Deck 14: Privacy and Ethical Considerations in Information Management

Full screen (f)
exit full mode
Question
"Who owns information?" and "What are the just and fair prices for its exchange?" are part of which ethical issue?

A) Privacy
B) Accuracy
C) Ownership
D) Property
E) Accessibility
Use Space or
up arrow
down arrow
to flip the card.
Question
All of the following are examples of green computing EXCEPT:

A) Virtualization
B) Cloud computing
C) Tidal powered servers
D) Server workloads moved to off-peak hours
E) Cookies
Question
In 2014, Cambridge Analytica scraped preferences, locations, and friends of 50 million Facebook users, meaning it:

A) Redirected users to its Web site.
B) Targeted advertisements.
C) Collected user passwords.
D) Captured from screen displays.
E) Sold personal data to third parties.
Question
Which type of "cookies" enables a user to stay logged to a site and keeps your shopping cart intact as you click from page to page?

A) Essential
B) Non-essential
C) Location
D) Widget
E) None of the above.
Question
A manager who primarily focuses on the shareholders of the corporation rather than all of the vested parties in the businesses operations and activities is practicing which theory of normative business ethics?

A) Stakeholder theory
B) Investor theory
C) Stockholder theory
D) Shareholder theory
E) Social contract theory
Question
The question "What information does a person or an organization have a right or a privilege to obtain?" is part of this ethical issue.

A) Privacy
B) Accuracy
C) Accessibility
D) Perfection
E) Property
Question
The chapter contends that Internet companies are in business for the money and hence they really would prefer to keep their customers in the dark about how their personal data is being used to generate profits. Assuming this statement is true, with which ethical theory would you say these Internet companies are most aligned?

A) Stockholder theory
B) Stakeholder theory
C) Property theory
D) Fiduciary theory
E) Normative theory
Question
Which act of 1996 is designed to safeguard the electronic exchange of patient records in the health care industry?

A) SoX
B) HIPAA
C) IETF
D) COBIT
E) PAPA
Question
Information privacy guidelines should come from what level in a company?

A) CEO and top-level executives
B) Middle management
C) Employees
D) Federal regulations
E) State laws
Question
Questions like "Who is responsible for the reliability of information?" and "Who will be accountable for errors in the information?" are part of which ethical issue?

A) Privacy
B) Accuracy
C) Authenticity
D) Perfection
E) Purpose
Question
TJX's handling of its serious data breach is consistent with which one of the following?

A) Stakeholder theory
B) Stockholder theory
C) Social normative
D) Social contract theory
E) Corporate social responsibility
Question
Which normative theory of business ethics would TJX have displayed if it had informed customers as soon as the breach was corrected and told other retailers how to prevent future security breaches?

A) Stakeholder
B) Stockholder
C) Social contract
D) Investor
E) Corporate social responsibility
Question
Which of the following is a text message that is stored on a user's computer by a Web server that helps trace the user's browsing habits?

A) Script
B) Cookie
C) Id theft
D) Firewall
E) Data file
Question
Which theory of normative business ethics seeks to create value for people in a manner that is just and nondiscriminatory?

A) Stakeholder theory
B) Investor theory
C) Social contract theory
D) Shareholder theory
E) Stockholder theory
Question
Green computing is often associated with supporting the triple bottom line, known as:

A) Economic, environmental, and social
B) Stockholder, stakeholder, and society
C) People, Privacy, and Property
D) Google, Facebook, and Microsoft
E) Data, information, and knowledge
Question
Today's managers must ensure that information about their employees and customers is only available to those who have a right to see it and use it, an issue referred to as:

A) Screening
B) Accuracy
C) Accessibility
D) Perfection
E) Property
Question
What term is used to describe ethical dilemmas that arise with the development and application of IT?

A) Stockholder theory
B) PAPA principles
C) Information ethics
D) Normative theories
E) IT dilemmas
Question
In today's digital word, individuals can control their privacy through choice, ______ , and correction.

A) Protection
B) Consent
C) Property
D) Communication
E) Consideration
Question
In 2018, the European Union enacted what legislation to set standards for the collection, storage, and processing of personal information?

