captured for manufacturers who voluntarily install Electronic Data Recorders on their vehicles?

National Highway Safety Administration

What is the best argument for offshore outsourcing?

Outsourcing provides companies with a 24-hour workday.

What act granted a four-year extension of two key provisions in the USA PATRIOT Act that allowed roving wiretaps and searches of business records?

PATRIOT Sunsets Extension Act of 2011

What surveillance program is used by the NSA to collect internet data like search histories, photos, email/file transfers, and voice/video chats?

PRISM

An online networking community used by entrepreneurs and small business owners to find the expertise and resources they need to start and grow a business

PartnerUp

This act would require the FCC to standardize its wireless coverage data. With better coverage data, the FCC could ensure that funds provided for expanding rural broadband infrastructure are equitably applied between rural and urban areas.

Rural Wireless Access Act of 2017

What is used by the TSA to check travelers' personal information against TSA's passenger watch list?

Secure Flight Program

Approximately how many U.S. workers have reported worker or manager misconduct and then suffered some sort of retribution from their supervisor or negative reactions from their co-workers?

Some 6.2 million

demonstrates that an outsourcing firm has effective internal controls in accordance with the Sarbanes-Oxley Act of 2002

Statement on Standards for Attestation Engagements (SSAE) No. 16 audit report

website that offers a number of security-related policy templates that can help an organization develop effective security policies quickly

SysAdmin, Audit, Network, Security (SANS)

What piece of legislation ensures U.S. citizens' ability to obtain records of interest kept by the federal government?

The Freedom of Information Act (FOIA)

Data accuracy safeguard laws and regulations for U.S. citizens are practically nonexistent in the United States. True or False?

True

What act allows surveillance, without court order, within the United States for up to a year unless the "surveillance will acquire the contents of any communication to which a U.S. person is a party"?

FISA (Foreign Intelligence Surveillance Act)

What would cause a federal agency to acknowledge it has been received and indicate when it will be fulfilled, with an initial response within 20 working days typically?

FOIA (Freedom of Information Act) request

FBI internal unit which can access 30 million scanned photos to help identify individuals in relation to state or federal investigations

FACE (facial analysis, comparison, and evaluation)

an act that makes it a crime to bribe a foreign official, a foreign political party official, or a candidate for foreign political office

FCPA (Foreign Corrupt Practices Act)

What is a federal law that assigns certain rights to parents regarding their children's educational records?

FERPA (Family Educational Rights and Privacy Act)

also known as the Lincoln Law, was enacted during the U.S. Civil War to combat fraud by companies that sold supplies to the Union Army

False Claims Act

who is responsible for the careful and responsible management of an organization?

board of directors

An agreed-upon set of skills and abilities that all licensed professionals must possess.

body of knowledge

The failure to act as a reasonable person would act.

breach of the duty of care

What is another name for a business impact analysis to identify critical business processes and the resources that support them?

business continuity plan

set of interrelated components—including hardware, software, databases, networks, people, and procedures—that collects and processes data and disseminates the output

business information system

According to Spacey (2017), technology risks long-term problems may be unresolved due to whiat?

conflict

conflict between the IT worker's (or the IT firm's) self-interest and the client's interests

conflict of interest

The National Labor Relations Act, Civil Rights Act, Air Labor Standards, and Employee Retirement Income Security Act each have a uniform, consistent definition of employee and the same way of distinguishing between employees and independent contractors. true or false?

false

form of outsourcing in which services are provided by an organization whose employees are in a foreign country

offshore outsourcing

long-term business arrangement in which a company contracts for services with an outside organization that has expertise in providing a specific function

outsourcing

A form of marketing that involves paying a third party to broadcast an organization's display ads or sponsored messages to social media users.

paid media marketing

provision of the False Claims Act allows a private citizen to file a suit in the name of the U.S. government, charging fraud by government contractors and other entities who receive or use government funds

qui tam

What is a manager's judgment of the cost of control as compared to the risk or the benefit known?

reasonable assurance

A legal standard that defines how an objective, careful, and conscientious person would have acted in the same circumstances.

reasonable person standard

A legal standard that defendants who have particular expertise or competence are measured against.

reasonable professional standard

What is the approximate value of lost revenue for unauthorized software copying and piracy in North America?

$10 billion

What are included in membership with recognized information technology (IT) professional organizations?

-Benefit for employees and vendor consultants by delivering to potential opportunities -Chance to improve technical skills -Increased awareness of IT trends by attending conferences

Two common methods of charging for paid media

-CPM/cost per thousand impressions (ad displays) -CPC/cost per click

What are healthcare organizations required to employ according to HIPAA in order to make it possible to exchange medical data over the Internet?

-Codes/identifiers -Standardized electronic transactions

What can the nonbreaching party do when there is a material breach of contract?

-Continue keeping the contract in effect and sue the breaching party to recover damages -Rescind the contract, seek restitution of any compensation paid under the contract to the breaching party, and be discharged from any further performance under the contract

What are some open source web browser?

-Firefox -Chrome/Opera -Midori -QupZilla

What are some open source accounting apps?

-GnuCash -SQL Ledger -X Tuple PostBooks -Compiere -Turbo Cash -KashFlow

Define the information providers and computer users that are protected from data inaccuracies.

-ISPs -Interactive computer users

What were the primary causes of the 2008 economic crisis?

-Laissez-faire free-market economic policies -Deregulation of the Glass-Steagall Act that had previously separated commercial banking from investment banking -Allowing major corporate firms to value their assets (falsify accounts) as they choose rather than reporting the market value

What are some open source database management systems?

-MySQL -PostgreSQL -SQLite -MongoDB -Cubrid -MariaDB

What do the Ethical Framework for Facial Recognition usage principles require entities to do?

-Not use the technology to determine an individual's race, color, religion, sex, national origin, disability, or age -Not compel an individual to give consent -Allow consent to be withdrawn by the individual at any time

What are the intermediaries between you and your audience?

1. Web host server 2. Upstream ISPs 3. DNS 4. ISP

the goal of risk assessment

-to identify which investments of time and resources will best protect the organization from its most likely and serious threats.

What is the difference between a code of ethics and a code of conduct?

A code of ethics is a high-level guideline, and a code of conduct is more explicit, providing examples of how employees and professionals should act in specific situations.

