Deck 14: Privacy and Ethical Considerations in Information Management

ملء الشاشة (f)
exit full mode
سؤال
"Who owns information?" and "What are the just and fair prices for its exchange?" are part of which ethical issue?

A) Privacy
B) Accuracy
C) Ownership
D) Property
E) Accessibility
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
All of the following are examples of green computing EXCEPT:

A) Virtualization
B) Cloud computing
C) Tidal powered servers
D) Server workloads moved to off-peak hours
E) Cookies
سؤال
In 2014, Cambridge Analytica scraped preferences, locations, and friends of 50 million Facebook users, meaning it:

A) Redirected users to its Web site.
B) Targeted advertisements.
C) Collected user passwords.
D) Captured from screen displays.
E) Sold personal data to third parties.
سؤال
Which type of "cookies" enables a user to stay logged to a site and keeps your shopping cart intact as you click from page to page?

A) Essential
B) Non-essential
C) Location
D) Widget
E) None of the above.
سؤال
A manager who primarily focuses on the shareholders of the corporation rather than all of the vested parties in the businesses operations and activities is practicing which theory of normative business ethics?

A) Stakeholder theory
B) Investor theory
C) Stockholder theory
D) Shareholder theory
E) Social contract theory
سؤال
The question "What information does a person or an organization have a right or a privilege to obtain?" is part of this ethical issue.

A) Privacy
B) Accuracy
C) Accessibility
D) Perfection
E) Property
سؤال
The chapter contends that Internet companies are in business for the money and hence they really would prefer to keep their customers in the dark about how their personal data is being used to generate profits. Assuming this statement is true, with which ethical theory would you say these Internet companies are most aligned?

A) Stockholder theory
B) Stakeholder theory
C) Property theory
D) Fiduciary theory
E) Normative theory
سؤال
Which act of 1996 is designed to safeguard the electronic exchange of patient records in the health care industry?

A) SoX
B) HIPAA
C) IETF
D) COBIT
E) PAPA
سؤال
Information privacy guidelines should come from what level in a company?

A) CEO and top-level executives
B) Middle management
C) Employees
D) Federal regulations
E) State laws
سؤال
Questions like "Who is responsible for the reliability of information?" and "Who will be accountable for errors in the information?" are part of which ethical issue?

A) Privacy
B) Accuracy
C) Authenticity
D) Perfection
E) Purpose
سؤال
TJX's handling of its serious data breach is consistent with which one of the following?

A) Stakeholder theory
B) Stockholder theory
C) Social normative
D) Social contract theory
E) Corporate social responsibility
سؤال
Which normative theory of business ethics would TJX have displayed if it had informed customers as soon as the breach was corrected and told other retailers how to prevent future security breaches?

A) Stakeholder
B) Stockholder
C) Social contract
D) Investor
E) Corporate social responsibility
سؤال
Which of the following is a text message that is stored on a user's computer by a Web server that helps trace the user's browsing habits?

A) Script
B) Cookie
C) Id theft
D) Firewall
E) Data file
سؤال
Which theory of normative business ethics seeks to create value for people in a manner that is just and nondiscriminatory?

A) Stakeholder theory
B) Investor theory
C) Social contract theory
D) Shareholder theory
E) Stockholder theory
سؤال
Green computing is often associated with supporting the triple bottom line, known as:

A) Economic, environmental, and social
B) Stockholder, stakeholder, and society
C) People, Privacy, and Property
D) Google, Facebook, and Microsoft
E) Data, information, and knowledge
سؤال
Today's managers must ensure that information about their employees and customers is only available to those who have a right to see it and use it, an issue referred to as:

A) Screening
B) Accuracy
C) Accessibility
D) Perfection
E) Property
سؤال
What term is used to describe ethical dilemmas that arise with the development and application of IT?

A) Stockholder theory
B) PAPA principles
C) Information ethics
D) Normative theories
E) IT dilemmas
سؤال
In today's digital word, individuals can control their privacy through choice, ______ , and correction.

A) Protection
B) Consent
C) Property
D) Communication
E) Consideration
سؤال
In 2018, the European Union enacted what legislation to set standards for the collection, storage, and processing of personal information?

