MIS Ethics
The federal law that protects person-to-person wire, oral, and electronic communications and also includes a variety of network crime statutes that include identity theft and unlawful access to stored communications is The ___ Act.
wiretap
Which two of the following are examples of an organization using big data and analyzing predictive behavior with the goal of creating new offerings?
An in-home healthcare provider tracks the hospital readmission rates of elderly people who live alone after they received care for falling in their home. Netflix tracks what users who viewed all three seasons of Stranger Things also had in their queues.
Because it is difficult to trace and it is accessible through any Internet connected device, cyber criminals often request payment in ___ .
cryptocurrency
Customers are offered a free dessert if they complete a survey. This method of data collection is referred to as ___ inquiry.
direct
A Wi-Fi tracker follows a shopper's path from store to store.
indirect tracking
There are five basic ethical principles that we can look to when facing an ethical dilemma. Select the three ethical principles from the choices offered.
The Principle of Moral Rights The Principle of Virtue The Principle of Distributive Justice
Select the two major types of patents.
Design Utility
This principle simply states that when faced with an ethical dilemma the manager should choose that option that does the greatest good for the most involved is the ___ principle.
utilitarian
Spyware is software that collects information about your Internet surfing habits and behaviors. Spyware includes the collection of which three of the following?
Account numbers Passwords Keystrokes
Which amendment to the U.S. Constitution protects freedom of speech from government censorship?
1st
A computer program that scans files to identify and remove computer viruses and other malicious programs is called _____.
Antivirus software
Which two of the following guidelines should you follow when reporting a co-worker's computer ethics violations.
Be brief and remember that your employer probably did not hire you monitor inappropriate computer use. Only report incidences that you have personally witnessed.
Select two ways managers encourage employees to act unethically.
By failing to act ethically themselves. By not enforcing strong ethical behavior.
Which two of the following potential workplace computer ethics violations are also illegal activities.
Computer scams launched from work computers. Software piracy using an employer's computer network.
This is a small text file of information created by websites you visit that your web browser stores on your hard disk.
Cookie
Determining how much time employees should be allowed to browse their social media sites while at work falls under which dimension of ethical behavior in the digital age?
Establishing standards
Acting with high morals means you live a virtuous life, while your ___ provide a rational framework for your morals.
Ethics
Changing cookie settings in one browser (Chrome, for example) will automatically change your cookie settings in your other browsers (Safari, Firefox, Edge, for example).
False
Select the first step in the five steps of an ethical analysis.
Getting the facts
Which dimension of ethical behavior in the digital age is represented by the following question? You are interviewing 3 applicants for a management position in your firm and wish to ensure that they will represent your company with professionalism and maturity. Should you check the applicants' social media sites prior to making your hiring decision?
Information Privacy Rights
Your boss states that in your organization data must be used responsibly and privacy should always be respected. This aligns with which dimension of ethical concerns in the digital age?
Information privacy rights
The software code of a particular computer virus is called the virus ____.
signature
Ethical challenges raised by the use of information systems fall into 5 dimensions (categories). Which 3 of the following are included in these 5 dimensions?
Information privacy rights Quality of life Copyright and intellectual property rights
Select the fourth step in the five steps of an ethical analysis.
Listing options
Select three categories of intellectual property.
Patents Trade secrets Copyrights
This software allows managers to take control of an employee's computer remotely
Remote desktop software
Which three of the following can encourage ethical computer use in the workplace?
Setting a good example Employee monitoring software Remote desktop software
Which of the following is not one of the steps included in the 5 steps of an ethical analysis?
Setting a strong example.
Will the decision impact the privacy or property rights of any individuals or corporations? This question should be asked in which step of the 5 steps of an ethical analysis.
Step 2 - Determining the affected.
Which of the following allows, but does not require, private companies to warn the U.S. government about cyber-security threats?
The Cybersecurity Information Sharing Act
The laws that were created to update copyright laws dealing with the issues of regulating digital material in accordance with World Intellectual Property Organization treaties is called:
The Digital Millennium Copyright Act (DMCA)
Which Act protects email and VoIP communications by making it illegal to intercept calls or messages without a warrant.
The Electronic Communications Privacy Act
Select three correct statements regarding international Internet privacy laws.
