Exam 13: Security and Ethical Challenges

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Lawsuits by monitored workers against employers are:

(Multiple Choice)
4.7/5
(42)

When managers apply the _____________ theory of ethical decision making, they believe their only responsibility is to increase the profits of the business without violating the law or engaging in fraudulent practices.

(Multiple Choice)
4.8/5
(38)

People who sit at PC workstations or visual display terminals in fast-paced, repetitive-keystroke jobs can suffer from a variety of health problems, known collectively as computer trauma disorders (CTDs).

(True/False)
4.7/5
(31)

When managers apply the _____________ theory of ethical decision making, they believe that managers have an ethical responsibility to manage a firm for the benefit of all individuals and groups that have a claim on a company.

(Multiple Choice)
4.9/5
(48)

What is the purpose of external firewalls?

(Multiple Choice)
4.9/5
(37)

One ethics challenge presented by IT is that computer monitoring, in its extremes, can create an electronic ________________, where workers are forced to work at a hectic pace under poor working conditions.

(Short Answer)
4.9/5
(32)

Security monitors can control the use of the hardware, software, and data resources of a computer system.

(True/False)
4.7/5
(42)

A virus is a distinct program that can run unaided.

(True/False)
4.9/5
(38)

IT security management should be periodically examined or audited by a company's internal auditing staff or auditors from professional accounting firms.

(True/False)
4.9/5
(37)

According to one survey, 90 percent of U.S. workers admit to surfing recreational sites during office hours.

(True/False)
4.7/5
(45)

According to the text, information technology has caused ethical controversy in which of the following basic categories of ethical business issues?

(Multiple Choice)
4.8/5
(40)

One way hackers gain access to an individual's information is by faking an e-mail address or Web page to trick users into passing along critical information like credit card numbers. This is known as ________________.

(Multiple Choice)
4.9/5
(39)

Which of the following is not a method used to defend against denial of service attacks at "zombie" machines?

(Multiple Choice)
4.9/5
(34)

Good ergonomic design considers tools, tasks, the workstation, and _______________.

(Multiple Choice)
4.8/5
(33)

The widespread use of personal computers and the Internet has dramatically improved the development of people-oriented and personalized information systems.

(True/False)
4.9/5
(32)

Computer monitoring has been criticized as unethical because no one is overseeing the person who monitors the workers.

(True/False)
4.7/5
(41)

_______________ software is not copyrighted.

(Short Answer)
4.8/5
(33)

Governments around the world are debating privacy issues and considering various forms of legislation. One area central to the privacy debate is opt-in versus opt-out. Those preferring the opt-in standard do so because this standard would:

(Multiple Choice)
4.8/5
(39)

One of the major principles of technology ethics is that even if judged acceptable by the other three guidelines, the technology must be implemented so as to avoid all unnecessary risk. This principle is:

(Multiple Choice)
4.8/5
(33)

________________ consist of computers, communications processors, and/or software that protect computer networks from intrusion by screening all network traffic and serving as a safe transfer point for access to and from other networks.

(Short Answer)
4.8/5
(43)
Showing 21 - 40 of 119
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)