Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Business Ethics
Q:
Utilize the knowledge you have gained to respond to the following essay questions. Your answers should state your position and use logical arguments and content from this and other chapters in the textbook to support it.
One of the benefits of technology is that it reduces the amount of labor needed to produce a given number of goods or services. Yet evidence shows that Americans work longer hours now than at any time in our history, and we work more hours than any other country. Discuss the implications of using technology to produce more instead of working less.
Q:
In a coemployment relationship, two employers have actual or potential legal rights and duties with respect to the same employee or group of employees.
a. True
b. False
Q:
Provide a short answer to each of these questions. Be sure to fully explain your answer.
Discuss the benefits and problems associated with labeling genetically modified foods (GMFs).
Q:
After a worker's HÂ1B visa expires, the foreign worker must remain outside the United States for six years before
another H-1B will be approved.
a. True
b. False
Q:
Provide a short answer to each of these questions. Be sure to fully explain your answer.
Some companies involved in biotech research hire bioethicists to monitor the ethical issues raised by their investigations. Can these bioethicists, paid by the firm doing the research, be objective?
Q:
According to the Computing Research Association, the number of undergraduate degrees awarded in computer science at doctoral-granting computer science departments has declined dramatically from 2004 to 2009.
a. True
b. False
Q:
Provide a short answer to each of these questions. Be sure to fully explain your answer.
Evaluate the use of GPS to monitor the activities and locales of employees.
Q:
The United States has several federal laws prohibiting the export of toxic waste.
a. True
b. False
Q:
Provide a short answer to each of these questions. Be sure to fully explain your answer.
Evaluate the Government's involvement in internet privacy protection.
Q:
As more businesses move their key processes offshore, U.S. IT service providers are forced to__________ in order to compete.
Q:
Provide a short answer to each of these questions. Be sure to fully explain your answer.
Why is protection of children an important ethical issue in the use of the Internet?
Q:
Violators of the False Claims Act are liable for__________ times the dollar amount for which the government was defrauded.
Q:
Provide a short answer to each of these questions. Be sure to fully explain your answer.
Evaluate the High Tech/High Touch authors' solution for technological intoxication.
Q:
__________ and language differences can cause misunderstandings among project members in different countries.
Q:
Provide a short answer to each of these questions. Be sure to fully explain your answer.
One of the ways to make judgments about the ethical impacts of technology is to employ prevailing norms of acceptability in determining what is fair and to avoid harm. Provide a critique of using this criterion.
Q:
Personal computers are composed of many different materials known to be potentially harmful to humans and the environment. These materials include beryllium, cadmium, lead, mercury, selenium, polyvinyl chloride, and__________ .
Q:
Provide a short answer to each of these questions. Be sure to fully explain your answer.
Discuss some of the challenges that technology presents to society.
Q:
The False Claims Act provides strong__________ protection.
Q:
Provide a short answer to each of these questions. Be sure to fully explain your answer.
Which of the four categories of technology's undesirable side effects is most worrisome? Why?
Q:
A firm is likely to use contingent IT workers if it experiences pronounced fluctuations in its__________ needs.
Q:
Provide a short answer to each of these questions. Be sure to fully explain your answer.
Consider an anecdote of a woman renting a car in California and being charged a large penalty because she drove out of state. The rental car company had tracked her locales through a global positioning system (GPS), allegedly without telling the woman that they would be doing so. Apparently the woman was upset because she was not told about the GPS. Is the failure to tell her the main issue?
Q:
Organizations often find that it can take years of ongoing effort and a large up-front investment to develop a good __________ with an offshore outsourcing firm.
Q:
The Non GMO Project is:
A.non-profit collaboration of manufacturers, retailers, processors, distributors, farmers, seed companies and consumers
B.mission driven to ensure the lack of non-GMO choices
C.about everyone having limited availability of non-GMO choices
D.about genetically modified foods
Q:
Which of the following statements is true about the Bureau of Labor Statistics forecast for employment between 2010 and 2020?a. Business is facing a long-term excess of trained and experienced IT workers.b. Organizations using IT products and services are concerned about the excess of U.S. workers available to fill IT related positions.c. 750,000 new jobs are expected to be added to IT related positions.d. IT firms are more likely to turn to traditional sources than nontraditional sources to find IT workers.