The European Union (EU) European Commission Data Protection Directive states that under EU law, personal data can only be gathered legally under strict conditions. International laws on Internet privacy vary greatly. It is very difficult to get nations across the globe to agree on standardized Internet privacy laws.
Which principle of ethical conduct attempts to distribute rewards equitably to individuals based on their level of productivity?
The Principle of Distributive Justice
Which principle of ethical conduct states that there exist certain moral values that should always be upheld or never be violated.
The Principle of Moral Rights
Which principle of ethical conduct asks the decision-maker to consider what a highly moral person would do when faced with this question.
The Principle of Virtue
Which law, passed after the 9/11 attacks allowed law enforcement to obtain information about online and offline communications related to terrorist activities without a warrant.
The US PATRIOT Act/USA Freedom Act
Many sales managers, including those in information technology-related fields, use commissions in an attempt to incentivize productivity and to reward more successful salespeople. The principle of ethical conduct that this exemplifies is ___.
The principle of distributive justice
Which statement encompasses the third step of the five-step process of an ethical analysis?
There is an extremely good chance that other managers, perhaps in your own organization, have faced similar dilemmas.
Companies that purchase consumer behavior information from other organizations are engaged in ___.
Third party data purchase
Select the three major titles of the Digital Millennium Copyright Act (DMCA) that impact digital copyright protection.
Title 4 - This act facilitates distance learning by allowing educational institutions latitude with regard to the use of copyrighted material. Title 2 - This act protects Internet Service Providers (ISPs) from being sued for copyright infringement when the ISP's user wrongfully copies items from the Internet. Title 1 - This act requires that measures be taken to make it difficult to copy analog video recordings.
The purpose of spyware is to ______.
capture the user's account data, passwords, key strokes, and more
The dimension (category) of ethical dilemmas that examines how individuals or corporations can be held responsible in case of violations of privacy or intellectual property rights is referred to ___ and accountability.
control
When you revisit a website, your browser will send the website's ____ (a small text file) to the Web server that uses this information to customize and optimize your experience.
cookie
A form of protection provided by the laws of the United States for "original works of authorship", including literary, dramatic, musical, architectural, cartographic, choreographic, pantomimic, pictorial, graphic, sculptural, and audiovisual creations is called a ____
copyright
Management can discourage the inappropriate use of business computers by publicly announcing that their organization uses employee ___ software or remote desktop software.
monitoring
If the box is not already checked by default, this is called an ___ mechanism.
opt-in
If the box is already checked by default, this is called an ___ mechanism.
opt-out
Cookies that are created by a website other than the one you are currently visiting and are used to track your surfing habits are called third- ____ cookies. These cookies are considered an invasion of privacy.
party
Cookies stored on your device's hard drive and remain even if your computer has been restarted are called ___ cookies.
persistent
Computer ethics violations fall in two major categories; illegal activity and organizational ___ violations.
policy
An important part of an ethical analysis is to prepare for the consequences of the decision, many of which may be unintended. Part of this preparation should include __.
preparing to defend your decision
Your right to control what happens with personal information about you is centered around the right to ___
privacy
Studies indicate that the more time teens spend on social media the more likely they are to suffer from depression. This concern falls in the ethical dimension of ___ of life.
quality
The Act that outlines a plan to protect government information and assets against cyber threats and requires each federal agency to develop a plan for information security is The Federal Information ___ Management Act (FISMA).
security
What type of cookie is stored in temporary memory and is lost when the web browser is closed?
session
The Cybersecurity Information ___ Act, passed in December 2015, allows private companies to share threat warnings with the U.S. government.
sharing
The dimension (category) of ethical concerns in the digital age that refers to determining what constitutes proper levels of protection of digital information is called establishing ____
standards
Data that has a defined length, type, and format, including items as numbers, dates, or strings such as a customer profile is referred to as ___ data.
structured
Data that is typically used in commercially available relational databases, where the data resides in a fixed field and can easily be queried, is called ___ data.
structured
The principle of ethical conduct that states that a manager must attempt to determine if this decision is fair for all involved is the ___ principle.
universalist
Select three common methods in which organizations collect data.
Direct inquiry Indirect tracking Third-party data purchase