WGU - Ethics in Technology 2.2 (5 reviews) Students also studied Terms in this set (70) Western Governors UniversityD 333 Save WGU D333 Ethics in Technology - W...332 terms DrkintrudrPreview WGU Ethics in Technology 326 terms James_88_Jackson Preview C961 - Ethics in Technology 70 terms Spice6091Preview Ethics i 50 terms tdu Practice questions for this set Learn1 / 7Study using Learn Many IT professionals feel their privacy is violated when employers use GPS-tracking devices. What describes the employer's point of view?A student makes two copies of a software package that was just purchased and sells one to a friend. How should this student's actions be described?Unethical and illegal Choose an answer 1Legal and Ethical2Unethical and Illegal 3Ethical but Illegal4Unethical and Risky Don't know?
What describes an employee's legal rights when an employer is using an auto-tracking device to monitor the employee's whereabouts?The employer must obtain employee consent before installing an auto-tracking device.Many IT professionals feel their privacy is violated when employers use GPS-tracking devices. What describes the employer's point of view?Legal and Ethical The implementation deadline for a highly visible IT project that will improve global client services is going to be missed due to a data integrity issue. An IT team member from an international country is confident that he has the solution code, but he does not have the resources to the test code. The project leader is receiving a lot of pressure to complete the project.What should this project leader do?Accept the code, test it, and implement the project late How should Charlotte's actions be characterized? illegal and unethical How should Jim's actions be characterized?Illegal and unethical How should the president's actions be addressed? Report to the compliance officer Which regulation is relevant to this video game company's actions with the children users?Children's Online Privacy Protection Act (COPPA) Which action should the programmer take to handle this situation?Contact and inform the FBI and the social media site of the company's activities A cell phone company is conducting a survey to learn more about the demographic and preferences of its current customers. The IT professionals at the company design the survey to be accessible through the customer's mobile phone. Customers can return to the survey data multiple times to update or revise their responses until the survey closes. To access the previously entered data, the customer must enter a one- time log-in code provided by the cell phone company, as well as answer individualized security questions on a secure mobile server.What is this method of conducting a survey an example of?A multistage process to prevent unauthorized access to sensitive data To spy on his girlfriend, a man uses her social security number and her mother's maiden name to reset the online password for her cell phone account. He is then able to enter the account to review her text messages and phone records from the past month of usage.What is this action an example of?misrepresentation
Data collection methods and processes continue to emerge into more industries, fields, and agencies.Meanwhile, the regulations governing the use and sharing of this data continue to evolve. However, data collection is still somewhat new, and there is a tangible gap in the legislation of ethical codes and guidelines to establish clear principles of collection and use.What may providing unrestricted access to consumers' data without protecting each individual's privacy or identity be considered?Unethical and risky Which best practice should help reduce the different ethical problems IT professionals face on a daily basis?Establishing and implementing an acceptable use policy What does the Bathsheba Syndrome refer to?The ethical failure of people in power What is the term for the concept where organizations assimilate social and environmental concerns in their business operations and in their interactions with stakeholders?CSR (Corporate Social Responsibility) According to Aristotle's virtue ethics, what should be the nature of a person who wants to donate something to an orphanage?Generous A person breaks a traffic law in order to get a critically injured man to a hospital. Which decision-making behavior describes this action?Ethical but illegal What is the first step in an ethical decision-making process?Develop a problem statement Why is it important for leaders to understand how technology affects their organization's daily practices?To understand possible legal ramifications What is an example of an IT professional demonstrating a commitment to ethics?An IT professional wants to do a side project for a local business. He checks his employer's company policy handbook first to avoid a conflict of interest.What does PAPA stand for?Privacy, accuracy, property, and access An IT worker uses a company-owned vehicle to transport illegal drugs.How does the use of auto-tracking devices explain the ethical issue in this scenario?An employer can use GPS-tracking data as evidence for the investigation.
An IT professional traveling for a work assignment decides to take a detour for personal business, and due to excessive speed, causes an auto accident.Who is responsible for damages?IT workers who breach the duty of care are accountable for injuries.Which privacy law was violated by these pharmacy employees?
HIPAA What should this IT issue be described as?Lack of internal controls What should this IT issue be described as?Inappropriate sharing How should the actions of the pharmacy employees be characterized?illegal and unethical What can organizations do to assist the sandwich generation in understanding the importance of protecting personal and financial information?Have IT, financial, and medical professionals conduct monthly information sessions for the community What is the source of the data threat in this scenario? Industrial spy How should Jack's actions be characterized?Illegal and unethical What should the novice researcher use to ensure this data is accurate?Sites that promote information accuracy and objectivity The agency the researcher works for has many resources to mine data.What concerns should the researcher have about these resources?Rights and ownership of the data The researcher is not familiar with IT and visits a data site outside of the resources provided by the organization.Within an hour of access, employees are having difficulties performing job duties because their computer is frozen. The IT department identifies the DDoS source and eradicates it.What should the IT department do to avoid this happening again?Develop and maintain a risk management plan Which best practice standard should be enforced to ensure IT personnel are properly trained?Reasonable professional standard What is a risk of saving sensitive consumer data without using encryption and other safe archiving methods?The data could be accessed by hackers.Which part of the security triad was violated in this scenario?Confidentiality