Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Business Ethics
Q:
(p. 164) Discuss vicarious liability and cyberliability. List the top categories of litigation in cyberliability.
Q:
(p. 161) Explain the differences between thin and thick consent.
Q:
(p. 159) Explain the employers' perspective on monitoring employees' activity at the workplace.
Q:
(p. 158) How did the digitizing of information lead to the establishment of call centers in other countries?
Q:
(p. 168) _____ can track an employee's location while he or she moves through the workplace.
Q:
(p. 168) Video surveillance, under federal law, is acceptable where the camera focuses on _____ accessible areas.
Q:
(p. 168) _____, under federal law, is acceptable where the camera focuses on publicly accessible areas.
Q:
(p. 168) _____ can record information that has been typed into a computer using a keyboard even after the information has been deleted.
Q:
(p. 168) _____ can be employed to capture every key pressed on a computer keyboard.
Q:
(p. 168) _____ can intercept, analyze, and archive all communications on a network.
Q:
(p. 166) The _____ argument and the recent availability of capable technology have been driving companies toward creating an Orwellian work environment.
Q:
(p. 164) _____ is a legal concept that holds employers liable for the actions of their employees in their Internet communications to the same degree as if those employers had written those communications on company letterhead.
Q:
(p. 164) The implications of vicarious liability are that the party charged is responsible for the actions of his or her _____.
Q:
(p. 164) Vicarious _____ is a legal concept that means a party may be held responsible for injury or damage even when he or she was not actively involved in an incident.
Q:
(p. 161) According to Adam Moore, if jobs are plentiful and an employee would have no difficulty in finding another position, then the consent given to a company's monitoring policy is _____ consent.
Q:
(p. 161) According to Adam Moore, when an employee consents to being monitored by a company because he or she has no choice, the employee has given _____ consent.
Q:
(p. 161) Advances in technology and the popularity of telecommuting now define the availability of employees by their _____.
Q:
(p. 160) The new capability of _____ has blurred the concept of employees being "at work."
Q:
(p. 160) _____ is a work arrangement that enables employees to log into their company's network via a secure gateway such as a virtual private network.
Q:
(p. 160) ______ refers to the employees' ability to work from home and log into their company's network remotely.
Q:
(p. 158) The ability to send digitized information over _____ led to the establishment of call centers.
Q:
(p. 158) Information can be sent over fiber-optic cables only after it has been _____.
Q:
(p. 158) The _____ is a private piece of a company's network that is made available to customers or vendor partners using secured access with a unique password.
Q:
(p. 158) The _____ is a company's internal website, containing information for employee access only.
Q:
(p. 168) Under federal law, video surveillance is legal only if:
A. the camera focuses on publicly accessible areas.
B. the camera is placed in employee rest areas.
C. the cameras aren't focused on customers.
D. the cameras aren't focused on employees.
Q:
(p. 168) Which of the following is true of keystroke loggers?
A. They can record typed-in information even if it is deleted.
B. They can videotape employees in public areas.
C. They can analyze and archive calls made on personal phones.
D. They can track the movement of employees in the workplace.
Q:
(p. 168) Which of the following is true of the technology used to monitor employees at the workplace?
A. Keystroke loggers can track employees' location while they move through the workplace.
B. Packet-sniffing software can intercept and archive all communications on a network.
C. Cybersquatting software can automatically monitor breaks between receiving calls.
D. "Smart" ID cards can be employed to capture every key pressed on a computer keyboard.
Q:
(p. 167) Which of the following actions does the Computer Ethics Institute consider ethical?
A. Making one's password easily available to coworkers
B. Considering the social consequences of one's work
C. Using corporate software for private use
D. Using pirated software for commercial purposes
Q:
(p. 167) Which of the following actions does the Computer Ethics Institute consider unethical?
A. Logging into one's company's intranet and extranet
B. Enabling cookies on one's own computer
C. Clearing the cache of one's own computer
D. Copying proprietary software without paying for it
Q:
(p. 167) Which of the following is an argument against creating a "locked-down" work environment?
A. Vicarious liability can have serious implications for the employer.
B. Cyberliability can have serious implications for the employer.
C. Employee turnover tends not to affect the company financially.
D. Employees who resent being constrained might leave the company.
Q:
(p. 166) Which of the following explains why employers are in favor of monitoring and restricting the actions of their employees?
A. The implications of vicarious liability for employers
B. The federal restrictions placed upon wiretapping
C. The reluctance of employees to give thick consent
D. The federal restrictions placed on cybersquatting
Q:
(p. 165) Which of the following is true of cyberliability?