A) General Data Protection Regulation
B) Safe Harbor Regulation
C) PAPA framework
D) Property Harbor framework
E) Fair Credit Reporting
سؤال
Google Flu Trends aggregates personal search data in order to estimate world-wide flu activity. Google's site has drawn criticism due to the sharing of users' online behavior without getting their consent. This, in essence, violates the user's right to:

A) Privacy
B) Property
C) Accuracy
D) Accessibility
E) Identity
سؤال
The social contract theory is made up of two distinct components: social welfare and _________.
سؤال
In today's digital word, individuals can control their privacy through ______, consent, and correction.
سؤال
Unlike the European Union, the U.S. has no general legislature ensuring Internet privacy rights. Instead, the U.S. encourages self-regulation and has introduced industry-specific regulations as needed.
سؤال
Target found out a teenager was pregnant by (1) ________ and revealed that fact to her dad by (2) _______

A) (1) Overhearing the teen in the store; (2) Calling her dad
B) (1) Her purchases of diapers; (2) sending an official letter to the dad
C) (1) Her purchases of unscented soap, cotton balls, and vitamins; (2) mailing her some ads for diapers and maternity clothes
D) (1) Her sudden elation when visiting the children's department; (2) sending a video of her tears of happiness in that department
E) None of the above
سؤال
In an exercise at a 2017 hacker conference, attendees were able to breach voting machines in under 2 hours.
سؤال
The four areas, as outlined in the text, that deal with control of information are____________ ,____________ , ____________, and .
سؤال
Research shows that despite concerns about privacy, most users don't actually alter their online behavior.
سؤال
Those who possess the "best" information and know how to use it, win.
سؤال
Green computing benefits _____ which is sometimes referred to as "People, Planet, Profit".
سؤال
In 2017, Target was breached and the private information of 147.7 people in the United States was taken.
سؤال
The Stakeholder theory requires managers to pursue projects in ways that are compatible with the well-being of society.
سؤال
____________is an example of U.S. legislature designed to ensure the privacy and protection of information for a specific industry.
سؤال
Over time it becomes easier to maintain the accuracy of information.
سؤال
Using the____________ theory, some content that if that third party mines the data and derives valuable insights, the fruits of that data mining legitimately belong to the third party.
سؤال
An Internet web site that wishes to abide by fair privacy practices will do all of the following EXCEPT:

A) Allow the consumer the choice to participate in the site or not
B) Post policies about how personal information gathered from consumers will be used
C) Afford the consumer the opportunity to view and contest the accuracy of the data collected
D) Secure collected consumer information
E) All of the above
سؤال
Explain how green computing can satisfy each of the three normative theories of business ethics.
سؤال
Green computing is a passing phase and will likely be less strategic to companies in the very near future.
سؤال
____________term is used to define energy-efficient computing resources.
سؤال
____________is a growing service designed to help individuals and companies clean up their online presence so that a search for their name produces favorable results.
سؤال
"Digital natives" are uncomfortable building relationships on the Internet because they understand the consequences of sharing information publicly.
سؤال
Provide an example of a company that has faced a dilemma reconciling their corporate policies within a country where it hopes to operate.
سؤال
Match the situation below with the area of information control it falls under.
 Privacy  A Web site seeks detailed infornation about  your farnily, you do not feel that this  information is in aryy way relevart to your  usage of the Web site’s services.  Accuracy  You have been the victim of a barking emor.  The error was corrected. Regardless, it appears  on your credit report and your credit rating is  terrible, impacting your ability to get a loarn  Property  You believe that by contributing online to one  non-profit your personal infornation has been  shared with several other non-profit  orgarnizations that you are not farniliar with.  Accessibility  A friend indicates that his log in allows hirn to  seenot just his prades but also all student  grades. \begin{array} { | l | l | } \hline \text { Privacy } & \begin{array} { l } \text { A Web site seeks detailed infornation about } \\\text { your farnily, you do not feel that this } \\\text { information is in aryy way relevart to your } \\\text { usage of the Web site's services. }\end{array} \\\hline \text { Accuracy } & \begin{array} { l } \text { You have been the victim of a barking emor. } \\\text { The error was corrected. Regardless, it appears } \\\text { on your credit report and your credit rating is } \\\text { terrible, impacting your ability to get a loarn }\end{array} \\\hline \text { Property } & \begin{array} { l } \text { You believe that by contributing online to one } \\\text { non-profit your personal infornation has been } \\\text { shared with several other non-profit } \\\text { orgarnizations that you are not farniliar with. }\end{array} \\\hline \text { Accessibility } & \begin{array} { l } \text { A friend indicates that his log in allows hirn to } \\\text { seenot just his prades but also all student } \\\text { grades. }\end{array} \\\hline\end{array}
سؤال
Match each normative theory of business ethics to its primary objective.
 Stakeholder  Balarice the rights and interests of all those who  hold a claim on the firm  Stockholder  Legally increase profits and maximize  shareholder value  Social contract  Create value for society \begin{array} { | l | l | } \hline \text { Stakeholder } & \begin{array} { l } \text { Balarice the rights and interests of all those who } \\\text { hold a claim on the firm }\end{array} \\\hline \text { Stockholder } & \begin{array} { l } \text { Legally increase profits and maximize } \\\text { shareholder value }\end{array} \\\hline \text { Social contract } & \text { Create value for society } \\\hline\end{array}
سؤال
Bradley Manning, a U.S. intelligence officer, took over 500,000 documents from the U.S. State Department and gave them to a public Web site called Wikileaks for publication. These documents were far ranging in their content. Match the actions below with the failure to control and the misuse of sensitive information.
