1/64
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Ethics
describes standards or codes of behavior expected of an individual by a group (nation, organization, profession) to which an individual belongs.
Corporate social responsibility
is the concept that an organization should act ethically by taking accountability for the impact of its actions on the environment, the community, and the welfare of its employees.
corporate ethics officer
A _____ provides an organization with vision and leadership in the area of business conduct.
vice
A(n) _____ is a habit of unacceptable behavior.
common good
An approach to ethical decision making that is based on a vision of society as a community whose members work together to achieve a general set of values and goals is the _____ approach.
Yes a manager has an impact on their ethical behavior
Is An individual's manager has very little impact on his or her ethical behavior?
It is true that ethics has risen to the to the top of the business agenda
Ethics has risen to the top of the business agenda because risks associated with inappropriate behavior have increased, both in their likelihood and in their potential negative impact. T/F
It is false that globalization decreased the likelihood of unethical behavior
Greater globalization has decreased the likelihood of unethical behavior. T/F
social audit
In a(n) _____, an organization reviews how well it is meeting its ethical and social responsibility goals, and communicates its new goals for the upcoming year.
an employer can be held responsible for the acts of its employees even if the employees act in a manner contrary to their employer's directions.
In the case of United States v. New York Central & Hudson River Railroad Co., the U.S. Supreme Court established that:
stakeholder
Someone who stands to gain or lose, depending on how a situation is resolved is called a _____.
It is false that the greater reliance of information systems in aspects of life decreased risk that IT will be used unethically
The greater reliance of information systems in all aspects of life has decreased the risk that information technology will be used unethically. T/F
code of ethics
A(n) _____ is a statement that highlights an organization's key ethical issues and identifies the overarching values and principles that are important to the organization and its decision making.
Fraud
_____ is the crime of obtaining goods, services, or property through deception or trickery.
firewall
A _____ is a hardware or software device that serves as a barrier between a company and the outside world and limits access to the company's network based on the organization's Internet usage policy.
professional code of ethics
A _____ states the principles and core values that are essential to the work of a particular occupational group.
It is true there is no universal code of ethics for IT workers
Currently no one IT professional organization has emerged as preeminent, so there is no universal code of ethics for IT workers. T/F
licensed
From a legal perspective, IT workers are not recognized as professionals because they are not _____ by the state or federal government.
It is false that govt licensing of IT workers is common in the US
Government licensing of IT workers is common within most of the states of the United States. T/F
do not meet the legal definition of a professional
In malpractice lawsuits, many courts have ruled that IT workers are not liable for malpractice because they _____.
legislation
In the legal system, compliance usually refers to behavior that is in accordance with _____.
Association for Computing Machinery
The _____ is a computing society founded in 1947 with more than 97,000 student and professional members in more than 100 countries, and it publishes over 50 journals and 30 newsletters.
Business Software Alliance (BSA)
The _____ is a trade group that represents the world's largest software and hardware manufacturers.
bribe a foreign official
The Foreign Corrupt Practices Act (FCPA) makes it a crime to _____
It is true that policies can establish boundaries for behavior and enable managemant to punish violators
While no policy can stop wrongdoers, it can establish boundaries for acceptable and unacceptable behavior and enable management to punish violators.T/F
breach of contract
A(n) _____ occurs when a party fails to perform certain express or implied obligations, which impairs or destroys the essence of the contract.
Negligent insiders
_____ are poorly trained and inadequately managed employees who mean well but have the potential to cause much damage.
Spear-phishing
_____ is the sending of fraudulent emails to an organization's employees designed to look like they came from high-level executives from within the organization.
Hackers
_____ test the limitations of information systems out of intellectual curiosity to see whether they can gain access and how far they can go.
distributed denial-of-service
A _____ attack keeps the target so busy responding to a stream of automated requests that legitimate users cannot get in.
It is true a risk assessment identifies most dangerous threats to a company
A completed risk assessment identifies the most dangerous threats to a company and helps focus security efforts on the areas of highest payoff. T/F
It is true an intrusion detection system monitors system and network activities etc
An intrusion detection system monitors system and network resources and activities, and notifies the network security when it detects attempts to circumvent the security measures of a networked computer environment. T/F
It is false regarding competitive intelligence
Competitive intelligence is conducted by industrial spies. T/F
Is it true that employees and contract workers must be educated about the importance of security
Employees and contract workers must be educated about the importance of security so that they will be motivated to understand and follow the security policies. T/F
exploit
In computing, a(n) _____ is a term for any sort of general attack on an information system that takes advantage of a particular system vulnerability.
U.S. Computer Emergency Readiness Team
The _____ is a partnership between the Department of Homeland Security and the public and private sectors, established in 2003 to protect the nation's Internet infrastructure against cyberattacks.
reasonable assurance
The concept of _____ recognizes that managers must use their judgment to ensure that the cost of control does not exceed the system's benefits or the risks involved.
it is true that automated system rules should mirror written policies
Whenever possible, automated system rules should mirror an organization's written policies. T/F
Collusion
The cooperation between an employee of a company and an outsider to commit fraud against the company is called _____.
it is false that a National security letter is subject to review and oversight
A National Security Letter is subject to judicial review and oversight. T/F
event data recorder
One purpose of a(n) _____ is to capture and record data that can be used by the manufacturer to make future changes to improve vehicle performance in the case of a crash.
It is true that the GLBA includes key rules that include the follow
The Gramm-Leach-Bliley Act includes three key rules that affect personal privacy: financial privacy rule, safeguards rule, and pretexting rule. T/F
FCC
The Communications Act of 1934 established the _____.
allows surveillance, without court order, within the United States for up to a year unless the "surveillance will acquire the contents of any communication to which a U.S. person is a party."
The Foreign Intelligence Surveillance Act:
It is false the US does not have a single national data privacy policy
The U.S. has a single, overarching national data privacy policy. T/F
It is false American citizens are not protected by the 4th amendment
American citizens are protected by the Fourth Amendment even when there is no reasonable expectation of privacy. T/F
Privacy Act
The _____ prohibits the government from concealing the existence of any personal data record-keeping systems.
It is false, financial institution cannot release customer's financial records
Under the Right to Financial Privacy Act, a financial institution can release a customer's financial records without the customer's authorization as long as it is a government authority that is seeking the records. T/F
Gramm-Leach-Bliley Act
Under the _____, financial institutions must provide a privacy notice to each consumer that explains what data about the consumer is gathered, with whom that data is shared, how the data is used, and how the data is protected.
evidence
Discovery is part of the pretrial phase of a lawsuit in which each party can obtain _____ from the other party by various means.
it is true that information privacy is the combination of communication and data privacy
Information privacy is the combination of communications privacy and data privacy.
Electronic Communications Privacy Act
Title I of the _____ extends the protections offered under the Wiretap Act to electronic communications, such as fax and messages sent over the Internet.
Is it true, web sites content is evaluated immediately
With dynamic content filtering, each Web site's content is evaluated immediately before it is displayed, using techniques such as object analysis and image recognition. T/F
Federal Trade Commission
The _____ is charged with enforcing the Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act, and the agency maintains a consumer complaint database relating to the law.
It is true the organization can be sued
If an employee sees a coworker viewing porn on a workplace computer, the organization can be sued in a sexual harassment lawsuit. T/F
It is False that they cannot be prosecuted
A U.S. citizen who posts material on the Web that is illegal in a foreign country cannot be prosecuted in that country. T/F
It is false, oral state isnt libel
An oral defamatory statement is libel. T/F
defamation
The Supreme Court has held that obscene speech and _____ are not protected by the First Amendment and may be forbidden by the government.
remailers
Which of the following can provide a virtually untraceable level of anonymity to email messages?
It is false, Internet filters can block users
Internet filters cannot block users from accessing useful information.T/F
First
In the United States, speech that is merely annoying, critical, demeaning, or offensive enjoys protection under the _____ Amendment.
California
Miller v. _____ is the Supreme Court case that established a test to determine if material is obscene and therefore not protected by the First Amendment.
A John Doe lawsuit
Which of the following can be used against an anonymous defendant to reveal truths about the defendant's identity?
it is true the goal is to protect children and ruled unconstitutional
The goal of the Child Online Protection Act (COPA) was to protect children from harmful material on the World Wide Web, however, it was ruled unconstitutional. T/F
it is false, this is not guaranteed
Anonymity on the Internet is practically guaranteed. T/F