A. It extends to any form of harassment that reaches an employee via e-mail.
B. It has no negative repercussions for the employer or the company involved.
C. It only applies to crimes that involve the patrons of commercial Internet cafs.
D. It does not cover categories like racial discrimination, defamation, and libel.
Q:
(p. 165) Cyberliability:
A. does not include harassment that reaches employees' via e-mail.
B. applies the legal concept of liability to the world of computers.
C. is only enforceable in unregistered commercial Internet cafs.
D. does not cover categories like obscenity and pornography.
Q:
(p. 165) The legal concept of _____ holds employers liable for the actions of their employees through Internet communications to the same degree as if they had written those communications on company letterhead.
A. cyberliability
B. cybersquatting
C. hyper-networking
D. virtual-mirroring
Q:
(p. 164) Which of the following is true of parties charged with vicarious liability?
A. They are held responsible for the actions of their subordinates.
B. They are seldom in supervisory or managerial roles.
C. They only comprise the individuals directly responsible for the damage.
D. They only comprise individuals who were the recipients of the damage.
Q:
(p. 164) _____ is a legal concept that means a party may be held responsible for injury or damage even when he or she was not actively involved in an incident.
A. Thin consent
B. Vicarious liability
C. Ratability
D. Thick consent
Q:
(p. 161) Which of the following is true of thick consent?
A. It is given when employees have little or no choice.
B. It is not affected by the state of the job market.
C. It signals that the consent of employees was forced.
D. It is given when employees have realistic job alternatives.
Q:
(p. 161) Andrew is informed by his company that he should be open to monitoring as a part of the company's plans to improve productivity. Because of his qualifications and work experience, he knows that he would have no difficulty finding a similar position in another company. Andrew agrees to the policy, knowing that he can switch jobs if the new policy affects his job satisfaction. He has given his company _____ consent.
A. thick
B. forced
C. thin
D. tertiary
Q:
(p. 161) According to Adam Moore, which of the following is true of thin consent?
A. It is given when the employee has no other choice.
B. It is not dependent upon the state of the job market.
C. It is consent given on behalf of somebody else.
D. It is a form of consent that is not legally binding.
Q:
(p. 161) Michelle receives formal notification from her company, stating that it will be monitoring all her e-mail and web activity. The notification also indicates that her continued employment with the company will depend on her agreement to abide by its monitoring policy. Because jobs are hard to come by, Michelle accepts. She has given the company _____ consent.
A. thick
B. implicit
C. thin
D. tertiary
Q:
(p. 161) According to Adam Moore, the distinction between the two types of consent to employee-monitoringthin and thickis created by _____.
A. the state of the job market
B. cybersquatting
C. the organization's structure
D. wiretapping
Q:
(p. 161) Which of the following is a benefit of telecommuting?
A. Employers find it easy to keep track of the number of hours employees put into a project.
B. Employees cannot be contacted by employers after a company's work hours.
C. Employers cannot request employees to work after a company's work hours.
D. Employees have the flexibility of taking care of their personal needs during work hours.
Q:
(p. 161) Because of the changes that telecommuting has introduced into the work environment:
A. employers find it easy to tabulate the time employees spend working.
B. employees are unable to take care of personal needs during work hours.
C. the availability of employees is being defined by their accessibility.
D. the distinction between personal life and work life is clearly perceived.
Q:
(p. 161) Which of the following is true of telecommuting?
A. It allows employees a certain degree of flexibility in terms of their work hours.
B. It allows employees no flexibility in terms of the locations from which they work.
C. It makes it easier for employers to measure the amount of time employees are on-site.
D. It makes it easier for employers to monitor the Internet activity of their employees.
Q:
(p. 160) _____ has made it difficult for organizations to precisely measure the amount of time that employees are on-site.
A. Keystroke loggers
B. Smart ID cards
C. Telecommuting
D. Packet-sniffing software
Q:
(p. 160) Because of _____, which allows employees to log into their company's network remotely from any location, the concept of being "at work" is blurred.
A. wiretapping
B. hyper-networking
C. telecommuting
D. cybersquatting
Q:
(p. 160) _____ refers to a work arrangement that allows employees to work from home and log into to the company's network remotely.
A. Telecommuting
B. Wiretapping
C. Hyper-networking
D. Cybersquatting
Q:
(p. 160) The argument over privacy at work has traditionally centered on:
A. the designations held by different employees.
B. the amount of time that employees were on-site.
C. whether the organization was vertically structured.
D. whether the organization was horizontally structured.
Q:
(p. 160) Resolving the different perspectives on the issue of monitoring employee activity is difficult because:
A. federal laws for video surveillance in public areas do not exist.
B. technological advances have had no impact on the workplace.
C. it is legal for employers to wiretap employees' personal phones.
D. it is difficult to determine where work ends and personal life begins.
Q:
(p. 159) Because of recent advances in technology, information can be digitized and transmitted over fiber-optic cables. What privacy-related issue does this raise for the customer?
A. Should customers be charged more now that companies can offer them better customer servicing?
B. Should customers be charged less now that companies have ways in which they can reduce production costs?
C. Should customer service be relative to the amount of money customers spend on company products?
D. Should customers be informed that their personal information is being sent to other countries?
Q:
(p. 158) How have advances in technology affected customers?
A. Their personal data can no longer be sent to any part of the world.
B. They have round-the-clock access to customer services.
C. They no longer have access to after-hours tech support services.
D. Their personal data cannot be digitized, thus protecting their privacy.
Q:
(p. 158) Because of recent advances in technology, information can be digitized and transmitted over fiber-optic cables. What implications does this have?
A. Customer services and tech support services are now bound by geographic borders.
B. Companies have fewer ways in which they can attend to the needs of their customers.
C. Customers' personal information can no longer be sent to or processed in other countries.
D. Companies can cut their expenses by shipping work to countries with low labor costs.
Q:
(p. 158) Which of the following is a disadvantage of technological advances in a workplace?
A. Loss of privacy
B. Limited employee mobility
C. Reduced employee accessibility
D. Limited access to customers
Q:
(p. 158) Companies can make vast amounts of information available to customers through their _____ sites.
A. extranet
B. intranet
C. cybernet
D. Ethernet
Q:
(p. 158) Jordan, a software engineer, is responsible for maintaining the private piece of his company's internet network that is accessible to clients by means of a unique password. This piece of the company's network is known as the _____.
A. intranet
B. cybernet
C. extranet
D. Ethernet
Q:
(p. 158) The term "_____" refers to a private piece of a company's Internet network that is made available to customers and/or vendor partners on the basis of secured access by unique password.
A. extranet
B. intranet
C. Ethernet
D. cybernet
Q:
(p. 146-147) Why should whistle-blowing be the last resort?
Q:
(p. 146) What is a whistle-blower hotline? How can an organization ensure that it is effective?
Q:
(p. 144-145) Compare the Whistleblower Protection Act of 1989 and the Sarbanes-Oxley Act of 2002.
Q:
(p. 144) What sort of protection or encouragement were whistle-blowers offered before the Whistleblowers Protection Act of 1989 was enacted?
Q:
(p. 140) Discuss the term whistle-blower. Describe the two types of whistle-blowers.
Q:
(p. 146) For a whistle-blower hotline to work, trust must be established between employees and _____.
Q:
(p. 146) A _____ is a telephone line by which employees can leave messages to alert a company of suspected misconduct without revealing their identity.
Q:
(p. 145) The "Office of the Whistleblower" was created by the _____.
Q:
(p. 145) Under the Dodd-Frank Wall Street Reform and Protection Act, a whistle-blower is entitled to between 10 and 30 percent of the monies collected if more than $_____ is collected.
Q:
(p. 145) The _____ Act of 2010 introduced a new reward program for whistle-blowers who report securities law violations to the Securities and Exchange Commission (SEC) or the Commodity Futures Trading Commission (CFTC).
Q:
(p. 145) The Corporate and Criminal Fraud Accountability Act is also called the _____ Act.
Q:
(p. 145) Under the _____ Act of 2002, congress took an integrated approach to the matter of whistle-blowing by prohibiting retaliation against whistle-blowers and encouraging the act of whistle-blowing.
Q:
(p. 145) The Whistleblower Protection Act of 1989 applied only to _____ employees.
Q:
(p. 144) The _____ Act of 1989 imposed specific performance deadlines in processing whistle-blower complaints and guaranteed the anonymity of the whistle-blower unless revealing the name would prevent criminal activity or protect public safety.
Q:
(p. 144) The _____ Act of 1989 first addressed the issue of retaliation against federal employees who bring accusations of unethical behavior.
Q:
(p. 144) The _____ Act of 1863 was designed to prevent profiteering from the Civil War.
Q:
(p. 142) It is impossible to track the history of _____ whistle-blowing actions since they rarely receive any media attention.
Q:
(p. 141) A _____ is a lawsuit brought on behalf of the federal government by a whistle-blower under the False Claims Act of 1863.
Q:
(p. 141) Under the federal Civil False Claims Act, whistle-blowers who expose fraudulent behavior against the government are entitled to a maximum of _____ percent of the amount recovered.
Q:
(p. 141) The lawsuits brought under the federal Civil False Claims Act establishes a whistle-blower as a deputized petitioner for the _____.
Q:
(p. 141) Under the federal Civil False Claims Act, whistle-blowers are referred to as _____.
Q:
(p. 141) The federal Civil False Claims Act is also known as "_____ Law."
Q:
(p. 140) An _____ whistle-blower is an employee who discovers corporate misconduct and chooses to bring it to the attention of law enforcement agencies and/or the media.
Q:
(p. 140) An _____ whistle-blower is an employee who discovers corporate misconduct and brings it to the attention of his supervisor, who then follows established procedures to address the misconduct within the organization.