What will a small company usually do when a large company is caught infringing a patent belonging to the small company?

A small company usually settles out of court and licenses its patents to the large company.

What is used by law enforcement agencies to snap photos/document the location of vehicles?

ALPR (automatic license plate reader)

network attack in which an intruder gains access to a network and stays there undetected with the intention of stealing data over a long period of time (weeks or even months)

APT (advanced persistent threat)

In hospitals, where does computerized provider order entry (CPOE) have a greater than 50% decline?

Adverse drug effects

nonprofit tribal organization of the Aleut people located off the coast of Alaska, administers five regional health clinics that are roughly 800 miles away from the nearest hospitals or specialists in Anchorage

Aleutian Pribilof Islands Association (APIA)

What is the definition of nominative fair use?

Allows a person to use the trademark of another as a reference to describe the other product or to compare it with one's own product

computing society founded in New York in 1947, is "dedicated to advancing the art, science, engineering, and application of information technology, serving both professional and public interests by fostering the open interchange of information and by promoting the highest professional and ethical standards."

Association for Computing Machinery (ACM)

the concept that an organization should act ethically by taking responsibility for the impact of its actions on its shareholders, consumers, employees, community, environment, and suppliers

CSR (corporate social responsibility)

What intel-gathering units are defined in Executive Order 12333?

Central Intelligence Agency Defense Intelligence Agency National Security Agency National Reconnaissance Office National Geospatial-Intelligence Agency Intel/Counterintelligence elements of the military Federal Bureau of Investigation Bureau of Intelligence and Research Department of State Office of Intelligence and Analysis Department of Treasury Office of National Security Intelligence Drug Enforcement Administration Department of Homeland Security Office of Intelligence and Counterintelligence Department of Energy Office of the Director of National Intelligence

process and a set of tools designed to enhance healthcare-related decision making through the use of clinical knowledge and patient-specific information to improve healthcare delivery

Clinical decision support (CDS)

What addresses fraud and related activities in association with computers?

Computer Fraud and Abuse Act

discipline that combines elements of law and computer science to identify, collect, examine, and preserve data from computer systems, networks, and storage devices in a manner that preserves the integrity of the data gathered so that it is admissible as evidence in a court of law

Computer forensics

What is a reasonable approach to testing a disaster recovery plan?

Conduct a test of a portion of the plan.

First Amendment

Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the government for a redress of grievances

specifies requirements that commercial emailers must follow when sending messages that have a primary purpose to advertise or promote a commercial product or service.

Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM)

states that it is legal to spam, provided the messages meet a few basic requirements: -spammers cannot disguise their identity by using a false return address -the email must include a label specifying that it is an ad or a solicitation -the email must include a way for recipients to indicate that they do not want future mass mailings.

Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act

What is the focus of the concept of reasonable assurance?

Cost and benefit

amended the EEA to create a federal civil remedy for trade secret misappropriation

Defend Trade Secrets Act of 2016 (DTSA)

In the early years of software development, patents were not granted for software. Which lawsuit changed this?

Diamond v. Diehr

What offers protection to whistle-blowers?

Different laws requiring an experienced attorney to determine the law

signed into law in 1998 and implements two 1996 WIPO treaties: -the WIPO Copyright Treaty -the WIPO Performances and Phonograms Treaty

Digital Millennium Copyright Act (DMCA)

A social marketplace designed to connect people who want stuff done with people who will do it

DoMyStuff

What act deals with three main issues? -protection of communications while in transfer -protection of communications held in storage -prohibition of devices from recording information without a warrant

ECPA (Electronic Communications Privacy Act)

Who requires any company doing business within the borders of the countries of the EU to implement a set of privacy directives on the fair and appropriate use of information?

EU Data Protection Directive

imposes penalties of up to $10 million and 15 years in prison for the theft of trade secrets

Economic Espionage Act (EEA) of 1996

What should users be required to do first?

Enter a successful passcode.

What regulates the operations of credit reporting bureaus, including how they collect, store, and use credit information?

Fair Credit Reporting Act

Requires each federal agency to provide information security for the data and information systems that support the agency's operations and assets, including those provided or managed by another agency, contractor, or other sources

Federal Information Security Management Act

What government agency is responsible for enforcing the Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN-SPAM)?

Federal Trade Commission (FTC)

Makes certain payments to foreign officials and other foreign persons illegal and requires companies to maintain accurate records

Foreign Corrupt Practices Act

What is the maximum length of time (term) a trademark is protected?

Forever—as long as it is renewed and kept in use

What covers false claims regarding the unauthorized use of credit cards?

Fraud and Related Activity in Connection with Access Devices Statute

Federal agencies receiving a ____________________ request must acknowledge that the request has been received and indicate when the request will be fulfilled, with an initial response within 20 working days unless an unusual circumstance occurs.

Freedom of Information Act (FOIA)

multilateral agreement governing international trade

GATT (General Agreement on Tariffs and Trade)

computer operating system comprised entirely of free software; its name is a recursive acronym for GNUs Not Unix

GNU

precursor to the open source code defined by the Open Source Initiative (OSI) intended to protect GNU software from being made proprietary, and it lists terms and conditions for copying, modifying, and distributing free software

GNU GPL (General Public License)

What act is designed to strengthen data protection for individuals within the EU by addressing the export of personal data outside the EU, enabling citizens to see and correct their personal data and ensuring data protection consistency across the EU?

General Data Protection Regulation (GDPR)

Did COPA follow through in court?

Hard no

Under this act, increased Medicaid and Medicare reimbursements are made to doctors and hospitals that demonstrate "meaningful use" of EHR technology

Health Information Technology for Economic and Clinical Health Act (HITECH Act)

process of sharing patient-level electronic health information between different organizations

Health information exchange (HIE)

What did the 2009 Health Information Technology for Economic and Clinical Health Act do to help electronic health record (EHR) adoption?

Increase reimbursement.

An online community of suppliers, distributors, and customers networking in their industries for B2B online sales

IndustryHuddle

John Doe lawsuits focus on revealing the identity of someone. When should a subpoena for identifying information be enforced as per a federal court ruling?

Information was related to a core claim or defense.

sponsors many conferences, applications-related and research-oriented journals, local and student lessons, technical committees, and standards working groups

Institute of Electrical and Electronics Engineers (IEEE)

provides a set of standardized requirements for a quality management system.

