Exam 16: Ethics, fraud and Computer Crime

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Describe what a cookie (in terms of IT)is and what it can do.

(Essay)
4.9/5
(39)

An ethical decision-making model provides guidance on: Introduction

(Multiple Choice)
4.9/5
(36)

The first step of ethical decision-making is to:

(Multiple Choice)
4.9/5
(43)

Name and briefly compare and contrast at least three types of malware.

(Essay)
4.7/5
(44)

Kantianism suggests that:

(Multiple Choice)
4.9/5
(25)

In terms of cybercrime,which of the following is true?

(Multiple Choice)
4.8/5
(35)

Which of the following statements regarding internet access is true?

(Multiple Choice)
4.9/5
(39)

What are the three ways of gathering information of users of an accounting information system? What are the associated ethical concerns?

(Essay)
4.9/5
(31)

Which of the following is not a criticism of utilitarianism?

(Multiple Choice)
4.8/5
(38)

The saying that an action is morally right if it is motivated by a good will that stems from a sense of duty is known as:

(Multiple Choice)
4.8/5
(39)

Some organisations restrict employee's access to external websites such as Facebook and eBay that are not relevant to work.Such conduct is ________ from an employee's perspective:

(Multiple Choice)
4.9/5
(29)

The reporting,by an employee or member of an organisation,of the unethical behaviour of a colleague is called:

(Multiple Choice)
4.8/5
(30)

What are the seven stages to go through when making an ethical decision?

(Essay)
4.9/5
(45)

In terms of IT,spam is a problem because:

(Multiple Choice)
4.8/5
(41)

The principles of the Privacy Act 1988 do not explicitly cover:

(Multiple Choice)
4.8/5
(44)

Which of the privacy principles covers the requirement that information should be protected from loss and unauthorised access?

(Multiple Choice)
4.9/5
(48)

Privacy is:

(Multiple Choice)
4.8/5
(32)

Which of the following statements regarding ethical decision-making is true?

(Multiple Choice)
4.8/5
(38)

Which of the following fraud can occur if an employee is responsible for both approving and paying invoices?

(Multiple Choice)
4.8/5
(36)

Which of the following factors does not affect the usage of internet technology?

(Multiple Choice)
5.0/5
(42)
Showing 21 - 40 of 58
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)