Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Business Ethics
Q:
The Fourth Amendment of the Constitution protects right of the people to be secure in their persons, houses, papers, and effects, against__________ .
Q:
In order to operate with a true stakeholder perspective, firms must accept the multiple bottom line view.
Q:
Companies must always deal with risks.
Q:
Spammers can defeat the registration process of free email services by launching a coordinated__________ attack that can sign up for thousands of untraceable email accounts.a. distributed denial-of-serviceb. botc. CAPTCHAd. logic bomb
Q:
Research has indicated that improvements in corporate social performance are associated with improved financial results.
Q:
In integrity strategy, ethics is _____ .A) a line of businessB) a driving forceC) often overlookedD) disregarded by company leaders
Q:
The__________ protects against unreasonable search and seizure.a. Fourth Amendmentb. Fifth Amendmentc. Wiretap Actd. Pen Registers and Trap and Trace Devices Statute
Q:
One of the biggest advances in corporate social performance is that the performance criteria for measuring financial performance and social responsibility have been agreed upon.
Q:
"If it's legal, it's ethical" is _____ .A) always correct B) always incorrect C) an accurate sloganD) a problematic slogan
Q:
A survey done by Walker Information shows that the public thinks that CSR factors impact a company's reputation even more than its quality, service, and price do.
Q:
The fundamental problem with trying to detect a rootkit is that the operating system cannot be trusted to provide __________.a. valid test resultsb. correct system login idsc. the correct date and timed. sufficient memory for operations
Q:
In the early 1990's, employees of Sears Auto Centers _____ .A) were not properly trained in the repair of autosB) acted as independent contractorsC) faced pressures to produce higher salesD) helped restore the company's image
Q:
The corporate social performance concept has not yet spread to the business community.
Q:
__________is the abuse of email systems to send unsolicited email to large numbers of people. a. A botnet b. Spam c. Logic bombing d. A worm
Q:
Lynn Sharp Paine believes businesses should foster climates that encourage _____ .A) leniencyB) exemplary behaviorC) compliance-oriented behaviorD) patterned behavior
Q:
According to the 2010/11 CSI Computer Crime and Security Survey, malware infection incidents were the most common security incident.a. Trueb. False
Q:
Carroll's Corporate Social Performance Model helps managers understand that social responsibility is separate and distinct from financial performance.
Q:
Frank believes that the proper resolution of ethical dilemmas in business often involves _____ .A) direct compensationB) antagonizing competitors C) anonymous punishment D) higher costs
Q:
Corporate social performance emphasizes the financial results of what the firm hopes to accomplish.
Q:
The security of any system or network is a combination of technology, policy, and people and requires a wide range of activities to be effective. a. True b. False
Q:
Robert Frank draws parallels between _____ .A) business practices and game theoryB) socialism and evolutionC) one-shot transactions and defectionsD) cooperation and equilibrium
Q:
Corporate social responsiveness is focused on the action phase of management response to social demands.
Q:
The cost to repair the worldwide damage done by a computer worm has exceeded $1 billion on more than one occasion.a. Trueb. False
Q:
Milton Friedman believed that each business's responsibility was to increase _____ .A) money supplyB) product distributionC) its profitsD) customer outreach
Q:
A "public good" is _____ .A) permanentB) a demonstration of private propertyC) government propertyD) something we all generally benefit from
Q:
Computer viruses differ from worms in that viruses can propagate without human intervention, often sending copies of themselves to other computers by email.a. Trueb. False
Q:
Proponents of the concept of corporate social responsiveness believe that the focus of corporate social responsibility on accountability or obligation is not dynamic enough to describe business's willingness and activity to respond to social demands.
Q:
An argument for corporate social responsibility is that it helps business compete in the global economy.
Q:
Mutual confidence in certain rules of behavior typically is _____ .A) implicit B) skeptical C) explicitD) multinational
Q:
Smart and talented hackers who are technically inept are referred to as lamers or script kiddies by more skilled hackers.a. Trueb. False
Q:
The Fifth Amendment regulates the collection of the content of wire and electronic communications.a. Trueb. False
Q:
Ivermectin is a drug that can treat _____ .A) AIDSB) River blindnessC) LeprosyD) Typhus
Q:
Arguments against corporate social responsibility tend to focus on the ethical category.
Q:
The CSR Pyramid is a stakeholder model--that is, each of its components addresses different stakeholders.
Q:
Nozick is a socialist.
Q:
Briefly describe how educating employees and contract workers is a critical part of implementing trustworthy computing.
Q:
Nozick believes that whether a distribution is just depends upon how it came about.
Q:
In practical terms, the socially responsible firm must be a good corporate citizen.
Q:
State the purpose of an IT security audit and briefly discuss the key elements of such an audit.
Q:
Identify and briefly discuss four reasons why the number, variety, and impact of security incidents is increasing.