International Organization for Standardization (ISO) 9001

international counterpart to SSAE No. 16.

International Standard on Assurance Engagements (ISAE) No. 3402

nonprofit corporation responsible for managing the Internet's domain name system introduced 13 domain names: .aero .biz .coop .info .museum .name .pro .asia .cat .mobi .tel .travel .xxx

Internet Corporation for Assigned Names and Numbers (ICANN)

Why is it important to document everything in a logbook?

It may become a court evidence.

The Communications Decency Act (CDA) aimed to protect children from pornography and became law in 1996. Why did the Supreme Court overrule the CDA as unconstitutional in June 1997?

It should have opened all aspects of online content to legal scrutiny.

A type of lawsuit that organizations may file in order to gain subpoena power in an effort to learn the identity of anonymous internet users who they believe have caused some form of harm to the organization through their postings.

John Doe lawsuit

IDSs that contain information about specific attacks and system vulnerabilities and watch for attempts to exploit these vulnerabilities

Knowledge-based

What is used by the NSA to intercept and record all telephone conversations in certain countries? Includes Afghanistan, the Bahamas, Mexico, Kenya, and the Philippines. America not included, but making calls to those countries are.

MYSTIC

This act boosts the development of next-generation gigabit wireless broadband services, including 5G, by ensuring more spectrum is identified for private sector use and by reducing the red tape associated with building broadband networks. It requires that 255 megahertz of spectrum be identified for fixed and mobile wireless broadband use by 2022—at least 100 megahertz for unlicensed use and at least 100 megahertz for licensed use. Further, it identifies the mid-band and high-band spectrum to be studied for possible commercial use.

Making Opportunities for Broadband Investment and Limiting Excessive and Needless Obstacles to Wireless Act (MOBILE NOW Act)

software used to measure the similarities among computer programs written in languages such as Ada, C, C++, Java, Lisp, and Paschal. It is used to detect plagiarism in computer programming classes and commercial software.

Measure of Software Similarity (MOSS)

What is a federal agency responsible for enforcing civil rights and health-privacy rights?

OCR (office for civil rights)

trade group that represents the world's largest software/hardware manufacturers

SIIA (Software and Information Industry Association)

improved on the Wetterling Act by setting national standards that govern which sex offenders must register and what data must be captured

Sex Offender Registration and Notification Provisions (SORNA)

What appliance can capture personal conversations along with voice commands used to control it?

Smart TVs

What is the principal obstacle to the business solution implementation in the context of the decision-making process?

The course of action to be implemented meets the resistance of employees who are used to the established work routine.

implements the WIPO treaties by making certain technical amendments to the U.S. law in order to provide appropriate references and links to the treaties. It also creates two new prohibitions in the Copyright Act (Title 17 of the U.S. Code)—one on circumvention of technological measures used by copyright owners to protect their works and one on tampering with copyright management information. also adds civil remedies and criminal penalties for violating the prohibitions.

Title I (WIPO Copyright and Performances and Phonograms Treaties Implementation Act of 1998)

enables website operators that allow users to post content on their website (e.g., music, video, and pictures) to avoid copyright infringement liability if certain "safe harbor" provisions are followed.

Title II (Online Copyright Infringement Liability Limitation Act)

permits the owner or lessee of a computer to make or authorize the making of a copy of a computer program in the course of maintaining or repairing that computer

Title III (Computer Maintenance Competition Assurance Act)

What regulates the interception of wire and oral communications?

Title III of the Omnibus Crime Control and Safe Streets Act

adds language to the Copyright Act confirming the Copyright Office's authority to continue to perform the policy and international functions that it has carried out for decades under its existing general authority.

Title IV (Miscellaneous provisions)

Who grants an H-1B work visa?

U.S. Citizenship and Immigration Services

Who issues U.S. patents?

U.S. Patent and Trademark Office (USPTO)

What serves as a clearinghouse for information on new viruses, worms, and other computer security topics.

US-CERT (US Computer Emergency Readiness Team)

What act terminated the bulk collection of telephone metadata by the NSA, following the Snowden whistleblow?

USA Freedom Act

Defines cyberterrorism and associated penalties

USA PATRIOT Act

What act gave sweeping new powers to both domestic law enforcement and US international intelligence agencies?

USA PATRIOT Act (Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism)

most types of trademark-based domain name disputes must be resolved by agreement, court action, or arbitration before a registrar will cancel, suspend, or transfer a domain name.

Uniform Domain-Name Dispute-Resolution Policy

drafted in the 1970s to bring uniformity to all the United States in the area of trade secret law and can qualify hardware/software as trade secrets

Uniform Trade Secrets Act (UTSA)

This act would make available additional funds to TV stations that are moving channels as a result of the so-called repack necessitated by the incentive auction. It also would dedicate federal support to alleviate costs borne by radio stations as a result of the repack.

Viewer and Listener Protection Act

global organization that deals with the rules of international trade based on agreements that are negotiated and signed by representatives of the world's trading nations. It is headquartered in Geneva, Switzerland

WTO (World Trade Organizaiton)

When is full-disk encryption a good idea?

When there is sensitive data on any device or in a public space

headquartered in Geneva, Switzerland, is an agency of the United Nations dedicated to "the use of intellectual property as a means to stimulate innovation and creativity."

World Intellectual Property Organization (WIPO)

What percent of instances of reported misconduct are non-managers responsible for?

about 40%

What percent of instances of reported misconduct are managers responsible for?

about 60%

a common form of abnormal heart rhythm and a major cause of strokes

atrial fibrillation (AF)

A group that provides assistance to the board of directors in fulfilling its responsibilities with respect to the oversight of the quality and integrity of the organization's accounting and reporting practices and controls, including financial statements and reports; the organization's compliance with legal and regulatory requirements; the qualifications, independence, and performance of the company's independent auditor; and the performance of the company's internal audit team.

audit committee

What is used by law enforcement agencies to scan vehicles and individuals/crowds to search for currency, drugs, and explosives?

backscatter imaging scanner

Someone who violates computer or internet security maliciously or for illegal personal gain

black hat hacker

a sophisticated threat that combines the features of a virus, worm, Trojan horse, and other malicious code into a single payload

blended threat

What is the best reason for whole-disk encryption?