Q:
The__________ lawsuit dramatically illustrated the cost of misclassifying employees and violating laws that cover compensation, taxes, unemployment insurance, and overtime.a. McClain v. Hewlett-Packardb. Vizcaino v. Microsoftc. Wainwright v. IBMd. Brown et al v. Oracle
Q:
All of the following are technological means by which companies invade consumer privacy except
A.cookies
B.spam
C.botnets
D.facebook
Q:
One of the main issues related to genetically modified foods (GMFs) is
A.whether the federal government will provide research funding.
B.whether the living organism can be patented.
C.labeling requirements.
D.the ability to export and import GMFs.
Q:
The__________ in Egypt reduced the attractiveness of that country as a source of IT outsourcing.a. spike in oil pricesb. political unrestc. limited number of resourcesd. lack of education
Q:
The most basic moral question involved in stem cell research is
A.what constitutes human life.
B.who "owns" the embryo.
C.the use to which the results of the research will be applied.
D.who will benefit from the research.
Q:
Since contingent workers are already specialists in a particular task, the hiring firm does not customarily incur __________ .a. relocation expensesb. start-up costsc. training costsd. travel expenses
Q:
Which of these statements about contingent workers is true?a. They typically work as a separate, independent group of workers and move from project to project working for the same firm.b. They are often paid a lower hourly wage than full-time employees doing equivalent work.c. They are eligible for most company benefits such as vacation, sick pay, and medical insurance.d. They have neither an explicit nor an implicit contract for continuing employment.
Q:
The most significant obstacle to the use of biotechnology is
A.fear that the technology will not work.
B.the potential for public backlash.
C.lack of funds to support research.
D.government requirements for prolonged tests on human subjects.
Q:
After a worker's HÂ1B visa expires, the foreigner must__________ .a. return to school to get an advanced degree before applying for another H-1B visab. apply to become a U.S. citizenc. remain outside the United States for one year before another H-1B petition will be approvedd. never again apply for an H-1B visa
Q:
Bioethics deals with the ethical issues embedded in
A.human and animal cloning.
B.embryonic stem cell research.
C.extraordinary means to prolong life.
D.the use of biotechnology.
Q:
Few applications of biotechnology will come in the fields of
A.health care.
B.sports medicine.
C.pharmaceuticals.
D.agriculture.
Q:
A(n) __________ visa is a temporary work visa granted by the U.S. Citizenship and Immigration Services for people who work in specialty occupations.a. H-1Bb. L-1c. B-1d. B-2
Q:
Describe the advantages and disadvantages of using contingent workers.
Q:
Using biology to discover, develop, manufacture, market, and sell products and services is called
A.bioethics.
B.biotechnology.
C.bionics.
D.bio-commerce.
Q:
All of the following are commandments of computer ethics except
A.Thou shalt not use the company's computer for personal business.
B.Thou shalt not snoop around in other people's computer files.
C.Thou shalt not copy or use proprietary software for which you have not paid.
D.Thou shalt not appropriate other people's intellectual output.
Q:
Briefly discuss the use of hazardous material in computers and the potential risks, for manufacturing employees, suppliers, and users.
Q:
Which of the following is not one of the Ten Commandments of Computer Ethics?
A.Thou shalt not use a computer to harm other people.
B.Thou shalt not use a computer to steal.
C.Thou shalt not use a computer to bear false witness.
D.Thou shalt not use a computer to spy on fellow employees.
Q:
Briefly summarize the Bureau of Labor statistics for employment in the IT industry for the period 2010 to 2020.
Q:
Ways that companies can address issues related to the ethical use of technology include all of the following except
A.management dictate.
B.use of the Information Systems Society's code of ethics.
C.relying on local and federal laws.
D.collaboration between managers and workers.
Q:
Define and briefly discuss the concept of employee leasing.
Q:
A major concern for employers is their workers' use of cell phones
A.to photograph sensitive sales documents.
B.to record private employee records.
C.while driving.
D.to converse with friends, instead of performing their duties.
Q:
Discuss some of the considerations involved in deciding whether or not to hire contingent workers.
Q:
Surveillance and security by use of computer technology got a big boost as a result of
A.lower costs.
B.enhanced resolution of digital photos.
C.relaxation of rules governing international travel.
D.the terrorist attacks of September 11, 2001.
Q:
The__________ was established to promote a common code of conduct for the electronics and communications technology industry.
Q:
Sometimes the__________ is not an employee but a person with special knowledge gained from a position as an auditor or business partner.
Q:
One of the primary reasons that companies check up on their employees is
A.the prevalence of employee theft.
B.concern over revealing trade secrets.
C.lack of worker productivity.
D.the availability of inexpensive technologies.
