Exam 10: Ethical Implications of Information Technology

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Traditions of belief about right and wrong conduct are:

(Multiple Choice)
4.9/5
(35)

A _____________ is the same as an operational audit except that this type is ongoing.

(Essay)
4.7/5
(32)

In an ethics audit, an internal auditor meets with a manager in a several- hour session to learn how the manager's unit is carrying out the corporate credo.

(True/False)
4.8/5
(31)

The act that made it a federal felony for someone to gain unauthorized access to information pertaining to national defense or foreign relations was the:

(Multiple Choice)
4.8/5
(34)

Which of the following is not one of Mason's categories of PAPA?

(Multiple Choice)
4.8/5
(35)

In the corporate credo for Security Pacific Corporation, who is the first commitment to?

(Multiple Choice)
4.8/5
(39)

James Moor has defined computer ethics as the analysis of the nature and social impact of computer technology, as well as the corresponding formulation and justification of policies for the ethical use of such technology.

(True/False)
4.8/5
(28)

Which of the following is not a major area of expectation according to the ACM Software Engineering Code of Ethics and Professional Practice?

(Multiple Choice)
4.8/5
(37)

___________are formal rules of conduct that a sovereign authority, such as a government, imposes on its subjects or citizens.

(Essay)
4.8/5
(32)

Mason coined the acronym___________ to represent society's four basic rights in terms of information: privacy, accuracy, property, and accessibility.

(Essay)
4.9/5
(33)

Software that is illegally copied and then used or sold is referred to as pirated.

(True/False)
4.7/5
(37)

The ability to program the computer to do practically anything you want it to do is called:

(Multiple Choice)
4.8/5
(38)

Under which program heading should the CIO initiate projects to review transaction processing systems and financial information systems to ensure that they are operating at maximum effectiveness?

(Multiple Choice)
4.8/5
(28)

Which type of auditing activity verifies the accuracy of the firm's records and is the type of activity performed by external auditors?

(Multiple Choice)
4.8/5
(32)

The Software Engineering Code of Ethics and Professional Practice deals with responsibility to constituents, professional performance, and self- improvement.

(True/False)
4.8/5
(25)

Which opportunity for invisible programming exists because of intentional programming acts that cross legal as well as ethical boundaries?

(Multiple Choice)
4.8/5
(32)

Under which program heading should the CIO work with the stockholder relations department to identify the information to be included in stockholder reports?

(Multiple Choice)
4.9/5
(30)

The mostly widely publicized classification of human rights in the computer area is Richard O. Mason's___________ .

(Essay)
4.7/5
(40)

Richard Mason believes "the right to be let alone" is being threatened.

(True/False)
4.8/5
(37)

Formal rules of conduct that a sovereign authority, such as a government, imposes on its subjects or citizens are:

(Multiple Choice)
4.8/5
(39)
Showing 21 - 40 of 80
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)