Chapter 7 Ethics and Information Technology 1. What is the name of the Ritz Carlton program that collects information on its guests in “We Thought You Wanted The Extra Pillow”? a. Ritzview b. Hostlist c. Mystique d. Caritz Answer: c. Mystique 2. Where did an employee capture information pertaining to a guest’s room at the Orlando Peabody? a. in the lobby b. in the bar c. in the guest’s room d. in a bathroom Answer: d. in a bathroom 3. Which hotel is experimenting with using a microchip in the guest room cards to store personal information? a. Marriott b. Ritz Carlton c. Hilton d. Hyatt Answer: c. Hilton 4. What percentage of the respondents of an information technology survey stated they had to fire an employee due to the employee’s misuse of the Internet? a. 12 percent b. 18 percent c. 22 percent d. 26 percent Answer: d. 26 percent 5. What percentage of the respondents of an information technology survey stated they had to fire an employee due to the employee’s misuse of his/her corporate e-mail accounts? a. 5 percent b. 10 percent c. 15 percent d. 25 percent Answer: d. 25 percent 6. What percentage of the respondents of an information technology survey stated they monitored employees’ computer use to determine which web sites employees had selected? a. 51 percent b. 63 percent c. 71 percent d. 76 percent Answer: d. 76 percent 7. What percentage of the respondents of an information technology survey stated they retained and reviewed e-mail messages send and received by their employees? a. 38 percent b. 43 percent c. 49 percent d. 55 percent Answer: d. 55 percent 8. What percentage of the respondents of an information technology survey stated they had a formal e-mail policy in place? a. 80 percent b. 84 percent c. 92 percent d. 96 percent Answer: b. 84 percent 9. . What percentage of the respondents of an information technology stated they used fingerprint scans for security? a. 0 percent b. 2 percent c. 4 percent d. 5 percent Answer: d. 5 percent 10. Phenomenologists believe that: a. doing well is based on the specific set of circumstances pertaining to that issue b. decision makers should observe the behavior of individuals to conclude what is good and ethical behavior c. decision makers need to gather information from multiple sources before a decision can be made d. doing well can only be evaluated if it satisfies the needs of all the critical stakeholders. Answer: a. doing well is based on the specific set of circumstances pertaining to that issue 11. Positivists believe that: a. doing well is based on the specific set of circumstances pertaining to that issue b. decision makers should observe the behavior of individuals to conclude what is good and ethical behavior c. decision makers need to gather information from multiple sources before a decision can be made d. doing good can only be evaluated if it satisfies the needs of all the critical stakeholders Answer: b. decision makers should observe the behavior of individuals to conclude what is good and ethical behavior 12. Collective rule-based ethics corresponds with: a. ethical egoism b. utilitarianism c. Kant’s ethics d. Sidgwick’s dualism Answer: c. Kant’s ethics 13. Collective consequentialist corresponds with the philosophy of: a. Plato b Socrates c. Aristotle d. Thomas Hobbes Answer: c. Aristotle 14. Individual consequentialist corresponds with the philosophy of: a. Adam Smith b. Jeremy Bentham c. John Stuart Mill d. John Locke Answer: a. Adam Smith 15. Which of the following is not a policy area that can address information technology management issues? a. Workers’ Competitiveness b. Intellectual Rights c. Communication Rights d. Data Policy Answer: c. Communication Rights 16. Which of the following is not a management issue for information technology? a. control b. speed c. accuracy d. control Answer: b. speed 17. Capturing, tracking and monitoring information flows is which management issue related to information technology? a. Ownership b. Control c. Accuracy d. Security Answer: b. Control 18. Which of the following is not included in the information technology critical analysis? a. Utilitarian Goal-based Analysis b. Ethical Egoism-based Analysis c. Rights-Based Analysis d. Duty-Based Analysis Answer: b. Ethical Egoism-based Analysis 19. Which of the following analyzes the greatest good to the greatest number of stakeholders? a. Stakeholder analysis b. Utilitarian goal-based analysis c. Common good analysis d. Global good analysis Answer: b. Utilitarian goal-based analysis 20. Which of the following analyzes whether the information technology decision impacts a stakeholder’s individual freedoms? a. Stakeholder analysis b. Utilitarian goal-based analysis c. Rights-based analysis d. Duty-based analysis Answer: c. Rights-based analysis 21. Which of the following analyzes whether the manager is being honest and fair to anyone who is impacted by the decision? a. Stakeholder analysis b. Utilitarian goal-based analysis c. Rights-based analysis d. Duty-based analysis Answer: d. Duty-based analysis 22. What act allows employers to consider employees’ e-mail corporate property? a. Electronic Communications Privacy Act b. Electronic Corporate Privacy Act c. Electronic Control Privacy Act d. Electronic Command Privacy Act Answer: a. Electronic Communications Privacy Act 23. Which of the following is not a benefit of using e-mail? a. cost benefits b. efficiency c. effectiveness d. monitoring Answer: c. effectiveness 24. Which of the following is not a cost of using e-mail? a. frivolous use b. information overload c. transfer of inaccurate information d. offensive communications Answer: c. transfer of inaccurate information 25. Which act regulates telephone monitoring? a. Electronic Tele-Communication Privacy Act b. Electronic Telephone Privacy Act c. Electronic Communications Privacy Act d. Electronic Data Privacy Act Answer: c. Electronic Communications Privacy Act 26. What is information technology related “cookie”? a. Allows employers to monitor e-mail activity b. Allows employers to monitor Internet activity c. Allows a company’s website to gather information about their customers d. The nickname of the centrally controlled computer server Answer: c. Allows a company’s website to gather information about their customers 27. Which of the following is not a tactic that is recommended to protect a customer’s data? a. when you buy items online, pay with a credit card b. pay attention c. use your common sense d. do not trust anyone with your data Answer: d. do not trust anyone with your data 28. In the textbook, which company did not properly protect the data of its customers in 2001? a. Exxon b. Pfizer c. Eli Lilly d. Dupont Answer: c. Eli Lilly 29. Which government act or agency was used to file a compliant against Eli Lilly when they failed to protect the privacy of the customer’s data? a. Electronic Communications Privacy Act b. Electronic Customer Protection Act c. Federal Trade Commission d. Securities and Exchange Commission Answer: c. Federal Trade Commission 30. In the textbook. which company paid a file of $10 million for violating consumer privacy rights? a. Exxon b. Choice Point c. Sears d. Ritz Carlton Answer: b. Choice Point 31. Why was ChoicePoint fined $10 million for violating consumer privacy rights? a. personal information about customers was stolen b. personal information was sold by ChoicePoint without customer authorization c. personal information about customers was illegally available on the firm’s Website d. personal information about customers was e-mailed to other customers Answer: b. personal information was sold by ChoicePoint without customer authorization 32. In the textbook, which company lost customer information when a company computer was stolen? a. Merck b. Fidelity c. Bank of America d. K-Mart Answer: b. Fidelity 33. Which of the following is not an ethical issue facing Internet usage? a. privacy b. plagiarism c. false advertising d. speed Answer: d. speed 34. What percentage of online credit card purchases are fraudulent in Internet retailing? a. 3 percent b. 6 percent c. 11 percent d. 14 percent Answer: c. 11 percent 35. What does WIPO stand for ? a. World Internet Property Organization b. World Intellectual Policing Organization c. World Intellectual Property Organization d. World Internet Policing Organization Answer: c. World Intellectual Property Organization 36. What does the WIPO do? a. protect the copyrights of intellectual property worldwide b. protects customers from receiving fraudulent goods and services c. protects customers from having their information stolen from the Internet d. protects customers from illegal release of personal information from a company Answer: a. protect the copyrights of intellectual property worldwide 37. What Act was passed by U.S. Congress to protect copyrights of intellectual property? a. Electronic Commerce Protection Act b. Digital Millennium Copyright Act c. Global Intellectual Rights Act d. Internet Property Control Act Answer: b. Digital Millennium Copyright Act 38. What year was the Digital Millennium Copyright Act passed? a. 1997 b. 1998 c. 1999 d. 2000 Answer: b. 1998 39. Which of the following is not a type of Internet fraud? a. work at home scheme b. market manipulation scheme c. credit card scheme d. pay to protect your own data scheme Answer: d. pay to protect your own data scheme 40. The use of e-mail to try to mimic a legal legitimate company to obtain personal information is called: a. Copying b. Mimicking c. Phishing d. Cookies Answer: c. Phishing 41. The use of computer technology to commit terrorism crimes is called: a. Internet terrorism b. Electronic terrorism c. Cyber terrorism d. Computer terrorism Answer: c. Cyber terrorism 42. Software that can be loaded unto a computer without the consent of the computer user is called: a. Spyware b. Codeware c. Hiddenware d. Secretware Answer: a. Spyware 43. The USA Patriot Act was passed in: a. 2000 b. 2001 c. 2002 d. 2003 Answer: b. 2001 44. The USA Patriot Act focuses on: a. monitoring US commercial operations in other countries b. electronic monitoring of different types of communications c. Congressional funding for new military technology d. monitoring of US copyrighted material in other countries Answer: b. electronic monitoring of different types of communications 45. The Hyatt hotel was one of the hotels discussed in “We Thought You Wanted The Extra Pillow”. a. True b. False Answer: b. False 46. In the bathroom of the Orlando Peabody, a guest complained about the loud noise coming from another guest’s room. a. True b. False Answer: b. False 47. Over a quarter of the companies that responded to an information technology survey stated