Deck 14: IT Ethics, Privacy and Sustainability
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/66
Play
Full screen (f)
Deck 14: IT Ethics, Privacy and Sustainability
1
Which of the following best describes the views and arguments about the consequences of wearing Google Glass?
A)Google Glass is a benefit to society because it improves personal security and safety.
B)Technology is inherently neutral.
C)Google Glass is a danger to society and Google has a responsibility to address this issue.
D)There are diverse views and arguments about the consequences of wearing Google Glass.
A)Google Glass is a benefit to society because it improves personal security and safety.
B)Technology is inherently neutral.
C)Google Glass is a danger to society and Google has a responsibility to address this issue.
D)There are diverse views and arguments about the consequences of wearing Google Glass.
D
2
According to the United Nations Guiding Principles on business and human rights,if Glass distracts drivers and causes traffic accidents,then __________.
A)Google has a responsibility to address this issue and to inform users that there may be social risks from using their products in plain language.
B)Glass users have the social responsibility to not use the device while driving similar to rules about smartphone use while driving.
C)Lawmakers will have greater authority to determine where the driver or tech companies are responsible for social harms.
D)All are true.
A)Google has a responsibility to address this issue and to inform users that there may be social risks from using their products in plain language.
B)Glass users have the social responsibility to not use the device while driving similar to rules about smartphone use while driving.
C)Lawmakers will have greater authority to determine where the driver or tech companies are responsible for social harms.
D)All are true.
A
3
3D-bioprinted human organs may be subject to ________.
A)conflicting healthcare regulations
B)conflicting religious,political,moral,and financial interests
C)skills of bio-engineers
D)technology limitations
A)conflicting healthcare regulations
B)conflicting religious,political,moral,and financial interests
C)skills of bio-engineers
D)technology limitations
B
4
________ are characteristics that have been identified by law that cannot be used in the hiring process.
A)Civil rights
B)Protected classes
C)EEOC practices
D)Negligent hiring
A)Civil rights
B)Protected classes
C)EEOC practices
D)Negligent hiring
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
5
What is a potential disadvantage of social recruiting methods?
A)Increases cost of in-house recruiting
B)Increases candidates' control of their privacy
C)Increases risk of discrimination
D)Increases risk of hiring the wrong person for the job
A)Increases cost of in-house recruiting
B)Increases candidates' control of their privacy
C)Increases risk of discrimination
D)Increases risk of hiring the wrong person for the job
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
6
________ is a claim made by an injured party against an employer who knew or should have known about an employee's background that indicates a dangerous or untrustworthy character.
A)Civil rights
B)Protected class
C)Genome
D)Negligent hiring
A)Civil rights
B)Protected class
C)Genome
D)Negligent hiring
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
7
To the extent that employers conduct a social media background check on job candidates,best practices are all of the following except _________.
A)Use only publicly available information.
B)Have either a third party or a designated person within the company who does not make hiring decisions do the background check.
C)Do not use social media for recruiting purposes.
D)Do not request username or passwords for social media accounts.
A)Use only publicly available information.
B)Have either a third party or a designated person within the company who does not make hiring decisions do the background check.
C)Do not use social media for recruiting purposes.
D)Do not request username or passwords for social media accounts.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
8
According to the National Highway Traffic Safety Administration,at any given moment,more than _________ U.S.drivers are talking on handheld cell phones
A)10 million
B)1 million
C)15.2 million
D)8.5 million
A)10 million
B)1 million
C)15.2 million
D)8.5 million
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
9
A conclusion based on the 2016 Pew Research study about national privacy and security was that ________.
A)30% of adult Americans were worried about the information available about them online
B)49% of the adult Americans studied felt their personal information is less secure than it was five years ago
C)The percentage of Internet users worried about their online privacy had decreased over 4 years.
D)Most Facebook users trusted the site's privacy policies
A)30% of adult Americans were worried about the information available about them online
B)49% of the adult Americans studied felt their personal information is less secure than it was five years ago
C)The percentage of Internet users worried about their online privacy had decreased over 4 years.
D)Most Facebook users trusted the site's privacy policies
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
10
Despite the challenges and lack of clear answers,ethics is important because it has become clear that relying on __________ alone to safeguard the community is insufficient.
