Deck 4: Ethics and Information Security: MIS Business Concerns

Full screen (f)
exit full mode
Question
Two of the common forms of viruses discussed in the book include the Trojan-horse virus and the acceptance-of-service attack.
Use Space or
up arrow
down arrow
to flip the card.
Question
An acceptable use policy (AUP) requires a user to agree to follow it to be provided access to corporate email, information systems, and the Internet.
Question
Employee monitoring policies explicitly state how, when, and where the company monitors its employees.
Question
A hacker weapon called a splog (spam blog) is a fake blog created solely to raise the search engine rank of affiliated websites.
Question
Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident are called insiders.
Question
Information technology monitoring tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed.
Question
A social media policy outlines the corporate guidelines or principles governing employee online communications.
Question
Information governance is a method or system of government for information management or control.
Question
Spyware is software that, while purporting to serve some useful function and often fulfilling that functions, also allows Internet advertisers to display advertisements without the consent of the computer user.
Question
An ethical computer use policy contains general principles to guide computer user behavior.
Question
Epolicies are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment.
Question
Privacy is the legal protection afforded an expression of an idea, such as a song, book, or video game.
Question
Ethics and security are two fundamental building blocks for all organizations.
Question
Smoking areas are targeted by hackers; they regularly use smoking entrances to gain building access, where they pose as employees to gain access to the company network.
Question
Confidentiality is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.
Question
Information security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.
Question
The Trojan-horse virus hides inside other software, usually as an attachment or a downloadable file.
Question
Companies do not need a privacy policy for email because an employee's work email is private and cannot be viewed by the company.
Question
Information security is a high priority for protection of the company's information, and it is critical to implement an information security procedure to combat misuse of this information.
Question
Downtime refers to a period of time when a system is unavailable, and unplanned downtime can strike at any time for various reasons.
Question
What is the intangible creative work that is embodied in physical form and includes trademarks and patents?

A)Intellectual software
B)Intellectual property
C)Trademark property
D)Ethical property
Question
The three primary information security areas are authentication and authorization, policies and rewards, and detection and response.
Question
Which of the following key terms represents the principles and standards that guide our behavior toward other people?

A)Ethics
B)Intellectual property
C)Standards of living
D)Security
Question
Information security policies detail how an organization will implement the information security plan.
Question
In relation to privacy, which of the following is the assurance that messages and information remain available only to those authorized to view them?

A)Contentment
B)Ethical standard
C)Confidentiality
D)Firewall security
Question
One of the most ineffective ways to set up authentication techniques is by setting up user IDs and passwords.
Question
Trust among companies, customers, partners, and suppliers is the support structure of which of the following?

A)Ebusiness
B)Eharmony
C)Esoftware
D)Epolicies
Question
A firewall scrambles information into an alternative form that requires a key or password to decrypt.
Question
Through social engineering, hackers use their social skills to trick people into revealing access credentials or other valuable information.
Question
Organizations address security risks through two lines of defense.The first is people and the second is technology.
Question
What is the difference between pirated and counterfeit software?

A)Counterfeit is fake technology products; pirated is invisible technological cameras placed online.
B)Pirated is the unauthorized use, duplication, distribution, or sale of copyrighted software; counterfeit is software that is manufactured to look like the real thing and sold as such.
C)Counterfeit is the unauthorized use, duplication, distribution, or sale of copyrighted software; pirated is software that is manufactured to look like the real thing and sold as such.
D)Pirated is stolen software used to hack into a company's classified material; counterfeit is a fake version of firewall software.
Question
The technique to gain personal information for the purpose of identity theft, often through fraudulent emails that look as though they came from legitimate businesses, is called phishing.
Question
Which of the following governs the ethical and moral issues arising from the development and use of information technologies and the creation, collection, duplication, distribution, and processing of information?

A)Ethical information
B)Information technology
C)Information policies
D)Information ethics
Question
Biometrics is the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting.
Question
Dumpster diving is another security breach for companies and is where people not associated with the company jump into the company's outside garbage bins and try to gather and steal any valuable company products they can resell on eBay.
Question
What is the legal protection afforded an expression of an idea, such as a song, book, or video game?

A)Privacy
B)Confidentiality
C)Intellectual property
D)Copyright
Question
Insiders are illegitimate users who purposely or accidentally misuse their access to the environment to do business.
Question
Tokens are small electronic devices that change user passwords automatically.
Question
Which of the following represents the two fundamental building blocks that protect organizational information?

