Children's Online Privacy Protection Act (COPPA) Which action should th e programmer take to handle this situation? - ✔✔-Contact and inform the FBI and the social media site of the company's activities A cell phone company is conducting a survey to learn more about the demographic and preferences of its current customers. The IT professionals at the company design the survey to be accessible through the customer's mobile phone. Customers can return to the survey data multiple times to update or revise their responses until the survey closes. To access the previously entered da ta, the customer must enter a one -time log -in code provided by the cell phone company, as well as answer individualized security questions on a secure mobile server. What is this method of conducting a survey an example of? - ✔✔-A multistage process to p revent unauthorized access to sensitive data To spy on his girlfriend, a man uses her social security number and her mother's maiden name to reset the online password for her cell phone account. He is then able to enter the account to review her text mess ages and phone records from the past month of usage. What is this action an example of? - ✔✔-misrepresentation Data collection methods and processes continue to emerge into more industries, fields, and agencies. Meanwhile, the regulations governing the use and sharing of this data continue to evolve. However, data collection is still somewhat new, and there is a tangible gap in the legislation of ethical codes and guidelines to establish clear principles of collection and use. What may providing unrest ricted access to consumers' data without protecting each individual's privacy or identity be considered? - ✔✔-Unethical and risky Which best practice should help reduce the different ethical problems IT professionals face on a daily basis? - ✔✔-Establishi ng and implementing an acceptable use policy What does the Bathsheba Syndrome refer to? - ✔✔-The ethical failure of people in power What is the term for the concept where organizations assimilate social and environmental concerns in their business operat ions and in their interactions with stakeholders? - ✔✔-CSR (Corporate Social Responsibility)
WGU D333 - Ethics in Technology. Exam Questions and answers, latest update.
WGU D333 - Ethics in Technology. Exam Questions and answers, latest update. A student makes two copies of a software package that was just purchased and sells one to a friend. How should this student's actions be described? - -Unethical and illegal What describes an employee's legal rights when an employer is using an auto-tracking device to monitor the employee's whereabouts? - -The employer must obtain employee consent before installing an auto-tracking device. Many IT professionals feel their privacy is violated when employers use GPS-tracking devices. What describes the employer's point of view? - -Legal and Ethical
Written for
- Institution
-
Western Governors University
- Course
-
WGU D333
Document information
- Uploaded on
- September 6, 2023
- Number of pages
- 8
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
wgu d333 ethics in technology exam questions an
Content preview
Children's Online Privacy Protection Act (COPPA) Which action should th e programmer take to handle this situation? - ✔✔-Contact and inform the FBI and the social media site of the company's activities A cell phone company is conducting a survey to learn more about the demographic and preferences of its current customers. The IT professionals at the company design the survey to be accessible through the customer's mobile phone. Customers can return to the survey data multiple times to update or revise their responses until the survey closes. To access the previously entered da ta, the customer must enter a one -time log -in code provided by the cell phone company, as well as answer individualized security questions on a secure mobile server. What is this method of conducting a survey an example of? - ✔✔-A multistage process to p revent unauthorized access to sensitive data To spy on his girlfriend, a man uses her social security number and her mother's maiden name to reset the online password for her cell phone account. He is then able to enter the account to review her text mess ages and phone records from the past month of usage. What is this action an example of? - ✔✔-misrepresentation Data collection methods and processes continue to emerge into more industries, fields, and agencies. Meanwhile, the regulations governing the use and sharing of this data continue to evolve. However, data collection is still somewhat new, and there is a tangible gap in the legislation of ethical codes and guidelines to establish clear principles of collection and use. What may providing unrest ricted access to consumers' data without protecting each individual's privacy or identity be considered? - ✔✔-Unethical and risky Which best practice should help reduce the different ethical problems IT professionals face on a daily basis? - ✔✔-Establishi ng and implementing an acceptable use policy What does the Bathsheba Syndrome refer to? - ✔✔-The ethical failure of people in power What is the term for the concept where organizations assimilate social and environmental concerns in their business operat ions and in their interactions with stakeholders? - ✔✔-CSR (Corporate Social Responsibility)
Also available in package deal