Deck 10: Ethics, Privacy, and Security in the Digital Age

Full screen (f)
exit full mode
Question
Children and young adults under 18 can easily become the victims of crimes due to their use of social media, but adults are entirely safe in using social media.
Use Space or
up arrow
down arrow
to flip the card.
Question
The U.S. Congress has made several attempts to pass and maintain legislation that limits children's exposure to online pornography, but eventually each of these laws has been ruled out because they were unconstitutional.
Question
Posting information to the Internet using anonymous email accounts or screen names makes it impossible to identify a libeler.
Question
Never send sensitive personal data such as credit card numbers, bank account numbers, or passwords via text or IM; only send them by email.
Question
Software developers have created filtering software that blocks children from viewing inappropriate or harmful Internet sites at home or school, but to date developers have been unsuccessful in creating a similar software for use in the workplace.
Question
Many workers claim their right to privacy trumps their employers' right to monitor employee use of IS resources.
Question
Organizations continue to operate their businesses using integrated information systems that lead to missed opportunities, increased costs, and lost sales.
Question
Training and incentives are the keys to the successful acceptance and implementation of policies and procedures governing waste and error prevention.
Question
A job that requires sitting at a desk for many hours a day can significantly reduce the risk of type 2 diabetes.
Question
The Federal Commerce Commission is responsible for enforcing consumer protection laws that prevent fraud, deception, and unfair business practices.
Question
Amy is doing some online research for a term paper. She'd like to access some information on a particular website, but the website is asking her to put in her email address before allowing her to view the information. She wonders what the website owner will do with that information, but there is never any way for her to know how data collected via a website will be used.
Question
It's safe for you to input personal data into your Facebook profile because Facebook is not allowed to share this information with law enforcement officials or third parties for any reason.
Question
U.S. federal law permits employers to monitor email sent and received by employees.
Question
The term "ethics" refers to an individual's personal beliefs about right and wrong, whereas the term "morals" describes standards or codes of behavior expected of an individual by a group, such as a nation, organization, or profession.
Question
Two primary causes of computer-related health problems are a poorly designed work environment and failure to take regular breaks to stretch the muscles and rest the eyes.
Question
IS professionals believe that their field offers few opportunities for unethical behavior.
Question
A job that requires sitting at a desk and using a computer for many hours a day qualifies as a sedentary job.
Question
If an activity is defined as legal then it is ethical.
Question
Some companies offer health and wellness programs that require employee participants to share personal data. This data is protected under the same HIPAA privacy regulations as data shared with health insurance companies and doctors.
Question
The use of computers in the workplace is a double-edged sword for workers. While they help to increase productivity and efficiency, they can also raise concerns about privacy and health issues.
Question
Which of the following is a computer-related mistake?

A)Operating unintegrated information systems.
B)Mishandling computer outputs.
C) Acquiring redundant systems.
D) Exhausting information system resources.
Question
The pages on a university's website are maintained by individual departments and organizational units. It is a useful policy to require that every change a user makes to his department pages be reviewed and approved.
Question
It is illegal for companies to buy and sell personal data collected through marketing and sales efforts.
Question
Suppose you have been receiving unsolicited phone calls from telemarketers. Which agency should you contact to prevent these 'junk' calls?

A)​The Federal Trade Commission
B)Better Business Bureau
C) your local police department
D) ​The Department of Justice
Question
If a worker is seated at a desk using a keyboard, the height of the surface holding the keyboard and mouse should be 1 or 2 inches above the worker's thighs so that his or her wrists are nearly straight.
Question
Harold is thinking about setting up profiles on Facebook and Twitter. Which of the following categories of data should he avoid sharing on these social media platforms?

A)​his location
B)​his religious and political affiliations
C) ​his health conditions
D) ​all of these answers
Question
A recent study conducted by the University of Nevada revealed that cyberloafing (wasting time online) costs U.S. businesses more than _____ annually.

A)​$25 billion
B)​$45 billion
C) ​$65 billion
D) ​$85 billion
Question
Laws and regulations have thoroughly addressed concerns about privacy and data management in private organizations and federal agencies.
Question
Anne and Jordan have two pre-teen sons and they're concerned about what their kids might see and share on the Internet. They should probably invest in _______.

A)​Internet licensing
B)​filtering software
C) ​security passwords
D) ​privacy screening
Question
Deepak's team is in charge of conducting a review of their company's waste/mistake prevention policies and procedures. Part of this review should also evaluate how upcoming changes in information systems will affect business activities.
Question
Flexibility is a major component of ergonomic design, mainly because: _______.

A)​people come in a wide range of shapes and sizes
B)​people have their own preferences
C) ​people need to be able to position equipment in different ways for best results
D) ​all of these answers
Question
Computer-related mistakes include organizations operating unintegrated information systems and acquiring redundant systems.
Question
Which of the following is NOT one of the four most common issues related to the storage and use of personal data?

A)​notice
B)​security
C) ​knowledge
D) ​consent
Question
Which legislation is designed to combat the growing crime of identity theft?

A)​E-Government Act of 2002
B)​USA Freedom Act of 2015
C) ​USA Patriot Act of 2001
D) ​Fair and Accurate Credit Transactions Act of 2003
Question
As a Google user, your search history data can be accessed by the NSA and the FBI without obtaining court orders.
Question
The use of e-mail among public officials might violate "open meeting" laws.
Question
In order to protect the privacy of employees, email messages that have been erased from hard disks cannot be retrieved.
Question
In the U.S., there is some debate over privacy between those who favor data collection as a means to increase national security and those who view such programs as a violation of rights guaranteed by the Constitution and the Bill of Rights.
Question
Heavy computer users who experience red, dry, itchy eyes should _____.

A)consider the use of artificial tears
B)consider the use of older, but more human friendly CRT monitors
C) keep their focus on their screens for long hours
D) avoid blinking often
Question
One idea for reducing cyberloafing is to develop software that recognizes and categorizes Internet sites into sites that employees can always visit, sometimes visit, and never visit.
Question
To minimize waste and mistakes, organizations often develop and implement policies and procedures which focus on: ________.

A)​the use of data editing to ensure data accuracy and completeness
B)​the assignment of clear responsibility for data accuracy within each information system
C) ​the implementation of source data automation
D) ​all of these answers
Question
Which of the following is a useful policy to minimize waste and mistakes?

A)Changes to HTML and URLs should be documented and authorized by end users.
B)System report titles should be as brief as possible and should simply indicate the report number.
C) Users should implement proper procedures to ensure correct input data.
D) Tight control should be avoided over critical tables.
Question
In order to be accredited by the Better Business Bureau, a business is required to publish a privacy notice on its website that includes all of the following elements EXCEPT ________.

A)​choice
B)​sharing and selling
C) ​access
D) ​updates
Question
Although Roberta had signed a form preventing her doctor from sharing her personal medical records with the company she worked for, she later discovered that the doctor's office had, in fact, shared her data with her health insurance provider and her employer, which caused her to be terminated. Because the doctor's practice violated its own privacy policy, she was able to file a lawsuit under the ________.

A)​Health Insurance Portability and Accountability Act
B)​Health and Medical Records Privacy Act
C) ​Gramm-Leach-Bliley Act
D) none of these answers
Question
During a recent brainstorming session, one of Franklin's co-workers suggested that their company could sell some of the data contained in its customer databases to earn extra revenue for the business. As a long-time member of the ACM (Association for Computing Machinery), Franklin is opposed to the idea because it violates which of the following imperatives in the ACM code of ethics?

A)Avoid harm to others.
B)Be honest and trustworthy.
C) Honor property right.s
D) ​Respect the privacy of others.
Question
In one court case, a hospital employee, who had been fired for showing coworkers sexually explicit photos on a hospital computer, sued his former employer for wrongful termination. What did the court rule and why?

A)​The employee won the case because the court stated that he had a reasonable expectation of privacy.
B)​The employee won the case because the court stated that viewing sexually explicit photos is not illegal.
C) ​The hospital won the case because the court stated that the employee did not have a reasonable expectation of privacy when using the hospital's computer at work.
D) ​The hospital won the case because the court stated that all employers have the right to monitor their employees' behavior at all times.
Question
While giving her students a physics exam, Professor Thompson noticed that Jack, one of her students who has been struggling with the course material, appeared to be copying answers from Graydon, one of the best students in the class. She decides that she should compare their answers when the class period is over before deciding what to do about the situation. In which phase of the ethical decision-making process is Professor Thompson?

A)​gathering information
B)​developing a problem statement
C) ​identifying options
D) ​weighing options
Question
A job that requires sitting at a desk and using a computer for many hours a day can lead to _______.

A)undesirable weight loss
B)formation of blood clots
C) inflammation of the gum tissue
D) sleep disorders
Question
In today's workplace, most employers issue a policy stating that they will monitor employees' use of any company-owned computer, server, or email system, thus eliminating any expectation of privacy. How many organizations actually monitor, retain, and review employees' emails?

A)​about one-fourth
B)​about half
C) ​about three-quarters
D) ​nearly all
Question
Graydon noticed Jack, his friend and classmate, cheating on a physics exam and now he is trying to decide what to do about it. He knows he could keep quiet about it, but that would violate his moral values, plus the school's code of ethics requires students to report incidents of cheating. On the other hand, if he reports the incident, both his friend and probably all of their other friends will be mad at him. In which phase of the ethical decision-making process is Graydon?

A)​gathering information
B)​developing a problem statement
C) ​identifying options
D) ​weighing options
Question
The _____ requires all financial institutions to protect and secure customers' nonpublic data from unauthorized access or use.

A)Gramm-Leach-Bliley Act of 1999
B)E-Government Act of 2002
C) USA Patriot Act of 2001
D) Sarbanes-Oxley Act of 2002
Question
Your cousin works at her desktop computer for prolonged period of time every day. She would like to minimize the harmful effects of such repetitive work. Her workspace should be designed with ______ in mind.

A)privacy
B)​productivity
C) ​economics
D) ​ergonomics
Question
Federal law permits employers to monitor their employees' use of company-owned computer equipment, specifically _______.

A)​e-mails
B)​instant messages
C) ​website views
D) ​all of these answers
Question
RFID chips embedded in objects generate radio transmissions that allow people to track the location and other associated data of those objects. It's been suggested that RFID chips be implanted ________.

A)​in children to enable parents to find them if lost
B)​in criminals to allow law enforcement agents to find them if needed
C) ​in all humans to give medical professionals instant access to medical records and conditions
D) ​all of these answers
Question
In a recent survey of 2100 human resource professionals, which two activities were listed as the biggest "productivity killers" in the workplace?

A)​personal cell phone use and Internet surfing
B)​personal cell phone use and online game play
C) ​Internet surfing and online game play
D) ​online shopping and online game play
Question
_____ states the principles and core values that are essential to a set of people and that, therefore, govern these people's behavior.

A)Code of ethics
B)Code of conduct
C) Code of civil procedure
D) Code of criminal procedure
Question
_____ is is an inflammation of the nerve that connects the forearm to the palm of the wrist.

A)Carpal tunnel syndrome (CTS)
B)Seated immobility thromboembolism (SIT)
C) Chronic idiopathic mylofibrosis
D) Behcet's syndrome
Question
_____ involves publishing an intentionally false written statement that is damaging to a person's or an organization's reputation.

A)Vishing
B)Slander
C) Libel
D) Phishing
Question
Which of the following statements is true of the E-Government Act of 2002?

A)It renews the U.S. government's authority to monitor electronic communications of foreigners abroad and authorizes foreign surveillance programs by the National Security Agency (NSA).
B)It requires federal agencies to post machine-readable privacy policies on their Web sites and to perform privacy impact assessments on all new collections of data of ten or more people.
C) It restricts government access to certain records held by financial institutions.
D) It defines procedures to request judicial authorization for electronic surveillance of persons engaged in espionage against the United States on behalf of a foreign power.
Question
The _____ requires telephone companies to turn over customer information, including numbers called, without a court order if the Federal Bureau of Investigation (FBI) claims that the records are relevant to a terrorism investigation.

A)Cable Act of 1992
B)Electronic Communications Privacy Act of 1986
C) Gramm-Leach-Bliley Act of 1999
D) USA Patriot Act of 2001
Question
In terms of information systems, issues of privacy relate to the collection and use or misuse of _____.
Question
_____, which means sending sexually explicit texts and/or photos, is illegal in some states, even if it is consensual.
Question
Employees at a small publishing company were dissatisfied with their project tracking system because it didn't allow them to record enough detail. To solve the problem, they created another system that recorded some of the same information, but allowed them to add even more detail about the schedules and budgets. As a result, the company had _____ systems.
Question
The _____ is directed at Web sites catering to children and requires Web site owners to obtain parental consent before they collect any personal information from children under 13 years old.
Question
_____ is a means of acquiring data about a group of people (such as location, noise level, and pollution levels) through sensor-enhanced mobile devices.
Question
According to the Better Business Bureau, a business's privacy notice should include some method of _____, which means providing a customer a course of action to take if the business does not meet its' own privacy policy in some way.
Question
The _____ Amendment protects individuals against unreasonable searches and seizures by requiring warrants to be issued only upon probable cause.
Question
A system of rules that tells us what we can and cannot do is referred to as _____.
Question
There are federal laws that permit your employer to monitor your email communications, hence your ______ is not protected.
Question
Some parents use _____ as a means of controlling what their children see or access on the Internet.
Question
The hazardous activities associated with unfavorable working conditions are collectively referred to as _____.
Question
_____ issues deal with what is generally considered right or wrong.
Question
_____ is the science of designing machines, products, and systems to maximize the safety, comfort, and efficiency of the people who use them.
Question
Liam, a specialist in _____, has designed a desk that uses hydraulic lifts to raise and lower the desk to the perfect height for any worker to use comfortably, whether sitting or standing.
Question
Kay should have been inputting data into her employer's database, but instead she was ____, meaning she was surfing the Internet, online shopping, and playing games.
Question
A party offended by a libel can file what is known as a(n) _____ lawsuit and use the subpoena power it grants to force the Internet service provider (ISP) to provide whatever information it has about the anonymous poster, including Internet Protocol (IP) address, name, and street address.
Question
Some people believe that consumers should have the ability to correct errors in their personal data stored in corporate database systems, which is an issue of _____.
Question
Miranda works at a small-batch soda pop manufacturing plant. For eight hours a day, she uses her right hand to lift individual bottles of soda pop off the production line and place them in packing crates. Lately her right elbow has been hurting, so she visited her doctor, who diagnosed her with _______.

A)​a repetitive strain injury
B)​carpal tunnel syndrome
C) ​a thromboembolism
D) ​none of these answers
Question
When a U.S. citizen applies for health insurance through the federally-operated Healthcare Marketplace, workers for the Marketplace then contact the IRS for data about that citizen's income and tax records. This cross-referencing of data is regulated by the Computer _____ and Privacy Act of 1988.
Question
Sending an email message is like having an open conversation in public-many people can listen to your messages, especially if they are not _____.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/85
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 10: Ethics, Privacy, and Security in the Digital Age
1
Children and young adults under 18 can easily become the victims of crimes due to their use of social media, but adults are entirely safe in using social media.
False
2
The U.S. Congress has made several attempts to pass and maintain legislation that limits children's exposure to online pornography, but eventually each of these laws has been ruled out because they were unconstitutional.
False
3
Posting information to the Internet using anonymous email accounts or screen names makes it impossible to identify a libeler.
False
4
Never send sensitive personal data such as credit card numbers, bank account numbers, or passwords via text or IM; only send them by email.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
5
Software developers have created filtering software that blocks children from viewing inappropriate or harmful Internet sites at home or school, but to date developers have been unsuccessful in creating a similar software for use in the workplace.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
6
Many workers claim their right to privacy trumps their employers' right to monitor employee use of IS resources.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
7
Organizations continue to operate their businesses using integrated information systems that lead to missed opportunities, increased costs, and lost sales.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
8
Training and incentives are the keys to the successful acceptance and implementation of policies and procedures governing waste and error prevention.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
9
A job that requires sitting at a desk for many hours a day can significantly reduce the risk of type 2 diabetes.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
10
The Federal Commerce Commission is responsible for enforcing consumer protection laws that prevent fraud, deception, and unfair business practices.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
11
Amy is doing some online research for a term paper. She'd like to access some information on a particular website, but the website is asking her to put in her email address before allowing her to view the information. She wonders what the website owner will do with that information, but there is never any way for her to know how data collected via a website will be used.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
12
It's safe for you to input personal data into your Facebook profile because Facebook is not allowed to share this information with law enforcement officials or third parties for any reason.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
13
U.S. federal law permits employers to monitor email sent and received by employees.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
14
The term "ethics" refers to an individual's personal beliefs about right and wrong, whereas the term "morals" describes standards or codes of behavior expected of an individual by a group, such as a nation, organization, or profession.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
15
Two primary causes of computer-related health problems are a poorly designed work environment and failure to take regular breaks to stretch the muscles and rest the eyes.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
16
IS professionals believe that their field offers few opportunities for unethical behavior.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
17
A job that requires sitting at a desk and using a computer for many hours a day qualifies as a sedentary job.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
18
If an activity is defined as legal then it is ethical.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
19
Some companies offer health and wellness programs that require employee participants to share personal data. This data is protected under the same HIPAA privacy regulations as data shared with health insurance companies and doctors.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
20
The use of computers in the workplace is a double-edged sword for workers. While they help to increase productivity and efficiency, they can also raise concerns about privacy and health issues.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
21
Which of the following is a computer-related mistake?

A)Operating unintegrated information systems.
B)Mishandling computer outputs.
C) Acquiring redundant systems.
D) Exhausting information system resources.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
22
The pages on a university's website are maintained by individual departments and organizational units. It is a useful policy to require that every change a user makes to his department pages be reviewed and approved.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
23
It is illegal for companies to buy and sell personal data collected through marketing and sales efforts.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
24
Suppose you have been receiving unsolicited phone calls from telemarketers. Which agency should you contact to prevent these 'junk' calls?

A)​The Federal Trade Commission
B)Better Business Bureau
C) your local police department
D) ​The Department of Justice
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
25
If a worker is seated at a desk using a keyboard, the height of the surface holding the keyboard and mouse should be 1 or 2 inches above the worker's thighs so that his or her wrists are nearly straight.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
26
Harold is thinking about setting up profiles on Facebook and Twitter. Which of the following categories of data should he avoid sharing on these social media platforms?

A)​his location
B)​his religious and political affiliations
C) ​his health conditions
D) ​all of these answers
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
27
A recent study conducted by the University of Nevada revealed that cyberloafing (wasting time online) costs U.S. businesses more than _____ annually.

A)​$25 billion
B)​$45 billion
C) ​$65 billion
D) ​$85 billion
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
28
Laws and regulations have thoroughly addressed concerns about privacy and data management in private organizations and federal agencies.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
29
Anne and Jordan have two pre-teen sons and they're concerned about what their kids might see and share on the Internet. They should probably invest in _______.

A)​Internet licensing
B)​filtering software
C) ​security passwords
D) ​privacy screening
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
30
Deepak's team is in charge of conducting a review of their company's waste/mistake prevention policies and procedures. Part of this review should also evaluate how upcoming changes in information systems will affect business activities.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
31
Flexibility is a major component of ergonomic design, mainly because: _______.

A)​people come in a wide range of shapes and sizes
B)​people have their own preferences
C) ​people need to be able to position equipment in different ways for best results
D) ​all of these answers
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
32
Computer-related mistakes include organizations operating unintegrated information systems and acquiring redundant systems.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
33
Which of the following is NOT one of the four most common issues related to the storage and use of personal data?

A)​notice
B)​security
C) ​knowledge
D) ​consent
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
34
Which legislation is designed to combat the growing crime of identity theft?

A)​E-Government Act of 2002
B)​USA Freedom Act of 2015
C) ​USA Patriot Act of 2001
D) ​Fair and Accurate Credit Transactions Act of 2003
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
35
As a Google user, your search history data can be accessed by the NSA and the FBI without obtaining court orders.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
36
The use of e-mail among public officials might violate "open meeting" laws.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
37
In order to protect the privacy of employees, email messages that have been erased from hard disks cannot be retrieved.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
38
In the U.S., there is some debate over privacy between those who favor data collection as a means to increase national security and those who view such programs as a violation of rights guaranteed by the Constitution and the Bill of Rights.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
39
Heavy computer users who experience red, dry, itchy eyes should _____.

A)consider the use of artificial tears
B)consider the use of older, but more human friendly CRT monitors
C) keep their focus on their screens for long hours
D) avoid blinking often
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
40
One idea for reducing cyberloafing is to develop software that recognizes and categorizes Internet sites into sites that employees can always visit, sometimes visit, and never visit.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
41
To minimize waste and mistakes, organizations often develop and implement policies and procedures which focus on: ________.

A)​the use of data editing to ensure data accuracy and completeness
B)​the assignment of clear responsibility for data accuracy within each information system
C) ​the implementation of source data automation
D) ​all of these answers
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
42
Which of the following is a useful policy to minimize waste and mistakes?

A)Changes to HTML and URLs should be documented and authorized by end users.
B)System report titles should be as brief as possible and should simply indicate the report number.
C) Users should implement proper procedures to ensure correct input data.
D) Tight control should be avoided over critical tables.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
43
In order to be accredited by the Better Business Bureau, a business is required to publish a privacy notice on its website that includes all of the following elements EXCEPT ________.

A)​choice
B)​sharing and selling
C) ​access
D) ​updates
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
44
Although Roberta had signed a form preventing her doctor from sharing her personal medical records with the company she worked for, she later discovered that the doctor's office had, in fact, shared her data with her health insurance provider and her employer, which caused her to be terminated. Because the doctor's practice violated its own privacy policy, she was able to file a lawsuit under the ________.

A)​Health Insurance Portability and Accountability Act
B)​Health and Medical Records Privacy Act
C) ​Gramm-Leach-Bliley Act
D) none of these answers
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
45
During a recent brainstorming session, one of Franklin's co-workers suggested that their company could sell some of the data contained in its customer databases to earn extra revenue for the business. As a long-time member of the ACM (Association for Computing Machinery), Franklin is opposed to the idea because it violates which of the following imperatives in the ACM code of ethics?

A)Avoid harm to others.
B)Be honest and trustworthy.
C) Honor property right.s
D) ​Respect the privacy of others.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
46
In one court case, a hospital employee, who had been fired for showing coworkers sexually explicit photos on a hospital computer, sued his former employer for wrongful termination. What did the court rule and why?

A)​The employee won the case because the court stated that he had a reasonable expectation of privacy.
B)​The employee won the case because the court stated that viewing sexually explicit photos is not illegal.
C) ​The hospital won the case because the court stated that the employee did not have a reasonable expectation of privacy when using the hospital's computer at work.
D) ​The hospital won the case because the court stated that all employers have the right to monitor their employees' behavior at all times.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
47
While giving her students a physics exam, Professor Thompson noticed that Jack, one of her students who has been struggling with the course material, appeared to be copying answers from Graydon, one of the best students in the class. She decides that she should compare their answers when the class period is over before deciding what to do about the situation. In which phase of the ethical decision-making process is Professor Thompson?

A)​gathering information
B)​developing a problem statement
C) ​identifying options
D) ​weighing options
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
48
A job that requires sitting at a desk and using a computer for many hours a day can lead to _______.

A)undesirable weight loss
B)formation of blood clots
C) inflammation of the gum tissue
D) sleep disorders
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
49
In today's workplace, most employers issue a policy stating that they will monitor employees' use of any company-owned computer, server, or email system, thus eliminating any expectation of privacy. How many organizations actually monitor, retain, and review employees' emails?

A)​about one-fourth
B)​about half
C) ​about three-quarters
D) ​nearly all
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
50
Graydon noticed Jack, his friend and classmate, cheating on a physics exam and now he is trying to decide what to do about it. He knows he could keep quiet about it, but that would violate his moral values, plus the school's code of ethics requires students to report incidents of cheating. On the other hand, if he reports the incident, both his friend and probably all of their other friends will be mad at him. In which phase of the ethical decision-making process is Graydon?

A)​gathering information
B)​developing a problem statement
C) ​identifying options
D) ​weighing options
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
51
The _____ requires all financial institutions to protect and secure customers' nonpublic data from unauthorized access or use.

A)Gramm-Leach-Bliley Act of 1999
B)E-Government Act of 2002
C) USA Patriot Act of 2001
D) Sarbanes-Oxley Act of 2002
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
52
Your cousin works at her desktop computer for prolonged period of time every day. She would like to minimize the harmful effects of such repetitive work. Her workspace should be designed with ______ in mind.

A)privacy
B)​productivity
C) ​economics
D) ​ergonomics
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
53
Federal law permits employers to monitor their employees' use of company-owned computer equipment, specifically _______.

A)​e-mails
B)​instant messages
C) ​website views
D) ​all of these answers
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
54
RFID chips embedded in objects generate radio transmissions that allow people to track the location and other associated data of those objects. It's been suggested that RFID chips be implanted ________.

A)​in children to enable parents to find them if lost
B)​in criminals to allow law enforcement agents to find them if needed
C) ​in all humans to give medical professionals instant access to medical records and conditions
D) ​all of these answers
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
55
In a recent survey of 2100 human resource professionals, which two activities were listed as the biggest "productivity killers" in the workplace?

A)​personal cell phone use and Internet surfing
B)​personal cell phone use and online game play
C) ​Internet surfing and online game play
D) ​online shopping and online game play
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
56
_____ states the principles and core values that are essential to a set of people and that, therefore, govern these people's behavior.

A)Code of ethics
B)Code of conduct
C) Code of civil procedure
D) Code of criminal procedure
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
57
_____ is is an inflammation of the nerve that connects the forearm to the palm of the wrist.

A)Carpal tunnel syndrome (CTS)
B)Seated immobility thromboembolism (SIT)
C) Chronic idiopathic mylofibrosis
D) Behcet's syndrome
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
58
_____ involves publishing an intentionally false written statement that is damaging to a person's or an organization's reputation.

A)Vishing
B)Slander
C) Libel
D) Phishing
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
59
Which of the following statements is true of the E-Government Act of 2002?

A)It renews the U.S. government's authority to monitor electronic communications of foreigners abroad and authorizes foreign surveillance programs by the National Security Agency (NSA).
B)It requires federal agencies to post machine-readable privacy policies on their Web sites and to perform privacy impact assessments on all new collections of data of ten or more people.
C) It restricts government access to certain records held by financial institutions.
D) It defines procedures to request judicial authorization for electronic surveillance of persons engaged in espionage against the United States on behalf of a foreign power.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
60
The _____ requires telephone companies to turn over customer information, including numbers called, without a court order if the Federal Bureau of Investigation (FBI) claims that the records are relevant to a terrorism investigation.

A)Cable Act of 1992
B)Electronic Communications Privacy Act of 1986
C) Gramm-Leach-Bliley Act of 1999
D) USA Patriot Act of 2001
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
61
In terms of information systems, issues of privacy relate to the collection and use or misuse of _____.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
62
_____, which means sending sexually explicit texts and/or photos, is illegal in some states, even if it is consensual.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
63
Employees at a small publishing company were dissatisfied with their project tracking system because it didn't allow them to record enough detail. To solve the problem, they created another system that recorded some of the same information, but allowed them to add even more detail about the schedules and budgets. As a result, the company had _____ systems.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
64
The _____ is directed at Web sites catering to children and requires Web site owners to obtain parental consent before they collect any personal information from children under 13 years old.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
65
_____ is a means of acquiring data about a group of people (such as location, noise level, and pollution levels) through sensor-enhanced mobile devices.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
66
According to the Better Business Bureau, a business's privacy notice should include some method of _____, which means providing a customer a course of action to take if the business does not meet its' own privacy policy in some way.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
67
The _____ Amendment protects individuals against unreasonable searches and seizures by requiring warrants to be issued only upon probable cause.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
68
A system of rules that tells us what we can and cannot do is referred to as _____.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
69
There are federal laws that permit your employer to monitor your email communications, hence your ______ is not protected.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
70
Some parents use _____ as a means of controlling what their children see or access on the Internet.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
71
The hazardous activities associated with unfavorable working conditions are collectively referred to as _____.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
72
_____ issues deal with what is generally considered right or wrong.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
73
_____ is the science of designing machines, products, and systems to maximize the safety, comfort, and efficiency of the people who use them.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
74
Liam, a specialist in _____, has designed a desk that uses hydraulic lifts to raise and lower the desk to the perfect height for any worker to use comfortably, whether sitting or standing.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
75
Kay should have been inputting data into her employer's database, but instead she was ____, meaning she was surfing the Internet, online shopping, and playing games.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
76
A party offended by a libel can file what is known as a(n) _____ lawsuit and use the subpoena power it grants to force the Internet service provider (ISP) to provide whatever information it has about the anonymous poster, including Internet Protocol (IP) address, name, and street address.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
77
Some people believe that consumers should have the ability to correct errors in their personal data stored in corporate database systems, which is an issue of _____.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
78
Miranda works at a small-batch soda pop manufacturing plant. For eight hours a day, she uses her right hand to lift individual bottles of soda pop off the production line and place them in packing crates. Lately her right elbow has been hurting, so she visited her doctor, who diagnosed her with _______.

A)​a repetitive strain injury
B)​carpal tunnel syndrome
C) ​a thromboembolism
D) ​none of these answers
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
79
When a U.S. citizen applies for health insurance through the federally-operated Healthcare Marketplace, workers for the Marketplace then contact the IRS for data about that citizen's income and tax records. This cross-referencing of data is regulated by the Computer _____ and Privacy Act of 1988.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
80
Sending an email message is like having an open conversation in public-many people can listen to your messages, especially if they are not _____.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 85 flashcards in this deck.