WGU Ethics in Technology Leave the first rating Students also studied Terms in this set (326) Western Governors UniversityD 333 Save WGU D333 Ethics in Technology - W...332 terms DrkintrudrPreview Ethics in Technology WGU 113 terms VeraButlerPreview Ethics in Tech Sec 3 12 terms Xavier_ClidyPreview WGU C 57 terms Chr What is the meaning of ethics in the context of ethical judgment The code of behavior defined by a group an individual belongs to Which two way may advance in technology affect common ethical assumptions?Companies take advantage of their privileged access to personal user data to benefit their shareholders and surveillance allows companies to increase productivity by closely watching their employees behavior A car manufacturer decides to alter its emission testing to pass regulatory requirements. the emission reduction system is only used during tests. the system is not engaged during normal driving conditions in order to improve fuel efficiency, torque, and acceleration. which step in the ethical decision-making process should have been used to evaluate the environmental impact of this decision?Choose Alternatives Which area of ethical concerns in IT deals directly with information ownership?Property Which ethics-related consideration is addressed by the California Online Privacy Protection Act of 2003 and Its amendments?Do not Track Signals Which two aspects of an IT worker's responsibilities involve ethical issues that might arise in the relationship between IT workers and IT users?Discouraging software piracy and Controlling Information sharing Searching for a new position.Prioritization of personal loyalty and Disregard for the professional code of conduct
What is an objective of a professional code of ethics in IT?Provide benchmarks for self-assessment What are the consequences of more lenient bring your own devices (BYOD) policies for IT?Increased productivity and increased vulnerability to data system breaches Which type of cyberattack uses text messages to tick victims into disclosing personal information that can subsequently be exploited for a financial gain?Smishing What is the goal of a white hat hacker in cyberattacks in IT?To identify vulnerabilities of a company's information system to remediate the Which major U.S regulation governs the collection, disclosure, and protection of consumers personally identifiable information (PII) data by companies that provide financial products and services?Gramm-Leach-Bliley Act What is the meaning of morals in the context of ethical judgment?The personal principles that determine what an individual considers to be right or wrong What is the primary used by deontology to evaluate morality of human actions?Duty Which part of the decision-making process involves defining a transition plan?Implementing the decision In response to the pressure from its shareholders, a publicly owned software company plans to implement a strict, globally consistent approach to prevent software piracy of its products that help with implementing green energy solutions. Which impact should be considered from an ethical standpoint due to digital divide?A negative impact on demographics in less-developed countries Which measure of the confidentiality, integrity. and availability (CIA) triad should be used by IT professionals at the organization level to supply validation of non- repudiation regarding data access in IT?Security Audit An IT professional wants the proper credentials and knowledge that is required to collect data from devices affected by cyberattacks to ensure such data would be admissible as evidence in a court of law. Which two certifications should the IT professional obtain?Certified Computer Examiner, EnCase Certified Examiner What are two reasons why professional codes of ethics in IT are important?They Identify the acceptable behaviors for interacting with customers and they identify the unacceptable behaviors for interacting with customers What are two main elements of a professional code of ethics in IT?Core Values and Common Beliefs
Which scenario may create a conflict of interest between IT workers and clients?A consulting firm that provides security is conducting an independent security audit for a company and is recommending remediation methods Which type of guidance is provided by professional codes of ethics within IT?Professional codes of ethics within IT provide the course of action in cases of conflict of interest What are two components of the concept of information privacy?Communication privacy and Data privacy Which aspect of the computer security triad provides guidance when dealing with data accuracy in IT?Integrity How should an IT professional respond to a cyberattack prior to the incident eradication?Preserve evidence and activity logs Which type of attack is a common cause of data-level breaches with global scope?Phishing What should be the primary ethical obligation of an IT professional regarding customer profiling data?Preventing unauthorized data disclosure A security company performs a superficial investigation of a data breach and issues a root cause analysis that unintentionally misses key details about the means to remediate that existing vulnerabilities. it is found that the security company has insufficient expertise.Misrepresentation Charges Which type of ethically dubious but legal approach is used by IT professionals working for marketing companies to profile their customers?Aggregation of personal data volunteered by consumers is used to profile a company's customers Which method is commonly used to obtain personal information about consumers in e-commerce scenarios?Cookies Which two factors contribute to intent censorship in IT? Totalitarian Governments, Dependency on regional providers Which threat is associated with John Doe lawsuits regarding anonymity in IT?Silencing critical speech by using the subpoena power Why is fake news a threat in IT?It is misrepresented as facts, It is driven by ulterior motives Why is hate speech a threat in IT?There are insufficient resources to prescreen online content there is a lack of assumed responsibility for online content posted by others Which two stipulations dictate the obligations of an IT professional regarding data property of a former employer when transitioning form one job to another?Nondisclosure clause, Noncompete agreement
What are the ethical challenges with an IT professional reverse engineering an in-house developed software and a third party-developed software?Only reverse engineering a third party-developed software would be in violation of a professional code of ethics in IT Which two common sources of proxy-based bias introduce ethical challenges associated with artificial intelligence(AI) in IT?Zip Code, School District A Software company wants to assign competitive intelligence tasks to a group of its analysts. Which two actions should be taken to address the potential ethical challenges associated with this scenario?Implement safeguards that prevent industrial espionage, obtain approval form the legal department for data gathering methods Which challenge associated with data overload in IT is addressed with predictive coding?Electronic Discovery of a large volume of documents A company encourages its employees and their families to wear fitness trackers to promote healthy lifestyles and help address the cost of insurance benefits. Which regulation is related to the legal and ethical challenges within this scenario?
HIPPA Children's Online Privacy Protection Act (COPPA) Regulates websites that cater to children FERPA (Family Educational Rights and Privacy Act) Gives parents certain rights to their child's education records CALEA (Communication Assistance for law Enforcement Act) Requires telecommunications industries to build eavesdropping tools into their products HIPPA (Health Insurance Portability and Accountability Act) Federal Law that protects sensitive patient health information What are two implications of using advanced surveillance technologies in public locations from the technical, legal, and ethical standpoints?Diminishing individual privacy, proliferation of stalking apps What are two challenges of using stalking apps from the technical, legal, and ethical standpoints?Selling and buying stalking apps over the internet is not prohibited by law, stalking apps allow for remote activation of the built-in microphone A private company decides to curb cyberloafing by its employees. What are two implications of this decision from the technical, legal and ethical standpoints?Increased privacy rights infringement, decreased legal liabilities What are two technical implications of fake news proliferation?Decreased data accuracy in the public domain, Increased bandwidth usage on the public internet