A) General Data Protection Regulation
B) Safe Harbor Regulation
C) PAPA framework
D) Property Harbor framework
E) Fair Credit Reporting
Question
Google Flu Trends aggregates personal search data in order to estimate world-wide flu activity. Google's site has drawn criticism due to the sharing of users' online behavior without getting their consent. This, in essence, violates the user's right to:

A) Privacy
B) Property
C) Accuracy
D) Accessibility
E) Identity
Question
The social contract theory is made up of two distinct components: social welfare and _________.
Question
In today's digital word, individuals can control their privacy through ______, consent, and correction.
Question
Unlike the European Union, the U.S. has no general legislature ensuring Internet privacy rights. Instead, the U.S. encourages self-regulation and has introduced industry-specific regulations as needed.
Question
Target found out a teenager was pregnant by (1) ________ and revealed that fact to her dad by (2) _______

A) (1) Overhearing the teen in the store; (2) Calling her dad
B) (1) Her purchases of diapers; (2) sending an official letter to the dad
C) (1) Her purchases of unscented soap, cotton balls, and vitamins; (2) mailing her some ads for diapers and maternity clothes
D) (1) Her sudden elation when visiting the children's department; (2) sending a video of her tears of happiness in that department
E) None of the above
Question
In an exercise at a 2017 hacker conference, attendees were able to breach voting machines in under 2 hours.
Question
The four areas, as outlined in the text, that deal with control of information are____________ ,____________ , ____________, and .
Question
Research shows that despite concerns about privacy, most users don't actually alter their online behavior.
Question
Those who possess the "best" information and know how to use it, win.
Question
Green computing benefits _____ which is sometimes referred to as "People, Planet, Profit".
Question
In 2017, Target was breached and the private information of 147.7 people in the United States was taken.
Question
The Stakeholder theory requires managers to pursue projects in ways that are compatible with the well-being of society.
Question
____________is an example of U.S. legislature designed to ensure the privacy and protection of information for a specific industry.
Question
Over time it becomes easier to maintain the accuracy of information.
Question
Using the____________ theory, some content that if that third party mines the data and derives valuable insights, the fruits of that data mining legitimately belong to the third party.
Question
An Internet web site that wishes to abide by fair privacy practices will do all of the following EXCEPT:

