Exam 10: Ethics, Privacy, and Security in the Digital Age
Exam 1: An Introduction to Information Systems in Organizations85 Questions
Exam 2: Hardware and Software111 Questions
Exam 3: Database Systems and Big Data86 Questions
Exam 4: Networks and Cloud Computing85 Questions
Exam 5: Electronic Commerce and Enterprise Systems117 Questions
Exam 6: Business Intelligence and Analytics85 Questions
Exam 7: Knowledge Management and Specialized Information Systems85 Questions
Exam 8: Systems Acquisition and Development85 Questions
Exam 9: The Personal and Social Effects of Computers85 Questions
Exam 10: Ethics, Privacy, and Security in the Digital Age85 Questions
Select questions type
_____ states the principles and core values that are essential to a set of people and that, therefore, govern these people's behavior.
(Multiple Choice)
4.9/5
(42)
Liam, a specialist in _____, has designed a desk that uses hydraulic lifts to raise and lower the desk to the perfect height for any worker to use comfortably, whether sitting or standing.
(Short Answer)
4.9/5
(31)
Outline six useful policies to minimize computer-related waste and mistakes.
(Short Answer)
4.9/5
(35)
Some people believe that consumers should have the ability to correct errors in their personal data stored in corporate database systems, which is an issue of _____.
(Short Answer)
4.7/5
(39)
According to the Better Business Bureau, a business's privacy notice should include some method of _____, which means providing a customer a course of action to take if the business does not meet its' own privacy policy in some way.
(Short Answer)
4.8/5
(46)
The _____ requires telephone companies to turn over customer information, including numbers called, without a court order if the Federal Bureau of Investigation (FBI) claims that the records are relevant to a terrorism investigation.
(Multiple Choice)
4.9/5
(50)
A recent study conducted by the University of Nevada revealed that cyberloafing (wasting time online) costs U.S. businesses more than _____ annually.
(Multiple Choice)
4.8/5
(33)
RFID chips embedded in objects generate radio transmissions that allow people to track the location and other associated data of those objects. It's been suggested that RFID chips be implanted ________.
(Multiple Choice)
4.8/5
(35)
Imagine that you are faced with an ethical dilemma at work, and you must determine the "right," or ethical, course of action. List the eight steps you will go through to make this decision, including some of the questions you'll ask yourself at each step in the process.
(Essay)
4.8/5
(38)
In order to protect the privacy of employees, email messages that have been erased from hard disks cannot be retrieved.
(True/False)
4.9/5
(36)
Miranda works at a small-batch soda pop manufacturing plant. For eight hours a day, she uses her right hand to lift individual bottles of soda pop off the production line and place them in packing crates. Lately her right elbow has been hurting, so she visited her doctor, who diagnosed her with _______.
(Multiple Choice)
4.9/5
(35)
In one court case, a hospital employee, who had been fired for showing coworkers sexually explicit photos on a hospital computer, sued his former employer for wrongful termination. What did the court rule and why?
(Multiple Choice)
4.7/5
(38)
Two primary causes of computer-related health problems are a poorly designed work environment and failure to take regular breaks to stretch the muscles and rest the eyes.
(True/False)
4.8/5
(37)
Organizations continue to operate their businesses using integrated information systems that lead to missed opportunities, increased costs, and lost sales.
(True/False)
4.7/5
(32)
Some companies offer health and wellness programs that require employee participants to share personal data. This data is protected under the same HIPAA privacy regulations as data shared with health insurance companies and doctors.
(True/False)
4.9/5
(29)
A system of rules that tells us what we can and cannot do is referred to as _____.
(Short Answer)
4.9/5
(36)
A job that requires sitting at a desk and using a computer for many hours a day can lead to _______.
(Multiple Choice)
4.9/5
(30)
Some parents use _____ as a means of controlling what their children see or access on the Internet.
(Short Answer)
4.7/5
(41)
Children and young adults under 18 can easily become the victims of crimes due to their use of social media, but adults are entirely safe in using social media.
(True/False)
4.9/5
(40)
IS professionals believe that their field offers few opportunities for unethical behavior.
(True/False)
4.9/5
(33)
Showing 61 - 80 of 85
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)