they fired an employee for misusing the Internet. a. True b. False Answer: a. True 48. Over three quarter of the companies that responded to an information technology survey stated they monitor employees’ computers to determine which Web sites had been selected. a. True b. False Answer: a. True 49. Over one half of the companies that responded to an information technology survey stated they monitor the amount of time employees spend on the telephone. a. True b. False Answer: a. True 50. Phenomenologists believe that decision makers should observe the behavior of individuals to determine good and ethical behavior. a. True b. False Answer: b. False 51. Positivists believe that doing good is based on a specific set of circumstances. a. True b. False Answer: b. False 52. Collective rule-based ethics is based on the philosophy of Kant’s ethics. a. True b. False Answer: a. True 53. Collective consequentialists based ethics is based on the work of Socrates. a. True b. False Answer: b. False 54. Individual consequentialists based ethics is based on the work of Adam Smith. a. True b. False Answer: a. True 55. Organizing is a management issue in information technology. a. True b. False Answer: b. False 56. Controlling is a management issue in information technology. a. True b. False Answer: a. True 57. Workers’ competitiveness is a policy area for information technology. a. True b. False Answer: a. True 58. Suppliers rights are a policy area for information technology. a. True b. False Answer: b. False 59. Stakeholder analysis is a step in the information technology critical analysis. a. True b. False Answer: a. True 60. Security-based analysis is a step in the information technology critical analysis. a. True b. False Answer: b. False 61. Access to resources is a benefit of using e-mail a. True b. False Answer: a. True 62. Loss of control is a cost of using e-mail. a. True b. False Answer: b. False 63. According to the textbook, one company has electronically tagged their employees to monitor all their movements. a. True b. False Answer: a. True 64. The Electronic Communications Privacy Act allows firms to monitor business related phone calls. a. True b. False Answer: a. True 65. Eli Lilly was fined for violating customer privacy laws by allowing unauthorized access to personal information. a. True b. False Answer: a. True 66. ChoicePlus was charged for selling personal customer information to a third party. a. True b. False Answer: b. False 67. Eleven percent of all retail credit card transactions on the Interest are fraudulent. a. True b. False Answer: a. True 68. WIPO has two treaties that protect the copyrights of intellectual property worldwide. a. True b. False Answer: a. True 69. Phishing is the use of mail to try to mimic a legal, legitimate company to obtain personal information. a. True b. False Answer: a. True 70. Cyberterrorism is the use of computer technology to commit terrorism crimes. a. True b. False Answer: a. True 71. Spyware is software that can be loaded onto a computer so the computer operations can be monitored by an outside party without the consent of the computer user. a. True b. False Answer: a. True 72. The USA PATRIOT Act was passed in a response to the terrorist attack of 9/11. a. True b. False Answer: a. True 73. How does a manager balance the freedom of the employees and the requirement to control their information technology? Answer: This balancing act is a continuous challenge for every manager. It is expected and required that a manager manage his or her assets including the physical and human resources. The manager has a responsibility to his or her supervisor to ensure that no laws or ethical standards have been violated with the use of information technology. However, the manager must also work within the framework of the employee’s rights when determining what types of controls are appropriate for information technology monitoring. 74. What do you think the most critical information technology issue in the future will be for firms? Answer: It could be argued that the most critical information technology issue has to relate to the continuous high level of security of confidential information pertaining to not only the firm’s customer and employees but also proprietary information pertaining to the firm’s competitive advantage. It is expected that rogue outsiders will continue to challenge any and all security systems in place at every firm in the world. As a result, information technology must continue to evolve from a security perspective in order to guarantee the protection of this sensitive information. 75. What should the role of the government be related to information technology issues? Answer: The government will continue to play a critical role in the establishment of the acceptable and appropriate frameworks for information technology issues. The USA PATROIT Act highlights that a government can quickly seize control over areas which some people claim violate their individual rights and freedoms. As a result, governments participating in information technology issues continue to examine the balance between the safety of the majority while still protecting the rights and freedoms of all. Test Bank For Understanding Business Ethics Peter Allen Stanwick, Sarah D. Stanwick 9780131735422, 9788131755365, 9781506303239, 9781452256559
Close