Chapter 7 IT Ethics, Crime and Privacy. Quiz Instructions 1.Print your name (first and last) on a...

22
Chapter 7 IT Ethics, Crime and Privacy
  • date post

    18-Dec-2015
  • Category

    Documents

  • view

    216
  • download

    1

Transcript of Chapter 7 IT Ethics, Crime and Privacy. Quiz Instructions 1.Print your name (first and last) on a...

Chapter 7

IT Ethics, Crime and Privacy

Quiz Instructions

1. Print your name (first and last) on a blank sheet of paper

2. Print date and class day and class start time

3. Write the question number and the answer letter as a minimum. Answer ALL questions.

4. Example:1. A

2. B

4. You have 5 minutes

Quiz on Chapter 7

1. What is environmentally sensible computing known as?(a) Ecological (b) Nature’s (c) Blue (d) Green

2. Attention to the overall workplace design can reduce stress and increase worker performance. (a) True (b) False

3. Your personal data cannot be passed from one organization to another without your consent. (a) True (b) False

4. A denial of service virus places high demands on: (a) backup capabilities, (b) hackers, (c) server resources, (d) vaccine research

Objectives

Societal impact of information and information technology

Identify terms and issues relating to proper and legal use of software, including privacy, licenses, copyright, and related concerns

Discuss issues of monitoring related to individual use of the computer and your employer

Explain the meaning of terms related to computer security and crime

Recognize ergonomic and environmental concerns of your workplace and the definitions of related terms

Identify ways to protect yourself and your information

Why this chapter is important to you!

Understanding certain issues when dealing with computers will make you more sensitive to ethical concerns

Everyday issues need to be understood in order to minimize problems, such as: Health Theft Abuse

Green Computing Green computing –

Environmentally sensible computing Energy STAR guidelines – ensure energy- efficient PCs, monitors, and printers Consider technology during and after its useful life

© 2005 Prentice-Hall, Inc.

The Workplace- Ergonomics Ergonomics –

study of relationships between people and technology

Carpal tunnel syndrome

Presentations

Personal Information Workplace monitoring Computer Crimes

Software Definitions Worms, Viruses, etc Phishing, pharming and spam Identity theft

Ethics

PrivacyHow Did They Get My Data?

The Privacy of Personal Information Violating the privacy of personal information

Cookie –

Computer monitoring –

© 2005 Prentice-Hall, Inc.

Computer and IT Crime Areas of computer and IT criminal activity

Negligence or incompetence

© 2005 Prentice-Hall, Inc.

Computer and IT CrimeCrimes that involve the theft of software or intellectual property

Software piracy – making illegal copies of software

© 2005 Prentice-Hall, Inc.

Computer and IT Crime Site license – allows a company to

install software on more than one computer Pilferage – when a company does not

buy a site license, but performs multiple installs

Identify Theft

Check your credit reports once a year Don’t put your SSN or drivers license number on your

checks Be suspicious of telephone solicitors Delete suspicious email requests http://

www.idtheftcenter.org/html/prevention_tips.htm for more tips and to check your risk level

Many recent examples of company data being compromised

PhishingSuspicious transaction. Please advise. We recently received a request from our Payment Processor

- VeriSign Inc, to put an Exception Payment on transaction id #02608771RES motivated by their Geographical Tracking System.

Nevertheless, this is a computer controled system and it may have flaws. So we only ask a couple of moments from your time, to clarify this situation. Ignoring this message could cause serious consequences.

If you agree that this is a fraudulent transaction, please answer us to clarify this issue.

Lesson Summary Identify terms and issues relating to proper and legal use

of software, including privacy, licenses, copyright, and related concerns

Discuss issues of monitoring related to individual use of the computer and your employer

Explain the meaning of terms related to computer security and crime

Recognize ergonomic and environmental concerns of your workplace and the definitions of related terms.

Identify ways to protect yourself and your information

Dear Customer, We are contacting you to remind you that our Account Review Team identified some unusual activity in your account. In accordance with

Carolina First Bank's User Agreement and to ensure that your account has not been compromised, access to your account was limited. Your account

access will remain limited until this issue has been resolved. We encourage you to sign on and perform the steps necessary to restore your account

access as soon as possible. Allowing your account access to remain limited for an extended period of time may result in further limitations on the use of

your account and possible account closure. To view and perform the verification process, please click on the link below:

https://online2.carolinafirst.com/servlet/tsfg/2000-login.htmlCarolina First Bank is committed to maintaining a safe environment for our customers. To protect the security of your account, our bank employs some

of the most advanced security systems in the world and our anti-fraud teams regularly screen the Online Banking system for unusual activity.

Thank you for your prompt attention to this matter. Please understand that this is a security measure meant to help protect you and your account. We

apologize for any inconvenience. Sincerely,

Carolina First Bank, Customer Service.

2. What is the study of the relationships between people and the things we use?A. ErgonomicsB. EpistemologyC. EcologyD. Econometrics

3. What is the name of the most commonly reported hand and wrist problem associated with keyboarding?A. Carpal tunnel syndrome (CTS)B. Chron’s syndrome (CS)C. Common hand injury (CHI)D. Reduced wrist movement (RWM)

4. What federal agency is proposing regulations to address ergonomic problems in the workplace?A. Office of Worker Safety (OWS)B. National Institutes of Health (NIH)C. Occupational Safety and Health Administration (OSHA)D. National Institute for Occupational Safety and Health (NIOSH)

A controversial, and apparently flawed, study in the late 1980s concluded that:A. women who used terminals and PCs were twice as susceptible to repetitive-stress injuries as were men.B. women who are exposed to the radiation emitted from terminals and PCs may have a higher rate of miscarriage than those who are not. C. due to job-related stress, one out of twenty marriages of IT professionals ended in divorce.D. IT workers were three times more susceptible to lower back injuries than other non-IT workers

What is environmentally sensible computing known as?A. Ecological B. Nature’s C. BlueD. Green

Which of the following is a common abuse that, if eliminated, can make a positive contribution to workplace efficiency?A. Sending and receiving frivolous e-mail B. Gambling on company time C. Using technology for personal profitD. All of these are correct.

More than how many different federal agencies maintain databases on individuals?A. 500B. 1,000C. 5,000D. 10,000

One of the main purposes of the cookie is to: A. gather sensitive data.B. cause a virus to invade your computer.C. personalize your interaction with a Web site.D. All of these are correct.

A recent study found that how many of the 100 most popular shopping Web sites were in compliance with Fair Information Practices, a set of principles that provides basic privacy protection?

A. NoneB. Only oneC. About 25D. All

The purpose of computer monitoring is to:A. continuously gather and assimilate data on job activities to measure worker performance.B. determine the root causes of worker fatigue.C. prevent worksite injuries.D. All of these are correct.

What crime has emerged as one of the fasted growing criminal activities?A. Identity theftB. PilferageC. ScavengingD. Cracking

What is a license called that permits LAN versions of software packages to be used by a specific number of users?

A. Site B. LimitedC. RestrictedD. Numerated

Comparisons of fingerprints, palm prints, iris scans, and voiceprints are used in what type of identification systems?

A. VisualB. AudioC. BiometricD. Positive