A)Security and sales
B)Human resources and security
C)Ethics and security
D)Ethics and technology
Question
A process of providing a user with permission, including access levels and abilities such as file access, hours of access, and amount of allocated storage space, is called authentication.
Question
In the information technology world, which of the following are examples of ethical issues that a company may have to manage?

A)Employees copying and distributing company-owned software
B)Employees searching other employees' private information without consent
C)Employees intentionally creating or spreading viruses to confuse IT
D)All of the following
Question
Which of the following is an example of acting ethically?

A)Individuals copy, use, and distribute software.
B)Employees search organizational databases for sensitive corporate and personal information.
C)Individuals hack into computer systems to steal proprietary information.
D)None of these offers an example of acting ethically.
Question
Which of the following represents the definition of information compliance?

A)The act of conforming, acquiescing, or yielding information
B)The ability to comply with software
C)The understanding of technology
D)The verbalization of information governance in a company's policies and procedures.
Question
Sophie Black works as a computer programmer for a software company.Her boss, Mike Jones, is responsible for developing a new software game for the Wii.After completion of the project Mike gives all of the team members a free copy of the game without consent from the company.Sophie is a little hesitant and unsure about accepting the game because legally it would be considered _________.

A)Counterfeit software
B)Pirated software
C)Ethical software
D)Governance software
Question
Which act strengthened criminal laws against identity theft?

A)Bork Bill
B)Sarbanes-Oxley Act
C)Cable Communications Act
D)None of these
Question
Which of the following is served as key evidence in many legal cases today and also provides a faster, easier way to search and organize paper documents?

A)Confidentiality
B)Digital information
C)Privacy policies
D)Information ethics
Question
Which of the following describes confidentiality?

A)The assurance that messages and information are available only to those who are authorized to view them
B)Policies and procedures that address the ethical use of computers and Internet usage in the business environment
C)The right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent
D)The principles and standards that guide our behavior toward other people
Question
Which of the following is included in the four quadrants of ethical and legal behavior?

A)Legal behavior and ethical behavior
B)Illegal behavior and ethical behavior
C)Legal behavior and unethical behavior
D)All of these
Question
Which of the following examines the organizational resource of information and regulates its definitions, uses, value, and distribution, ensuring it has the types of data or information required to function and grow effectively?

A)Information code
B)Information technology
C)Information management
D)Information governance
Question
What are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment?

A)Information systems policy
B)Epolicies
C)Technology applied policy
D)Emastery
Question
Which of the following refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry?

A)Eauthorization
B)Emanagement
C)Ediscovery
D)Epolicies
Question
Which of the following means the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent?

A)Safety
B)Ethical standard
C)Privacy
D)Proper
Question
Which of the following describes privacy?

A)The assurance that messages and data are available only to those who are authorized to view them
B)Policies and procedures that address the ethical use of computers and Internet usage in the business environment
C)The right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent
D)The principles and standards that guide our behavior toward other people
Question
What is the method or system of government for information management or control?

A)Information management
B)Information compliance
C)Information governance
D)Information ethics
Question
When studying the figure of the four quadrants of ethical and legal behavior, the goal is for organizations to make decisions in which of the following quadrants?

A)Quadrant IV
B)Quadrant II and III
C)Quadrant I
D)Quadrant III
Question
Which act protects investors by improving the accuracy and reliability of corporate disclosures?

A)Sarbanes-Oxley Act
B)Identity Theft and Assumption Deterrence Act
C)CAN-Spam Act
D)None of these
Question
Determining what is ethical can sometimes be difficult because certain actions can be justified or condemned, depending on how you view the relationship between ________ and ________.

A)Legal and confidential
B)Legal and ethical
C)Legal and technical
D)Confidential and open
Question
What is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents?

A)Ethics
B)Intellectual property
C)Privacy
D)Confidentiality
Question
Which act restricts what information the federal government can collect?

A)Privacy Act
B)Bork Bill
C)Freedom of Information Act
D)Communications Assistance for Law Enforcement Act
Question
As the president of a local trade company, Kristin is faced with leadership, ethical, and operational decisions on a daily basis.Kristen's responsibilities include examining the organizational resource of information and regulating its definitions, uses, value, and distribution, ensuring it has the types of information required to function and grow effectively.What is Kristin overseeing for the company?

