COMPUTER ETHICS MID TERM STUDY GUIDE

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/64

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

65 Terms

1
New cards

Ethics

describes standards or codes of behavior expected of an individual by a group (nation, organization, profession) to which an individual belongs.

2
New cards

Corporate social responsibility

is the concept that an organization should act ethically by taking accountability for the impact of its actions on the environment, the community, and the welfare of its employees.

3
New cards

corporate ethics officer

A _____ provides an organization with vision and leadership in the area of business conduct.

4
New cards

vice

A(n) _____ is a habit of unacceptable behavior.

5
New cards

common good

An approach to ethical decision making that is based on a vision of society as a community whose members work together to achieve a general set of values and goals is the _____ approach.

6
New cards

Yes a manager has an impact on their ethical behavior

Is An individual's manager has very little impact on his or her ethical behavior?

7
New cards

It is true that ethics has risen to the to the top of the business agenda

Ethics has risen to the top of the business agenda because risks associated with inappropriate behavior have increased, both in their likelihood and in their potential negative impact. T/F

8
New cards

It is false that globalization decreased the likelihood of unethical behavior

Greater globalization has decreased the likelihood of unethical behavior. T/F

9
New cards

social audit

In a(n) _____, an organization reviews how well it is meeting its ethical and social responsibility goals, and communicates its new goals for the upcoming year.

10
New cards

an employer can be held responsible for the acts of its employees even if the employees act in a manner contrary to their employer's directions.

In the case of United States v. New York Central & Hudson River Railroad Co., the U.S. Supreme Court established that:

11
New cards

stakeholder

Someone who stands to gain or lose, depending on how a situation is resolved is called a _____.

12
New cards

It is false that the greater reliance of information systems in aspects of life decreased risk that IT will be used unethically

The greater reliance of information systems in all aspects of life has decreased the risk that information technology will be used unethically. T/F

13
New cards

code of ethics

A(n) _____ is a statement that highlights an organization's key ethical issues and identifies the overarching values and principles that are important to the organization and its decision making.

14
New cards

Fraud

_____ is the crime of obtaining goods, services, or property through deception or trickery.

15
New cards

firewall

A _____ is a hardware or software device that serves as a barrier between a company and the outside world and limits access to the company's network based on the organization's Internet usage policy.

16
New cards

professional code of ethics

A _____ states the principles and core values that are essential to the work of a particular occupational group.

17
New cards

It is true there is no universal code of ethics for IT workers

Currently no one IT professional organization has emerged as preeminent, so there is no universal code of ethics for IT workers. T/F

18
New cards

licensed

From a legal perspective, IT workers are not recognized as professionals because they are not _____ by the state or federal government.

19
New cards

It is false that govt licensing of IT workers is common in the US

Government licensing of IT workers is common within most of the states of the United States. T/F

20
New cards

do not meet the legal definition of a professional

In malpractice lawsuits, many courts have ruled that IT workers are not liable for malpractice because they _____.

21
New cards

legislation

In the legal system, compliance usually refers to behavior that is in accordance with _____.

22
New cards

Association for Computing Machinery

The _____ is a computing society founded in 1947 with more than 97,000 student and professional members in more than 100 countries, and it publishes over 50 journals and 30 newsletters.

23
New cards

Business Software Alliance (BSA)

The _____ is a trade group that represents the world's largest software and hardware manufacturers.

24
New cards

bribe a foreign official

The Foreign Corrupt Practices Act (FCPA) makes it a crime to _____

25
New cards

It is true that policies can establish boundaries for behavior and enable managemant to punish violators

While no policy can stop wrongdoers, it can establish boundaries for acceptable and unacceptable behavior and enable management to punish violators.T/F

26
New cards

breach of contract

A(n) _____ occurs when a party fails to perform certain express or implied obligations, which impairs or destroys the essence of the contract.

27
New cards

Negligent insiders

_____ are poorly trained and inadequately managed employees who mean well but have the potential to cause much damage.

28
New cards

Spear-phishing

_____ is the sending of fraudulent emails to an organization's employees designed to look like they came from high-level executives from within the organization.

29
New cards

Hackers

_____ test the limitations of information systems out of intellectual curiosity to see whether they can gain access and how far they can go.

30
New cards

distributed denial-of-service

A _____ attack keeps the target so busy responding to a stream of automated requests that legitimate users cannot get in.

31
New cards

It is true a risk assessment identifies most dangerous threats to a company

A completed risk assessment identifies the most dangerous threats to a company and helps focus security efforts on the areas of highest payoff. T/F

32
New cards

It is true an intrusion detection system monitors system and network activities etc

An intrusion detection system monitors system and network resources and activities, and notifies the network security when it detects attempts to circumvent the security measures of a networked computer environment. T/F

33
New cards

It is false regarding competitive intelligence

Competitive intelligence is conducted by industrial spies. T/F

34
New cards

Is it true that employees and contract workers must be educated about the importance of security

Employees and contract workers must be educated about the importance of security so that they will be motivated to understand and follow the security policies. T/F

35
New cards

exploit

In computing, a(n) _____ is a term for any sort of general attack on an information system that takes advantage of a particular system vulnerability.

36
New cards

U.S. Computer Emergency Readiness Team

The _____ is a partnership between the Department of Homeland Security and the public and private sectors, established in 2003 to protect the nation's Internet infrastructure against cyberattacks.

37
New cards

reasonable assurance

The concept of _____ recognizes that managers must use their judgment to ensure that the cost of control does not exceed the system's benefits or the risks involved.

38
New cards

it is true that automated system rules should mirror written policies

Whenever possible, automated system rules should mirror an organization's written policies. T/F

39
New cards

Collusion

The cooperation between an employee of a company and an outsider to commit fraud against the company is called _____.

40
New cards

it is false that a National security letter is subject to review and oversight

A National Security Letter is subject to judicial review and oversight. T/F

41
New cards

event data recorder

One purpose of a(n) _____ is to capture and record data that can be used by the manufacturer to make future changes to improve vehicle performance in the case of a crash.

42
New cards

It is true that the GLBA includes key rules that include the follow

The Gramm-Leach-Bliley Act includes three key rules that affect personal privacy: financial privacy rule, safeguards rule, and pretexting rule. T/F

43
New cards

FCC

The Communications Act of 1934 established the _____.

44
New cards

allows surveillance, without court order, within the United States for up to a year unless the "surveillance will acquire the contents of any communication to which a U.S. person is a party."

The Foreign Intelligence Surveillance Act:

45
New cards

It is false the US does not have a single national data privacy policy

The U.S. has a single, overarching national data privacy policy. T/F

46
New cards

It is false American citizens are not protected by the 4th amendment

American citizens are protected by the Fourth Amendment even when there is no reasonable expectation of privacy. T/F

47
New cards

Privacy Act

The _____ prohibits the government from concealing the existence of any personal data record-keeping systems.

48
New cards

It is false, financial institution cannot release customer's financial records

Under the Right to Financial Privacy Act, a financial institution can release a customer's financial records without the customer's authorization as long as it is a government authority that is seeking the records. T/F

49
New cards

Gramm-Leach-Bliley Act

Under the _____, financial institutions must provide a privacy notice to each consumer that explains what data about the consumer is gathered, with whom that data is shared, how the data is used, and how the data is protected.

50
New cards

evidence

Discovery is part of the pretrial phase of a lawsuit in which each party can obtain _____ from the other party by various means.

51
New cards

it is true that information privacy is the combination of communication and data privacy

Information privacy is the combination of communications privacy and data privacy.

52
New cards

Electronic Communications Privacy Act

Title I of the _____ extends the protections offered under the Wiretap Act to electronic communications, such as fax and messages sent over the Internet.

53
New cards

Is it true, web sites content is evaluated immediately

With dynamic content filtering, each Web site's content is evaluated immediately before it is displayed, using techniques such as object analysis and image recognition. T/F

54
New cards

Federal Trade Commission

The _____ is charged with enforcing the Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act, and the agency maintains a consumer complaint database relating to the law.

55
New cards

It is true the organization can be sued

If an employee sees a coworker viewing porn on a workplace computer, the organization can be sued in a sexual harassment lawsuit. T/F

56
New cards

It is False that they cannot be prosecuted

A U.S. citizen who posts material on the Web that is illegal in a foreign country cannot be prosecuted in that country. T/F

57
New cards

It is false, oral state isnt libel

An oral defamatory statement is libel. T/F

58
New cards

defamation

The Supreme Court has held that obscene speech and _____ are not protected by the First Amendment and may be forbidden by the government.

59
New cards

remailers

Which of the following can provide a virtually untraceable level of anonymity to email messages?

60
New cards

It is false, Internet filters can block users

Internet filters cannot block users from accessing useful information.T/F

61
New cards

First

In the United States, speech that is merely annoying, critical, demeaning, or offensive enjoys protection under the _____ Amendment.

62
New cards

California

Miller v. _____ is the Supreme Court case that established a test to determine if material is obscene and therefore not protected by the First Amendment.

63
New cards

A John Doe lawsuit

Which of the following can be used against an anonymous defendant to reveal truths about the defendant's identity?

64
New cards

it is true the goal is to protect children and ruled unconstitutional

The goal of the Child Online Protection Act (COPA) was to protect children from harmful material on the World Wide Web, however, it was ruled unconstitutional. T/F

65
New cards

it is false, this is not guaranteed

Anonymity on the Internet is practically guaranteed. T/F