Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Business Ethics
Q:
Technological advances over the last two decades have made it more difficult to pass the personal data of customers from one place to another.
Q:
The extranet is a part of a company's website which can only be accessed by its senior executives.
Q:
The intranet is a private piece of a company's Internet network that is made available to customers and/or vendor partners on the basis of secured access by a unique password.
Q:
Companies can now make vast amounts of information available to its employees and customers on their Internet, intranet, and extranet sites.
Q:
Workplace technology has changed dramatically over the last two decades.
Q:
Explain how packet-sniffing software and keystroke loggers can be used to monitor employees at the workplace.
Q:
Discuss vicarious liability and cyberliability. List the top categories of litigation in cyberliability.
Q:
Explain the differences between thin and thick consent.
Q:
Explain the employers' perspective on monitoring employees' activity at the workplace.
Q:
How did the digitizing of information lead to the establishment of call centers in other countries?
Q:
_____ can track an employee's location while he or she moves through the workplace.
Q:
Video surveillance, under federal law, is acceptable where the camera focuses on _____ accessible areas.
Q:
_____, under federal law, is acceptable where the camera focuses on publicly accessible areas.
Q:
_____ can record information that has been typed into a computer using a keyboard even if the information is deleted after typing.
Q:
_____ can be employed to capture every key pressed on a computer keyboard.
Q:
_____ can intercept, analyze, and archive all communications on a network.
Q:
The _____ argument and the recent availability of capable technology have been driving companies toward creating an Orwellian work environment.
Q:
_____ is a legal concept that holds employers liable for the actions of their employees in their Internet communications to the same degree as if those employers had written those communications on company letterhead.
Q:
The implications of vicarious liability are that the party charged is responsible for the actions of his or her _____.
Q:
Vicarious _____ is a legal concept that means a party may be held responsible for injury or damage even when he or she was not actively involved in an incident.
Q:
According to Adam Moore, if jobs are plentiful and an employee would have no difficulty in finding another position, then the consent given to a company's monitoring policy is _____ consent.
Q:
According to Adam Moore, when an employee consents to being monitored by a company because he or she has no choice, the employee has given _____ consent.
Q:
Advances in technology and the popularity of telecommuting now define the availability of employees by their _____.
Q:
The new capability of _____ has blurred the concept of employees being "at work."
Q:
_____ is a work arrangement that enables employees to log into their company's network via a secure gateway such as a virtual private network.
Q:
_____ refers to employees' ability to work from home and log into their company's network remotely.
Q:
The ability to send digitized information over _____ led to the establishment of call centers.
Q:
Information can be sent over fiber-optic cables only after it has been _____.
Q:
The _____ is a private piece of a company's network that is made available to customers or vendor partners using secured access with a unique password.
Q:
The _____ is a company's internal website, containing information for employee access only.
Q:
Under federal law, video surveillance is legal only if:
A. the camera focuses on publicly accessible areas.
B. the camera is placed in employee rest areas.
C. the cameras aren't focused on customers.
D. the cameras aren't focused on employees.
Q:
Which of the following statements is true of keystroke loggers?
A. They can record typed-in information even if it is deleted.
B. They can videotape employees in public areas.
C. They can analyze and archive calls made on personal phones.
D. They can track the movement of employees in the workplace.
Q:
Which of the following is true of the technology used to monitor employees at the workplace?
A. Keystroke loggers can track employees' location while they move through the workplace.
B. Packet-sniffing software can intercept and archive all communications on a network.
C. Cybersquatting software can automatically monitor breaks between receiving calls.
D. "Smart" ID cards can be employed to capture every key pressed on a computer keyboard.
Q:
Which of the following actions does the Computer Ethics Institute consider ethical?
A. Making one's password easily available to coworkers
B. Considering the social consequences of one's work
C. Using corporate software for private use
D. Using pirated software for commercial purposes
Q:
Which of the following actions does the Computer Ethics Institute consider unethical?
A. Logging into one's company's intranet and extranet
B. Enabling cookies on one's own computer
C. Clearing the cache of one's own computer
D. Copying proprietary software without paying for it
Q:
What is the reason for the increased monitoring of employees at work by organizations?
A. The evidence gathered from the electronic trail of e-mails from employees can cause potential damage to an organization.
B. The concept of being at work has become far more rigid in the new environment.
C. Organizations have been given the right to monitor every movement of their employees by the federal government.
D. Employers have proved beyond doubt that constant employee surveillance leads to increased worker productivity.
Q:
Which of the following explains why employers are in favor of monitoring and restricting the actions of their employees?
