Exam 8: Ethics and Technology
Exam 1: Understanding Ethics114 Questions
Exam 2: Defining Business Ethics105 Questions
Exam 3: Organizational Ethics105 Questions
Exam 4: Corporate Social Responsibility106 Questions
Exam 5: Corporate Governance105 Questions
Exam 6: The Role of Government103 Questions
Exam 7: Blowing the Whistle100 Questions
Exam 8: Ethics and Technology100 Questions
Exam 9: Ethics and Globalization100 Questions
Exam 10: Making It Stick: Doing Whats Right in a Competitive Market91 Questions
Select questions type
Thin consent is based on the assumption that the employee can easily find another job.
(True/False)
4.7/5
(46)
Video surveillance, under federal law, is acceptable where the camera focuses on _____ accessible areas.
(Short Answer)
4.9/5
(39)
Companies can now make vast amounts of information available to its employees and customers on their Internet, intranet, and extranet sites.
(True/False)
5.0/5
(32)
Which of the following statements is true of thick consent?
(Multiple Choice)
4.9/5
(43)
According to Adam Moore, consent given by employees with little choice is referred to as thick consent.
(True/False)
4.9/5
(35)
_____ can record information that has been typed into a computer using a keyboard even if the information is deleted after typing.
(Short Answer)
4.8/5
(44)
_____ is a work arrangement that enables employees to log into their company's network via a secure gateway such as a virtual private network.
(Short Answer)
4.8/5
(32)
Packet-sniffing software can be used to monitor employees' private accounts, as long as they are accessed on workplace networks or phone lines.
(True/False)
4.9/5
(44)
The _____ argument and the recent availability of capable technology have been driving companies toward creating an Orwellian work environment.
(Short Answer)
4.9/5
(35)
The _____ is a private piece of a company's network that is made available to customers or vendor partners using secured access with a unique password.
(Short Answer)
4.8/5
(46)
Which of the following statements is true of telecommuting?
(Multiple Choice)
4.9/5
(39)
Keystroke loggers can only capture information that is not deleted.
(True/False)
4.9/5
(35)
Which of the following is a disadvantage of technological advances in a workplace?
(Multiple Choice)
4.8/5
(45)
Copying and distributing unpaid proprietary software is not a violation of computer ethics.
(True/False)
4.8/5
(29)
How did the digitizing of information lead to the establishment of call centers in other countries?
(Essay)
4.7/5
(48)
Video surveillance, under federal law, is acceptable where the camera focuses on publicly accessible areas.
(True/False)
4.8/5
(38)
According to the legal concept of cyberliability, employers can be held liable for the actions of their employees through Internet communications to the same degree as if they had written those communications on company letterhead.
(True/False)
4.8/5
(36)
Parents can be charged with vicarious liability for the actions of their children.
(True/False)
5.0/5
(28)
Showing 61 - 80 of 100
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)