Q:
To qualify as a truly "green computer", the computer must use less electricity to run than the standard computer, reduce the amount of hazardous materials used, and dramatically increase the amount of__________ .
Q:
The most intensely monitored employee activities are
A.productivity and break times.
B.alcohol and tobacco consumption.
C.e-mail and Internet usage.
D.break times and absenteeism.
Q:
Most ethical companies make hiring decisions based on how well an applicant fulfills the__________ .
Q:
Surveillance of employees has been shown to increase
A.attendance.
B.absenteeism.
C.stress.
D.productivity.
Q:
The qui tam provision of the__________ allows a private citizen to file a suit in the name of the U.S. government, charging fraud by government contractors and other entities who receive or use government funds.
Q:
The major issue related to electronic surveillance is
A.productivity.
B.invasion of privacy.
C.company loyalty.
D.legality.
Q:
Many states have created laws that prevent workers from being fired because of an employee's participation in __________activities including the filing of a qui tam lawsuit under the provisions of the False Claims Act.
Q:
The use of electronic means by a company to watch or monitor its employees is called
A.management.
B.control.
C.surveillance.
D.mentoring.
Q:
Users of technology in the workplace indicate that all of the following are benefits except
A.expanding job-related knowledge.
B.relieving job stress.
C.improving communication with clients and customers.
D.allowing more leisure time.
Q:
The environmental activist organization__________ issues a quarterly ranking of the top manufacturers of personal computers, mobile phones, TVs, and game consoles according to the manufacturers' polices on toxic chemicals, recycling, and climate change.
Q:
Employees typically have a(n) ____ impression of technology's impact in the workplace.
A.positive
B.negative
C.false
D.uninformed
Q:
Offshore outsourcing is a form of outsourcing in which the services are provided by an organization whose__________.
Q:
A technique that lures prey into revealing passwords and other private data by providing a convincing offer is called
A.mining.
B.phishing.
C.data trapping.
D.ultra-collecting.
Q:
Successful outsourcing projects require day-to-day interaction between software development and business teams, so it is essential for the hiring company to take a(n) __________ approach to project management.
Q:
Which of the following is not considered a questionable business practice made possible by the Internet?
A.plagiarism
B.pornography
C.gambling
D.music downloading
Q:
Firms that outsource must take precautions to protect__________ , regardless of where it is stored or processed or who handles it.
Q:
The EICC has established a code of conduct that defines performance, compliance, auditing, and reporting guidelines across five areas of social responsibility: labor, health and safety, environment, management system, and__________
Q:
Developing Internet policies, helping their companies avoid consumer litigation, and handling consumer complaints are all functions of a
A.chief executive officer (CEO).
B.chief operating officer (COO).
C.chief financial officer (CFO).
D.chief privacy officer (CPO).
Q:
Which of the following is not a way that businesses attempt to protect consumers' privacy?
A.ethical leadership
B.privacy policies
C.periodic purges of databanks
D.chief privacy officers
Q:
__________ is a system that enables purchasers to evaluate, compare, and select electronic products based on a total of 51 environmental criteria.
Q:
An extreme concern in the realm of privacy issues is
A.identity theft.
B.DNA duplication.
C.theft of intellectual property.
D.the distinction between "opting in" versus "opting out."
Q:
__________ is the most common charge in qui tam cases.
Q:
One of the most serious invasion of privacy issues with respect to e-commerce is
A.access to pornography sites.
B.downloading copyrighted material.
C.collection and use of personal information.
D.sharing medical information with unauthorized users.
Q:
The__________ , also known as the Lincoln Law, was enacted to combat fraud by companies that sold supplies to the Union Army.
Q:
The number one ethical issue in doing business over the Internet is
A.intellectual property.
B.pornography.
C.possible invasion of privacy.
D.security of financial information.
Q:
An employee who identifies an illegal or unethical practice should begin to compile__________ to establish wrongdoing.
Q:
Privacy and informed consent are issues that
A.are the same whether one is surfing the Web or visiting the local hardware store.
B.are always readily apparent to users of the Internet.
C.are of little importance to consumers of e-commerce.
D.become even more important on the Internet than in brick-and-mortar businesses.
Q:
Because wages in the IT field vary greatly, unethical companies can get around the__________ .
Q:
The__________ passed the Restriction of Hazardous Substances Directive which restricts the use of many hazardous materials in computer manufacturing.
Q:
Copyrighted material, such as songs or poems, are often referred to as
A.e-commerce.
B.legally protected digitals.
C.intellectual property.
D.downloadables.