A)Corporate policy
B)The law
C)Audit trails
D)Moral behavior
A)Corporate policy
B)The law
C)Audit trails
D)Moral behavior
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
11
Types of risky behaviors of free and paid mobile apps include all of the following except ________.
A)Location tracking
B)Accessing the device's address book or contact list
C)Decrypting messages
D)Sharing data with ad networks and analytics companies
A)Location tracking
B)Accessing the device's address book or contact list
C)Decrypting messages
D)Sharing data with ad networks and analytics companies
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
12
Private content that uninhibited teenagers with bad judgment had posted online ________.
A)will be archived and inaccessible after 12 months
B)is not retained
C)cannot be made to disappear
D)can only be purged by the individual,according to the site's removal procedures
A)will be archived and inaccessible after 12 months
B)is not retained
C)cannot be made to disappear
D)can only be purged by the individual,according to the site's removal procedures
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
13
3D printers can use ________ electricity to produce a part than would have been used to produce the same part by nonadditive manufacturing.
A)Half the
B)Double the
C)10 times more
D)100 times more
A)Half the
B)Double the
C)10 times more
D)100 times more
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
14
Which is not a protected class?
A)Age
B)Education
C)Genetic information
D)Religion
A)Age
B)Education
C)Genetic information
D)Religion
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
15
__________ or sniffing out and mapping the physical location of Wi-Fi routers is a hacking technique,an invasion of privacy,and an information security risk.
A)IP monitoring
B)Spear fishing
C)Wardriving
D)Snooping
A)IP monitoring
B)Spear fishing
C)Wardriving
D)Snooping
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
16
Google's engineers realized the cars could be used for ________ by sniffing out and mapping the physical location of the world's Wi-Fi routers.
A)wardriving
B)mobile hacking
C)snooping
D)drive-by recording
A)wardriving
B)mobile hacking
C)snooping
D)drive-by recording
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
17
Social recruitment refers to use of social media to find,screen,and select job candidates.Often it involves searching information ________.
A)the job candidate did not want considered
B)that is illegal to use in the hiring process
C)that violates the EEOC or SEC
D)A and B
A)the job candidate did not want considered
B)that is illegal to use in the hiring process
C)that violates the EEOC or SEC
D)A and B
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
18
Which statement about privacy in the U.S.is incorrect?
A)A person's privacy is well-protected by laws and regulations,and is based to a minor extent on choices the person has made.
B)Privacy is the right to self-determine what information about you is made accessible,to whom,when,and for what use or purpose.
C)Privacy means we have freedom of choice and control over our personal information,including what we do not want shared with or used by others.
D)Unauthorized disclosure of personal information is normally considered a breach of privacy,although what is unauthorized and what is personal information are matters of dispute,particularly when it is online
A)A person's privacy is well-protected by laws and regulations,and is based to a minor extent on choices the person has made.
B)Privacy is the right to self-determine what information about you is made accessible,to whom,when,and for what use or purpose.
C)Privacy means we have freedom of choice and control over our personal information,including what we do not want shared with or used by others.
D)Unauthorized disclosure of personal information is normally considered a breach of privacy,although what is unauthorized and what is personal information are matters of dispute,particularly when it is online
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
19
The term ________ refers to the phenomenon where social users are concerned about privacy,but their behaviors contradict these concerns to an extreme degree.
A)Facebook fallacy
B)Social denial
C)Privacy paradox
D)Media comfort
A)Facebook fallacy
B)Social denial
C)Privacy paradox
D)Media comfort
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
20
The FCC determined that Google's Street View actions and snooping on unencrypted wireless data were:
A)An unfair advantage
B)Environmentally harmful
C)Spying and intolerable invasions of privacy
D)Not technically illegal
A)An unfair advantage
B)Environmentally harmful
C)Spying and intolerable invasions of privacy
D)Not technically illegal
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
21
Examples of civil rights are each of the following except ________.
