1/76
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
_____ describes standards or codes of behavior expected of an individual by a group (nation, organization, profession) to which an individual belongs.
Ethics
_____ is the concept that an organization should act ethically by taking accountability for the impact of its actions on the environment, the community, and the welfare of its employees.
Corporate social responsibility
A _____ provides an organization with vision and leadership in the area of business conduct.
corporate ethics officer
A(n) _____ is a habit of unacceptable behavior.
vice
An approach to ethical decision making that is based on a vision of society as a community whose members work together to achieve a general set of values and goals is the _____ approach.
common good
An individual's manager has very little impact on his or her ethical behavior.
False
Ethics has risen to the top of the business agenda because risks associated with inappropriate behavior have increased, both in their likelihood and in their potential negative impact.
True
Greater globalization has decreased the likelihood of unethical behavior.
False
In a(n) _____, an organization reviews how well it is meeting its ethical and social responsibility goals, and communicates its new goals for the upcoming year.
social audit
In the case of United States v. New York Central & Hudson River Railroad Co., the U.S. Supreme Court established that:
an employer can be held responsible for the acts of its employees even if the employees act in a manner contrary to their employer's directions.
Someone who stands to gain or lose, depending on how a situation is resolved is called a _____.
stakeholder
The greater reliance of information systems in all aspects of life has decreased the risk that information technology will be used unethically.
False
A(n) _____ is a statement that highlights an organization's key ethical issues and identifies the overarching values and principles that are important to the organization and its decision making.
code of ethics
_____ is the crime of obtaining goods, services, or property through deception or trickery.
Fraud
A _____ is a hardware or software device that serves as a barrier between a company and the outside world and limits access to the company's network based on the organization's Internet usage policy.
Firewall
A _____ states the principles and core values that are essential to the work of a particular occupational group.
professional code of ethics
Currently no one IT professional organization has emerged as preeminent, so there is no universal code of ethics for IT workers.
True
From a legal perspective, IT workers are not recognized as professionals because they are not _____ by the state or federal government.
licensed
Government licensing of IT workers is common within most of the states of the United States.
False
In malpractice lawsuits, many courts have ruled that IT workers are not liable for malpractice because they _____.
do not meet the legal definition of a professional
In the legal system, compliance usually refers to behavior that is in accordance with _____.
legislation
The _____ is a computing society founded in 1947 with more than 97,000 student and professional members in more than 100 countries, and it publishes over 50 journals and 30 newsletters.
Association for Computing Machinery
The _____ is a trade group that represents the world's largest software and hardware manufacturers.
Business Software Alliance (BSA)
The Foreign Corrupt Practices Act (FCPA) makes it a crime to _____.
bribe a foreign official
While no policy can stop wrongdoers, it can establish boundaries for acceptable and unacceptable behavior and enable management to punish violators.
True
A(n) _____ occurs when a party fails to perform certain express or implied obligations, which impairs or destroys the essence of the contract.
material breach of contract
_____ are poorly trained and inadequately managed employees who mean well but have the potential to cause much damage.
Negligent insiders
_____ is the sending of fraudulent emails to an organization's employees designed to look like they came from high-level executives from within the organization.
Spear-phishing
_____ test the limitations of information systems out of intellectual curiosity to see whether they can gain access and how far they can go.
Hackers
A _____ attack keeps the target so busy responding to a stream of automated requests that legitimate users cannot get in.
distributed denial-of-service
A completed risk assessment identifies the most dangerous threats to a company and helps focus security efforts on the areas of highest payoff.
True
An intrusion detection system monitors system and network resources and activities, and notifies the network security when it detects attempts to circumvent the security measures of a networked computer environment.
True
Competitive intelligence is conducted by industrial spies.
False
Employees and contract workers must be educated about the importance of security so that they will be motivated to understand and follow the security policies.
True
In computing, a(n) _____ is a term for any sort of general attack on an information system that takes advantage of a particular system vulnerability.
exploit
The _____ is a partnership between the Department of Homeland Security and the public and private sectors, established in 2003 to protect the nation's Internet infrastructure against cyberattacks.
U.S. Computer Emergency Readiness Team
The concept of _____ recognizes that managers must use their judgment to ensure that the cost of control does not exceed the system's benefits or the risks involved.
reasonable assurance
Whenever possible, automated system rules should mirror an organization's written policies.
True
The cooperation between an employee of a company and an outsider to commit fraud against the company is called _____.
Collusion
American citizens are protected by the Fourth Amendment even when there is no reasonable expectation of privacy.
False
The U.S. has a single, overarching national data privacy policy.
False
The Communications Act of 1934 established the _____.
Federal Communications Commission
A National Security Letter is subject to judicial review and oversight.
False
The Gramm-Leach-Bliley Act includes three key rules that affect personal privacy: financial privacy rule, safeguards rule, and pretexting rule.
True
Under the Right to Financial Privacy Act, a financial institution can release a customer's financial records without the customer's authorization as long as it is a government authority that is seeking the records.
False
One purpose of a(n) _____ is to capture and record data that can be used by the manufacturer to make future changes to improve vehicle performance in the case of a crash.
event data recorder
The Foreign Intelligence Surveillance Act:
allows surveillance, without court order, within the United States for up to a year unless the "surveillance will acquire the contents of any communication to which a U.S. person is a party."
Discovery is part of the pretrial phase of a lawsuit in which each party can obtain _____ from the other party by various means.
evidence
Information privacy is the combination of communications privacy and data privacy.
True
The _____ prohibits the government from concealing the existence of any personal data record-keeping systems.
Privacy Act
Under the _____, financial institutions must provide a privacy notice to each consumer that explains what data about the consumer is gathered, with whom that data is shared, how the data is used, and how the data is protected.
Gramm-Leach-Bliley Act
Title I of the _____ extends the protections offered under the Wiretap Act to electronic communications, such as fax and messages sent over the Internet.
Electronic Communications Privacy Act
The _____ is charged with enforcing the Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act, and the agency maintains a consumer complaint database relating to the law.
The Federal Trade Commission
In the United States, speech that is merely annoying, critical, demeaning, or offensive enjoys protection under the _____ Amendment.
First
The Supreme Court has held that obscene speech and _____ are not protected by the First Amendment and may be forbidden by the government.
Defamation
Anonymity on the Internet is practically guaranteed.
False
Internet filters cannot block users from accessing useful information.
False
If an employee sees a coworker viewing porn on a workplace computer, the organization can be sued in a sexual harassment lawsuit.
True
A U.S. citizen who posts material on the Web that is illegal in a foreign country cannot be prosecuted in that country.
False
With dynamic content filtering, each Web site's content is evaluated immediately before it is displayed, using techniques such as object analysis and image recognition.
True
An oral defamatory statement is libel.
False
Which of the following can be used against an anonymous defendant to reveal truths about the defendant's identity?
A John Doe lawsuit
Miller v. _____ is the Supreme Court case that established a test to determine if material is obscene and therefore not protected by the First Amendment.
California
Which of the following can provide a virtually untraceable level of anonymity to email messages?
Remailers
The goal of the Child Online Protection Act (COPA) was to protect children from harmful material on the World Wide Web, however, it was ruled unconstitutional.
True
_____ allows portions of copyrighted materials to be used without permission under certain circumstances.
Fair use doctrine
_____ is the process of taking something apart in order to understand it, build a copy of it, or improve it.
Reverse engineering
A copyright is the exclusive right to distribute, display, perform, or reproduce an original work in copies or to prepare derivative works based on the work.
True
A trademark permits its owner to exclude the public from making, using, or selling a protected invention, and allows for legal action against violators.
False
A(n) _____ is a logo, package design, phrase, sound, or word that enables a consumer to differentiate one company's products from another's.
Trademark
A(n) _____ prohibits a departing employee from working for any competitors for a period of time.
noncompete agreement
Copyright infringement is the act of stealing someone's ideas or words and passing them off as one's own.
False
Cybersquatters _____.
register domain names for famous trademarks or company names to which they have no connection
Reverse engineering can only be applied to computer hardware, not computer software.
False
Software, video games, multimedia works, and Web pages can all be copyrighted.
True
The term of copyright has been extended several times from its original limit of 25 years to 35 years.
False
Unlike traditional copyright law, the _____ does not govern copying; instead, it focuses on the distribution of tools and software that can be used for copyright infringement as well as for legitimate non-infringing use.
Digital Millennium Copyright Act (DMCA)