• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

WGU D333 - Ethics in Technology Modules 1-3

Latest WGU Jan 16, 2026 ★★★★☆ (4.0/5)
Loading...

Loading document viewer...

Page 0 of 0

Document Text

WGU D333 - Ethics in Technology Modules 1-3 Leave the first rating Students also studied Terms in this set (56) Social SciencesBusinessBusiness management Save

D352 WGU

Teacher 255 terms lovetolearn5454 Preview ⭕️ Pre-Assessment Review D196 12 terms Sarah-Hokulele Preview D196 Practice Q’s Unit 7 15 terms Megangrishaber Preview WGU D 156 term big Practice questions for this set Learn1 / 7Study using Learn The moral corruption of people in power, which is often facilitated by a tendency for people to look the other way when their leaders act inappropriately.EthicsA code of behavior that is defined by the group to which an individual belongs (Conforms to accepted norms) MoralsThe personal principles upon which an individual bases his or her decisions about what is right and what is wrong (Core individual beliefs) Choose an answer 1Bathsheba Syndrome2Phishing 3Fraud4Galatea Effect Don't know?

VirtueA habit that inclines people to do what is acceptable ViceA habit that inclines people to do what is unacceptable IntegrityActing in accordance with a personal code of principles LawsA system of rules that tells us what we can and cannot do (Legal vs ethical, a law can be ethical or unethical, i.e. illegal can be ethical, etc.) Bathsheba SyndromeThe moral corruption of people in power, which is often facilitated by a tendency for people to look the other way when their leaders act inappropriately.Corporate social responsibility (CSR)The concept that an organization should act ethically by taking responsibility for the impact of its actions on its shareholders, consumers, employees, environment and suppliers StakeholderSomeone who stands to gain or lose depending upon how a particular situation is resolved Corporate ethics officer (AKA corporate compliance officer) Provides an organization with vision and leadership in the area of business conduct and aligns practices of the workplace with stated ethics and beliefs of that workplace Code of ethicsA statement that highlights an organization's key ethical issues and identifies overarching values and principles important to the organization and its decision making principles Problem statementClear, concise description of the issue that needs to be addressed Social auditReview by an organization to see how well it is meeting its ethical and social responsibility goals and communicate new goals for the upcoming year Trade secretInformation generally unknown to the public that a company has taken strong measures to keep confidential Whistle-blowingAn effort by an employee to attract attention to a negligent, illegal, unethical, abusive or dangerous act by a company that threatens public interest Conflict of InterestA conflict between the IT worker's self-interest and the client's interests FraudThe crime of obtaining goods, services, or property through deception or trickery MisrepresentationThe misstatement or incomplete statement of a material fact Breach of contractOccurs when one party fails to meet the terms of a contract Material breach of contractOccurs when a party fails to perform certain express or implied obligations, which impairs or destroys the essence of the contract

BriberyThe act of providing money, property, or favors to someone in business or government in order to obtain a business advantage Internal controlThe process established by an organization's board of directors, managers, and IT systems people to provide reasonable assurance for the effectiveness and efficiency of operations PoliciesGuidelines and standards by which the organization must abide ProcedureDefines the exact instructions for completing each task in a process Separation of dutiesA fundamental part of good internal controls: Creates a need for collusion of two or more parties to accomplish illegal or unethical deeds Foreign Corrupt Practices Act (FCPA)Makes it a crime to bribe a foreign official, a foreign political party official, or a candidate for foreign political office Resume inflationLying on a resume, i.e. claiming competence in an IT skill that is in high demand Body of knowledgeThe core outline of agreed-upon skills and abilities that all licensed professionals must possess in a given field NegligenceNot doing something that a reasonable person would do or doing something that a reasonable person would not do Duty of careObligation to protect people against any unreasonable harm or risk Reasonable person standardUsed to evaluate how an objective, careful and conscientious person would have acted in the same circumstances as a case Reasonable professional standardUsed to evaluate how a competent professional would have acted in the same circumstances as a case Breach of the duty of careThe failure to act as a reasonable person would act Professional malpracticeProfessionals who breach the duty of care ComplianceTo be in accordance with established policies, guidelines, specifications, or legislation Zero-day exploitCyberattack that takes place before the security community and/or developers are aware of the vulnerability BYOD (Bring your own device)Policy that permits or encourages employees to bring their own device to the workplace (increase in vulnerability)

ExploitAn attack on an information system that takes advantage of a particular system vulnerability RansomwareMalware that stops you from using your computer or accessing your data until you meet certain demands (usually financial) VirusA piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner (Spread by human action) WormSimilar to a virus, but duplicates itself and spreads automatically (Spread without human action) Trojan horseA seemingly harmless program in which malicious code is hidden Blended threatA sophisticated threat that combines the features of a virus, worm, trojan horse, and other malicious code into a single payload SpamEmail spam is the use of email systems to send unsolicited email to large numbers of people ranging from low-cost advertising to virus/worm introduction Distributed denial-of-service (DDoS) attackAn attack in which a malicious hacker takes over computers via the internet and causes them to flood a target site with demands for data and other small tasks BotnetA large group of computers taken by hackers and used to perform DDoS attacks (individual computers are called Zombies) RootkitSet of programs that enables its user to gain administrator-level access to a computer without the end user's consent or knowledge Advanced persistent threat (APT)A network attack in which an intruder gains access to a network and stays there, undetected, with the intention of stealing data over a long period of time PhishingAct of fraudulently using email to try to get the recipient to reveal personal data (Spear fishing = targeted fishing, Smishing = texting, Vishing = phone) CyberespionageDeployment of malware that secretly steals data in the computer systems of organizations, such as government agencies, military contractors, political organizations, and manufacturing firms CyberterrorismIntimidation of government of civilian population by using IT to disable critical national infrastructure CIA Security TriadConfidentiality, Integrity, Availability Risk assessmentProcess of assessing security-related risks to an organization's computers and networks from both internal and external threats Security auditEvaluates whether an organization has a well-considered security policy in place and if it is being followed

User Reviews

★★★★☆ (4.0/5 based on 1 reviews)
Login to Review
S
Student
May 21, 2025
★★★★☆

The comprehensive coverage offered by this document enhanced my understanding. A impressive purchase!

Download Document

Buy This Document

$11.00 One-time purchase
Buy Now
  • Full access to this document
  • Download anytime
  • No expiration

Document Information

Category: Latest WGU
Added: Jan 16, 2026
Description:

WGU D333 - Ethics in Technology Modules 1-3 Leave the first rating Students also studied Terms in this set Social SciencesBusinessBusiness management Save D352 WGU Teacher 255 terms lovetolearn5454...

Unlock Now
$ 11.00