Exam 13: Security and Ethical Challenges
Exam 1: Foundations of Information Systems in Business146 Questions
Exam 2: Competing With Information Technology125 Questions
Exam 3: Computer Hardware160 Questions
Exam 4: Computer Software139 Questions
Exam 5: Data Resource Management119 Questions
Exam 6: Telecommunications and Networks126 Questions
Exam 7: Electronic Business Systems112 Questions
Exam 8: Enterprise Business Systems105 Questions
Exam 9: Electronic Commerce Systems111 Questions
Exam 10: Decision Support Systems123 Questions
Exam 11: Developing Businessit Strategies125 Questions
Exam 12: Developing Businessit Solutions145 Questions
Exam 13: Security and Ethical Challenges119 Questions
Exam 14: Enterprise and Global Management of Information Technology124 Questions
Select questions type
When managers apply the _____________ theory of ethical decision making, they believe their only responsibility is to increase the profits of the business without violating the law or engaging in fraudulent practices.
(Multiple Choice)
4.8/5
(38)
People who sit at PC workstations or visual display terminals in fast-paced, repetitive-keystroke jobs can suffer from a variety of health problems, known collectively as computer trauma disorders (CTDs).
(True/False)
4.7/5
(31)
When managers apply the _____________ theory of ethical decision making, they believe that managers have an ethical responsibility to manage a firm for the benefit of all individuals and groups that have a claim on a company.
(Multiple Choice)
4.9/5
(48)
One ethics challenge presented by IT is that computer monitoring, in its extremes, can create an electronic ________________, where workers are forced to work at a hectic pace under poor working conditions.
(Short Answer)
4.9/5
(32)
Security monitors can control the use of the hardware, software, and data resources of a computer system.
(True/False)
4.7/5
(42)
IT security management should be periodically examined or audited by a company's internal auditing staff or auditors from professional accounting firms.
(True/False)
4.9/5
(37)
According to one survey, 90 percent of U.S. workers admit to surfing recreational sites during office hours.
(True/False)
4.7/5
(45)
According to the text, information technology has caused ethical controversy in which of the following basic categories of ethical business issues?
(Multiple Choice)
4.8/5
(40)
One way hackers gain access to an individual's information is by faking an e-mail address or Web page to trick users into passing along critical information like credit card numbers. This is known as ________________.
(Multiple Choice)
4.9/5
(39)
Which of the following is not a method used to defend against denial of service attacks at "zombie" machines?
(Multiple Choice)
4.9/5
(34)
Good ergonomic design considers tools, tasks, the workstation, and _______________.
(Multiple Choice)
4.8/5
(33)
The widespread use of personal computers and the Internet has dramatically improved the development of people-oriented and personalized information systems.
(True/False)
4.9/5
(32)
Computer monitoring has been criticized as unethical because no one is overseeing the person who monitors the workers.
(True/False)
4.7/5
(41)
Governments around the world are debating privacy issues and considering various forms of legislation. One area central to the privacy debate is opt-in versus opt-out. Those preferring the opt-in standard do so because this standard would:
(Multiple Choice)
4.8/5
(39)
One of the major principles of technology ethics is that even if judged acceptable by the other three guidelines, the technology must be implemented so as to avoid all unnecessary risk. This principle is:
(Multiple Choice)
4.8/5
(33)
________________ consist of computers, communications processors, and/or software that protect computer networks from intrusion by screening all network traffic and serving as a safe transfer point for access to and from other networks.
(Short Answer)
4.8/5
(43)
Showing 21 - 40 of 119
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)