Two programmers disagree about which philosophical theory is best suited for their autonomous vehicles. One programmer suggests their vehicle should
... [Show More] always choose the greatest good for the greatest number of people.
Which philosophical theory encapsulates this stance?
Utilitarianism
What is the difference between ethics and morals?
Ethics reflect a societal code of behavior, whereas morals reflect personal principles.
An IT company holds itself accountable for how its actions affect its shareholders, consumers, employees, community, the environment, and suppliers.
What is this company demonstrating?
Corporate social responsibility
A homeowners' association (HOA) installs license plate readers after an increase in reported crime in the neighborhood. Two domestic workers petition the HOA, requesting that their data be deleted to protect their privacy. The HOA considers this but denies their request, citing the greater need for security protection for residents.
Which ethical theory does this represent?
Consequentialism
A developer creates video games based on real war scenarios and designs characters that mimic real people from world events. The video game has content perceived as excessively violent and rewards players who inflict the most harm on other players' virtual characters. The developer knows that these are simulated acts that depict real war scenarios to create an immersive experience for players but is concerned about the impact on their moral character.
Which ethical theory does this situation represent?
Virtue
A project team at an animal welfare agency is using predictive analytics to help take animals out of abusive environments. The algorithm the team designed has a false positive rate that is higher than zero, which means that some animals could be removed erroneously if the algorithm's recommendations are followed. The project owner understands that pets may wrongfully be removed from loving healthy homes but decides to use the algorithm anyway because it will happen only a small percentage of the time.
Which ethical theory does this represent?
Consequentialism
A software sales company is currently struggling with low sales. The company is aware that one of its competitor's senior sales managers is dissatisfied with the competitor due to having been overlooked for a promotion to the position of a vice president (VP). The company approaches the sales manager and offers them a position as VP for sales on the condition of bringing the manager's existing customer list and contacts to the new role. The sales manager is bound by a noncompete clause.
Which type of decision-making process did the company follow?
Unethical and illegal
A municipality decides to use the data it has on household water usage to build an algorithm that can identify welfare fraud. This would result in a list of potential fraudsters that could be used to make welfare decisions. Although the municipality is the rightful owner and processor of the data, citizens have raised privacy issues with the application. The citizens object that they have no way of knowing whether they are on the list and have no possibility of redress if they are.
Which decision-making process did the municipality follow?
Legal but unethical
The marketing department of a financial services institution asks data scientists to build a consumer profile based on transaction data. Although company lawyers approve the request to explicitly signal customers with potential gambling addiction problems, the data scientists refuse to build the profiles.
What describes this request?
Unethical and legal
Which ethical concept is related to the right to use a person's or an organization's intangible creative activities?
Property
An IT company that specializes in software development has an organizational structure that consists of a chief executive officer, chief ethics officer, chief finance officer, and chief operating officer.
Which of these executives provides the company with vision and leadership in business conduct?
Chief ethics officer
What is a reason for organizations to pursue corporate social responsibility (CSR) goals?
Gain goodwill
A police department employee has access to data related to an ongoing investigation. A local politician whom the employee supports has come under investigation. The employee accesses the data relating to the investigation and provides the file to the politician anonymously.
How should this behavior be classified?
Corruption
An IT manager implements security measures at the organization, network, application, and employee levels.
Which approach to security is the manager using?
Layered
A new startup tech company plans to provide secure wireless access within its office for employees and other trusted visitors. The company has concerns about competitors eavesdropping or compromising the connections and obtaining unauthorized access to the company's intellectual property. The company is considering using Wireless Protected Access 2 (WPA2) to secure data in transit.
Which protocol does this wireless protection implement?
Advanced Encryption Standard (AES)
A Federal Bureau of Investigation (FBI) agent monitors a telephone conversation between a 12-year-old child and the child's stepfather. The monitoring is part of a criminal investigation. A warrant was not obtained prior to commencement of the monitoring.
Which law or regulation did the agent violate?
Wiretap Act
A U.S. company launched an e-commerce platform in the European Union (EU). The board of directors raised concerns about compliance with applicable privacy regulations and the collection of customer information.
Which regulation applies to this scenario?
General Data Protection Regulation
A social media website collected personal information about consumers when they subscribed to the service. Subscribers opted in or out before creating their online profiles.
Which European Union Data Protection Directive did the website follow?
Choice
A company is engaged as a third party to perform debt collection on behalf of a telecommunications provider. The company operates an outbound call center to contact debtors and set up payment arrangements. The company needs to ensure that the debtors' data privacy is not at risk.
Which two areas should the company ensure are properly managed?
Insider access/Network security
A company is using software to track workforce operational activity. Management communicates that the data collected will be treated as sensitive. Administrative and technical security measures are put in place to protect employee data. These measures include periodically culling records that are no longer relevant.
Which additional measure should be taken to safeguard employee data from misuse?
Limit who can view employee data
A retail company experiences a data breach. Customer data is stolen, including credit card numbers, names, addresses, and account passwords. The attackers have amassed enough combinations of personally identifiable information (PII) to commit identity theft.
Which adverse impacts, in addition to the loss of business, does the company face?
Reputational damage and the need to provide support for victims
An attending physician at a local hospital receives an email with a link that appears to be from a neighboring clinic. When the physician clicks the link, computers throughout the hospital freeze, and patient information can no longer be accessed. A message appears demanding payment of five bitcoins within 48 hours to decrypt the hospital database and threatening that without payment, all information will be deleted.
Which type of exploit is this?
Ransomware
What is the cause of the rise in computer-related security issues, particularly among small- and medium-sized businesses?
Bring your own device policies
A company is notified of a breach of its systems. An investigation reveals that although no financial information was taken, the customer records for all its customers, including names, email addresses, and passwords, may have been taken. Although it is uncertain whether the records were taken, evidence suggests that the intruders accessed the database containing the information. The investigation team indicates that, given six weeks, they will be able to identify what, if anything, has been taken.
Which action should the company take?
Notify all customers that there may have been a data breach [Show Less]