chance of computer theft

a classification exclusively designated for AI data processing systems, expressly recognizes that AI can be patentable

class 706

what is a statement that highlights an organization's key ethical issues and identifies the overarching values and principles that are important to the organization and its devision-making?

code of ethics

crime of obtaining goods, services, or property through deception or trickery

fraud

concerned with the efficient and environmentally responsible design, manufacture, operation, and disposal of IT-related products, including all types of computing devices (from smartphones to supercomputers), printers, printer materials such as cartridges and toner, and storage devices

green computing

use of illegal means to obtain business information not available to the general public

industrial espionage

An individual who captures trade secrets and attempts to gain an unfair competitive advantage

industrial spy

What is the combination of communications privacy and data privacy?

information privacy

A group within an organization managing the processes, tools, and policies necessary to prevent, detect, document, and counter threats to digital and nondigital information, whether it is in transit, being processed, or at rest in storage.

infosec group

adherence to a personal code of principles

integrity

what is the most commonly observed form of employee misconduct?

misuse of company time

(also called home monitoring) involves the regular, ongoing, accurate measurement of an individual's vital signs (temperature, blood pressure, heart rate, and breathing rate) and other health measures (for example, glucose levels for a diabetic) and the transmission of this data to a healthcare provider

remote monitoring

principle stating that an employer can be held legally responsible for the acts of its employees even if the employees acted in a way contrary to corporate policies and their employer's directions

respondeat superior

reduces the effort required to monitor and identify threats in time to take action

security dashboard

What new technique detects the mood of large numbers of people?

sentiment analysis

oral defamatory

slander

variant of phishing through texting

smishing

how does an organization review how well it meets its ethical and social responsibility goals and communicates its new goals for the upcoming year?

social audit

As innovations near launch, which type or classification of risk management is needed?

standard

employed by corporations, government officials, and others against citizens and community groups who oppose them on matters of public interest typically without merit and is used to intimidate critics out of fear of the cost and efforts associated with a major legal battle

strategic lawsuit against public participation (SLAPP)

component of CSR that focuses on developing and maintaining a supply chain that meets the needs of the present without compromising the ability of future generations to meet their needs

supply chain sustainability

Coemployment legal problems with offshore outsourcing are minimal because __________.

the company that contracts for the services does not generally supervise or control the contractor's employees

Who does Section 230 of the Communications Decency Act protect?

the website and its operators

What was the key privacy issue at the heart of the K.W. v. Armstrong case?

trade secrets

logo, package design, phrase, sound, or word that enables a consumer to differentiate one company's products from another's.

trademark

risk management strategy in which the risk, should it happen, does not rest solely on one individual or organization. For example, a common way to accomplish risk transference is for an individual or an organization to purchase insurance, such as auto or business liability insurance. Another way to transfer risk is to outsource the risk by contracting with a third party to manage the risk.

transference

What device records the originating number of incoming calls for a particular phone number?

trap and trace

type of patent "issued for the invention of a new and useful process, machine, manufacture, or composition of matter, or a new and useful improvement thereof, it generally permits its owner to exclude others from making, using, or selling the invention for a period of up to twenty years from the date of patent application filing, subject to the payment of maintenance fees."

utility patent

a device that records vehicle and occupant data for a few seconds before, during, and after any vehicle crash severe enough to deploy its airbags

vehicle EDR (event data recorder)

__________ refers to the variance of the quality of data being captured. The data accuracy of the analysis depends on this.

veracity

communications protocol or system of rules that ensures privacy between communicating applications and their users on the internet

TLS (Transport Layer Security)

Its primary purpose was to allow free competition among phone, cable, and TV companies

Telecommunications Act

employs electronic information processing and telecommunications to support at-a-distance healthcare, provide professional and patient health-related training, and support healthcare administration

Telehealth

component of telehealth that provides medical care to people at a location different from the healthcare providers

Telemedicine

employs tools provided by or tailored for a particular social media platform to build a social community and interact with it by sharing posts and responding to customer comments on the organization's blog and social media accounts

organic media marketing

grant of a property right issued by the U.S. Patent and Trademark Office (USPTO) to an inventor permits its owner to exclude the public from making, using, or selling a protected invention, and it allows for legal action against violators

patent

violation of the rights secured by the owner of a patent, occurs when someone makes unauthorized use of another's patent can award up to three times the amount of the damages claimed by the patent holder

patent infringement

What device records electronic impulses to identify the numbers dialed for outgoing calles?

pen register

percent of total population that uses social media on a mobile device

penetration rate

Agreement on Trade-Related Aspects of Intellectual Property Rights and is a binding agreement of World Trade Organization (WTO) member governments to ensure that intellectual property rights can be enforced under their laws

Trade-Related Aspects of Intellectual Property Rights (TRIPS)

includes those portions of the EHR that are routinely shared with the patient—such as personal identifiers, contact information, health provider information, problem list, medication history, allergies, immunizations, and lab and test results

personal health record (PHR

A guideline states that products, technologies, and materials that may harm the public should not be released on the market until they can be shown to be safe.

precautionary principle

a computer-driven search process used to reduce a large set of miscellaneous documents into a smaller set of relevant documents (5-20%)

predictive coding

a process that couples human guidance with computer-driven concept searching in order to train document review software to recognize relevant documents with a document universe.

predictive coding

the existing body of knowledge available to a person of ordinary skill in the art

prior art

a clear, concise description of the issue that needs to be addressed

problem statement

This act would harmonize state laws regarding which entity is responsible for collecting and remitting certain types of taxes and fees assessed on wireless services

Wireless Telecommunications Tax and Fee Collection Fairness Act

states the principles and core values that are essential to the work of a particular occupational group

professional code of ethics

business entity that coemploys the employees of its clients and typically assumes responsibility for all human resource management functions

professional employer organization (PEO)

network of over 150 experienced and specially trained federal prosecutors who focus on computer and intellectual property crimes

program called Computer Hacking and Intellectual Property (CHIP)

uses a computer program to strip the originating header and/or IP number from the message. It then forwards the message to its intended recipient—an individual, a chat room, or a newsgroup—with either no IP address or a fake one, ensuring that the header information cannot be used to identify the author

anonymous remailer service

two employers have actual or potential legal rights and duties with respect to the same employee or group of employees

coemployment relationship

What is the ability to communicate with others without being monitored by other persons or organizations?

