Deck 9: Ethics and Information Technology
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/53
Play
Full screen (f)
Deck 9: Ethics and Information Technology
1
Which of the following types of analysis focuses on an evaluation of whether the options available to the manager impact any of the fundamental ethical duties of the manager?
A) Stakeholder analysis
B) Utilitarian goal-based analysis
C) Government-based analysis
D) Duty-based analysis
A) Stakeholder analysis
B) Utilitarian goal-based analysis
C) Government-based analysis
D) Duty-based analysis
D
2
Which of the following is NOT one of the six questions that help determine whether an invasion of privacy is justifiable by an employer?
A) For what purpose is the undocumented personal knowledge sought?
B) Is this purpose a profitable and important one?
C) Is the knowledge sought through invasion of privacy relevant to its justifying purpose?
D) Is invasion of privacy the only or the least offensive means of obtaining the knowledge?
A) For what purpose is the undocumented personal knowledge sought?
B) Is this purpose a profitable and important one?
C) Is the knowledge sought through invasion of privacy relevant to its justifying purpose?
D) Is invasion of privacy the only or the least offensive means of obtaining the knowledge?
D
3
What percentage of managers considered the right of employees to send and receive personal e-mails during working hours seriously unethical?
A) 39%
B) 50%
C) 56%
D) 58%
A) 39%
B) 50%
C) 56%
D) 58%
B
4
In the opening case, on what date did Sony Pictures announce that "The Interview" would be available to view on national cable and satellite systems ______.
A) December, 17 2014
B) December, 19 2014
C) January 1, 2015
D) February 5, 2015
A) December, 17 2014
B) December, 19 2014
C) January 1, 2015
D) February 5, 2015
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
5
In the opening case, the hacking into Sony Pictures databases was instigated by a group from ______.
A) FBI
B) Sony insiders
C) North Korea
D) Anonymous
A) FBI
B) Sony insiders
C) North Korea
D) Anonymous
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
6
All financial institutions, according to the Federal Trade Commission Safeguards Rule, must develop a security plan that does all of the following except
A) Designates one or more employees to coordinate the safeguard efforts
B) Partner with the Federal Trade Commission to access confidential data when needed
C) Designs and implements a safeguards program and regularly monitors and tests it
D) Selects appropriate service providers and makes them implement safeguards
A) Designates one or more employees to coordinate the safeguard efforts
B) Partner with the Federal Trade Commission to access confidential data when needed
C) Designs and implements a safeguards program and regularly monitors and tests it
D) Selects appropriate service providers and makes them implement safeguards
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
7
Under the ______________, employers can consider individual's e-mails corporate property.
A) Foreign Corrupt Practices Act
B) Sydney Principles
C) Kyoto Treaty
D) Electronic Communications Privacy Act
A) Foreign Corrupt Practices Act
B) Sydney Principles
C) Kyoto Treaty
D) Electronic Communications Privacy Act
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
8
An effective data policy needs to address issues of all of the following except
A) Privacy
B) Accuracy
C) Ownership
D) Profitability
A) Privacy
B) Accuracy
C) Ownership
D) Profitability
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
9
________________ is one of the costs of using e-mail.
A) Frivolous use
B) Access to resources
C) Monitoring
D) Data protection
A) Frivolous use
B) Access to resources
C) Monitoring
D) Data protection
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
10
______________ sell laptops that use fingerprint readers as part of their security systems.
A) Aladdin Knowledge Systems
B) Biometric Security Systems
C) Lenovo and Fujitsu
D) Privacy Rights Clearinghouse
A) Aladdin Knowledge Systems
B) Biometric Security Systems
C) Lenovo and Fujitsu
D) Privacy Rights Clearinghouse
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
11
The ______________ is used to help managers determine a decision that will produce the greatest good to the greatest number of stakeholders.
A) Stakeholder analysis
B) Utilitarian goal-based analysis
C) Government-based analysis
D) Duty-based analysis
A) Stakeholder analysis
B) Utilitarian goal-based analysis
C) Government-based analysis
D) Duty-based analysis
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
12
Based on the results of the American Management Association/ePolicy Institute Survey on electronic monitoring and surveillance, companies reported that they had dismissed ______of workers for misusing the Internet.
A) 9%
B) 30%
C) 48%
D) 73%
A) 9%
B) 30%
C) 48%
D) 73%
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following is not one of the consumer protection tools recommended by the Federal Trade Commission?
A) Protect your private information
B) Pay attention
C) Use your common sense
D) Share passwords
A) Protect your private information
B) Pay attention
C) Use your common sense
D) Share passwords
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
14
One of the most common ways of monitoring customers and potential customers is by using ____________.
A) Computer viruses
B) Spyware
C) Cookies
D) Hardware
A) Computer viruses
B) Spyware
C) Cookies
D) Hardware
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following is NOT a question that managers should ask of themselves before they collect, store, and release potentially private information?
A) What is the nature of the data?
B) Who should have access to the information?
C) Who is responsible for screening potential users to ensure they have a valid reason to request access to the information?
D) What is the financial value of the data being collected?
A) What is the nature of the data?
B) Who should have access to the information?
C) Who is responsible for screening potential users to ensure they have a valid reason to request access to the information?
D) What is the financial value of the data being collected?
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
16
All of the following are mentioned in the text as types of critical analysis to assist managers with their decision-making process except
A) Stakeholder analysis
B) Rights-based analysis
C) Government-based analysis
D) Duty-based analysis
A) Stakeholder analysis
B) Rights-based analysis
C) Government-based analysis
D) Duty-based analysis
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
17
___________________ allows unannounced monitoring of business-related calls.
A) The California Public Utilities Commission
B) The Privacy Rights Clearinghouse
C) The Electronics Communications Privacy Act d: Federal Trades Commission
A) The California Public Utilities Commission
B) The Privacy Rights Clearinghouse
C) The Electronics Communications Privacy Act d: Federal Trades Commission
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
18
Based on the results of the American Management Association/ePolicy Institute Survey on electronic monitoring and surveillance, what percentage of companies notified their employees that they were monitoring phone use?
A) 7%
B) 16%
C) 73%
D) 84%
A) 7%
B) 16%
C) 73%
D) 84%
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
19
Business analytics is a key tool to analyze big data so that firms can customize their strategic focus on customers. What is not a big risk in data analysis?
A) Loss of anonymity
B) Data patterns versus reality
C) Discrimination-based customer segmentation
D) Growth in market share and sales
A) Loss of anonymity
B) Data patterns versus reality
C) Discrimination-based customer segmentation
D) Growth in market share and sales
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
20
An effective workers' rights policy needs to address issues of all of the following except
A) Type of monitoring taking place
B) Type of information being collected
C) Accuracy of information being collected
D) Identification of what information is private or public
A) Type of monitoring taking place
B) Type of information being collected
C) Accuracy of information being collected
D) Identification of what information is private or public
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
21
One of the provisions of the USA PATRIOT Act is ensure that every designated firm creates the position of compliance officer. Which of the items below is not one of the key duties?
A) Approve a written antimoney laundering program
B) Written policies, procedures, and controls to prevent and detect money laundering
C) Administering the firm's computer monitoring program
D) An ongoing employee training program
A) Approve a written antimoney laundering program
B) Written policies, procedures, and controls to prevent and detect money laundering
C) Administering the firm's computer monitoring program
D) An ongoing employee training program
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
22
Information overload is a positive benefit of e-mail communication channels in organizations.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
23
An effective data policy needs to address issues of privacy, control, accuracy, and security.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
24
______ is software that can be loaded onto a computer so an outside party can monitor the computer operations without the consent of the computer user.
A) Hardware
B) Skyware
C) Spyware
D) Cyberware
A) Hardware
B) Skyware
C) Spyware
D) Cyberware
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
25
________________ is a common attitude toward the illegal download of music.
A) It benefits artists
B) It is on the Internet, so I can copy it for free
C) It is my right
D) Intellectual property rights are not relevant
A) It benefits artists
B) It is on the Internet, so I can copy it for free
C) It is my right
D) Intellectual property rights are not relevant
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
26
_____________ is the use of computer technology to commit terrorism crimes.
A) Virtualterrorism
B) Techterrorism
C) Cyberterrorism
D) Retroterrorism
A) Virtualterrorism
B) Techterrorism
C) Cyberterrorism
D) Retroterrorism
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
27
As access and accumulation of information become easier within a firm, so does the probability that information becomes more accurate.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
28
Issues that need to be addressed in the workers' rights policy include the type of monitoring that can take place within the firm, the type of information that may be collected pertaining to the employee, and the identification of what information would be considered private versus public.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
29
Bush, Venables, and Bush identified a series of ethical issues facing internet usage. Which of the following is not one?
A) Privacy
B) Pornography
C) Security transactions
D) Validity
A) Privacy
B) Pornography
C) Security transactions
D) Validity
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
30
_____________ has two treaties that protect the copyrights of intellectual property worldwide on properties such as books, songs, films, and pirated CDs and DVDs.
A) The European Union's Electronic Commerce Directive
B) Millennium Development Summit
C) The World Intellectual Property Organization
D) USA Patriot Act
A) The European Union's Electronic Commerce Directive
B) Millennium Development Summit
C) The World Intellectual Property Organization
D) USA Patriot Act
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
31
The Northumberland National Park Authority Information technology policies are established to optimize managers' power over employees and their use of IT equipment and tools.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
32
An initiative by the Federal Bureau of Investigation, in conjunction with other government agencies, called ______________ was developed to help target and convict cybercriminals.
A) Operation Web Collect
B) Operation Web Find
C) Operation Web Snare
D) Operation Web Catch
A) Operation Web Collect
B) Operation Web Find
C) Operation Web Snare
D) Operation Web Catch
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
33
In direct response to the terrorist attacks on September 11, 2001, President George W. Bush signed into law the ________________.
A) Robinson-Patman Act
B) USA PATRIOT Act
C) Sarbanes-Oxley Act
D) Sherman Antitrust Act
A) Robinson-Patman Act
B) USA PATRIOT Act
C) Sarbanes-Oxley Act
D) Sherman Antitrust Act
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
34
____________ is the use of e-mail to try to mimic a legal, legitimate company to access personal or financial information from individuals.
A) Phishing
B) Skyping
C) Snaring
D) Surfing
A) Phishing
B) Skyping
C) Snaring
D) Surfing
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
35
The American Management Association/ePolicy Institute survey examined the relationship between ethics and technology. One finding stated that 45% of firms monitored the time spent and numbers called on the phone.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
36
In general, most employees can assume that their e-mail messages are not private.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
37
In The Interview hacking case, North Korea instigated a computer outage on Sony for 10 hours on December 22, 2014.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
38
Stakeholder analysis treats all stakeholders equally in the critical analysis of information technology management issues.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
39
Which of the following is not a guideline dealing with information security compliance?
A) Maintain stable information security controls even when business changes occur
B) Design information systems to permit later auditing
C) Hold third party service providers to high standards
D) Monitor personnel to prevent information misuse or loss
A) Maintain stable information security controls even when business changes occur
B) Design information systems to permit later auditing
C) Hold third party service providers to high standards
D) Monitor personnel to prevent information misuse or loss
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
40
Operation Web Snare was an initiative by the Federal Bureau of Investigation to help target and convict cybercriminals. In 150 investigations the value of money lost by the victims was ______.
A) $21m
B) $210m
C) $870,000
D) $87m
A) $21m
B) $210m
C) $870,000
D) $87m
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
41
In a short essay, list and discuss any three of the five issues that managers have to consider when deriving an ethical policy for information technology.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
42
Biometric Security Systems identifies users based on a combination of PINS and passwords.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
43
In a short essay discuss how the use of e-mail impacts on the privacy of employees.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
44
The ultimate goal of phishing is to acquire personal information pertaining to an individual that could be used in the future for illegal activities.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
45
In a short essay, describe the World Intellectual Property Organization and the European Union's Electronic Commerce Directive in the context of the role of government regulations.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
46
In a short essay, explain the USA PATRIOT Act.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
47
The Privacy Rights Clearinghouse suggests that privacy of personal calls made at work may be increased through using cell phones, pay phones, or separate phones that employers have designated for personal calls.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
48
Cookies are a form of monitoring customers and potential customers.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
49
In a short essay, list four of the six measures that can be used to protect businesses from cyberterrorism.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
50
The European Union's Electronic Commerce Directive has two treaties that protect the copyrights of intellectual property worldwide on properties such as books, songs, films, and pirated CDs and DVDs.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
51
The FTC Safeguards Rule applies only to firms listed on the NYSE.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
52
Downloading of music and movies has become a large problem as more and more Internet users develop attitudes that if the music is there, it is for entertainment purposes and it is free.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck
53
Software that can be loaded onto a computer so the computer operations can be monitored by an outside party without the consent of the computer user is called spyware.
Unlock Deck
Unlock for access to all 53 flashcards in this deck.
Unlock Deck
k this deck