A)Information codes
B)Information management
C)Information deployment
D)Information security
Question
Which of the following clauses is typically contained in an acceptable use policy?

A)A nonrepudiation clause
B)A repudiation clause
C)A confidentiality clause
D)An employee use clause
Question
Which of the following contains general principles to guide computer user behavior?

A)Information technology code
B)Techie policy
C)Ethical computer use policy
D)Information systems
Question
Which of the following would you find in a typical Internet use policy?

A)User ramifications if the policy is violated
B)User responsibility for properly handling offensive material
C)User responsibility for protecting the company's good name
D)All of these
Question
What is one of the major problems with email?

A)Intellectual property
B)Nonrepudiation
C)User's expectation of privacy
D)None of these
Question
Which of the following policies details the extent to which email messages may be read by others?

A)Email privacy policy
B)Email confidential policy
C)Anti-spam policy
D)Spam policy
Question
Jackie is the head teller at ABC Bank, and her responsibilities include overseeing and managing the tellers, resolving customer issues, and developing and implementing systems for an optimal and efficient team.She notices a steady increase in customer complaints and tracks back to find that the complaints started right around the time ABC Bank provided Internet access to all employees.Jackie watched the tellers closely and found that they were spending significant amounts of time playing Internet games and posting on Facebook.Which policy should the company implement to help eliminate this problem?

A)An information privacy policy
B)An email privacy policy
C)An Internet use policy
D)A workplace monitoring policy
Question
According to the text, Visa created a program called Innovant.What was the primary purpose for Innovant?

A)Information governance
B)Information privacy policy
C)Ethical computer use policy
D)Acceptable use policy
Question
Which of the following policies states that users agree to follow it in order to be given access to corporate email, information systems, and the Internet?

A)Acceptable use policy
B)Social media policy
C)Information privacy policy
D)Email privacy policy
Question
Which of the following should be included in a company email privacy policy?

A)Definition of legitimate email users and explanation of what happens to accounts after a person leaves the organization
B)Statement discouraging sending junk email or spam to anyone who doesn't want to receive it
C)Statement informing users that the organization has no control over email once it has been transmitted outside the organization
D)All of these
Question
According to the ethical computer use policy, users should be ______________ of the rules and, by agreeing to use the system on that basis, _______________ to abide by the rules.

A)Informed, collaborate
B)Consent, informed
C)Informed, consent
D)Consent, information
Question
Employees need to understand that email privacy exists to an extent and that corporate email is solely owned by _________.

A)The individual user
B)The company
C)The human resources department
D)The individual user's department
Question
What sends massive amounts of email to a specific person or system that can cause that user's server to stop functioning?

A)Mail bomb
B)Spam
C)Intellectual spam
D)Junk mail
Question
Which of the following would not be found in a typical acceptable use policy?

A)Not using the service as part of violating any law
B)Not posting commercial messages to groups where the employee has received user consent
C)Not performing any nonrepudiation
D)Not attempting to break the security of any computer network
Question
If an organization implemented only one policy, which one would it want to implement?

A)Information privacy policy
B)Acceptable use policy
C)Internet use policy
D)Ethical computer use policy
Question
Which of the following is not one of the six epolicies that a company should implement for information protection as discussed in the text?

A)Information privacy policy
B)Workplace monitoring policy
C)Acceptable use policy
D)Downtime monitoring policy
Question
Which policy contains general principles regarding information privacy?

A)Information privacy policy
B)Acceptable use policy
C)Internet use policy
D)Anti-spam policy
Question
What is one of the guidelines an organization can follow when creating an information privacy policy?

A)Adoption and implementation of an anti-spam policy
B)Notice and disclosure
C)Choice and quality
D)None of these
Question
Which of the following is not considered an epolicy?

A)Acceptable use policy
B)Internet use policy
C)Ethical computer use policy
D)Anti-hacker use policy
Question
Which of the following terms refers to a contractual stipulation to ensure that ebusiness participants do not deny their online actions?

A)Compliance
B)Noncommittal
C)Nonrepudiation
D)Erepudiation
Question
Which of the following represents the classic example of unintentional information reuse?

