Exam 9: Ethics and Information Technology

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

An effective data policy needs to address issues of all of the following except

Free
(Multiple Choice)
4.8/5
(33)
Correct Answer:
Verified

D

In a short essay, explain the USA PATRIOT Act.

Free
(Essay)
4.8/5
(34)
Correct Answer:
Verified

The act provides expanded government authority over matters such as electronic communications and the use of computer and monetary transactions. Under the current conditions of the Act, government officials are allowed to request and monitor electronic communications that they believe may have a terrorist link. They do not have to have evidence of terrorist activity to make this request. As a result, all electronic communications are now considered available for government inspection. The USA PATRIOT Act also has a broad definition of which types of companies are included within the act. The act is designed to monitor the activities of financial institutions; however, the act considers many types of businesses that are involved in financial transactions.

________________ is a common attitude toward the illegal download of music.

Free
(Multiple Choice)
4.8/5
(33)
Correct Answer:
Verified

B

An initiative by the Federal Bureau of Investigation, in conjunction with other government agencies, called ______________ was developed to help target and convict cybercriminals.

(Multiple Choice)
4.9/5
(40)

One of the most common ways of monitoring customers and potential customers is by using ____________.

(Multiple Choice)
4.8/5
(40)

Stakeholder analysis treats all stakeholders equally in the critical analysis of information technology management issues.

(True/False)
4.8/5
(39)

___________________ allows unannounced monitoring of business-related calls.

(Multiple Choice)
5.0/5
(41)

Under the ______________, employers can consider individual's e-mails corporate property.

(Multiple Choice)
4.9/5
(30)

An effective workers' rights policy needs to address issues of all of the following except

(Multiple Choice)
4.8/5
(44)

An effective data policy needs to address issues of privacy, control, accuracy, and security.

(True/False)
4.7/5
(36)

All of the following are mentioned in the text as types of critical analysis to assist managers with their decision-making process except

(Multiple Choice)
4.8/5
(33)

In a short essay, list and discuss any three of the five issues that managers have to consider when deriving an ethical policy for information technology.

(Essay)
4.9/5
(39)

Software that can be loaded onto a computer so the computer operations can be monitored by an outside party without the consent of the computer user is called spyware.

(True/False)
4.8/5
(27)

Based on the results of the American Management Association/ePolicy Institute Survey on electronic monitoring and surveillance, companies reported that they had dismissed ______of workers for misusing the Internet.

(Multiple Choice)
4.8/5
(28)

The American Management Association/ePolicy Institute survey examined the relationship between ethics and technology. One finding stated that 45% of firms monitored the time spent and numbers called on the phone.

(True/False)
4.8/5
(27)

The FTC Safeguards Rule applies only to firms listed on the NYSE.

(True/False)
4.8/5
(39)

As access and accumulation of information become easier within a firm, so does the probability that information becomes more accurate.

(True/False)
4.7/5
(38)

Based on the results of the American Management Association/ePolicy Institute Survey on electronic monitoring and surveillance, what percentage of companies notified their employees that they were monitoring phone use?

(Multiple Choice)
4.8/5
(24)

Bush, Venables, and Bush identified a series of ethical issues facing internet usage. Which of the following is not one?

(Multiple Choice)
4.8/5
(42)

Issues that need to be addressed in the workers' rights policy include the type of monitoring that can take place within the firm, the type of information that may be collected pertaining to the employee, and the identification of what information would be considered private versus public.

(True/False)
4.8/5
(23)
Showing 1 - 20 of 53
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)