1/160
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
An organization's mission statement highlights its key ethical issues and identifies the overarching values and principles that are important to the organization and its decision making.
False
Because an activity is defined as legal, the activity is also considered ethical.
False
The greater reliance of information systems in all aspects of life has decreased the risk that information technology will be used unethically.
False
The board of directors of an organization is normally responsible for day-to-day management and operations of the organization.
False
Legal acts conform to what an individual believes to be the right thing to do.
False
Multinational and global organizations must not present a consistent face to their shareholders, customers, and suppliers but instead must operate with a different value system in each country they do business in.
False
Compliance means to be in conformance with a profession's core body of knowledge.
False
The internal audit department includes members of the board of directors who determine that the internal systems and controls of the organization are adequate and effective.
False
When it comes to distinguishing between bribes and gifts, the perceptions of the donor and recipient almost always coincide.
False
A breach of the duty of care is defined as a failure to conform to the code of ethics of a professional organization.
False
Government licensing of IT workers is common within most of the states of the United States.
False
The Foreign Corrupt Practices Act is a legally binding global treaty to fight bribery and corruption.
False
The United Nations Convention Against Corruption makes it a crime to bribe a foreign official, a foreign political party official, or a candidate for foreign political office.
False
A spear phishing attach typically employs a group of zombies to keep the target so busy responding to a stream of automated requests that legitimate users cannot access the target.
False
Cyberterrorism involves the deployment of malware that secretly steals data in the computer systems of organizations, such as government agencies, military contractors, political organizations, and manufacturing firms.
False
Computer forensics is such a new field that there is little training or certification processes avalible.
False
Installation of a corporate firewall is the least common security precaution taken by businesses as it does not provide sufficient security.
False
The Fifth Amendment regulates the collection of the content of wire and electronic communications.
False
The cost of creating an email campaign for a product or service is typically more expensive and takes longer to conduct than a direct-mail campaign.
False
The U.S. has a single, overarching national data privacy policy.
False
Online marketers can capture personal information, such as names, addresses, and Social Security numbers without requiring consent.
False
Under the Right to Financial Privacy Act, a financial institution can release a customer's financial records without the customer's authorization as long as it is a government authority that is seeking the records.
False
A pen register is a device that records the originating number of incoming calls for a particular phone number.
False
The rights assigned to parents by the Family Educational Rights and Privacy Act transfer to the student once the student reaches the age of 21.
False
Title III of the Wiretap Act allows state and federal law enforcement officials to use wiretapping without requiring them to obtain warrants.
False
The USA PATRIOT Act grants citizens the right to access certain information and records of federal, state, and local governments upon request.
False
The plaintiff in a strategic lawsuit against public participation (SLAPP) can present themselves to the court admitting that their intent is to censor their critics.
False
Free-speech advocates believe that purchasing adult pornographic material is illegal and wrong even for consenting adults.
False
Anti-SLAPP laws are designed to protect children from pornography.
False
The Fifth Amendment protects American's rights to freedom of religion and freedom of expression.
False
An oral defamatory statement is libel.
False
Anonymity on the Internet is practically guaranteed.
False
A U.S. citizen who posts material on the Web that is illegal in a foreign country cannot be prosecuted in that country.
False
Phishing frequently leads consumers to counterfeit websites designed to trick them into initiating a denial-of-service attack.
False
Installation of a corporate firewall is the least common security precaution taken by businesses as it does not provide sufficient security.
False
A router is a hardware- or software-based network security system that is able to detect and block sophisticated attacks by filtering network traffic dependent on the packet contents.
True
Employees may suppress their tendency to act in a manner that seems ethical to them and instead act in a manner that will protect them against anticipated punishment.
True
In the business world, important decisions are too often left to the technical experts; general business managers must assume greater responsibility for these decisions.
True
The term ethics describes standards or codes of behavior expected of an individual by a group to which the individual belongs.
True
Increasingly, managers are including ethical conduct as part of an employee's performance appraisal.
True
Ideally, the corporate ethics officer should be a well respected, senior-level manager who reports directly to the CEO.
True
Consistency means that shareholders, customers, suppliers, and the community know what they can expect of an organization—that it will behave in the future much as it has in the past.
True
Setting corporate social responsibility (CSR) goals encourages an organization to achieve higher moral and ethical standards.
True
The term morals refers to the personal principles upon which an individual bases his or her decisions about what is right and what is wrong.
True
While no policy can stop wrongdoers, it can establish boundaries for acceptable and unacceptable behavior and enable management to punish violators.
True
There are many industry association certifications in a variety of IT-related subject areas.
True
Gifts come with no expectation of a future favor for the donor.
True (if people actually follow the rules)
Vendor certifications require passing a written exam, which usually contains multiple-choice questions because of legal concerns about whether other types of exams can be graded objectively.
True
There is potential conflict of interest when IT consultants or auditors recommend their own products and services or those of an affiliated vendor or remedy a problem they have detected.
True
Employees and contract workers must be educated about the importance of security so that they will be motivated to understand and follow the security policies.
True
Today's computer menace is much better organized and may be part of an organized group.
True
The cost to repair the worldwide damage done by a computer worm has exceeded $1 billion on more than one occasion.
True
It is not unusual for a security audit to reveal that too many people have access to critical data and that many people have capabilities beyond those needed to perform their jobs.
True
Through the use of cookies, a Web site is able to identify visitors on subsequent visits.
True
The cost of a data breach can be quite expensive, by some estimates nearly $200 for each record lost.
True
The Health Insurance Portability and Accountability Act requires healthcare organizations to employ standardized electronic transactions, codes, and identifiers to enable them to fully digitize medical records thus making it possible to exchange medical records over the Internet.
True
The Constitution does not contain the word privacy, but the Supreme Court has ruled that the concept of privacy is protected by the Bill of Rights.
True
Electronically stored information includes any form of digital information stored on any form of electronic storage device.
True
In general, the closer an Internet service provider (ISP) is to a pure service provider than to a content provider, the more likely that the Section 230 immunity of the Communications Decency Act (CDA) will apply.
True
Over the years, a number of federal, state, and local laws have been found unconstitutional because they violated one of the tenets of the First amendment.
True
Private schools may prohibit students, instructors, and other employees from engaging in offensive speech.
True
A strategic lawsuit against public participation (SLAPP) is typically without merit.
True
The right to freedom of expression is restricted when the expressions, whether spoken or written, are untrue and cause harm to another person.
True
With URL filtering, a particular URL or domain name is identified as an objectionable site and the user is not allowed access to it.
True
Anti-SLAPP laws can identify whether there are any merits to a lawsuit.
True
Pornography purveyors are free to produce and publish whatever they want; however, if what they distribute is judged obscene, they are subject to prosecution under the obscenity laws.
True
Most countries other than the United States do not provide constitutional protection for hate speech.
True
Each violation of the provisions of the Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act can result in a fine of up to $250 for each unsolicited email, and fines can be tripled in certain cases.
True
Even when preventative measures are implemented, no organization is completely secure from a determined computer attack.
True
The Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act states that it is legal to spam, provided the messages meet a few basic requirements.
False
The fair use doctrine denies portions of patented materials to be used without permission under any circumstance.
False
A trademark permits its owner to exclude the public from making, using, or selling a protected invention, and allows for legal action against violators.
False
The World Intellectual Property Organization (WIPO) Copyright Treaty of 1996 eliminated many of the original copyright protections for electronic media.
False
A trademark is business information that represents something of economic value, has required effort or cost to develop, has some degree of uniqueness or novelty, is generally unknown to the public, and is kept confidential.
False
Industrial espionage and competitive intelligence are essentially the same.
False
Cross-licensing agreements between organizations allow each party to sue the other over patent infringements.
False
Copyright infringement is the act of stealing someone's ideas or words and passing them off as one's own.
False
From 2007 to June 2016, the percentage of organizations determined to be at a high-maturity level is 50.
False
When software is well-designed, programmers make no mistakes in turning design specifications into lines of code.
False
In the context of developing safety-critical systems, the safety engineer's role is limited to producing a hazard log.
False
Transference is the provision of multiple interchangeable components to perform a single function in order to cope with failures and errors.
False
Software developers do not typically work closely with safety and software engineers.
False
When developing safety-critical systems, a key assumption must be that safety will automatically result from following an organization's standard development methodology.
False
Black-box testing treats the software unit as a device that has expected input and output behaviors but whose internal workings are known.
False
In integration testing, special software programs called static analyzers are run against the new code.
False
In the early days of IT in the 1960s, productivity improvements were difficult to measure.
False
Machine learning is a branch of engineering that involves the development and manufacture of mechanical or computer devices that can perform tasks that require a high degree of precision or that are tedious or hazardous for human beings.
False
Electronic medical records capture data on the total health of the patient and include more than just the standard clinical data collected in the provider's office thus enabling a broader view of a patient's care.
False
Effective use of CDS (Clinical Decision Support) systems increases the quality of patient care but at the expense of rising healthcare costs.
False
Lifestyle changes have led to a decrease in chronic illnesses, such as diabetes and heart disease, that are expensive and difficult to treat.
False
Labor productivity is measured by the annual revenue an employee generates divided by the employee's annual salary.
False
It usually takes less than two years for IT investment to result in a significant increase in productivity in large firms.
False
Lifestyle changes have led to a decrease in chronic illnesses such as diabetes and heart disease, that are expensive and difficult to treat.
False
Live telemedicine requires the presence of patients and healthcare providers at the same site.
False
The information in the EHR is not easily shared with others outside of the healthcare organization where the data originated.
False
It usually takes less than two years for IT to result in a significant increase in productivity in large firms.
False
Lifestyle changes have led to a decrease in chronic illnesses, such as diabetes heart disease, that are expensive and difficult to treat.
False
Social shopping Web sites earn money solely by sharing with retailers data about their members' likes and dislikes.
False
MySpace is the most popular social network destination worldwide.
False
The goal of viral marketing is to spread rumors and innuendo about a rival's product that will hurt its image.
False