A)Phone number
B)Social Security number
C)Address
D)Driver's license number
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/225
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 4: Ethics and Information Security: MIS Business Concerns
1
Two of the common forms of viruses discussed in the book include the Trojan-horse virus and the acceptance-of-service attack.
False
Explanation: Among the common forms of viruses discussed in the book are Trojan-horse virus and the denial-of-service attack (DoS), not acceptance-of-service attack.
2
An acceptable use policy (AUP) requires a user to agree to follow it to be provided access to corporate email, information systems, and the Internet.
True
Explanation: This is the definition of an acceptable use policy (AUP).
3
Employee monitoring policies explicitly state how, when, and where the company monitors its employees.
True
Explanation: This is the definition of employee monitoring policies.
4
A hacker weapon called a splog (spam blog) is a fake blog created solely to raise the search engine rank of affiliated websites.
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
5
Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident are called insiders.
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
6
Information technology monitoring tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed.
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
7
A social media policy outlines the corporate guidelines or principles governing employee online communications.
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
8
Information governance is a method or system of government for information management or control.
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
9
Spyware is software that, while purporting to serve some useful function and often fulfilling that functions, also allows Internet advertisers to display advertisements without the consent of the computer user.
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
10
An ethical computer use policy contains general principles to guide computer user behavior.
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
11
Epolicies are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment.
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
12
Privacy is the legal protection afforded an expression of an idea, such as a song, book, or video game.
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
13
Ethics and security are two fundamental building blocks for all organizations.
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
14
Smoking areas are targeted by hackers; they regularly use smoking entrances to gain building access, where they pose as employees to gain access to the company network.
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
15
Confidentiality is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
16
Information security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
17
The Trojan-horse virus hides inside other software, usually as an attachment or a downloadable file.
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
18
Companies do not need a privacy policy for email because an employee's work email is private and cannot be viewed by the company.
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
19
Information security is a high priority for protection of the company's information, and it is critical to implement an information security procedure to combat misuse of this information.
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
20
Downtime refers to a period of time when a system is unavailable, and unplanned downtime can strike at any time for various reasons.
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
21
What is the intangible creative work that is embodied in physical form and includes trademarks and patents?

A)Intellectual software
B)Intellectual property
C)Trademark property
D)Ethical property
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
22
The three primary information security areas are authentication and authorization, policies and rewards, and detection and response.
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
23
Which of the following key terms represents the principles and standards that guide our behavior toward other people?

A)Ethics
B)Intellectual property
C)Standards of living
D)Security
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
24
Information security policies detail how an organization will implement the information security plan.
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
25
In relation to privacy, which of the following is the assurance that messages and information remain available only to those authorized to view them?

A)Contentment
B)Ethical standard
C)Confidentiality
D)Firewall security
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
26
One of the most ineffective ways to set up authentication techniques is by setting up user IDs and passwords.
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
27
Trust among companies, customers, partners, and suppliers is the support structure of which of the following?

A)Ebusiness
B)Eharmony
C)Esoftware
D)Epolicies
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
28
A firewall scrambles information into an alternative form that requires a key or password to decrypt.
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
29
Through social engineering, hackers use their social skills to trick people into revealing access credentials or other valuable information.
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
30
Organizations address security risks through two lines of defense.The first is people and the second is technology.
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
31
What is the difference between pirated and counterfeit software?

A)Counterfeit is fake technology products; pirated is invisible technological cameras placed online.
B)Pirated is the unauthorized use, duplication, distribution, or sale of copyrighted software; counterfeit is software that is manufactured to look like the real thing and sold as such.
C)Counterfeit is the unauthorized use, duplication, distribution, or sale of copyrighted software; pirated is software that is manufactured to look like the real thing and sold as such.
D)Pirated is stolen software used to hack into a company's classified material; counterfeit is a fake version of firewall software.
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
32
The technique to gain personal information for the purpose of identity theft, often through fraudulent emails that look as though they came from legitimate businesses, is called phishing.
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
33
Which of the following governs the ethical and moral issues arising from the development and use of information technologies and the creation, collection, duplication, distribution, and processing of information?

A)Ethical information
B)Information technology
C)Information policies
D)Information ethics
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
34
Biometrics is the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting.
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
35
Dumpster diving is another security breach for companies and is where people not associated with the company jump into the company's outside garbage bins and try to gather and steal any valuable company products they can resell on eBay.
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
36
What is the legal protection afforded an expression of an idea, such as a song, book, or video game?

A)Privacy
B)Confidentiality
C)Intellectual property
D)Copyright
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
37
Insiders are illegitimate users who purposely or accidentally misuse their access to the environment to do business.
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
38
Tokens are small electronic devices that change user passwords automatically.
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
39
Which of the following represents the two fundamental building blocks that protect organizational information?

A)Security and sales
B)Human resources and security
C)Ethics and security
D)Ethics and technology
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
40
A process of providing a user with permission, including access levels and abilities such as file access, hours of access, and amount of allocated storage space, is called authentication.
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
41
In the information technology world, which of the following are examples of ethical issues that a company may have to manage?

A)Employees copying and distributing company-owned software
B)Employees searching other employees' private information without consent
C)Employees intentionally creating or spreading viruses to confuse IT
D)All of the following
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
42
Which of the following is an example of acting ethically?

A)Individuals copy, use, and distribute software.
B)Employees search organizational databases for sensitive corporate and personal information.
C)Individuals hack into computer systems to steal proprietary information.
D)None of these offers an example of acting ethically.
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
43
Which of the following represents the definition of information compliance?

A)The act of conforming, acquiescing, or yielding information
B)The ability to comply with software
C)The understanding of technology
D)The verbalization of information governance in a company's policies and procedures.
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
44
Sophie Black works as a computer programmer for a software company.Her boss, Mike Jones, is responsible for developing a new software game for the Wii.After completion of the project Mike gives all of the team members a free copy of the game without consent from the company.Sophie is a little hesitant and unsure about accepting the game because legally it would be considered _________.

A)Counterfeit software
B)Pirated software
C)Ethical software
D)Governance software
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
45
Which act strengthened criminal laws against identity theft?

A)Bork Bill
B)Sarbanes-Oxley Act
C)Cable Communications Act
D)None of these
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
46
Which of the following is served as key evidence in many legal cases today and also provides a faster, easier way to search and organize paper documents?

A)Confidentiality
B)Digital information
C)Privacy policies
D)Information ethics
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
47
Which of the following describes confidentiality?

A)The assurance that messages and information are available only to those who are authorized to view them
B)Policies and procedures that address the ethical use of computers and Internet usage in the business environment
C)The right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent
D)The principles and standards that guide our behavior toward other people
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
48
Which of the following is included in the four quadrants of ethical and legal behavior?

A)Legal behavior and ethical behavior
B)Illegal behavior and ethical behavior
C)Legal behavior and unethical behavior
D)All of these
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
49
Which of the following examines the organizational resource of information and regulates its definitions, uses, value, and distribution, ensuring it has the types of data or information required to function and grow effectively?

A)Information code
B)Information technology
C)Information management
D)Information governance
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
50
What are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment?

A)Information systems policy
B)Epolicies
C)Technology applied policy
D)Emastery
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
51
Which of the following refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry?

A)Eauthorization
B)Emanagement
C)Ediscovery
D)Epolicies
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
52
Which of the following means the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent?

A)Safety
B)Ethical standard
C)Privacy
D)Proper
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
53
Which of the following describes privacy?

A)The assurance that messages and data are available only to those who are authorized to view them
B)Policies and procedures that address the ethical use of computers and Internet usage in the business environment
C)The right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent
D)The principles and standards that guide our behavior toward other people
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
54
What is the method or system of government for information management or control?

A)Information management
B)Information compliance
C)Information governance
D)Information ethics
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
55
When studying the figure of the four quadrants of ethical and legal behavior, the goal is for organizations to make decisions in which of the following quadrants?

A)Quadrant IV
B)Quadrant II and III
C)Quadrant I
D)Quadrant III
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
56
Which act protects investors by improving the accuracy and reliability of corporate disclosures?

A)Sarbanes-Oxley Act
B)Identity Theft and Assumption Deterrence Act
C)CAN-Spam Act
D)None of these
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
57
Determining what is ethical can sometimes be difficult because certain actions can be justified or condemned, depending on how you view the relationship between ________ and ________.

A)Legal and confidential
B)Legal and ethical
C)Legal and technical
D)Confidential and open
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
58
What is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents?

A)Ethics
B)Intellectual property
C)Privacy
D)Confidentiality
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
59
Which act restricts what information the federal government can collect?

A)Privacy Act
B)Bork Bill
C)Freedom of Information Act
D)Communications Assistance for Law Enforcement Act
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
60
As the president of a local trade company, Kristin is faced with leadership, ethical, and operational decisions on a daily basis.Kristen's responsibilities include examining the organizational resource of information and regulating its definitions, uses, value, and distribution, ensuring it has the types of information required to function and grow effectively.What is Kristin overseeing for the company?