A)freedom of the press
B)right to vote
C)right to any speech
D)right to equality in public places
A)freedom of the press
B)right to vote
C)right to any speech
D)right to equality in public places
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
22
There are competing business interests and trade-offs at work when the issue is privacy.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
23
Accenture's Technology Vision 2017 analysis found that seventy-nine percent of survey respondents agree that ____ will revolutionize the way they gain information from and interact with customers.
A)AI
B)ICT
C)IOT
D)GHG
A)AI
B)ICT
C)IOT
D)GHG
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
24
If a workplace violence incident occurred and the attacker's public social networking profile contained information that could have predicted that behavior,the employer may be held liable for ________.
A)Obstruction
B)Civil rights violations
C)Negligent hiring
D)Discrimination
A)Obstruction
B)Civil rights violations
C)Negligent hiring
D)Discrimination
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
25
According to The Climate Group's SMART 2020 Report,transforming the way people and businesses use IT could reduce annual human-generated global emissions by _______ percent by 2020.
A)15
B)5
C)25
D)75
A)15
B)5
C)25
D)75
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
26
________ occurs when the civil rights of an individual are denied or interfered with because of their membership in a particular group or class.
A)Harassment
B)Prejudice
C)Negligent hiring
D)Discrimination
A)Harassment
B)Prejudice
C)Negligent hiring
D)Discrimination
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
27
Accenture's Technology Vision 2017 analysis emphasized that a(n)________ approach to technology will allow organizations to improve performance.
A)data-centric
B)intelligent automation
C)people first
D)information architecture
A)data-centric
B)intelligent automation
C)people first
D)information architecture
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
28
Which is not a step that companies can take to balance the competing risks of negligent hiring and social discrimination?
A)Choose to ignore social network profiles of candidates.
B)Let candidates themselves disclose information found on social media.
C)A consistent and well-documented process is needed to ensure and show compliance if there is an EEO employment investigation.
D)Make sure recruiters do not pressure applicants to disclose protected information via social media by requiring them to disclose passwords or relax privacy settings for purposes of review by the employer.
A)Choose to ignore social network profiles of candidates.
B)Let candidates themselves disclose information found on social media.
C)A consistent and well-documented process is needed to ensure and show compliance if there is an EEO employment investigation.
D)Make sure recruiters do not pressure applicants to disclose protected information via social media by requiring them to disclose passwords or relax privacy settings for purposes of review by the employer.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
29
Canadian Tire enabled its credit card business to create psychological profiles of its cardholders that were built using alarmingly precise correlations.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
30
Predicting people's behavior is big business-and increasingly illegal because of privacy and anti-money laundering laws.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
31
An early flaw in Snapchat allowed the use of simple file browsing tools to locate and save videos that were supposed to "disappear" after a designated period of time.The FTC ruled that Snapchat
A)Had no responsibility to secure these videos
B)Must implement a comprehensive privacy policy that will be independently monitored
C)Could collect contact data from mobile users' address books because it was Apple's responsibility to notify users
D)Must issue notifications to its database of 10 million users
A)Had no responsibility to secure these videos
B)Must implement a comprehensive privacy policy that will be independently monitored
C)Could collect contact data from mobile users' address books because it was Apple's responsibility to notify users
D)Must issue notifications to its database of 10 million users
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
32
The ________ scrutinizes business practices to regulate "unfair and deceptive trade practices."
A)EEOC
B)FFIEC
C)FTC
D)FCC
A)EEOC
B)FFIEC
C)FTC
D)FCC
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
33
________ refers to situations when too much data interferes with our ability to focus and be productive.
A)Electronic static
B)Social stimuli
C)Cognitive overload
D)Antidistraction
A)Electronic static
B)Social stimuli
C)Cognitive overload
D)Antidistraction
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
34
Bioprinting produces 3D biological objects or parts that are highly precise in shape and mechanical complexity.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
35
There are several frameworks provided by the FTC for deciding what is ethical and what is not.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
36
Analysis by consultants McKinsey and Company reveals that the IT sector could double its percent of global emissions by 2020 due to _________.