A. The implications of vicarious liability for employers
B. The federal restrictions placed upon wiretapping
C. The reluctance of employees to give thick consent
D. The federal restrictions placed on cybersquatting
Q:
Which of the following is true of cyberliability?
A. It extends to any form of harassment that reaches an employee via e-mail.
B. It has no negative repercussions for the employer or the company involved.
C. It only applies to crimes that involve the patrons of commercial Internet cafs.
D. It does not cover categories like racial discrimination, defamation, and libel.
Q:
The concept of cyberliability:
A. does not include harassment that reaches employees via e-mail.
B. applies the legal concept of liability to the world of computers.
C. is only enforceable in unregistered commercial Internet cafs.
D. does not cover categories like obscenity and pornography.
Q:
The legal concept of _____ holds employers liable for the actions of their employees through Internet communications to the same degree as if they had written those communications on company letterhead.
A. cyberliability
B. cybersecurity
C. hyper-networking
D. virtual-mirroring
Q:
Which of the following statements is true of parties charged with vicarious liability?
A. They are held responsible for the actions of their subordinates.
B. They are seldom in supervisory or managerial roles.
C. They only comprise the individuals directly responsible for the damage.
D. They only comprise individuals who were the recipients of the damage.
Q:
_____ is a legal concept that means a party may be held responsible for injury or damage even when he or she was not actively involved in an incident.
A. Strict liability
B. Vicarious liability
C. Absolute liability
D. Regulatory liability
Q:
Which of the following statements is true of thick consent?
A. It is given when employees have little or no choice.
B. It is not affected by the state of the job market.
C. It signals that the consent of employees was forced.
D. It is given when employees have realistic job alternatives.
Q:
Andrew is informed by his company that he should be open to monitoring as a part of the company's plans to improve productivity. Because of his qualifications and work experience, he knows that he would have no difficulty finding a similar position in another company. Andrew agrees to the policy, knowing that he can switch jobs if the new policy affects his job satisfaction. He has given his company _____ consent.
A. thick
B. implied
C. thin
D. inferred
Q:
Which of the following statements is true of thin consent according to Adam Moore?
A. It is given when an employee has no other choice.
B. It is not dependent upon the state of the job market.
C. It is consent given on behalf of somebody else.
D. It is a form of consent that is not legally binding.
Q:
Michelle receives a formal notification from her company stating that it will be monitoring all her e-mail and web activity. The notification also indicates that her continued employment with the company will depend on her agreement to abide by its monitoring policy. Because jobs are hard to come by, Michelle accepts. The consent given by Michelle can be classified as _____ consent.
A. thick
B. implied
C. thin
D. inferred
Q:
_____ will create a distinction between thin consent and thick consent according to Adam Moore.
A. The state of the job market
B. The capability of telecommuting
C. The promise of increased productivity
D. The implications of vicarious liability
Q:
Telecommuting has changed the work environment in a way that:
A. employers find it easy to keep track of the number of hours employees put into a project off-site.
B. employees cannot be contacted by employers after a company's work hours.
C. employers cannot request employees to work after a company's work hours.
D. employees have begun to expect a level of flexibility in taking care of their personal needs during work hours.
Q:
Which of the following is true of the changes that telecommuting has introduced into the work environment?
A. Employers find it easy to tabulate the time employees spend working.
B. Employees are unable to take care of personal needs during work hours.
C. The availability of employees is being defined by their accessibility.
D. The distinction between personal life and work life is clearly perceived.
Q:
Which of the following statements is true of telecommuting?
A. It allows employees a certain degree of flexibility in terms of their work hours.
B. It allows employees no flexibility in terms of the locations from which they work.
C. It makes it easier for employers to measure the amount of time employees are on-site.
D. It makes it easier for employers to monitor the Internet activity of their employees.
Q:
_____ has made it difficult for organizations to precisely measure the amount of time that employees are on-site.
A. Keystroke loggers
B. Smart ID cards
C. Telecommuting
D. Packet-sniffing software
Q:
Which of the following statements is true of the effects of telecommuting?
A. The concern over loss of privacy has been resolved.
B. The concept of being at work has become more flexible.
C. The promise of increased productivity has become blurred.
D. The ability to monitor every employee has reduced.
Q:
_____ refers to a new capability that allows employees to work from home and log into to their company's network remotely.
A. Telecommuting
B. Wiretapping
C. Hyper-networking
D. Cybersquatting
Q:
The argument over privacy at work has traditionally centered on:
A. the designations held by different employees.
B. the amount of time that employees were on-site.
C. whether the organization was vertically structured.
D. whether the organization was horizontally structured.
Q:
Resolving the different perspectives on the issue of monitoring employee activity is difficult because:
A. federal laws for video surveillance in public areas do not exist.
B. technological advances have no impact on the workplace.
C. it is legal for employers to wiretap employees' personal phones.
D. it is difficult to determine where work ends and personal life begins.
Q:
Information can be digitized and transmitted over fiber-optic cables because of the recent advances in technology. Which ethical obligation of this new capability is now being realized?
A. Should customers be charged more now that companies can offer them better customer servicing?
B. Should customers be charged less now that companies have ways in which they can reduce production costs?
C. Should customer service be relative to the amount of money customers spend on company products?
D. Should customers be informed that their personal information is being sent to other countries?
Q:
The advances in technology have affected customers in a way that:
A. their personal data can no longer be sent to any part of the world.
B. they have round-the-clock access to customer services.
C. they no longer have access to after-hours tech support services.
D. their personal data cannot be digitized, thus protecting their privacy.
Q:
Information can be digitized and transmitted over fiber-optic cables because of the recent advances in technology. What implications does this have?
A. Customer services and tech support services are now bound by geographic borders.
B. Companies have fewer ways in which they can attend to the needs of their customers.
C. Customers' personal information can no longer be sent to or processed in other countries.
D. Companies can reduce their expenses by shipping work to countries with low labor costs.
Q:
Which of the following is a disadvantage of technological advances in a workplace?
A. Loss of privacy
B. Limited employee mobility
C. Reduced employee accessibility
D. Limited access to customers
Q:
Companies can make vast amounts of information available to customers through their _____ sites.
A. extranet
B. intranet
C. cybernet
D. fibernet
Q:
Jordan, a software engineer, is responsible for maintaining the private piece of his company's internet network that is accessible to clients by means of a unique password. This piece of the company's network is known as the _____.
A. intranet
B. cybernet
C. extranet
D. clientnet
Q:
The term _____ refers to a private piece of a company's Internet network that is made available to customers and/or vendor partners on the basis of secured access by unique password.
A. extranet
B. intranet
C. fibernet
D. castanet
Q:
Emily, a website designer, is hired by an organization to create an internal website that contains information meant to be accessed solely by employees. This website is the company's _____.
A. orgonet
B. intranet
C. castanet
D. extranet
Q:
The term _____ refers to a company's internal website that contains information for employee access only.
A. intranet
B. extranet
C. castanet
D. informanet
Q:
Which of the following statements is true of the advances in workplace technology over the last two decades?
A. Companies cannot send personal data of their customers to any part of the world to take advantage of lower labor costs.
B. Companies are now able to make vast amounts of information available to employees and customers.
C. Companies are facing the issue of maintaining a flexible work environment.
D. Companies cannot monitor their employees to identify the rate of productivity.
Q:
Video surveillance, under federal law, is acceptable where the camera focuses on publicly accessible areas.
Q:
Keystroke loggers can only capture information that is not deleted.
Q:
Packet-sniffing software can be used to monitor employees' private accounts, as long as they are accessed on workplace networks or phone lines.
Q:
Employee turnover, a long-term effect of monitoring employees, costs organizations thousands of dollars in recruitment costs and training.
Q:
Computer ethics extends to considering the social consequences of the program being written and ensuring that your work doesn't harm people.
Q:
Using a computer to appropriate the intellectual output of another person is an example of ethical employee behavior.
Q:
Copying and distributing unpaid proprietary software is not a violation of computer ethics.
Q:
With employers being able to monitor every keystroke on a computer, track every website visited, and record every call made by employees, the workplace is beginning to display Orwellian characteristics.
Q:
The categories of litigation for cyberliability extend to defamation and libel.
Q:
Cyberliability results in litigation for harassment through spam, obscenity, and pornography.
Q:
Cyberliability applies the existing legal concept of liability to the field of computers.
Q:
According to the legal concept of cyberliability, employers can be held liable for the actions of their employees through Internet communications to the same degree as if they had written those communications on company letterhead.
Q:
Parents can be charged with vicarious liability for the actions of their children.
Q:
The implications of vicarious liability are that the party charged is responsible for the actions of his or her subordinates.
Q:
Parties charged with vicarious liability are never in a supervisory role over the person or parties personally responsible for the injury or damage.