Exam 10: Ethics, Privacy, and Security in the Digital Age
Exam 1: An Introduction to Information Systems in Organizations85 Questions
Exam 2: Hardware and Software111 Questions
Exam 3: Database Systems and Big Data86 Questions
Exam 4: Networks and Cloud Computing85 Questions
Exam 5: Electronic Commerce and Enterprise Systems117 Questions
Exam 6: Business Intelligence and Analytics85 Questions
Exam 7: Knowledge Management and Specialized Information Systems85 Questions
Exam 8: Systems Acquisition and Development85 Questions
Exam 9: The Personal and Social Effects of Computers85 Questions
Exam 10: Ethics, Privacy, and Security in the Digital Age85 Questions
Select questions type
Graydon noticed Jack, his friend and classmate, cheating on a physics exam and now he is trying to decide what to do about it. He knows he could keep quiet about it, but that would violate his moral values, plus the school's code of ethics requires students to report incidents of cheating. On the other hand, if he reports the incident, both his friend and probably all of their other friends will be mad at him. In which phase of the ethical decision-making process is Graydon?
Free
(Multiple Choice)
4.7/5
(34)
Correct Answer:
D
Imagine that you own your own business, and you have decided to write your own code of ethics. List at least five "imperatives," or guidelines, that you would like to include in your company's code of ethics.
Free
(Short Answer)
4.7/5
(31)
Correct Answer:
Students' answers should include some of the following or similar statements:
1. contribute to society and human well-being.
2. avoid harm to others.
3. be honest and trustworthy.
4. be fair and take action not to discriminate.
5. honor property rights including copyrights and patents.
6. give proper credit for intellectual property.
7. respect the privacy of others.
8. honor confidentiality.
Federal law permits employers to monitor their employees' use of company-owned computer equipment, specifically _______.
Free
(Multiple Choice)
4.8/5
(33)
Correct Answer:
D
Which of the following is a useful policy to minimize waste and mistakes?
(Multiple Choice)
4.8/5
(33)
Which of the following statements is true of the E-Government Act of 2002?
(Multiple Choice)
4.8/5
(41)
Computer-related mistakes include organizations operating unintegrated information systems and acquiring redundant systems.
(True/False)
4.9/5
(32)
Deepak's team is in charge of conducting a review of their company's waste/mistake prevention policies and procedures. Part of this review should also evaluate how upcoming changes in information systems will affect business activities.
(True/False)
4.9/5
(39)
U.S. federal law permits employers to monitor email sent and received by employees.
(True/False)
4.8/5
(34)
Kay should have been inputting data into her employer's database, but instead she was ____, meaning she was surfing the Internet, online shopping, and playing games.
(Short Answer)
4.9/5
(38)
In today's workplace, most employers issue a policy stating that they will monitor employees' use of any company-owned computer, server, or email system, thus eliminating any expectation of privacy. How many organizations actually monitor, retain, and review employees' emails?
(Multiple Choice)
4.9/5
(40)
Although Roberta had signed a form preventing her doctor from sharing her personal medical records with the company she worked for, she later discovered that the doctor's office had, in fact, shared her data with her health insurance provider and her employer, which caused her to be terminated. Because the doctor's practice violated its own privacy policy, she was able to file a lawsuit under the ________.
(Multiple Choice)
4.8/5
(39)
Harold is thinking about setting up profiles on Facebook and Twitter. Which of the following categories of data should he avoid sharing on these social media platforms?
(Multiple Choice)
4.8/5
(37)
There are federal laws that permit your employer to monitor your email communications, hence your ______ is not protected.
(Essay)
4.9/5
(41)
In order to be accredited by the Better Business Bureau, a business is required to publish a privacy notice on its website that includes all of the following elements EXCEPT ________.
(Multiple Choice)
4.9/5
(42)
To minimize waste and mistakes, organizations often develop and implement policies and procedures which focus on: ________.
(Multiple Choice)
4.9/5
(31)
It's safe for you to input personal data into your Facebook profile because Facebook is not allowed to share this information with law enforcement officials or third parties for any reason.
(True/False)
4.7/5
(30)
In a recent survey of 2100 human resource professionals, which two activities were listed as the biggest "productivity killers" in the workplace?
(Multiple Choice)
4.7/5
(26)
In the U.S., there is some debate over privacy between those who favor data collection as a means to increase national security and those who view such programs as a violation of rights guaranteed by the Constitution and the Bill of Rights.
(True/False)
4.8/5
(38)
_____ is a means of acquiring data about a group of people (such as location, noise level, and pollution levels) through sensor-enhanced mobile devices.
(Essay)
4.8/5
(31)
Identify and briefly discuss two primary causes of computer-related health problems.
(Essay)
4.7/5
(33)
Showing 1 - 20 of 85
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)