communications privacy

legally obtained information that is gathered to help a company gain an advantage over its rivals

competitive intelligence

enables physicians to place orders (for drugs, laboratory tests, radiology, physical therapy) electronically, with the orders transmitted directly to the recipient

computerized provider order entry (CPOE) system

job situation in which an individual does not have an explicit or implicit contract for long-term employment

contingent work

What is used by most types of websites to capture your browsing history for website customization and personalization purposes as well as targeted marketing?

cookies

exclusive right to distribute, display, perform, or reproduce an original work in copies or to prepare derivative works based on the work

copyright

who provides an organization with vision and leadership in the area of business conduct?

corporate ethics officer (aka corporate compliance officer)

An individual who causes problems, steals data, and corrupts systems

cracker

Title V (Vessel Hull Design Protection Act)

creates a new form of protection for the original design of vessel hulls

What is a potential downside in creating a corporate compliance officer position, according to critics?

creating a corporate compliance officer position may lead others to think that they have no responsibilities in ensuring compliance with ethical standards and regulations

Creation of roles and user accounts so that employees only have the authority to perform their responsibilities and nothing more

critical safeguard

each party agrees not to sue the other over patent infringements

cross-licensing agreement

any form of mistreatment or lack of care, both physical and mental, based on the use of an electronic communications device that causes harm and distress to others

cyberabuse

Someone who attacks a computer system or network for financial gain

cybercriminal

What involves the deployment of malware that secretly steals data in the computer systems of organizations, such as government agencies, military contractors, political organizations, and manufacturing firms?

cyberespionage

form of cyberabuse in which the abusive behavior, which involves the use of an electronic communications device, is degrading, humiliating, hurtful, insulting, intimidating, malicious, or otherwise offensive to an individual or group of individuals, causing substantial emotional distress

cyberharassment

registers domain names for famous trademarks or company names to which they had no connection, with the hope that the trademark's owner would eventually buy the domain name for a large sum of money.

cybersquatter

a subcategory of cyberabuse that consists of a long-term pattern of unwanted, persistent pursuit and intrusive behavior (involving the use of an electronic communications device) that is directed by one person against another and that causes fear and distress in the victim

cyberstalking

Someone who attempts to destroy the infrastructure components of governments; financial institutions; and other corporations, utilities, and emergency response units

cyberterrorist

What is the ability to limit access to one's personal data by others and organizations in order to exercise a substantial degree of control over that data and its use?

data privacy

can be used to develop accurate forecasts of customer demand, recommend stocks and bonds for an investment portfolio, or schedule shift workers in such a way as to minimize cost while meeting customer service goals

decision support system (DSS)

also called reverse engineering compilers, can read the computer machine language and produce the source code.

decompiler

identifying the stakeholders and their positions on an issue is a part of which of the five decision-making steps?

defining the problem

type of patent "issued for a new, original, and ornamental design embodied in or applied to an article of manufacture," granted for a term of 15 years

design patent

What will you do if the chosen solution has not provided the expected results?

determine a further course of action based on the data obtained from monitoring the implemented solution.

documented process for recovering an organization's business information system assets—including hardware, software, data, networks, and facilities—in the event of a disaster

disaster recovery plan

involves researching on the internet to obtain someone's private personal information—such as a home address, email address, phone numbers, and place of employment—and even private electronic documents, such as photographs, and then posting that information online without permission

doxing

What unmanned aerial vehicle is used by law enforcement to support operations that require aerial survellance?

drone

refers to the media exposure an organization gets through press and social media mentions, positive online ratings and reviews, tweets and retweets, reposts (or "shares"), recommendations, and so on

earned media

comprehensive view of the patient's complete medical history designed to be shared with authorized providers and staff from more than one organization

electronic health record (EHR)

collection of health-related information on an individual that is created, managed, and consulted by authorized clinicians and staff within a single healthcare organization

electronic medical record (EMR)

What are the time limits of copyright law for works created in 1978 and beyond?

endures for the life of the author plus 70 years

a code of behavior that is defined by the group to which an individual belongs

ethics

What is an official document used by the POTUS to manage the operations of the federal government?

executive order

What is used by Facebook to identify and reference people in photos and videos posted on Facebook by its total user population?

facebook tagging system

What is a term for a set of guidelines that govern the collection and use of personal data?

fair information practices

It allows portions of copyrighted materials to be used without permission under certain circumstances

fair use doctrine

if two people file for a patent application on the same invention at approximately the same time, the first person to file with the USPTO will receive the patent, not necessarily the person who actually invented the item first

first-inventor-to-file

represents the total annual output of a nation's economy

gross domestic product (GDP)

An individual who hacks computers or websites in an attempt to promote a political ideology

hackivist

systems that are easy to learn and use because they perform quickly and efficiently, they meet their users' needs, and they operate safely and reliably so that the system downtime is kept to a minimum

high-quality software systems

term used to describe works of the mind—such as art, books, films, formulas, inventions, music, and processes—that are distinct and owned or created by a single person or group. It is protected through copyright, patent, and trade secret laws.

intellectual property

The machine learns by interacting with humans, such as an interactive game.

interaction bias

process established by an organization's board of directors, managers, and IT systems people to provide reasonable assurance for the effectiveness and efficiency of operations, reliability of financial reporting, and compliance with applicable laws/regulations

internal control

"digital divide" is frequently used as a way to describe those who have access and those who do not have access to three things

internet usage, broadband internet at home, and mobile phones.

