Computer Ethics Midterm

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/65

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

66 Terms

1
New cards

Ethics

_____ describes standards or codes of behavior expected of an individual by a group (nation, organization, profession) to which an individual belongs.

2
New cards

Corporate social responsibility

_____ is the concept that an organization should act ethically by taking accountability for the impact of its actions on the environment, the community, and the welfare of its employees.

3
New cards

corporate ethics officer

A _____ provides an organization with vision and leadership in the area of business conduct.

4
New cards

vice

A(n) _____ is a habit of unacceptable behavior.

5
New cards

common good

An approach to ethical decision making that is based on a vision of society as a community whose members work together to achieve a general set of values and goals is the _____ approach.

6
New cards

False

An individual’s manager has very little impact on his or her ethical behavior. True/False

7
New cards

True

Ethics has risen to the top of the business agenda because risks associated with inappropriate behavior have increased, both in their likelihood and in their potential negative impact. True/False

8
New cards

False

Greater globalization has decreased the likelihood of unethical behavior. True/False

9
New cards

social audit

In a(n) _____, an organization reviews how well it is meeting its ethical and social responsibility goals, and communicates its new goals for the upcoming year.

10
New cards

an employer can be held responsible for the acts of its employees even if the employees act in a manner contrary to their employer’s directions.

In the case of United States v. New York Central & Hudson River Railroad Co., the U.S. Supreme Court established that:

11
New cards

stakeholder

Someone who stands to gain or lose, depending on how a situation is resolved is called a _____.

12
New cards

False

The greater reliance of information systems in all aspects of life has decreased the risk that information technology will be used unethically. True/False

13
New cards

code of ethics

A(n) _____ is a statement that highlights an organization’s key ethical issues and identifies the overarching values and principles that are important to the organization and its decision making.

14
New cards

Fraud

_____ is the crime of obtaining goods, services, or property through deception or trickery.

15
New cards

firewall

A _____ is a hardware or software device that serves as a barrier between a company and the outside world and limits access to the company’s network based on the organization’s Internet usage policy.

16
New cards

professional code of ethics

A _____ states the principles and core values that are essential to the work of a particular occupational group.

17
New cards

True

Currently no one IT professional organization has emerged as preeminent, so there is no universal code of ethics for IT workers. True/False

18
New cards

licensed

From a legal perspective, IT workers are not recognized as professionals because they are not _____ by the state or federal government.

19
New cards

False

Government licensing of IT workers is common within most of the states of the United States. True/False

20
New cards

do not meet the legal definition of a professional

In malpractice lawsuits, many courts have ruled that IT workers are not liable for malpractice because they _____.

21
New cards

legislation

In the legal system, compliance usually refers to behavior that is in accordance with _____.

22
New cards

Association for Computing Machinery

The _____ is a computing society founded in 1947 with more than 97,000 student and professional members in more than 100 countries, and it publishes over 50 journals and 30 newsletters.

23
New cards

Business Software Alliance (BSA)

The _____ is a trade group that represents the world’s largest software and hardware manufacturers.

24
New cards

bribe a foreign official

The Foreign Corrupt Practices Act (FCPA) makes it a crime to _____.

25
New cards

True

While no policy can stop wrongdoers, it can establish boundaries for acceptable and unacceptable behavior and enable management to punish violators. True/False

26
New cards

breach of contract

A(n) _____ occurs when a party fails to perform certain express or implied obligations, which impairs or destroys the essence of the contract.

27
New cards

Negligent insiders

_____ are poorly trained and inadequately managed employees who mean well but have the potential to cause much damage.

28
New cards

Spear-phishing

_____ is the sending of fraudulent emails to an organization’s employees designed to look like they came from high-level executives from within the organization.

29
New cards

Hackers

_____ test the limitations of information systems out of intellectual curiosity to see whether they can gain access and how far they can go.

30
New cards

distributed denial-of-service

A _____ attack keeps the target so busy responding to a stream of automated requests that legitimate users cannot get in.

31
New cards
32
New cards

True

A completed risk assessment identifies the most dangerous threats to a company and helps focus security efforts on the areas of highest payoff. True/False

33
New cards

True

An intrusion detection system monitors system and network resources and activities, and notifies the network security when it detects attempts to circumvent the security measures of a networked computer environment. True/False

34
New cards

False

Competitive intelligence is conducted by industrial spies. True/False

35
New cards

True

Employees and contract workers must be educated about the importance of security so that they will be motivated to understand and follow the security policies. True/False

36
New cards

exploit

In computing, a(n) _____ is a term for any sort of general attack on an information system that takes advantage of a particular system vulnerability.

37
New cards

U.S. Computer Emergency Readiness Team

The _____ is a partnership between the Department of Homeland Security and the public and private sectors, established in 2003 to protect the nation’s Internet infrastructure against cyberattacks.

38
New cards

reasonable assurance

The concept of _____ recognizes that managers must use their judgment to ensure that the cost of control does not exceed the system’s benefits or the risks involved.

39
New cards

True

Whenever possible, automated system rules should mirror an organization’s written policies. True/False

40
New cards

collusion

The cooperation between an employee of a company and an outsider to commit fraud against the company is called _____.

41
New cards

False

The U.S. has a single, overarching national data privacy policy. True/False

42
New cards

False

A National Security Letter is subject to judicial review and oversight. True/False

43
New cards

evidence

Discovery is part of the pretrial phase of a lawsuit in which each party can obtain _____ from the other party by various means.

44
New cards

True

Information privacy is the combination of communications privacy and data privacy. True/False

45
New cards

Fallse

American citizens are protected by the Fourth Amendment even when there is no reasonable expectation of privacy. True/False

46
New cards

Privacy Act

The _____ prohibits the government from concealing the existence of any personal data record-keeping systems.

47
New cards

FCC

The Communications Act of 1934 established the _____.

48
New cards

event data recorder

One purpose of a(n) _____ is to capture and record data that can be used by the manufacturer to make future changes to improve vehicle performance in the case of a crash.

49
New cards

True

The Gramm-Leach-Bliley Act includes three key rules that affect personal privacy: financial privacy rule, safeguards rule, and pretexting rule. True/False

50
New cards

False

Under the Right to Financial Privacy Act, a financial institution can release a customer’s financial records without the customer's authorization as long as it is a government authority that is seeking the records. True/False

51
New cards

allows surveillance, without court order, within the United States for up to a year unless the "surveillance will acquire the contents of any communication to which a U.S. person is a party."

The Foreign Intelligence Surveillance Act:

52
New cards

Electronic Communications Privacy Act

Title I of the _____ extends the protections offered under the Wiretap Act to electronic communications, such as fax and messages sent over the Internet.

53
New cards

Gramm-Leach-Bliley Act

Under the _____, financial institutions must provide a privacy notice to each consumer that explains what data about the consumer is gathered, with whom that data is shared, how the data is used, and how the data is protected.

54
New cards

False

A U.S. citizen who posts material on the Web that is illegal in a foreign country cannot be prosecuted in that country. True/False

55
New cards

defamation

The Supreme Court has held that obscene speech and _____ are not protected by the First Amendment and may be forbidden by the government.

56
New cards

A John Doe lawsuit

Which of the following can be used against an anonymous defendant to reveal truths about the defendant's identity?

57
New cards

First

In the United States, speech that is merely annoying, critical, demeaning, or offensive enjoys protection under the _____ Amendment.

58
New cards

FTC

The _____ is charged with enforcing the Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act, and the agency maintains a consumer complaint database relating to the law.

59
New cards

False

Anonymity on the Internet is practically guaranteed. True/False

60
New cards

Remailers

Which of the following can provide a virtually untraceable level of anonymity to email messages?

61
New cards

False

Internet filters cannot block users from accessing useful information.  True/False

62
New cards

True

If an employee sees a coworker viewing porn on a workplace computer, the organization can be sued in a sexual harassment lawsuit. True/False

63
New cards

True

The goal of the Child Online Protection Act (COPA) was to protect children from harmful material on the World Wide Web, however, it was ruled unconstitutional. True/False

64
New cards

California

Miller v. _____ is the Supreme Court case that established a test to determine if material is obscene and therefore not protected by the First Amendment.

65
New cards

True

With dynamic content filtering, each Web site’s content is evaluated immediately before it is displayed, using techniques such as object analysis and image recognition. True/False

66
New cards

False

An oral defamatory statement is libel. True/False