A) Allow the consumer the choice to participate in the site or not
B) Post policies about how personal information gathered from consumers will be used
C) Afford the consumer the opportunity to view and contest the accuracy of the data collected
D) Secure collected consumer information
E) All of the above
Question
Explain how green computing can satisfy each of the three normative theories of business ethics.
Question
Green computing is a passing phase and will likely be less strategic to companies in the very near future.
Question
____________term is used to define energy-efficient computing resources.
Question
____________is a growing service designed to help individuals and companies clean up their online presence so that a search for their name produces favorable results.
Question
"Digital natives" are uncomfortable building relationships on the Internet because they understand the consequences of sharing information publicly.
Question
Provide an example of a company that has faced a dilemma reconciling their corporate policies within a country where it hopes to operate.
Question
Match the situation below with the area of information control it falls under.
 Privacy  A Web site seeks detailed infornation about  your farnily, you do not feel that this  information is in aryy way relevart to your  usage of the Web site’s services.  Accuracy  You have been the victim of a barking emor.  The error was corrected. Regardless, it appears  on your credit report and your credit rating is  terrible, impacting your ability to get a loarn  Property  You believe that by contributing online to one  non-profit your personal infornation has been  shared with several other non-profit  orgarnizations that you are not farniliar with.  Accessibility  A friend indicates that his log in allows hirn to  seenot just his prades but also all student  grades. \begin{array} { | l | l | } \hline \text { Privacy } & \begin{array} { l } \text { A Web site seeks detailed infornation about } \\\text { your farnily, you do not feel that this } \\\text { information is in aryy way relevart to your } \\\text { usage of the Web site's services. }\end{array} \\\hline \text { Accuracy } & \begin{array} { l } \text { You have been the victim of a barking emor. } \\\text { The error was corrected. Regardless, it appears } \\\text { on your credit report and your credit rating is } \\\text { terrible, impacting your ability to get a loarn }\end{array} \\\hline \text { Property } & \begin{array} { l } \text { You believe that by contributing online to one } \\\text { non-profit your personal infornation has been } \\\text { shared with several other non-profit } \\\text { orgarnizations that you are not farniliar with. }\end{array} \\\hline \text { Accessibility } & \begin{array} { l } \text { A friend indicates that his log in allows hirn to } \\\text { seenot just his prades but also all student } \\\text { grades. }\end{array} \\\hline\end{array}
Question
Match each normative theory of business ethics to its primary objective.
 Stakeholder  Balarice the rights and interests of all those who  hold a claim on the firm  Stockholder  Legally increase profits and maximize  shareholder value  Social contract  Create value for society \begin{array} { | l | l | } \hline \text { Stakeholder } & \begin{array} { l } \text { Balarice the rights and interests of all those who } \\\text { hold a claim on the firm }\end{array} \\\hline \text { Stockholder } & \begin{array} { l } \text { Legally increase profits and maximize } \\\text { shareholder value }\end{array} \\\hline \text { Social contract } & \text { Create value for society } \\\hline\end{array}
Question
Bradley Manning, a U.S. intelligence officer, took over 500,000 documents from the U.S. State Department and gave them to a public Web site called Wikileaks for publication. These documents were far ranging in their content. Match the actions below with the failure to control and the misuse of sensitive information.