When a domain name is deregistered, it becomes what to users seeking access?

invisible

measure of economic performance that compares the amount of goods and services produced (output) with the number of labor hours used in producing those goods and services. defined mathematically as real output per labor hour

labor productivity

Which bias can be introduced to an artificial intelligence (AI) machine through learning data that have many more men technicians than women technicians?

latent bias

written defamatory

libel

a notice to employees or an opposing party to save relevant data and to suspend data that might be due to be destroyed

litigation hold

An employee or contractor who attempts to gain financially or disrupt a company's information systems and business operations

malicious insider

a company that monitors, manages, and maintains computer and network security for other organizations

managed security service provider (MSSP)

occurs when a party fails to perform certain express or implied obligations, which impairs or destroys the essence of the contract

material breach of contract

the personal principles upon which an individual bases his or her decisions about what is right and wrong

morals

Do publicly traded organizations have an obligation to report all data breaches to the Securities and Exchange Commission (SEC)?

no

Is insurance a factor in risk assessment?

no

Which net neutrality rule stops internet traffic from being singled out based on who sends it?

no throttling

prohibits an employee from working for any competitors for a period of time, often one to two years.

noncompete agreement

What stops an employee from taking home an electronic copy of software code written for the company?

nondisclosure clause

focuses on defining, measuring, and refining the quality of the development process and the products developed during its various stages

quality management

nasty piece of malware that deletes information from a computer and makes it impossible to run some applications, such as Microsoft Word

"2012 rootkit virus"

process of assessing security-related risks to an organization's computers and networks from both internal and external threats

risk assessment

branch of engineering that involves the development and manufacture of mechanical or computer devices that can perform tasks that require a high degree of precision or that are tedious or hazardous for human beings, such as painting cars or making precision welds

robotics

provides immunity to an internet service provider (ISP) that publishes user-generated content, as long as its actions do not rise to the level of a content provider

section 230 of the CDA

defines an organization's security requirements, as well as the controls and sanctions needed to meet those requirements

security policy

data used to train the algorithm represents one population, making it operate better for that population at the expense of others.

selection bias

web-based communication channels and tools that enable people to interact with each other by creating online communities in which they can share information, ideas, messages, and other content, including images, audio, and video.

social media

involves the use of social networks to communicate and promote the benefits of products and services

social media marketing

creates an online community of internet users that enables members to break down barriers created by time, distance, and cultural differences.

social networking platform

To participate in the SANS Affiliate Program, what must the organization affiliate do?

-Provide a customer reference case study to prove the successful delivery of the product/service -Offer a product/service that provides a solution for cybersecurity professionals

What does the CDA specifically do?

-Provides immunity to ISPs with users of their service that publish inappropriate content. -Protects user postings on social networking companies (like Facebook, Google, and Twitter) from defamation lawsuits.

High-value data include the following

-Sales and marketing information and new product development plans, schedules, and budgets -Product designs and innovative processes -Employee personal information -Customer and client data -Sensitive information about partners

trade groups that represent the world's largest software and hardware manufacturers. Part of their mission is to stop the unauthorized copying of software produced by its members

-Software & Information Industry Association (SIIA) -BSA | The Software Alliance (BSA)

What key requirements does CAN-SPAM specify?

-The From and To fields in the email, as well as the originating domain name and email address, must be accurate and identify the person who initiated the email. -The subject line of the email cannot mislead the recipient as to the contents or subject matter of the message. In addition, if the message contains sexually-oriented material, the phrase "SEXUALLY EXPLICIT" must appear in capital letters as the first characters in the subject line. -The email must be identified as an advertisement and include a valid physical postal address for the sender. -The emailer must provide a return email address or some other internet-based response procedure to enable the recipient to request no future emails, and the emailer must honor such requests to opt-out. -The emailer has 10 days to honor the opt-out request. -Additional rules prohibit the harvesting of email addresses from websites, using automated methods to register for multiple email accounts, or relaying email through another computer without the owner's permission.

The U.S. Supreme Court has ruled that three classes of items cannot be patented

-abstract ideas -laws of nature -natural phenomena -mathematical subject matter on its own -(kinda) software, gene sequences, or genetically modified bacteria

Where can a person new in the IT industry get some mentoring help?

-an IT professional association -other IT professionals

To be eligible for copyright, a work must be...

-architecture -art -audiovisual works -choreography -drama, graphics -literature, motion pictures, music, pantomimes, pictures, sculptures, sound recordings, and other intellectual works

What is required for the government to access a customer's financial records?

-authorization signed by the customer -an appropriate administrative or judicial subpoena or summons -qualified search warrant or a formal written request by a government agency

The destructive nature of cybercrimes negatively impacts many organizational areas. What are the major concerns for organizations?

-brands -reputation -earnings

what responsibilities does an ethics officer have?

-compliance -creating/maintaining ethics culture -being a key knowledge and contact person on issues relating to corporate ethics/principles

One challenge is how to request new data or analytics. What do they need to know to get the information they need?

-correct search terms -range of factors to consider -right questions to ask

What should a good security policy include?

-defines an organization's security requirements -delineate responsibility and the behavior expected of members. -include clear expectations about what needs to be done but not how to do it

What is the Fair Credit Reporting Act designed to ensure?

-fairness of credit information -accuracy of information -privacy of information

What are the three rules of GBLA?

-financial privacy -safeguards -pretexting

What are the benefits of predictive coding?

-greatly accelerates the actual review process -improves document accuracy -reduces the risk of missing key documents

To obtain an ISO 9001 certificate, an organization must submit to an examination by an external assessor and must fulfill the following requirements

-have written procedures for all processes -follow said procedures -prove to an auditor that it as fulfilled the first two requirements

What key components define data accuracy?

-legitimacy -precision -authenticity

According to the Ethical Framework for Facial Recognition misuse principle, what safeguards need to be in place to protect biometric entities like social networking sites that contain names and photographs?

-limitation of automated access to relevant databases -all appropriate technical and procedural measures be taken to prevent access for the purpose of creating a faceprint database -creation of contractual obligations binding partners to follow the Ethical Framework for Facial Recognition guidelines.

What three components make up machine learning?

-model -parameters -learner

What sources of information does the IBM Watson (a machine learning system) use to learn and reason?

-online interactions -human interactions -environment -computer files

The Supreme Court has held that the following types of speech are not protected by the First Amendment and may be forbidden by the government

-perjury -fraud -defamation -obscene speech -incitement of panic -incitement to crime -"fighting words" -sedition

What are two major metrics used to measure the efficacy of a predictive coding tool?

-precision -recall (number of documents discovered)

Topics addressed in such a manual or code of conduct might include...

-protection of company secrets -vacation policy -time off allowed for a funeral or an illness in the family -tuition reimbursement -use of company resources

four factors when deciding whether a particular use of copyrighted property is fair and can be allowed without penalty

-purpose and character of the use -nature of the copyrighted work -portion of the copyrighted work used in relation to the work as a whole -effect of the use on the value of the copyrighted work

What rights are provided to an individual by the EU directive?