 Property  Even though the dociments were made available on the  site Wikileaks, the U.S. State Department still holds that  the docunents are classified and under their regulation.  Accessibility  Marning was allowed to log into a database of classified  infomation No one monitored his retrieval of  infamation that was outside the scope of his duties.  Privacy  The U.S. State Department acknowledges that personal  comments and assessments of foreign leaders revealed  in some documents were strictly for the pupose of U.S.  diplomacy. \begin{array} { | l | l | } \hline \text { Property } & \begin{array} { l } \text { Even though the dociments were made available on the } \\\text { site Wikileaks, the U.S. State Department still holds that } \\\text { the docunents are classified and under their regulation. }\end{array} \\\hline \text { Accessibility } & \begin{array} { l } \text { Marning was allowed to log into a database of classified } \\\text { infomation No one monitored his retrieval of } \\\text { infamation that was outside the scope of his duties. }\end{array} \\\hline \text { Privacy } & \begin{array} { l } \text { The U.S. State Department acknowledges that personal } \\\text { comments and assessments of foreign leaders revealed } \\\text { in some documents were strictly for the pupose of U.S. } \\\text { diplomacy. }\end{array} \\\hline\end{array}
سؤال
Match the U.S. legislative/regulatory act with the industry for which it governs the control of information.
 Sarbarnes-Oxley Act  Publicly held cornpanies  HIPAA  Health insurance companies  and health care providers  Grarnrn-Leach-Bliley Act  Financial institutions  1974 Privacy Act  Government agencies  Fair Credit Reporting Act  Consuner reporting agencies \begin{array} { | l | l | } \hline \text { Sarbarnes-Oxley Act } & \text { Publicly held cornpanies } \\\hline \text { HIPAA } & \begin{array} { l } \text { Health insurance companies } \\\text { and health care providers }\end{array} \\\hline \text { Grarnrn-Leach-Bliley Act } & \text { Financial institutions } \\\hline \text { 1974 Privacy Act } & \text { Government agencies } \\\hline \text { Fair Credit Reporting Act } & \text { Consuner reporting agencies } \\\hline\end{array}
سؤال
Give reasons why users are so willing to forgo privacy on the Internet.
سؤال
Match the critical question with the information control issue it addresses.
 Privacy  Can the infonnation be used for puposes other  than those for which it was initially captured?  Privacy  Can the infonnation provided be used to  identify personal preferences or history even if  the provider doesn’t want it known?  Accuracy  Who is accountable for errors in the  infornation?  Property  Who owns the infornation?  Accessibility  What infornation does an orgarization have the  right to obtain?  Accessibility  Does the person retrieving the infornation  "need to know" the infornation that is being  retrieved? \begin{array} { | l | l | } \hline \text { Privacy } & \begin{array} { l } \text { Can the infonnation be used for puposes other } \\\text { than those for which it was initially captured? }\end{array} \\\hline \text { Privacy } & \begin{array} { l } \text { Can the infonnation provided be used to } \\\text { identify personal preferences or history even if } \\\text { the provider doesn't want it known? }\end{array} \\\hline \text { Accuracy } & \begin{array} { l } \text { Who is accountable for errors in the } \\\text { infornation? }\end{array} \\\hline \text { Property } & \text { Who owns the infornation? } \\\hline \text { Accessibility } & \begin{array} { l } \text { What infornation does an orgarization have the } \\\text { right to obtain? }\end{array} \\\hline \text { Accessibility } & \begin{array} { l } \text { Does the person retrieving the infornation } \\\text { "need to know" the infornation that is being } \\\text { retrieved? }\end{array} \\\hline\end{array}
سؤال
Match the managerial control concern with the challenges a manager may face on a regular basis.
 Privacy  Surveillance of employees to ensure productivity  and utilization  Property  Agpregating customer data and providing it to a  marketing firm for a fee  Accessibility  Giving employees improper riphts to view other  employee’s personal data  Accuracy  Holding on to outdated customer records \begin{array} { | l | l | } \hline \text { Privacy } & \begin{array} { l } \text { Surveillance of employees to ensure productivity } \\\text { and utilization }\end{array} \\\hline \text { Property } & \begin{array} { l } \text { Agpregating customer data and providing it to a } \\\text { marketing firm for a fee }\end{array} \\\hline \text { Accessibility } & \begin{array} { l } \text { Giving employees improper riphts to view other } \\\text { employee's personal data }\end{array} \\\hline \text { Accuracy } & \text { Holding on to outdated customer records } \\\hline\end{array}
سؤال
How does the European Union approach data protection differently than the United States?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/49
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 14: Privacy and Ethical Considerations in Information Management
1
"Who owns information?" and "What are the just and fair prices for its exchange?" are part of which ethical issue?