 Property  Even though the dociments were made available on the  site Wikileaks, the U.S. State Department still holds that  the docunents are classified and under their regulation.  Accessibility  Marning was allowed to log into a database of classified  infomation No one monitored his retrieval of  infamation that was outside the scope of his duties.  Privacy  The U.S. State Department acknowledges that personal  comments and assessments of foreign leaders revealed  in some documents were strictly for the pupose of U.S.  diplomacy. \begin{array} { | l | l | } \hline \text { Property } & \begin{array} { l } \text { Even though the dociments were made available on the } \\\text { site Wikileaks, the U.S. State Department still holds that } \\\text { the docunents are classified and under their regulation. }\end{array} \\\hline \text { Accessibility } & \begin{array} { l } \text { Marning was allowed to log into a database of classified } \\\text { infomation No one monitored his retrieval of } \\\text { infamation that was outside the scope of his duties. }\end{array} \\\hline \text { Privacy } & \begin{array} { l } \text { The U.S. State Department acknowledges that personal } \\\text { comments and assessments of foreign leaders revealed } \\\text { in some documents were strictly for the pupose of U.S. } \\\text { diplomacy. }\end{array} \\\hline\end{array}
Question
Match the U.S. legislative/regulatory act with the industry for which it governs the control of information.
 Sarbarnes-Oxley Act  Publicly held cornpanies  HIPAA  Health insurance companies  and health care providers  Grarnrn-Leach-Bliley Act  Financial institutions  1974 Privacy Act  Government agencies  Fair Credit Reporting Act  Consuner reporting agencies \begin{array} { | l | l | } \hline \text { Sarbarnes-Oxley Act } & \text { Publicly held cornpanies } \\\hline \text { HIPAA } & \begin{array} { l } \text { Health insurance companies } \\\text { and health care providers }\end{array} \\\hline \text { Grarnrn-Leach-Bliley Act } & \text { Financial institutions } \\\hline \text { 1974 Privacy Act } & \text { Government agencies } \\\hline \text { Fair Credit Reporting Act } & \text { Consuner reporting agencies } \\\hline\end{array}
Question
Give reasons why users are so willing to forgo privacy on the Internet.
Question
Match the critical question with the information control issue it addresses.
 Privacy  Can the infonnation be used for puposes other  than those for which it was initially captured?  Privacy  Can the infonnation provided be used to  identify personal preferences or history even if  the provider doesn’t want it known?  Accuracy  Who is accountable for errors in the  infornation?  Property  Who owns the infornation?  Accessibility  What infornation does an orgarization have the  right to obtain?  Accessibility  Does the person retrieving the infornation  "need to know" the infornation that is being  retrieved? \begin{array} { | l | l | } \hline \text { Privacy } & \begin{array} { l } \text { Can the infonnation be used for puposes other } \\\text { than those for which it was initially captured? }\end{array} \\\hline \text { Privacy } & \begin{array} { l } \text { Can the infonnation provided be used to } \\\text { identify personal preferences or history even if } \\\text { the provider doesn't want it known? }\end{array} \\\hline \text { Accuracy } & \begin{array} { l } \text { Who is accountable for errors in the } \\\text { infornation? }\end{array} \\\hline \text { Property } & \text { Who owns the infornation? } \\\hline \text { Accessibility } & \begin{array} { l } \text { What infornation does an orgarization have the } \\\text { right to obtain? }\end{array} \\\hline \text { Accessibility } & \begin{array} { l } \text { Does the person retrieving the infornation } \\\text { "need to know" the infornation that is being } \\\text { retrieved? }\end{array} \\\hline\end{array}
Question
Match the managerial control concern with the challenges a manager may face on a regular basis.
 Privacy  Surveillance of employees to ensure productivity  and utilization  Property  Agpregating customer data and providing it to a  marketing firm for a fee  Accessibility  Giving employees improper riphts to view other  employee’s personal data  Accuracy  Holding on to outdated customer records \begin{array} { | l | l | } \hline \text { Privacy } & \begin{array} { l } \text { Surveillance of employees to ensure productivity } \\\text { and utilization }\end{array} \\\hline \text { Property } & \begin{array} { l } \text { Agpregating customer data and providing it to a } \\\text { marketing firm for a fee }\end{array} \\\hline \text { Accessibility } & \begin{array} { l } \text { Giving employees improper riphts to view other } \\\text { employee's personal data }\end{array} \\\hline \text { Accuracy } & \text { Holding on to outdated customer records } \\\hline\end{array}
Question
How does the European Union approach data protection differently than the United States?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/49
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 14: Privacy and Ethical Considerations in Information Management
1
"Who owns information?" and "What are the just and fair prices for its exchange?" are part of which ethical issue?