-right with capability to restrict data use -right to know how data will be used -right to challenge data accuracy -right to provide corrected data

What groups of foreign workers are exempt from the annual cap on the number of H-1B visas granted?

-scientists hired to teach at US universities -those hired to work in government research labs -those hired to work in nonprofit organizations

From what types of sources can the massive big data sets be produced?

-unstructured data sources -structured data sources -semistructured data sources

Data integrity as a state...

...defines a data set that is both valid and accurate

Data integrity as a process...

...describes measures used to ensure validity and accuracy of a data set or all the data in a database or other data construct.

An agency can deny an FOIA request based on the following nine document exemptions

1. Information properly classified as secret in the interest of national security 2. Information related solely to internal personnel rules and practices of an agency 3. Information that is prohibited from disclosure based on other federal statutes 4. Trade secrets or privileged or confidential commercial or financial information 5. Privileged communications within or between agencies 6. A personnel, medical, or similar file, the release of which would constitute a clearly unwarranted invasion of personal privacy 7. Information compiled for law enforcement purposes, the release of which a. could reasonably be expected to interfere with law enforcement proceedings b. would deprive a person of a right to a fair trial or an impartial adjudication c. could reasonably be expected to constitute an unwarranted invasion of personal privacy d. could reasonably be expected to disclose the identity of a confidential source e. would disclose techniques, procedures, or guidelines for investigations or prosecutions f. could reasonably be expected to endanger an individual's life or physical safety. 8. Information that concerns the supervision of financial institutions 9. Documents containing exempt information about gas or oil wells

What are the five phases of an APT attack?

1. Recon 2. Incursion 3. Discovery 4. Capture 5. Export

What are the five sections of the DMCA?

1. Title I (WIPO Copyright and Performances and Phonograms Treaties Implementation Act of 1998) 2. Title II (Online Copyright Infringement Liability Limitation Act) 3. Title III (Computer Maintenance Competition Assurance Act) 4. Title IV (Miscellaneous provisions) 5. Title V (Vessel Hull Design Protection Act)

What is the five-step decision-making process for ethical cases??

1. develop a problem statement 2. identify alternatives 3. choose alternatives 4. implement the decision 5. evaluate the results

What are the steps in a general security risk assessment?

1. identify the set of IT assets the organization is most concerned about 2. identify the loss events or the chances it happens 3. assess the frequency or likelihood of the events 4. determine the impact of each threat 5. determine how the threat can be mitigated in likelihood or impact 6. assess the feasibility of implementing mitigation 7. perform a cost-benefit analysis 8. make the decision to implement or not

Makes it a federal crime for any person to travel across state lines with the intent to injure or harass another person

18 USC §2261A

Protects children against online stalking by making it a federal crime to communicate with any person with the intent to solicit or entice a child into unlawful sexual activity

18 USC §2425

Makes it a federal crime to transmit any communication in interstate or foreign commerce containing a threat to injure another person

18 USC §875(c)

This act requires sex offenders to register their residence with local law enforcement agencies

1994 Jacob Wetterling Crimes Against Children and Sexually Violent Offender Registration Act

average time from filing until the application is issued as a patent, rejected, or abandoned by the applicant

25 months

Makes it a federal crime to use a telephone or telecommunications device to annoy, abuse, harass, or threaten any person at the called number

47 USC §223

How long can an H-1B employee work for a U.S. employer legally?

6 years

What percent of a worker's time online has nothing to do with work?

60-80%

What are the time limits for copyright law for works created, but not published/registered, before 1978?

the term endures for the life of the author plus 70 years, but in no case expires earlier than December 31, 2004.

What are the time limits for works created before 1978 that are still in their original or renewable term of copyright?

the total term was extended to 95 years from the date the copyright was originally secured

What act was passed in 2009 and authorized $787 billion in spending/tax cuts over 10 years, included strong privacy provisions for electronic health records, and mandated that leaks are notified to the victim within 60 days?

American Recovery and Reinvestment Act

provides IT-related seminars and conferences, information on IT issues, and forums for networking with other IT workers Its mission is to provide superior leadership and education in information technology, and one of its goals is to help members make themselves more marketable within their industry

Association of Information Technology Professionals (AITP)

Which of the following statements is not true? A Congress sets an annual cap on the number of H-1B visas to be granted—although the number of visas issued often varies greatly from this cap due to various exceptions. B Companies cannot use an H-1B worker classified as an entry-level IT employee to fill the position of a higher paid experienced worker. C Companies with 15 percent or more of their workers on H-1B visas can use those workers to replace U.S. workers if those workers are paid at least $60,000 per year. D All companies that employ H-1B workers are required to offer a wage not less than 95 percent of the average salary for the occupation.

B Companies cannot use an H-1B worker classified as an entry-level IT employee to fill the position of a higher paid experienced worker.

Requires financial institutions in the United States to assist U.S. government agencies in detecting and preventing money laundering

Bank Secrecy Act of 190

the moral corruption of people in power, which is often facilitated by a tendency for people to look the other way when their leaders act inappropriately

Bathsheba syndrome

Where does good antivirus software look for infected files?

Both on system files and in computer memory

What act required the telecommunications industry to build tools into its products that federal investigators could use to eavesdrop on conversations and intercept electronic communications?

CALEA (Communications Assistance for Law Enforcement Act)

generates and grades tests that humans can pass and all but the most sophisticated computer programs cannot

CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart)

What act mandates that any website catering to children must offer comprehensive privacy policies, notify parents/guardians about its data collection practices, and receive parental consent before collecting any personal information from children under 13?

COPPA (children's online privacy protection act)

an online database of more than 690,000 contract documents.

CORI

states that "whoever knowingly and with knowledge of the character of the material, in interstate or foreign commerce by means of the World Wide Web, makes any communication for commercial purposes that is available to any minor and that includes any material that is harmful to minors shall be fined not more than $50,000, imprisoned not more than 6 months, or both." not to be confused with the Children's Online Privacy Protection Act (COPPA) ultimately determined unconstitutional

Child Online Protection Act (COPA)

required federally financed schools and libraries to use some form of technological protection (such as an internet filter) to block computer access to obscene material, pornography, and anything else considered harmful to minors.

Children's Internet Protection Act (CIPA)

Why was the E-Rate program designed?

to pay for internet access for schools and libraries.

system that enables purchasers to evaluate, compare, and select electronic products based on a total of 51 environmental criteria

Electronic Product Environmental Assessment Tool (EPEAT)

Provides companies in the EU and the U.S. with a mechanism to comply with EU data protection requirements when transferring personal data from the European Union to the United States in support of transatlantic commerce

European Union-United States Privacy Shield

What new arrangement places stronger obligations on companies in the US to protect the personal data of Europeans and requires stronger monitoring and enforcement by the US Department of Commerce and the Federal Trade Commission?

European-United States Privacy Shield Data Transfer Program Guidelines

What approves the use of any intelligence collection techniques that are in accordance with procedures established by the head of the intelligence community and approved by the attorney general?

Executive Order 12333

What executive order was issued by Reagan and identifies various US governmental intel-gathering agencies and defines what info can be collected, retained, and disseminated by these agencies?

Executive Order 12333

What law, passed in 2003, amended the Fair Credit Reporting Act and allows consumers to request/obtain a free credit report once each year from each of the three primary consumer credit reporting companies? (Equifax, Experian, and TransUnion)

Fair and Accurate Credit Transactions Act

What prohibited any one institution from offering investment, commercial banking, and insurance services?

Glass-Steagall

An online community that helps connect companies with investors

GoBigNetwork

What is used by mobile device users to store a history of location data from all devices on which a user is logged into a Google account?

Google location services

Governs the collection, disclosure, and protection of consumers' nonpublic personal information or personally identifiable information

Gramm-Leach-Bliley Act

What was a bank deregulation law that repealed a Depression-era law known as Glass-Steagall?

Gramm-Leach-Bliley Act (GBLA)

Question 3 :An IT worker cannot be sued for professional malpractice unless he or she is licensed. true or false?

true

temporary work visa granted by the U.S. Citizenship and Immigration Services (USCIS) for people who work in specialty occupations—jobs that require at least a four-year bachelor's degree in a specific field, or equivalent experience

H-1B visa

What is another name for the Ray Baum Act of 2018?

H.R.4986

What act was designed to improve the portability and continuity of health insurance coverage; to reduce fraud, waste, and abuse in health insurance and healthcare delivery; and to simplify the administration of health insurance?

HIPAA (Health Insurance Portability and Accountability Act)

What are the uses of NGFW?

Hardware, software, or both

What company has obtained more utility patents than any other country and generates income from patent licensing?

IBM

What can be done during the software development process to foster fewer software defects?

ISO 9001 standards

In June 1997, the Supreme Court ruled that the Communications Decency Act is unconstitutional and declared that the internet must be protected under the First Amendment. To whom does the ruling apply?

Internet communication users who have the same free-speech protections on the internet as exist for print communications.

(also known as the Trademark Act, Title 15, of the U.S. Code) defines the use of a trademark, the process for obtaining a trademark from the USPTO, and the penalties associated with trademark infringement

Lanham Act

a system of rules that dictates what an individual can and cannot do

Law

amends Title 35 of the U.S. Code, patent system changed from a "first-to-invent" to a "first-inventor-to-file" system

Leahy-Smith America Invents Act

What prohibits NSL recipients from informing anyone that the government has secretly requested records?

NSL gag provision

aspect of artificial intelligence that involves technology that allows computers to understand, analyze, manipulate, and/or generate "natural" languages, such as English

Natural language processing

What is the purpose of notice and takedown procedures?

Notice and takedown procedures grant copyright holders a quick and simple way to halt access to allegedly infringing content. Copyright holders are granted the right to issue subpoenas.

What kind of model does the Organisation for Economic Co-operation and Development (OECD) guidelines provide for the protection of all private data?

OECD guidelines provide a non-binding model for the protection of consumer data.

Who's goals are to set policies and to agree on topics for which multilateral consensus is necessary for individual countries to make progress in a global economy?

Organisation for Economic Co-operation and Development (OECD)

Which four levels need security measures implemented?

Organization, network, application, and user

How did the America Invents Act affect the definition of prior art?

Prior art now includes items sold around the world, not just those items sold in the United States.

Public Law 110-403) created the position of Intellectual Property Enforcement Coordinator within the Executive Office of the President. It also increased trademark and copyright enforcement and substantially increased penalties for infringement.

Prioritizing Resources and Organization for Intellectual Property (PRO-IP) Act of 2008

What act establishes a code of fair information practices that sets rules for the collection, maintenance, use, and dissemination of personal data that is kept in systems of records by federal agencies?

Privacy Act

What protects the records of financial institution customers from unauthorized scrutiny by the federal government?

Right to Financial Privacy Act

This act could help speed the recovery of communications infrastructure after natural disasters and direct the federal government to study additional ways to make sure that existing infrastructure can survive during those disasters.

Securing Access to Networks in Disasters Act of 2017

What is the difference between security safeguards and purpose specification in the context of fair information practices?

Security safeguards are focused on unauthorized access, modification, or disclosure of personal data Purpose specification is focused on the explicitly specified purpose of data collection and the absence of the consequent change of the collected data.

This act gives the Federal Communications Commission (FCC) and law enforcement additional authority to stop fraudulent telephone calls from persons using false caller identification information. It also provides consumers with new tools and information to identify and prevent these illegal scam calls and directs the Government Accountability Office (GAO) to conduct a study on new technologies to stop these calls.

Spoofing Prevention Act

What hardware device is used by law enforcement to impersonate a cell tower, forcing all mobile phones in range to connect to it and then capture information to identify said phones/users?

Stingray

involves acquiring data, sound, images, and video from a patient and then transmitting everything to a medical specialist for later evaluation

Store-and-forward telemedicine

Focuses on unlawful access to stored communications to obtain, alter, or prevent authorized access to a wire or electronic communication while it is in electronic storage

Stored Wire and Electronic Communications and Transactional Records Access Statutes

a habit of unacceptable behavior

vice

an approach to social media marketing that encourages individuals to pass along a marketing message to others, thus creating the potential for exponential growth in the message's exposure and influence

viral marketing

a habit that inclines people to do what is acceptable

virtue

variant of phishing through voicemail

vishing


Related study sets

My World Chapter 7.1 First Presidents

View Set

Quantative Reasoning 4A-4D Definitions

View Set

LU CSIS 325 - CH. 1-3 & 5-7 (Midterm)

View Set