A)substituting digital formats for paper formats
B)50 billion machine-to-machine connections
C)increased use of tablets,smartphones,apps,and services
D)increased use of real-time analytics
A)substituting digital formats for paper formats
B)50 billion machine-to-machine connections
C)increased use of tablets,smartphones,apps,and services
D)increased use of real-time analytics
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
37
When a Google Street View car encountered an open Wi-Fi network-a non-password-protected router-it recorded all the digital traffic traveling across that router,which the FCC determined was illegal.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
38
Both free and paid third-party mobile apps are regulated by the FTC to protect privacy.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
39
Accenture's Technology Vision 2017 analysis recognized an organizational trend used by leading companies to replace traditional hierarchies with _____________.
A)flattened hierarchies
B)talent marketplaces
C)social media platforms
D)digital ecosystems
A)flattened hierarchies
B)talent marketplaces
C)social media platforms
D)digital ecosystems
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
40
Science today shows that the best strategy to improve focus is to: ____________.
A)Practice multitasking by switching from one thing to another
B)Collaborate,communicate,and create
C)Practice doing it
D)Spend less time online
A)Practice multitasking by switching from one thing to another
B)Collaborate,communicate,and create
C)Practice doing it
D)Spend less time online
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
41
Many people live and work in a state of continuous partial attention as they move through their day-loosely connected to friends and family through various apps on mobile and wearable devices.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
42
Discrimination is biased or prejudicial treatment in recruitment,hiring,or employment based on protected classes characteristics.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
43
3D printers can significantly reduce impacts on the environment than those of standard manufacturing methods.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
44
Private content that uninhibited teenagers with bad judgment posted or sent cannot be made to disappear when they apply for jobs requiring security clearance or intense background checks or run for public office.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
45
In Google's view and business model,the whole purpose of Glass is to wear it responsibly.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
46
We do not live in a world without consequences and boundaries.Yet many people act as though they do,as the privacy paradox points out.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
47
Recruiters learn a great deal of information,all of which they are allowed to use in their decision to interview,recommend,or hire someone from what job candidates post about themselves and through their check-ins and posts.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
48
The legal system is reactive and slower moving that IT-and may not be prepared for upcoming challenges.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
49
__________ is the right to self-determine what information about you is made accessible,to whom,when,and for what use or purpose.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
50
A person's privacy is based to a large extent on what choices that person has made.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
51
The Facebook paradox refers to this phenomenon where social users are concerned about privacy but their behaviors contradict these concerns to an extreme degree.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
52
Several researchers estimate that distraction costs hundreds of billions of dollars a year in lost productivity.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
53
Google's engineers realized the cars could be used for ________ which is also a hacking technique,an invasion of privacy,and an information security risk.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
54
Companies expose themselves to harsh sanctions by federal agencies when they violate the privacy policies that their customers rely upon.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
55
Despite benefits,the medical application of 3D printing to produce living tissue and organs,or 3D __________,is expected to spark major ethical debates
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
56
The __________ refers to this phenomenon where social users are concerned about privacy but their behaviors contradict these concerns to an extreme degree.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
57
Privacy means we have freedom of choice and control over our personal information,including what we do not want shared with or used by others
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
58
Unauthorized disclosure of personal information is normally considered a breach of privacy,because the law clearly defines what is unauthorized and what is personal information.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
59
Discrimination is prejudicial treatment that tends to be easy to prove.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
60
Negligent hiring is a claim made by an injured party against an employer who knew or should have known about an employee's background that indicates a dangerous or untrustworthy character.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
61
How many more things do you check today compared to a year ago? How long can you go without checking your devices without experiencing anxiety? When do you put down your mobiles and concentrate on one thing at a time? Do your answers indicate that you are experiencing digital or connectivity overload?
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
62
Discuss the competing interests and tradeoffs at work when the issue is privacy.In your opinion,why are ethics important when there are numerous civil rights and privacy laws?
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
63
__________ is a claim made by an injured party against an employer who knew or should have known about an employee's background that indicates a dangerous or untrustworthy character.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
64
Explain the principle of privacy.Describe the privacy paradox.Do you agree that a person's privacy is based to a large extent on what choices that person has made? Explain why or why not.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
65
Discuss two technologies that illustrate the trend toward a people first approach to technology.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
66
__________ is a term used in these laws to describe characteristics that cannot be targeted for discrimination and harassment.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck