Deck 10: Ethical Implications of Information Technology
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/80
Play
Full screen (f)
Deck 10: Ethical Implications of Information Technology
1
The ability to program the computer to do practically anything you want it to do is called:
A)invisible programming values.
B)the invisibility factor.
C)logical malleability.
D)the transformation factor.
A)invisible programming values.
B)the invisibility factor.
C)logical malleability.
D)the transformation factor.
C
2
The reason behind society's high level of interest in computer ethics is that all of the computer's internal operations are hidden from view is referred to as:
A)the transformation factor.
B)invisible abuse.
C)the transformation factor.
D)the invisibility factor.
A)the transformation factor.
B)invisible abuse.
C)the transformation factor.
D)the invisibility factor.
D
3
In an AMA 2002 Corporate Values Survey, what percent of the respondents' firms adhered to ethical and integrity guidelines only part of the time?
A)23%
B)44%
C)80%
D)63%
A)23%
B)44%
C)80%
D)63%
A
4
Which type of auditing activity verifies the accuracy of the firm's records and is the type of activity performed by external auditors?
A)internal control systems design
B)financial audit
C)operational audit
D)concurrent audit
A)internal control systems design
B)financial audit
C)operational audit
D)concurrent audit
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
5
The system feature that is audited to see if the system's operations are carried out to achieve the greatest productivity from available resources is referred to as:
A)efficiency.
B)effectiveness.
C)adequacy of controls.
D)compliance with company policy.
A)efficiency.
B)effectiveness.
C)adequacy of controls.
D)compliance with company policy.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
6
When top- level management imposes the ethics culture in a top- down manner, which step comes first?
A)Conduct an ethics audit.
B)Establish ethics programs.
C)Establish a corporate ethics code.
D)Establish a corporate credo.
A)Conduct an ethics audit.
B)Establish ethics programs.
C)Establish a corporate ethics code.
D)Establish a corporate credo.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
7
The act that made it a federal felony for someone to gain unauthorized access to information pertaining to national defense or foreign relations was the:
A)Counterfeit Access Device and Computer Fraud and Abuse Act.
B)Right to Financial Privacy Act.
C)Federal Privacy Act.
D)Small Business Computer Security and Education Act.
A)Counterfeit Access Device and Computer Fraud and Abuse Act.
B)Right to Financial Privacy Act.
C)Federal Privacy Act.
D)Small Business Computer Security and Education Act.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following is not one of Mason's categories of PAPA?
A)Right to Privacy
B)Right to Access
C)Right to Availability
D)Right to Property
A)Right to Privacy
B)Right to Access
C)Right to Availability
D)Right to Property
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
9
Traditions of belief about right and wrong conduct are:
A)laws.
B)computer ethics.
C)ethics.
D)morals.
A)laws.
B)computer ethics.
C)ethics.
D)morals.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
10
When top- level management leads by example, it is referred to as:
A)leading by example.
B)ethical behavior.
C)ethics culture.
D)moral culture.
A)leading by example.
B)ethical behavior.
C)ethics culture.
D)moral culture.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
11
Which part of the ACM Code of Ethics and Professional Conduct deals with moral behavior and issues that are currently receiving legal attention?
A)Compliance with the Code
B)Organizational Leadership Imperatives
C)General Moral Imperatives
D)More Specific Professional Responsibilities
A)Compliance with the Code
B)Organizational Leadership Imperatives
C)General Moral Imperatives
D)More Specific Professional Responsibilities
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
12
An effort consisting of multiple activities designed to provide employees with direction in carrying out the corporate credo is referred to as an:
A)ethics audit.
B)ethics indoctrination.
C)ethics program.
D)ethics orientation.
A)ethics audit.
B)ethics indoctrination.
C)ethics program.
D)ethics orientation.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following is not a major area of expectation according to the ACM Software Engineering Code of Ethics and Professional Practice?
A)environmental
B)colleagues
C)self
D)client and employer
A)environmental
B)colleagues
C)self
D)client and employer
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
14
Formal rules of conduct that a sovereign authority, such as a government, imposes on its subjects or citizens are:
A)computer ethics.
B)ethics.
C)morals.
D)laws.
A)computer ethics.
B)ethics.
C)morals.
D)laws.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
15
Formal educational programs in computer ethics are available from a variety of sources except for:
A)college courses.
B)professional programs.
C)law enforcement programs.
D)private educational programs.
A)college courses.
B)professional programs.
C)law enforcement programs.
D)private educational programs.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
16
Which of the following are the easiest to interpret?
A)computer ethics
B)ethics
C)laws
D)morals
A)computer ethics
B)ethics
C)laws
D)morals
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
17
Which opportunity for invisible programming exists because of intentional programming acts that cross legal as well as ethical boundaries?
A)invisible programming values
B)invisible abuse
C)invisible programming routines
D)invisible complex calculations
A)invisible programming values
B)invisible abuse
C)invisible programming routines
D)invisible complex calculations
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following laws was passed in the 1970s dealing with the handling of credit data?
A)Fair Credit Reporting Act
B)Freedom of Information Act
C)Computer Matching and Privacy Act
D)Right to Federal Privacy Act
A)Fair Credit Reporting Act
B)Freedom of Information Act
C)Computer Matching and Privacy Act
D)Right to Federal Privacy Act
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
19
In the corporate credo for Security Pacific Corporation, who is the first commitment to?
A)commitment to communities
B)commitment to employee
C)commitment to customer
D)commitment of employee to employee
A)commitment to communities
B)commitment to employee
C)commitment to customer
D)commitment of employee to employee
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
20
A succinct statement of the values that the firm seeks to uphold is referred to as a(n):
A)ethical statement.
B)code of ethics.
C)corporate credo.
D)corporate code.
A)ethical statement.
B)code of ethics.
C)corporate credo.
D)corporate code.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
21
The manages the internal auditing department and usually reports to the CEO or the CFO.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
22
includes intentional acts that cross legal as well as ethical boundaries.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
23
The auditing activity that involves the internal auditors in system development is:
A)financial audit.
B)internal control systems design.
C)operational audit.
D)concurrent audit.
A)financial audit.
B)internal control systems design.
C)operational audit.
D)concurrent audit.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
24
The right to be left alone falls under which category of Mason's PAPA?
A)Right to Property
B)Right to Access
C)Right to Privacy
D)Right to Accuracy
A)Right to Property
B)Right to Access
C)Right to Privacy
D)Right to Accuracy
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
25
The analysis of the nature and social impact of computer technology as well as the corresponding formulation and justification of policies for the ethical use of such technology is referred to as:
A)ethics.
B)a corporate credo.
C)an ethical code.
D)computer ethics.
A)ethics.
B)a corporate credo.
C)an ethical code.
D)computer ethics.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
26
Regarding information auditing, who reports to the CEO or the CFO?
A)external auditors
B)director of internal auditing
C)internal auditors
D)audit committee
A)external auditors
B)director of internal auditing
C)internal auditors
D)audit committee
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
27
In the Software Engineering Code of Ethics and Professional Practice, which area falls under the heading of professional performance?
A)management
B)judgment
C)profession
D)public
A)management
B)judgment
C)profession
D)public
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
28
is a collection of guiding beliefs, standards, or ideals that pervades an individual or a group or community of people.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
29
A _ _ is the same as an operational audit except that this type is ongoing.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
30
Under which program heading should the CIO initiate projects to review transaction processing systems and financial information systems to ensure that they are operating at maximum effectiveness?
A)Educating the firm's executives on financial systems
B)Achieving a higher level of understanding of accounting principles
C)Keeping tight control on money spent for information resources
D)Reviewing the information systems that accomplish financial reporting and taking remedial action
A)Educating the firm's executives on financial systems
B)Achieving a higher level of understanding of accounting principles
C)Keeping tight control on money spent for information resources
D)Reviewing the information systems that accomplish financial reporting and taking remedial action
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
31
Which statement is false regarding internal auditors?
A)Internal auditors have no ties with any individuals or groups within the firm.
B)Internal auditors' only allegiance is to the systems development team.
C)Internal auditors offer objectivity.
D)Internal auditors operate independently of the firm's business units.
A)Internal auditors have no ties with any individuals or groups within the firm.
B)Internal auditors' only allegiance is to the systems development team.
C)Internal auditors offer objectivity.
D)Internal auditors operate independently of the firm's business units.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
32
Mason coined the acronym to represent society's four basic rights in terms of information: privacy, accuracy, property, and accessibility.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
33
An is an effort consisting of multiple activities designed to provide employees with direction in carrying out the corporate credo.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
34
The mostly widely publicized classification of human rights in the computer area is Richard O. Mason's .
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
35
Under which program heading should the CIO work with the stockholder relations department to identify the information to be included in stockholder reports?
A)Actively participating in the release of financial information to environmental elements
B)Educating the firm's executives on financial systems
C)Keeping tight control on money spent for information resources
D)Achieving a higher level of understanding of accounting principles
A)Actively participating in the release of financial information to environmental elements
B)Educating the firm's executives on financial systems
C)Keeping tight control on money spent for information resources
D)Achieving a higher level of understanding of accounting principles
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
36
are those routines that the programmer codes into the program that may or may not produce the processing that the user desires.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
37
A _ is a succinct statement of the values that the firm seeks to uphold.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
38
is software that is illegally copied and then used or sold.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
39
Which opportunity for invisible programming exists because the routines that the programmer codes into the program may or may not produce the processing that the user desires?
A)invisible complex calculations
B)invisible programming values
C)invisible models
D)invisible abuse
A)invisible complex calculations
B)invisible programming values
C)invisible models
D)invisible abuse
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
40
Which act was rewritten to include digital, data, and video communications and electronic mail?
A)Electronic Communications Privacy Act
B)Freedom of Information Act
C)Right to Federal Privacy Act
D)Computer Matching and Privacy Act
A)Electronic Communications Privacy Act
B)Freedom of Information Act
C)Right to Federal Privacy Act
D)Computer Matching and Privacy Act
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
41
Morals are a suite of guiding beliefs, standards, or ideals that pervades an individual or a group or community of people.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
42
Richard Mason believes "the right to be let alone" is being threatened.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
43
Internal auditors should participate in systems development because they can offer expertise that can improve the quality of the system.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
44
An AMA 2002 Corporate Values Survey found that 45% of the respondents' firms adhered to ethical and integrity guidelines only part of the time.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
45
A concurrent audit is the same as a financial audit except that the concurrent audit is ongoing.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
46
An audit committee defines the responsibilities of the internal auditing department and receives many of the audit reports.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
47
The Software Engineering Code of Ethics and Professional Practice deals with responsibility to constituents, professional performance, and self- improvement.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
48
A verifies the accuracy of the firm's records and is the type of activity performed by external auditors.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
49
An _ is not conducted to verify the accuracy of records, but rather to validate the effectiveness of procedures.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
50
The ethics culture is determined from the lower level of management to the top level.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
51
are formal rules of conduct that a sovereign authority, such as a government, imposes on its subjects or citizens.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
52
Computer- based systems are more accurate than manual systems.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
53
deal with moral behavior and issues that are currently receiving legal attention.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
54
take the form of programs that are so complex that users do not understand them.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
55
The first person charged with committing a computer crime was a programmer who put a patch in a program so that it would not flag his bank account as being overdrawn.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
56
The Counterfeit Access Device and Computer Fraud and Abuse Act made it a federal felony for someone to gain unauthorized access to information pertaining to national defense or foreign relations.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
57
Software that is illegally copied and then used or sold is referred to as pirated.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
58
A financial audit verifies the accuracy of the firm's records and is the type of activity performed by external auditors.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
59
The CIO should keep tight control on money spent for information resources.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
60
The Association for Computing Machinery is the oldest professional computer organization in the world.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
61
One way to have continuing education of the firm's executives is to make sure that financial managers are liberally represented on the MIS steering committee.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
62
The Electronic Communications Privacy Act of 1968 covered voice, digital, data, and video communications, as well as electronic mail.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
63
Invisible programming values are those routines that the programmer intentionally codes into the program that do not produce the processing that the user desires.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
64
Morals are a social institution with a history and a list of rules.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
65
In meeting the control requirements imposed by NCR, the CIO must ensure that such controls are built into systems during systems development.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
66
Today, public information is more accessible than the time prior to computerized databases.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
67
James Moor has defined computer ethics as the analysis of the nature and social impact of computer technology, as well as the corresponding formulation and justification of policies for the ethical use of such technology.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
68
In an ethics audit, an internal auditor meets with a manager in a several- hour session to learn how the manager's unit is carrying out the corporate credo.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
69
What are the four parts of the current form of the ACM code of ethics?
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
70
One of SOX provisions is that CEOs and CFOs must certify the financial reports.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
71
Define morals, ethics, and laws.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
72
How can the CIO bring financial reporting up to expectations?
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
73
Laws are formal rules of conduct that a sovereign authority, such as a government, imposes on its subject or citizens.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
74
All acts of computer crime fall into the category of invisible abuse.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
75
As of August 11, 2002, CEOs, CFOs, and CIOs are required to sign off on the accuracy of their financial statements.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
76
What are the three reasons for the importance of computer ethics as posed by James Moor?
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
77
What does the acronym PAPA refer to?
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
78
Software vendors can guard against theft of their intellectual property by means of copyrights, patents, and license agreements.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
79
A problem in the People's Republic of China is that the term "privacy" often has a negative connotation, being associated with someone who has something to hide.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
80
James Moor believes that the two main reasons for society's high level of interest in computer ethics are logical malleability and the invisibility factor.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck