Ethics and Privacy Concerns

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/116

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

117 Terms

1
New cards

Which principle of ethical conduct states that when faced with an ethical dilemma the manager should choose the option that does the greatest good for the most involved?

The Utilitarian Principle

2
New cards

Computer ethics violations fall in two major categories; illegal activity and organizational _______violations.

policy

3
New cards

Along with the employee, which of the following is most responsible for an employee's ethical behavior?

managment

4
New cards

Under what circumstance should you report a computer ethics violation to your employer?

You pass a co-worker's computer screen and see him surfing through child pornography.

5
New cards

Managers must protect the online ___ of employees and organization stakeholders.

privacy

6
New cards

Many sales managers, including those in information technology-related fields, use commissions in an attempt to incentivize productivity and to reward more successful salespeople. The principle of ethical conduct that this exemplifies is Blank______.

The principle of distributive justice

7
New cards

Select three correct statements regarding international Internet privacy laws.

-International laws on Internet privacy vary greatly.

-The European Union (EU) European Commission Data Protection Directive states that under EU law, personal data can only be gathered legally under strict conditions.

-It is very difficult to get nations across the globe to agree on standardized Internet privacy laws.

8
New cards

This principle states that a manager must attempt to determine if this decision is fair for all involved.

The Universalist Principle

9
New cards

This principle simply states that when faced with an ethical dilemma the manager should choose that option that does the greatest good for the most involved is the Blank______ principle.

Utilitarian

10
New cards

With regard to Internet privacy, the First Amendment to the U.S. Constitution is relevant because Blank______

it provides freedom of speech protection that extends to the Internet which means there is little government filtering of content.

11
New cards

Select two ways managers encourage employees to act unethically.

By not enforcing strong ethical behavior.

By failing to act ethically themselves.

12
New cards

Select the three major titles of the Digital Millennium Copyright Act (DMCA) that impact digital copyright protection.

-Title 2 - This act protects Internet Service Providers (ISPs) from being sued for copyright infringement when the ISP's user wrongfully copies items from the Internet.

-Title 1 - This act requires that measures be taken to make it difficult to copy analog video recordings.

-Title 4 - This act facilitates distance learning by allowing educational institutions latitude with regard to the use of copyrighted material.

13
New cards

A wide-ranging term that refers to a variety of considerations including; how data and information is used, who has access to data and information, the techniques and technologies used to protect sensitive and private data, communications, and preferences is Internet Blank______.

privacy

14
New cards

The Cybersecurity Information _____Act, passed in December 2015, allows private companies to share threat warnings with the U.S. government.

sharing

15
New cards

Due to the lack of normalized laws, it is important to use discretion on the Internet when traveling or living abroad.

true

16
New cards

Which Act protects email and VoIP communications by making it illegal to intercept calls or messages without a warrant.

The Electronic Communications Privacy Act

17
New cards

The principle of ethical conduct that states that a manager must attempt to determine if this decision is fair for all involved is the______ principle.

universalist

18
New cards

The PATRIOT Act was enacted to monitor terrorist activities and communications following the 9/11 attacks and the 2001 Anthrax attack on Congress. PATRIOT stands for Providing Appropriate Tools Required to Intercept and Obstruct _____.

Terrorism

19
New cards

Even though the Child Online Protection Act of 1998 was sponsored by both Democrats and Republicans and was passed by both Houses of Congress and signed into law by President Clinton, you cannot be punished for violating law because Blank______ .

the law violated the 1st Amendment (freedom of speech) rights and was found unconstitutional.

20
New cards

The laws that were created to update copyright laws dealing with the issues of regulating digital material in accordance with World Intellectual Property Organization treaties is called:

The Digital Millennium Copyright Act (DMCA)

21
New cards

The Act that outlines a plan to protect government information and assets against cyber threats and requires each federal agency to develop a plan for information security is The Federal Information _______Management Act (FISMA).

security

22
New cards

Which Act, signed into law in December 2015, allows companies to share cyber-security threat information with the U.S. government?

The Cybersecurity Information Sharing Act

23
New cards

The Act that protects person-to-person wire, oral, and electronic communications is Blank______.

The Wiretap Act

24
New cards

The law passed in 1986 that protects email and VoIP communications by making it illegal to intercept calls or messages without a warrant is The Electronic Communications ______Act.

privacy

25
New cards

Which law, passed after the 9/11 attacks allowed law enforcement to obtain information about online and offline communications related to terrorist activities without a warrant.

The US PATRIOT Act/USA Freedom Act

26
New cards

This is a small text file of information created by websites you visit that your web browser stores on your hard disk.

cookie

27
New cards

With regard to Internet privacy, the First Amendment to the U.S. Constitution is relevant because _______

it provides freedom of speech protection that extends to the Internet which means there is little government filtering of content.

28
New cards

What type of cookie is stored in temporary memory and is lost when the web browser is closed?

session

29
New cards

This Act outlines a plan to protect government information and assets against cyber threats. It requires each federal agency to develop a plan for information security.

The Federal Information Security Management Act

30
New cards

Cookies are stored on the hard drive and are not lost when the web browser is closed are called Blank______ cookies

Persistent

31
New cards

The federal law that protects person-to-person wire, oral, and electronic communications and also includes a variety of network crime statutes that include identity theft and unlawful access to stored communications is The _____Act.

Wiretap

32
New cards

Cookies that are created by a website other than the one you are currently visiting and are used to track your surfing habits are known as Blank______ cookies.

third-party

33
New cards

Small text files created by websites you visit that your web browser stores on your hard disk are called_____

cookies

34
New cards

In the settings area of each browser you should consider adjusting which three of the following?

-Blocking or customizing your cookie settings

-Deciding from which sites you want to allow cookies

-Deleting cookies

35
New cards

A type of cookie, sometimes called a transient cookie, that is not stored but just kept in memory when a user visits a website is called a _____cookie.

session

36
New cards

A form of spyware that records all actions typed on a keyboard is called a __ logger.

Keystroke

37
New cards

Cookies stored on your device's hard drive and remain even if your computer has been restarted are called __ cookies.

Persistent

38
New cards

A checkbox may ask if you want to receive news and updates, or participate in surveys from the site. When creating or browsing websites, this checkbox is referred to as an Blank______.

Opt-in and Opt-out

39
New cards

The Act that protects person-to-person wire, oral, and electronic communications is______

The Wiretap Act

40
New cards

1. Invention-

2. Novel-

3. Logo-

1. -Patent

2. -Copyright

3. -Trademark

41
New cards

Select three privacy concerns associated with cookies.

-Corporate and government entities can use cookies to monitor your surfing behavior.

-Websites that use cookies can collect information about surfing habits and sell that information to a variety of third-parties.

-Websites can use cookies to track your surfing behavior and use this information to create specific user profiles.

42
New cards

Which two of the following can be awarded copyright protection?

Sculptures

Choreography

43
New cards

Changing cookie settings in one browser (Chrome, for example) will automatically change your cookie settings in your other browsers (Safari, Firefox, Edge, for example).

False

44
New cards

When the government grants an inventor the right to exclude others from the use of the invention for a period of time, this is called a _____.

patent

45
New cards

Keystroke loggers and packet analyzers (sniffers) are two common types of ____

spyware

46
New cards

Data that is typically used in commercially available relational databases, where the data resides in a fixed field and can easily be queried, is called ___ data.

structured

47
New cards

If you are downloading a game or software onto a device, there may be an empty box asking you to check the box to agree to Terms of Use and the site's Privacy Policy. This checkbox is called a(n) _________-in.

opt

48
New cards

Which two of the following are examples of an organization using big data and analyzing predictive behavior with the goal of creating new offerings?

Netflix tracks what users who viewed all three seasons of Stranger Things also had in their queues.

An in-home healthcare provider tracks the hospital readmission rates of elderly people who live alone after they received care for falling in their home.

49
New cards

Property rights that allow creators to profit from their work, thereby encouraging creativity, are called _______property rights.

intellectual

50
New cards

Insurance companies use big ______in actuarial analysis in order to more accurately estimate risk, often lowering the cost of their services.

data

51
New cards

A form of protection provided by the laws of the United States for "original works of authorship", including literary, dramatic, musical, architectural, cartographic, choreographic, pantomimic, pictorial, graphic, sculptural, and audiovisual creations is called a _______

copyright

52
New cards

Having a customer fill out a survey

direct inquiry

53
New cards

Using cookies to follow a customer's search history

indirect tracking

54
New cards

Buying a list of potential customers from an outside agency

Third party data purchase

55
New cards

Select the three correct statements regarding patents.

A patent will only be granted for something that is useful.

To qualify for a patent, the invention must be novel, or different, from other similar inventions.

To qualify for a patent, the invention must be non-obvious, meaning that a skilled artisan would find the invention surprising or unexpected.

56
New cards

Data that has a defined length, type, and format, including items as numbers, dates, or strings such as a customer profile is referred to as Blank______ data.

structured

57
New cards

Methodologies that attempt to deal with the vast amount of complex information that accumulates at high, and accelerating, velocity use _____data.

big

58
New cards

Credit institutions use big data to anticipate the likelihood of ___ and to more accurately report credit ratings.

loan default

59
New cards

When you order a pizza online and are asked to provide your address, the company stores this information. This manner of data collection is referred to as ___.

direct inquiry

60
New cards

Select three common methods in which organizations collect data.

Third-party data purchase

Direct inquiry

Indirect tracking

61
New cards

A Wi-Fi tracker follows a shopper's path from store to store.

indirect tracking

62
New cards

Select the two major types of patents.

Design

Utility

63
New cards

Companies that purchase consumer behavior information from other organizations are engaged in ___.

Third party data purchase

64
New cards

A major transition in the big data security sector is to move all data storage to ____storage.

cloud

65
New cards

These programs use a variety of techniques to identify and remove viruses and malware.

Anti-virus software

66
New cards

This keeps your computer from storing cookies, but doesn't securely hide your identity beyond the device because your IP address can still be tracked.

Private browsing

67
New cards

This essentially hides your IP address to outside websites by running your communications through a secure network.

Virtual private network (VPN)

68
New cards

Checking your FICO score from each different agency every four months and watching for unusual activity.

Credit monitoring

69
New cards

Customers are offered a free dessert if they complete a survey. This method of data collection is referred to as ______ inquiry

direct

70
New cards

Kevin needs to create a password to access his bank's online banking system. He is considering the passwords below. Which is most secure?

Sxf6512@fg%

71
New cards

Select two common methods of using indirect tracking to gather data.

A cookie tracks your purchasing searches

A mobile game app uploads your phone's browser activity

72
New cards

Select two common techniques used by anti-virus software to identify malware.

Heuristic-based detection

Signature-based detection

73
New cards

You own a real estate brokerage and need a list of high-income residents. You buy the list from a data marketing company. This is called Blank______.

Third party data purchase

74
New cards

Which three of the following are widely used tactics that can help keep you safe on the Web?

Make sure the sites you visit use HTTPS if entering personal information

Use your browser's private browsing mode.

Consider using a VPN

75
New cards

Many businesses have reduced the likelihood of experiencing an expensive data breach by moving data storage to __

major cloud storage service providers such as Amazon Web Services.

76
New cards

Monitoring your credit, creating strong passwords, using anti-virus protection, and practicing safe browsing techniques are methods of protecting your personal ______while using the Internet.

privacy

77
New cards

To determine the interest rate you will be charged or the amount of money you are qualified to borrow, lenders will check your ___.

credit report

78
New cards

Wyatt needs a password for his school's email system. Of the following, which password is the most secure?

Xj9%ft7y

79
New cards

Which of the following is a primary ethical concern with the use of AI in business?

AI may perpetuate biases based on biased data sources.

80
New cards

A computer program that scans files to identify and remove computer viruses and other malicious programs is called Blank______.

Antivirus software

81
New cards

What does the EU's Artificial Intelligence Act primarily focus on?

Protecting intellectual property and personal data privacy

82
New cards

Select two reasons why a credit card offers more protection than a debit card when shopping online.

With a credit card you have a layer of security between your cash and hackers on the Internet.

Using your debit card can give hackers direct access to your checking accounts.

83
New cards

In the European Union's AI Act, which of the following AI risks is categorized as "Unacceptable Risk"?

Social scoring systems

84
New cards

A major transition in the big data security sector is to move all data storage to ____ storage.

cloud

85
New cards

If you believe you are at significant risk of fraud, for example, if you have been the victim of a data breach, you should consider purchasing ______monitoring.

credit

86
New cards

Which two of the following are risks associated with the use of AI in business?

AI may cause employees to become overly reliant on the software, leading to skill atrophy.

AI may perpetuate biases based on the data it has been trained on.

87
New cards

Which three of the following are challenges associated with the AI-driven data-mining process?

Data transparency.

Privacy protection in highly connected environments.

Obtaining user consent.

88
New cards

What is one of the primary challenges businesses face when attempting to create ethical guidelines for the use of AI in the workplace?

The rapid pace of AI technology changes

89
New cards

Select three true statements regarding protecting big data.

Adherents argue that cloud service providers have security measures that far exceed the data security capabilities of small businesses.

One advantage of cloud storage is that it greatly reduces the human factor in data protection.

Over half of all data breaches can be traced to human error.

90
New cards

Which dimension of ethical behavior in the digital age is represented by the following question?

You are interviewing 3 applicants for a management position in your firm and wish to ensure that they will represent your company with professionalism and maturity. Should you check the applicants' social media sites prior to making your hiring decision?

Multiple choice question.

Information Privacy Rights

91
New cards

After getting all the pertinent facts, the next step in making an ethical analysis is to ___ .

determine the affected

92
New cards

Because it is difficult to trace and it is accessible through any Internet connected device, cyber criminals often request payment in ___ .

Cryptocurrency

93
New cards

The dimension (category) of ethical concerns in the digital age that refers to determining what constitutes proper levels of protection of digital information is called establishing __.

Standards

94
New cards

Which three of the following are considered intellectual property and entitled to protection?

A mural that you painted.

A story that you published.

A song that you wrote.

95
New cards

Which two of the following guidelines should you follow when reporting a co-worker's computer ethics violations.

Only report incidences that you have personally witnessed.

Be brief and remember that your employer probably did not hire you monitor inappropriate computer use.

96
New cards

The dimension (category) of ethical dilemmas that examines how individuals or corporations can be held responsible in case of violations of privacy or intellectual property rights is referred to _____and accountability.

control

97
New cards

The final step when making an ethical analysis is to make a decision and to prepare for the consequences. Preceding this is the fourth step, which has the manager ___ .

listing options

98
New cards

Many sales managers, including those in information technology-related fields, use commissions in an attempt to incentivize productivity and to reward more successful salespeople. The principle of ethical conduct that this exemplifies is ______

The principle of distributive justice

99
New cards

With regard to Internet privacy, the First Amendment to the U.S. Constitution is relevant because ______

it provides freedom of speech protection that extends to the Internet which means there is little government filtering of content.

100
New cards

When the government grants an inventor the right to exclude others from the use of the invention for a period of time, this is called a _____

patent