Q:
For Nozick, justice cannot allow the free transfer of holdings.
Q:
In Carroll's four-part definition of corporate social responsibility, ethical responsibilities are required of business by society.
Q:
The company town, in which a major employer builds homes and commercial buildings, and provides the goods and services needed by its employees, is an example of paternalistic social responsibility.
Q:
Nozick believes the minimal state is the least extensive state that can be justified.
Q:
Identify safeguards that should be implemented to protect against attacks by malicious insiders.
Q:
Rawls assumes that a just society is likely to be a constitutional democracy.
Q:
Philanthropy is the term by Adam Smith in Wealth of Nations to describe the operation of self interest resulting in the good of society.
Q:
Define computer forensics and briefly describe how one may prepare for a role as a computer forensics investigator.
Q:
The marketplace in the classical view of economics, while being a good allocator of goods and services, does not do a good job of ensuring that business always acts fairly and ethically.
Q:
Rawls believes justice can never exist with inequality.
Q:
The__________ leads the federal government's efforts in "securing civilian government computer systems, and works with industry and state, local, tribal, and territorial governments to secure critical infrastructure and information systems."
Q:
A society more satisfied with corporate social responsiveness, performance, and citizenship will invariably have reduced criticism of business.
Q:
Distribution is an enumerated principle of justice for Rawls.
Q:
The process of assessing securityÂrelated risks from both internal and external threats to an organization's computers and networks is called __________.
Q:
Because of the sheer member, and specificity of special interest groups, the groups often
A.collaborate with each other to achieve common goals.
B.sabotage each other's efforts to attain their goals.
C.work at cross-purposes.
D.collude to see that their common interests are emphasized.
Q:
__________ is a method of computing that delivers secure, private, and reliable computing experiences based on sound business practices.
Q:
John Rawls is a social contract theorist.
Q:
Working on an offshore oil rig can be dangerous.
Q:
Carrying the idea of a pluralistic society to an extreme leads to
A.anarchy.
B.totalitarian government.
C.a special-interest society.
D.a free market economy.
Q:
Debit and credit cards which contain a memory chip that is updated with encrypted data every time the cards are used are called __________.
Q:
Angola is a wealthy country.
Q:
The sheer numbers of relationships that business has with other segments of society indicate the ____ of its social environment.
A.simplicity
B.size
C.divisiveness
D.complexity
Q:
Hacking to achieve a political or social goal is known as __________.
Q:
Nozick uses the person of Wilt Chamberlain in his example. Wilt Chamberlain was a famous _____ .A) basketball playerB) musicianC) actorD) jockey
Q:
Which of the following is not a weakness of pluralism?
A.prevention of concentrations of power
B.pursuit of self-interest
C.overlapping goals, causing confusion about which groups best serve particular interests
D.emphasis on conflict
Q:
People who use illegal means to obtain trade secrets from a competitor are called __________.
Q:
Strengths of pluralism include all of the following except
A.pursuit of self-interest.
B.prevention of concentrations of power.
C.a built-in set of checks and balances.
D.maximization of freedom of expression.
Q:
The__________ encourages private industry to share confidential information about the nation's critical infrastructure with the Department of Homeland Security under the assurance that the information will be protected from public disclosure.
Q:
According to Nozick, if the government wanted an equal distribution of goods to always be the case, it would have to _____ .A) prevent transfer by individualsB) reward the unjustC) distribute items once a yearD) be in favor of utility
Q:
Decentralization and diversity of power concentrations leads to
A.anarchy.
B.a totalitarian society.
C.a pluralistic society.
D.democracy.
Q:
__________ is legally obtained information gathered using sources available to the public.
Q:
Nozick posits that justice in holdings does not include which of the following?
A) Original acquisition of holdings
B) Transfer of holdings
C) Secondary or repeated transfer of holdings
D) Permanent equality of assets
Q:
Technology-based advancements and progress in the applied sciences that help achieve a practical purpose is part of a firm's
A.social environment.
B.political environment.
C.economic environment.
D.technological environment.
Q:
The cooperation between an employee of a company and an outsider to commit fraud against the company is called __________ .
Q:
Rawls believes in _____ .A) utilitarian ethicsB) social contract theoryC) economic ethicsD) natural ethics
Q:
The processes by which laws are enacted and government officials are elected are part of the
A.social environment.
B.economic environment.
C.political environment.
D.technological environment.
Q:
Rawls argues that utility runs counter to _____ .A) libertyB) economyC) justiceD) philosophy
Q:
An employee who seeks to disrupt his firm's information systems or to use them to seek financial gain is called a(n) __________ .
Q:
Gross national product, inflation, interest rates, and unemployment rates are included in a firm's
A.social environment.
B.economic environment.
C.political environment.
D.technological environment.
Q:
The__________ Act addresses the disclosure of stored wired and electronic communications and transaction records by Internet service providers.