A) Privacy
B) Accuracy
C) Ownership
D) Property
E) Accessibility
D
2
All of the following are examples of green computing EXCEPT:

A) Virtualization
B) Cloud computing
C) Tidal powered servers
D) Server workloads moved to off-peak hours
E) Cookies
E
3
In 2014, Cambridge Analytica scraped preferences, locations, and friends of 50 million Facebook users, meaning it:

A) Redirected users to its Web site.
B) Targeted advertisements.
C) Collected user passwords.
D) Captured from screen displays.
E) Sold personal data to third parties.
D
4
Which type of "cookies" enables a user to stay logged to a site and keeps your shopping cart intact as you click from page to page?

A) Essential
B) Non-essential
C) Location
D) Widget
E) None of the above.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
5
A manager who primarily focuses on the shareholders of the corporation rather than all of the vested parties in the businesses operations and activities is practicing which theory of normative business ethics?

A) Stakeholder theory
B) Investor theory
C) Stockholder theory
D) Shareholder theory
E) Social contract theory
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
6
The question "What information does a person or an organization have a right or a privilege to obtain?" is part of this ethical issue.

A) Privacy
B) Accuracy
C) Accessibility
D) Perfection
E) Property
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
7
The chapter contends that Internet companies are in business for the money and hence they really would prefer to keep their customers in the dark about how their personal data is being used to generate profits. Assuming this statement is true, with which ethical theory would you say these Internet companies are most aligned?

A) Stockholder theory
B) Stakeholder theory
C) Property theory
D) Fiduciary theory
E) Normative theory
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
8
Which act of 1996 is designed to safeguard the electronic exchange of patient records in the health care industry?

A) SoX
B) HIPAA
C) IETF
D) COBIT
E) PAPA
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
9
Information privacy guidelines should come from what level in a company?