A) Privacy
B) Accuracy
C) Ownership
D) Property
E) Accessibility
D
2
All of the following are examples of green computing EXCEPT:

A) Virtualization
B) Cloud computing
C) Tidal powered servers
D) Server workloads moved to off-peak hours
E) Cookies
E
3
In 2014, Cambridge Analytica scraped preferences, locations, and friends of 50 million Facebook users, meaning it:

A) Redirected users to its Web site.
B) Targeted advertisements.
C) Collected user passwords.
D) Captured from screen displays.
E) Sold personal data to third parties.
D
4
Which type of "cookies" enables a user to stay logged to a site and keeps your shopping cart intact as you click from page to page?

A) Essential
B) Non-essential
C) Location
D) Widget
E) None of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
5
A manager who primarily focuses on the shareholders of the corporation rather than all of the vested parties in the businesses operations and activities is practicing which theory of normative business ethics?

A) Stakeholder theory
B) Investor theory
C) Stockholder theory
D) Shareholder theory
E) Social contract theory
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
6
The question "What information does a person or an organization have a right or a privilege to obtain?" is part of this ethical issue.

A) Privacy
B) Accuracy
C) Accessibility
D) Perfection
E) Property
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
7
The chapter contends that Internet companies are in business for the money and hence they really would prefer to keep their customers in the dark about how their personal data is being used to generate profits. Assuming this statement is true, with which ethical theory would you say these Internet companies are most aligned?

A) Stockholder theory
B) Stakeholder theory
C) Property theory
D) Fiduciary theory
E) Normative theory
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
8
Which act of 1996 is designed to safeguard the electronic exchange of patient records in the health care industry?

A) SoX
B) HIPAA
C) IETF
D) COBIT
E) PAPA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
9
Information privacy guidelines should come from what level in a company?

