Exam 12: Ethical Guidelines for Information Use

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Match the managerial control concern with the challenges a manager may face on a regular basis. Match the managerial control concern with the challenges a manager may face on a regular basis.

(Not Answered)
This question doesn't have any answer yet
Ask our community

In today's digital word,individuals can control their privacy through ______,consent,and correction.

(Short Answer)
5.0/5
(31)

Google Flu Trends aggregates personal search data in order to estimate world-wide flu activity.Google's site has drawn criticism due to the sharing of users' online behavior without getting their consent.This,in essence,violates the user's right to:

(Multiple Choice)
4.7/5
(45)

"Who owns information?" and "What are the just and fair prices for its exchange?" are part of this ethical issue:

(Multiple Choice)
4.7/5
(38)

Many organizations and even consumers use this to control access to a network like the Internet,allowing only authorized traffic to pass.

(Multiple Choice)
4.8/5
(35)

Provide an example of a company that has faced a dilemma reconciling their corporate policies within a country where it hopes to operate.

(Essay)
4.8/5
(45)

Give reasons why users are so willing to forgo privacy on the Internet.

(Short Answer)
4.9/5
(44)

This is the term used to describe ethical dilemmas that arise with the development and application of IT.

(Multiple Choice)
4.8/5
(31)

Today's managers must ensure that information about their employees and customers is only available to those who have a right to see it and use it,an issue referred to as:

(Multiple Choice)
4.8/5
(41)

Match the security tool to its security category. Match the security tool to its security category.

(Not Answered)
This question doesn't have any answer yet
Ask our community

Those who possess the "best" information and know how to use it,win.

(True/False)
4.9/5
(37)

Questions like "Who is responsible for the reliability of information?" and "Who will be accountable for errors in the information?" are part of this ethical issue.

(Multiple Choice)
4.9/5
(39)

Which normative theory of business ethics would TJX have displayed if it had informed customers as soon as the breach was corrected and told other retailers how to prevent future security breaches?

(Multiple Choice)
4.9/5
(35)

All of the following are examples of green computing EXCEPT:

(Multiple Choice)
4.9/5
(39)

What security and controls should a company use to protect its computer infrastructure? Why do managers need to be involved in the decisions about security and control measures?

(Not Answered)
This question doesn't have any answer yet
Ask our community

In today's digital word,individuals can control their privacy through choice,______ ,and correction.

(Multiple Choice)
4.9/5
(41)

The concern about privacy on Facebook and other social media sites is greater in the U.S.than it is in Europe.

(True/False)
5.0/5
(33)

Green computing is often associated with supporting the triple bottom line known as:

(Multiple Choice)
4.8/5
(42)

The social contract theory is made up of two distinct components - social welfare and _________.

(Short Answer)
4.9/5
(26)

List the four areas,as outlined in the text,which deal with control of information.

(Essay)
4.9/5
(36)
Showing 21 - 40 of 52
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)