A)Information codes
B)Information management
C)Information deployment
D)Information security
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
61
Which of the following clauses is typically contained in an acceptable use policy?

A)A nonrepudiation clause
B)A repudiation clause
C)A confidentiality clause
D)An employee use clause
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
62
Which of the following contains general principles to guide computer user behavior?

A)Information technology code
B)Techie policy
C)Ethical computer use policy
D)Information systems
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
63
Which of the following would you find in a typical Internet use policy?

A)User ramifications if the policy is violated
B)User responsibility for properly handling offensive material
C)User responsibility for protecting the company's good name
D)All of these
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
64
What is one of the major problems with email?

A)Intellectual property
B)Nonrepudiation
C)User's expectation of privacy
D)None of these
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
65
Which of the following policies details the extent to which email messages may be read by others?

A)Email privacy policy
B)Email confidential policy
C)Anti-spam policy
D)Spam policy
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
66
Jackie is the head teller at ABC Bank, and her responsibilities include overseeing and managing the tellers, resolving customer issues, and developing and implementing systems for an optimal and efficient team.She notices a steady increase in customer complaints and tracks back to find that the complaints started right around the time ABC Bank provided Internet access to all employees.Jackie watched the tellers closely and found that they were spending significant amounts of time playing Internet games and posting on Facebook.Which policy should the company implement to help eliminate this problem?

A)An information privacy policy
B)An email privacy policy
C)An Internet use policy
D)A workplace monitoring policy
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
67
According to the text, Visa created a program called Innovant.What was the primary purpose for Innovant?

A)Information governance
B)Information privacy policy
C)Ethical computer use policy
D)Acceptable use policy
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
68
Which of the following policies states that users agree to follow it in order to be given access to corporate email, information systems, and the Internet?

A)Acceptable use policy
B)Social media policy
C)Information privacy policy
D)Email privacy policy
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
69
Which of the following should be included in a company email privacy policy?

A)Definition of legitimate email users and explanation of what happens to accounts after a person leaves the organization
B)Statement discouraging sending junk email or spam to anyone who doesn't want to receive it
C)Statement informing users that the organization has no control over email once it has been transmitted outside the organization
D)All of these
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
70
According to the ethical computer use policy, users should be ______________ of the rules and, by agreeing to use the system on that basis, _______________ to abide by the rules.

A)Informed, collaborate
B)Consent, informed
C)Informed, consent
D)Consent, information
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
71
Employees need to understand that email privacy exists to an extent and that corporate email is solely owned by _________.

A)The individual user
B)The company
C)The human resources department
D)The individual user's department
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
72
What sends massive amounts of email to a specific person or system that can cause that user's server to stop functioning?

A)Mail bomb
B)Spam
C)Intellectual spam
D)Junk mail
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
73
Which of the following would not be found in a typical acceptable use policy?

A)Not using the service as part of violating any law
B)Not posting commercial messages to groups where the employee has received user consent
C)Not performing any nonrepudiation
D)Not attempting to break the security of any computer network
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
74
If an organization implemented only one policy, which one would it want to implement?

A)Information privacy policy
B)Acceptable use policy
C)Internet use policy
D)Ethical computer use policy
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
75
Which of the following is not one of the six epolicies that a company should implement for information protection as discussed in the text?

A)Information privacy policy
B)Workplace monitoring policy
C)Acceptable use policy
D)Downtime monitoring policy
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
76
Which policy contains general principles regarding information privacy?

A)Information privacy policy
B)Acceptable use policy
C)Internet use policy
D)Anti-spam policy
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
77
What is one of the guidelines an organization can follow when creating an information privacy policy?

A)Adoption and implementation of an anti-spam policy
B)Notice and disclosure
C)Choice and quality
D)None of these
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
78
Which of the following is not considered an epolicy?

A)Acceptable use policy
B)Internet use policy
C)Ethical computer use policy
D)Anti-hacker use policy
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
79
Which of the following terms refers to a contractual stipulation to ensure that ebusiness participants do not deny their online actions?

A)Compliance
B)Noncommittal
C)Nonrepudiation
D)Erepudiation
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
80
Which of the following represents the classic example of unintentional information reuse?

A)Phone number
B)Social Security number
C)Address
D)Driver's license number
Unlock Deck
Unlock for access to all 225 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 225 flashcards in this deck.