A) CEO and top-level executives
B) Middle management
C) Employees
D) Federal regulations
E) State laws
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
10
Questions like "Who is responsible for the reliability of information?" and "Who will be accountable for errors in the information?" are part of which ethical issue?

A) Privacy
B) Accuracy
C) Authenticity
D) Perfection
E) Purpose
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
11
TJX's handling of its serious data breach is consistent with which one of the following?

A) Stakeholder theory
B) Stockholder theory
C) Social normative
D) Social contract theory
E) Corporate social responsibility
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
12
Which normative theory of business ethics would TJX have displayed if it had informed customers as soon as the breach was corrected and told other retailers how to prevent future security breaches?

A) Stakeholder
B) Stockholder
C) Social contract
D) Investor
E) Corporate social responsibility
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following is a text message that is stored on a user's computer by a Web server that helps trace the user's browsing habits?

A) Script
B) Cookie
C) Id theft
D) Firewall
E) Data file
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
14
Which theory of normative business ethics seeks to create value for people in a manner that is just and nondiscriminatory?

A) Stakeholder theory
B) Investor theory
C) Social contract theory
D) Shareholder theory
E) Stockholder theory
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
15
Green computing is often associated with supporting the triple bottom line, known as:

A) Economic, environmental, and social
B) Stockholder, stakeholder, and society
C) People, Privacy, and Property
D) Google, Facebook, and Microsoft
E) Data, information, and knowledge
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
16
Today's managers must ensure that information about their employees and customers is only available to those who have a right to see it and use it, an issue referred to as:

A) Screening
B) Accuracy
C) Accessibility
D) Perfection
E) Property
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
17
What term is used to describe ethical dilemmas that arise with the development and application of IT?

A) Stockholder theory
B) PAPA principles
C) Information ethics
D) Normative theories
E) IT dilemmas
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
18
In today's digital word, individuals can control their privacy through choice, ______ , and correction.

A) Protection
B) Consent
C) Property
D) Communication
E) Consideration
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
19
In 2018, the European Union enacted what legislation to set standards for the collection, storage, and processing of personal information?

A) General Data Protection Regulation
B) Safe Harbor Regulation
C) PAPA framework
D) Property Harbor framework
E) Fair Credit Reporting
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
20
Google Flu Trends aggregates personal search data in order to estimate world-wide flu activity. Google's site has drawn criticism due to the sharing of users' online behavior without getting their consent. This, in essence, violates the user's right to:

A) Privacy
B) Property
C) Accuracy
D) Accessibility
E) Identity
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
21
The social contract theory is made up of two distinct components: social welfare and _________.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
22
In today's digital word, individuals can control their privacy through ______, consent, and correction.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
23
Unlike the European Union, the U.S. has no general legislature ensuring Internet privacy rights. Instead, the U.S. encourages self-regulation and has introduced industry-specific regulations as needed.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
24
Target found out a teenager was pregnant by (1) ________ and revealed that fact to her dad by (2) _______

A) (1) Overhearing the teen in the store; (2) Calling her dad
B) (1) Her purchases of diapers; (2) sending an official letter to the dad
C) (1) Her purchases of unscented soap, cotton balls, and vitamins; (2) mailing her some ads for diapers and maternity clothes
D) (1) Her sudden elation when visiting the children's department; (2) sending a video of her tears of happiness in that department
E) None of the above
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
25
In an exercise at a 2017 hacker conference, attendees were able to breach voting machines in under 2 hours.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
26
The four areas, as outlined in the text, that deal with control of information are____________ ,____________ , ____________, and .
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
27
Research shows that despite concerns about privacy, most users don't actually alter their online behavior.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
28
Those who possess the "best" information and know how to use it, win.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
29
Green computing benefits _____ which is sometimes referred to as "People, Planet, Profit".
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
30
In 2017, Target was breached and the private information of 147.7 people in the United States was taken.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
31
The Stakeholder theory requires managers to pursue projects in ways that are compatible with the well-being of society.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
32
____________is an example of U.S. legislature designed to ensure the privacy and protection of information for a specific industry.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
33
Over time it becomes easier to maintain the accuracy of information.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
34
Using the____________ theory, some content that if that third party mines the data and derives valuable insights, the fruits of that data mining legitimately belong to the third party.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
35
An Internet web site that wishes to abide by fair privacy practices will do all of the following EXCEPT:

A) Allow the consumer the choice to participate in the site or not
B) Post policies about how personal information gathered from consumers will be used
C) Afford the consumer the opportunity to view and contest the accuracy of the data collected
D) Secure collected consumer information
E) All of the above
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
36
Explain how green computing can satisfy each of the three normative theories of business ethics.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
37
Green computing is a passing phase and will likely be less strategic to companies in the very near future.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
38
____________term is used to define energy-efficient computing resources.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
39
____________is a growing service designed to help individuals and companies clean up their online presence so that a search for their name produces favorable results.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
40
"Digital natives" are uncomfortable building relationships on the Internet because they understand the consequences of sharing information publicly.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
41
Provide an example of a company that has faced a dilemma reconciling their corporate policies within a country where it hopes to operate.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
42
Match the situation below with the area of information control it falls under.
 Privacy  A Web site seeks detailed infornation about  your farnily, you do not feel that this  information is in aryy way relevart to your  usage of the Web site’s services.  Accuracy  You have been the victim of a barking emor.  The error was corrected. Regardless, it appears  on your credit report and your credit rating is  terrible, impacting your ability to get a loarn  Property  You believe that by contributing online to one  non-profit your personal infornation has been  shared with several other non-profit  orgarnizations that you are not farniliar with.  Accessibility  A friend indicates that his log in allows hirn to  seenot just his prades but also all student  grades. \begin{array} { | l | l | } \hline \text { Privacy } & \begin{array} { l } \text { A Web site seeks detailed infornation about } \\\text { your farnily, you do not feel that this } \\\text { information is in aryy way relevart to your } \\\text { usage of the Web site's services. }\end{array} \\\hline \text { Accuracy } & \begin{array} { l } \text { You have been the victim of a barking emor. } \\\text { The error was corrected. Regardless, it appears } \\\text { on your credit report and your credit rating is } \\\text { terrible, impacting your ability to get a loarn }\end{array} \\\hline \text { Property } & \begin{array} { l } \text { You believe that by contributing online to one } \\\text { non-profit your personal infornation has been } \\\text { shared with several other non-profit } \\\text { orgarnizations that you are not farniliar with. }\end{array} \\\hline \text { Accessibility } & \begin{array} { l } \text { A friend indicates that his log in allows hirn to } \\\text { seenot just his prades but also all student } \\\text { grades. }\end{array} \\\hline\end{array}
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
43
Match each normative theory of business ethics to its primary objective.
 Stakeholder  Balarice the rights and interests of all those who  hold a claim on the firm  Stockholder  Legally increase profits and maximize  shareholder value  Social contract  Create value for society \begin{array} { | l | l | } \hline \text { Stakeholder } & \begin{array} { l } \text { Balarice the rights and interests of all those who } \\\text { hold a claim on the firm }\end{array} \\\hline \text { Stockholder } & \begin{array} { l } \text { Legally increase profits and maximize } \\\text { shareholder value }\end{array} \\\hline \text { Social contract } & \text { Create value for society } \\\hline\end{array}
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
44
Bradley Manning, a U.S. intelligence officer, took over 500,000 documents from the U.S. State Department and gave them to a public Web site called Wikileaks for publication. These documents were far ranging in their content. Match the actions below with the failure to control and the misuse of sensitive information.
 Property  Even though the dociments were made available on the  site Wikileaks, the U.S. State Department still holds that  the docunents are classified and under their regulation.  Accessibility  Marning was allowed to log into a database of classified  infomation No one monitored his retrieval of  infamation that was outside the scope of his duties.  Privacy  The U.S. State Department acknowledges that personal  comments and assessments of foreign leaders revealed  in some documents were strictly for the pupose of U.S.  diplomacy. \begin{array} { | l | l | } \hline \text { Property } & \begin{array} { l } \text { Even though the dociments were made available on the } \\\text { site Wikileaks, the U.S. State Department still holds that } \\\text { the docunents are classified and under their regulation. }\end{array} \\\hline \text { Accessibility } & \begin{array} { l } \text { Marning was allowed to log into a database of classified } \\\text { infomation No one monitored his retrieval of } \\\text { infamation that was outside the scope of his duties. }\end{array} \\\hline \text { Privacy } & \begin{array} { l } \text { The U.S. State Department acknowledges that personal } \\\text { comments and assessments of foreign leaders revealed } \\\text { in some documents were strictly for the pupose of U.S. } \\\text { diplomacy. }\end{array} \\\hline\end{array}
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
45
Match the U.S. legislative/regulatory act with the industry for which it governs the control of information.
 Sarbarnes-Oxley Act  Publicly held cornpanies  HIPAA  Health insurance companies  and health care providers  Grarnrn-Leach-Bliley Act  Financial institutions  1974 Privacy Act  Government agencies  Fair Credit Reporting Act  Consuner reporting agencies \begin{array} { | l | l | } \hline \text { Sarbarnes-Oxley Act } & \text { Publicly held cornpanies } \\\hline \text { HIPAA } & \begin{array} { l } \text { Health insurance companies } \\\text { and health care providers }\end{array} \\\hline \text { Grarnrn-Leach-Bliley Act } & \text { Financial institutions } \\\hline \text { 1974 Privacy Act } & \text { Government agencies } \\\hline \text { Fair Credit Reporting Act } & \text { Consuner reporting agencies } \\\hline\end{array}
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
46
Give reasons why users are so willing to forgo privacy on the Internet.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
47
Match the critical question with the information control issue it addresses.
 Privacy  Can the infonnation be used for puposes other  than those for which it was initially captured?  Privacy  Can the infonnation provided be used to  identify personal preferences or history even if  the provider doesn’t want it known?  Accuracy  Who is accountable for errors in the  infornation?  Property  Who owns the infornation?  Accessibility  What infornation does an orgarization have the  right to obtain?  Accessibility  Does the person retrieving the infornation  "need to know" the infornation that is being  retrieved? \begin{array} { | l | l | } \hline \text { Privacy } & \begin{array} { l } \text { Can the infonnation be used for puposes other } \\\text { than those for which it was initially captured? }\end{array} \\\hline \text { Privacy } & \begin{array} { l } \text { Can the infonnation provided be used to } \\\text { identify personal preferences or history even if } \\\text { the provider doesn't want it known? }\end{array} \\\hline \text { Accuracy } & \begin{array} { l } \text { Who is accountable for errors in the } \\\text { infornation? }\end{array} \\\hline \text { Property } & \text { Who owns the infornation? } \\\hline \text { Accessibility } & \begin{array} { l } \text { What infornation does an orgarization have the } \\\text { right to obtain? }\end{array} \\\hline \text { Accessibility } & \begin{array} { l } \text { Does the person retrieving the infornation } \\\text { "need to know" the infornation that is being } \\\text { retrieved? }\end{array} \\\hline\end{array}
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
48
Match the managerial control concern with the challenges a manager may face on a regular basis.
 Privacy  Surveillance of employees to ensure productivity  and utilization  Property  Agpregating customer data and providing it to a  marketing firm for a fee  Accessibility  Giving employees improper riphts to view other  employee’s personal data  Accuracy  Holding on to outdated customer records \begin{array} { | l | l | } \hline \text { Privacy } & \begin{array} { l } \text { Surveillance of employees to ensure productivity } \\\text { and utilization }\end{array} \\\hline \text { Property } & \begin{array} { l } \text { Agpregating customer data and providing it to a } \\\text { marketing firm for a fee }\end{array} \\\hline \text { Accessibility } & \begin{array} { l } \text { Giving employees improper riphts to view other } \\\text { employee's personal data }\end{array} \\\hline \text { Accuracy } & \text { Holding on to outdated customer records } \\\hline\end{array}
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
49
How does the European Union approach data protection differently than the United States?
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 49 flashcards in this deck.