A) CEO and top-level executives
B) Middle management
C) Employees
D) Federal regulations
E) State laws
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
10
Questions like "Who is responsible for the reliability of information?" and "Who will be accountable for errors in the information?" are part of which ethical issue?

A) Privacy
B) Accuracy
C) Authenticity
D) Perfection
E) Purpose
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
11
TJX's handling of its serious data breach is consistent with which one of the following?

A) Stakeholder theory
B) Stockholder theory
C) Social normative
D) Social contract theory
E) Corporate social responsibility
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
12
Which normative theory of business ethics would TJX have displayed if it had informed customers as soon as the breach was corrected and told other retailers how to prevent future security breaches?

A) Stakeholder
B) Stockholder
C) Social contract
D) Investor
E) Corporate social responsibility
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
13
Which of the following is a text message that is stored on a user's computer by a Web server that helps trace the user's browsing habits?

A) Script
B) Cookie
C) Id theft
D) Firewall
E) Data file
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
14
Which theory of normative business ethics seeks to create value for people in a manner that is just and nondiscriminatory?

A) Stakeholder theory
B) Investor theory
C) Social contract theory
D) Shareholder theory
E) Stockholder theory
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
15
Green computing is often associated with supporting the triple bottom line, known as:

A) Economic, environmental, and social
B) Stockholder, stakeholder, and society
C) People, Privacy, and Property
D) Google, Facebook, and Microsoft
E) Data, information, and knowledge
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
16
Today's managers must ensure that information about their employees and customers is only available to those who have a right to see it and use it, an issue referred to as:

A) Screening
B) Accuracy
C) Accessibility
D) Perfection
E) Property
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
17
What term is used to describe ethical dilemmas that arise with the development and application of IT?

A) Stockholder theory
B) PAPA principles
C) Information ethics
D) Normative theories
E) IT dilemmas
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
18
In today's digital word, individuals can control their privacy through choice, ______ , and correction.

A) Protection
B) Consent
C) Property
D) Communication
E) Consideration
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
19
In 2018, the European Union enacted what legislation to set standards for the collection, storage, and processing of personal information?

A) General Data Protection Regulation
B) Safe Harbor Regulation
C) PAPA framework
D) Property Harbor framework
E) Fair Credit Reporting
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
20
Google Flu Trends aggregates personal search data in order to estimate world-wide flu activity. Google's site has drawn criticism due to the sharing of users' online behavior without getting their consent. This, in essence, violates the user's right to:

A) Privacy
B) Property
C) Accuracy
D) Accessibility
E) Identity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
21
The social contract theory is made up of two distinct components: social welfare and _________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
22
In today's digital word, individuals can control their privacy through ______, consent, and correction.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
23
Unlike the European Union, the U.S. has no general legislature ensuring Internet privacy rights. Instead, the U.S. encourages self-regulation and has introduced industry-specific regulations as needed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
24
Target found out a teenager was pregnant by (1) ________ and revealed that fact to her dad by (2) _______

A) (1) Overhearing the teen in the store; (2) Calling her dad
B) (1) Her purchases of diapers; (2) sending an official letter to the dad
C) (1) Her purchases of unscented soap, cotton balls, and vitamins; (2) mailing her some ads for diapers and maternity clothes
D) (1) Her sudden elation when visiting the children's department; (2) sending a video of her tears of happiness in that department
E) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
25
In an exercise at a 2017 hacker conference, attendees were able to breach voting machines in under 2 hours.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
26
The four areas, as outlined in the text, that deal with control of information are____________ ,____________ , ____________, and .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
27
Research shows that despite concerns about privacy, most users don't actually alter their online behavior.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
28
Those who possess the "best" information and know how to use it, win.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
29
Green computing benefits _____ which is sometimes referred to as "People, Planet, Profit".
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
30
In 2017, Target was breached and the private information of 147.7 people in the United States was taken.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
31
The Stakeholder theory requires managers to pursue projects in ways that are compatible with the well-being of society.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
32
____________is an example of U.S. legislature designed to ensure the privacy and protection of information for a specific industry.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
33
Over time it becomes easier to maintain the accuracy of information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
34
Using the____________ theory, some content that if that third party mines the data and derives valuable insights, the fruits of that data mining legitimately belong to the third party.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
35
An Internet web site that wishes to abide by fair privacy practices will do all of the following EXCEPT:

A) Allow the consumer the choice to participate in the site or not
B) Post policies about how personal information gathered from consumers will be used
C) Afford the consumer the opportunity to view and contest the accuracy of the data collected
D) Secure collected consumer information
E) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
36
Explain how green computing can satisfy each of the three normative theories of business ethics.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
37
Green computing is a passing phase and will likely be less strategic to companies in the very near future.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
38
____________term is used to define energy-efficient computing resources.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
39
____________is a growing service designed to help individuals and companies clean up their online presence so that a search for their name produces favorable results.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
40
"Digital natives" are uncomfortable building relationships on the Internet because they understand the consequences of sharing information publicly.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
41
Provide an example of a company that has faced a dilemma reconciling their corporate policies within a country where it hopes to operate.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
42
Match the situation below with the area of information control it falls under.
 Privacy  A Web site seeks detailed infornation about  your farnily, you do not feel that this  information is in aryy way relevart to your  usage of the Web site’s services.  Accuracy  You have been the victim of a barking emor.  The error was corrected. Regardless, it appears  on your credit report and your credit rating is  terrible, impacting your ability to get a loarn  Property  You believe that by contributing online to one  non-profit your personal infornation has been  shared with several other non-profit  orgarnizations that you are not farniliar with.  Accessibility  A friend indicates that his log in allows hirn to  seenot just his prades but also all student  grades. \begin{array} { | l | l | } \hline \text { Privacy } & \begin{array} { l } \text { A Web site seeks detailed infornation about } \\\text { your farnily, you do not feel that this } \\\text { information is in aryy way relevart to your } \\\text { usage of the Web site's services. }\end{array} \\\hline \text { Accuracy } & \begin{array} { l } \text { You have been the victim of a barking emor. } \\\text { The error was corrected. Regardless, it appears } \\\text { on your credit report and your credit rating is } \\\text { terrible, impacting your ability to get a loarn }\end{array} \\\hline \text { Property } & \begin{array} { l } \text { You believe that by contributing online to one } \\\text { non-profit your personal infornation has been } \\\text { shared with several other non-profit } \\\text { orgarnizations that you are not farniliar with. }\end{array} \\\hline \text { Accessibility } & \begin{array} { l } \text { A friend indicates that his log in allows hirn to } \\\text { seenot just his prades but also all student } \\\text { grades. }\end{array} \\\hline\end{array}
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
43
Match each normative theory of business ethics to its primary objective.
 Stakeholder  Balarice the rights and interests of all those who  hold a claim on the firm  Stockholder  Legally increase profits and maximize  shareholder value  Social contract  Create value for society \begin{array} { | l | l | } \hline \text { Stakeholder } & \begin{array} { l } \text { Balarice the rights and interests of all those who } \\\text { hold a claim on the firm }\end{array} \\\hline \text { Stockholder } & \begin{array} { l } \text { Legally increase profits and maximize } \\\text { shareholder value }\end{array} \\\hline \text { Social contract } & \text { Create value for society } \\\hline\end{array}
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
44
Bradley Manning, a U.S. intelligence officer, took over 500,000 documents from the U.S. State Department and gave them to a public Web site called Wikileaks for publication. These documents were far ranging in their content. Match the actions below with the failure to control and the misuse of sensitive information.
 Property  Even though the dociments were made available on the  site Wikileaks, the U.S. State Department still holds that  the docunents are classified and under their regulation.  Accessibility  Marning was allowed to log into a database of classified  infomation No one monitored his retrieval of  infamation that was outside the scope of his duties.  Privacy  The U.S. State Department acknowledges that personal  comments and assessments of foreign leaders revealed  in some documents were strictly for the pupose of U.S.  diplomacy. \begin{array} { | l | l | } \hline \text { Property } & \begin{array} { l } \text { Even though the dociments were made available on the } \\\text { site Wikileaks, the U.S. State Department still holds that } \\\text { the docunents are classified and under their regulation. }\end{array} \\\hline \text { Accessibility } & \begin{array} { l } \text { Marning was allowed to log into a database of classified } \\\text { infomation No one monitored his retrieval of } \\\text { infamation that was outside the scope of his duties. }\end{array} \\\hline \text { Privacy } & \begin{array} { l } \text { The U.S. State Department acknowledges that personal } \\\text { comments and assessments of foreign leaders revealed } \\\text { in some documents were strictly for the pupose of U.S. } \\\text { diplomacy. }\end{array} \\\hline\end{array}
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
45
Match the U.S. legislative/regulatory act with the industry for which it governs the control of information.
 Sarbarnes-Oxley Act  Publicly held cornpanies  HIPAA  Health insurance companies  and health care providers  Grarnrn-Leach-Bliley Act  Financial institutions  1974 Privacy Act  Government agencies  Fair Credit Reporting Act  Consuner reporting agencies \begin{array} { | l | l | } \hline \text { Sarbarnes-Oxley Act } & \text { Publicly held cornpanies } \\\hline \text { HIPAA } & \begin{array} { l } \text { Health insurance companies } \\\text { and health care providers }\end{array} \\\hline \text { Grarnrn-Leach-Bliley Act } & \text { Financial institutions } \\\hline \text { 1974 Privacy Act } & \text { Government agencies } \\\hline \text { Fair Credit Reporting Act } & \text { Consuner reporting agencies } \\\hline\end{array}
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
46
Give reasons why users are so willing to forgo privacy on the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
47
Match the critical question with the information control issue it addresses.
 Privacy  Can the infonnation be used for puposes other  than those for which it was initially captured?  Privacy  Can the infonnation provided be used to  identify personal preferences or history even if  the provider doesn’t want it known?  Accuracy  Who is accountable for errors in the  infornation?  Property  Who owns the infornation?  Accessibility  What infornation does an orgarization have the  right to obtain?  Accessibility  Does the person retrieving the infornation  "need to know" the infornation that is being  retrieved? \begin{array} { | l | l | } \hline \text { Privacy } & \begin{array} { l } \text { Can the infonnation be used for puposes other } \\\text { than those for which it was initially captured? }\end{array} \\\hline \text { Privacy } & \begin{array} { l } \text { Can the infonnation provided be used to } \\\text { identify personal preferences or history even if } \\\text { the provider doesn't want it known? }\end{array} \\\hline \text { Accuracy } & \begin{array} { l } \text { Who is accountable for errors in the } \\\text { infornation? }\end{array} \\\hline \text { Property } & \text { Who owns the infornation? } \\\hline \text { Accessibility } & \begin{array} { l } \text { What infornation does an orgarization have the } \\\text { right to obtain? }\end{array} \\\hline \text { Accessibility } & \begin{array} { l } \text { Does the person retrieving the infornation } \\\text { "need to know" the infornation that is being } \\\text { retrieved? }\end{array} \\\hline\end{array}
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
48
Match the managerial control concern with the challenges a manager may face on a regular basis.
 Privacy  Surveillance of employees to ensure productivity  and utilization  Property  Agpregating customer data and providing it to a  marketing firm for a fee  Accessibility  Giving employees improper riphts to view other  employee’s personal data  Accuracy  Holding on to outdated customer records \begin{array} { | l | l | } \hline \text { Privacy } & \begin{array} { l } \text { Surveillance of employees to ensure productivity } \\\text { and utilization }\end{array} \\\hline \text { Property } & \begin{array} { l } \text { Agpregating customer data and providing it to a } \\\text { marketing firm for a fee }\end{array} \\\hline \text { Accessibility } & \begin{array} { l } \text { Giving employees improper riphts to view other } \\\text { employee's personal data }\end{array} \\\hline \text { Accuracy } & \text { Holding on to outdated customer records } \\\hline\end{array}
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
49
How does the European Union approach data protection differently than the United States?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.