Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Accounting Information Systems Study Set 2
Quiz 11: Computer Crime, Fraud, Ethics, and Privacy
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 1
True/False
The TRW Company Credit Data Case is an example of "valuable information" computer crime.
Question 2
True/False
Many types of computer abuse have other, more common names such as "vandalism" or "embezzlement."
Question 3
True/False
"Shoulder surfing" is a victimless crime.
Question 4
True/False
In Canada, trafficking in passwords is immoral, but not illegal.
Question 5
True/False
Canada passed an important piece of federal legislation referring to criminal activities involving computers in 1987, making it illegal to alter or destroy federal information.
Question 6
True/False
The absence of good statistics on computer crime is partially explained by the fact that a large proportion of the computer crime committed in private organizations is handled as an internal matter and thus is never publicly divulged.
Question 7
True/False
According to the chapter, a computer virus is an example of a type of computer crime called "denial of service."
Question 8
True/False
The largest known computer crime of record is the TRW Company Credit Data Case.
Question 9
True/False
A conflict exists between providing bona fide AIS users easy access to computer resources and security objectives.
Question 10
True/False
We believe that most computer crimes are not discovered.
Question 11
True/False
One conclusion that we can draw about computer crime is that it is growing.
Question 12
True/False
There were less than 200 documented cases of computer crime at the time the textbook was written.
Question 13
True/False
VoIP refers to a type of antivirus software.
Question 14
True/False
Automated accounting information systems are a particularly important potential target of computer crime.
Question 15
True/False
Most computer abuse that we have caught so far has been because of good accounting controls.
Question 16
True/False
It is generally accepted that hackers are motivated only by greed.
Question 17
True/False
In Canada, there is a widely accepted definition of computer crime given by the Canadian Police College.
Question 18
True/False
A paradoxical matter in the TRW Case was that the prosecution had trouble acquiring testimonies because the buyers as well as the sellers of the credit information were technically in violation of the law.