Pre-Assessment Flashcards
(91 cards)
What is Fraud?
Fraud in business ethics refers to deceptive or dishonest practices carried out within a business or organizational setting for personal or financial gain. It involves intentionally misrepresenting information, manipulating records, or engaging in fraudulent activities with the intention to deceive stakeholders, such as customers, investors, employees, or business partners.
What is cyberloafing?
Cyberloafing refers to the act of employees using their work computers or internet access for personal activities during work hours. It involves engaging in non-work-related online activities, such as browsing social media, shopping, watching videos, playing games, or chatting with friends, instead of focusing on their assigned tasks.
What is industrial espionage?
Industrial espionage, also known as corporate espionage or economic espionage, refers to the clandestine practice of gathering confidential or proprietary information from a competitor or rival company for the purpose of gaining a competitive advantage. It involves the unauthorized acquisition or theft of trade secrets, intellectual property, research and development data, customer lists, pricing information, marketing strategies, or any other sensitive information related to a company’s operations or competitive edge.
What is bribery?
Bribery refers to the act of offering, giving, receiving, or soliciting something of value, such as money, gifts, favors, or benefits, with the intention of influencing the actions or decisions of an individual in a position of power or authority. It is a form of corruption that undermines fair and transparent practices, distorts decision-making processes, and creates an unfair advantage for those involved.
Is it legal for a person to break a traffic law in order to get a critically injured man to a hospital?
In many jurisdictions, there are legal provisions that allow for emergency exceptions or defenses when it comes to traffic laws. However, it is defined as “illegal” at the outset.
Why is it important for leaders to understand how technology affects their organization’s daily practices?
To understand possible legal ramifications. Technology is evolving rapidly, and its integration into business operations can have significant legal consequences.
From an employer’s POV, all policies are implicitly
ethical and legal.
In a system attack, data is released
A) Intended by unauthorized user
B) Ethically
C) In an unintended manner
D) Intended by authorized user
A) Intended by unauthorized user
A employee sharing personal customer information with 3rd parties is
A) Unintended release of sensitive data by unauthorized user
B) Intended release of sensitive data by authorized user
B) Intended release of sensitive data by authorized user
IT worker crashes in a company vehicle, who is responsible for damages?
A) The company owns the vehicle and is, thus, liable for negligence.
B) IT workers who breach the duty of care are accountable for injuries.
B) IT workers who breach the duty of care are accountable for injuries.
In the context of IT personnel working on a research project involving data mining and algorithmic decision-making, it is essential for them to possess the necessary knowledge, skills, and expertise related to data management, data privacy, security, and the ethical considerations involved in handling sensitive information.
Which practice standard is described?
The reasonable professional standard relates to the performance and conduct of professionals in their respective fields, while the reasonable assurance standard pertains specifically to auditing and assurance engagements, emphasizing the level of confidence that auditors can provide in the information being reviewed.
It is a United States federal law that was enacted in 1986, primarily aimed at addressing computer-related crimes and unauthorized access to computer systems. It provides a legal framework to prosecute individuals who engage in activities that involve unauthorized access, computer fraud, and abuse.
The Computer Fraud and Abuse Act (CFAA)
Codified under 18 U.S.C. Section 1029, primarily focuses on criminalizing actions related to unauthorized access or use of access devices, which typically include credit cards, debit cards, ATM cards, and other similar payment cards or electronic access devices.
The Access Device Fraud statute
It is a federal law in the United States that was enacted as part of the Electronic Communications Privacy Act of 1986 (ECPA). It regulates the government’s access to and disclosure of electronic communications and certain related records held by third-party service providers.
The Stored Communications Act (SCA)
Federal law enacted in the United States in response to the September 11, 2001 terrorist attacks, signed into law on October 26, 2001, by President George W. Bush.
The USA PATRIOT Act, short for the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act, enhances the ability of law enforcement and intelligence agencies to prevent and investigate acts of terrorism. The act expanded the surveillance powers of the government and provided authorities with new tools to gather intelligence and combat terrorism.
Specifically represents companies primarily engaged in providing computer programming services, including writing, modifying, testing, and supporting software applications.
Standard Industrial Classification code for Computer Programming Services.
SIC 7371
Corresponds to the North American Industry Classification System code for Custom Computer Programming Services. It is a newer classification system that replaced SIC codes in the United States, Canada, and Mexico. It is similar to SIC 7371, as it encompasses companies primarily engaged in custom computer programming activities, including the design, development, and modification of software applications to meet specific client needs.
NAICS 541511
Protects original works of authorship, such as literary, artistic, and musical creations, from being copied, distributed, displayed, or performed without the owner’s permission.
A) Copyright
B) Patent
C) Trade secret
D) Trademark
A) Copyright
Protects new inventions, processes, methods, or useful and non-obvious improvements to existing inventions. They provide exclusive rights to the inventor to prevent others from making, using, selling, or importing the invention at play.
A) Copyright
B) Patent
C) Trade secret
D) Trademark
B) Patent
Protects valuable and confidential business information that provides a competitive advantage. This can include formulas, processes, techniques, customer lists, marketing strategies, or other confidential information.
A) Copyright
B) Patent
C) Trade secret
D) Trademark
C) Trade secret
Protects brands, logos, names, slogans, or symbols that distinguish goods or services from those of others in the marketplace. They help consumers identify and associate products or services with a specific source.
A) Copyright
B) Patent
C) Trade secret
D) Trademark
D) Trademark
It involves legally obtaining information through various methods such as market research, data analysis, and monitoring competitor activities.
A) Competitive intelligence
B) Reverse engineering
C) Plagiarism
D) Infringement
A) Competitive intelligence
It involves analyzing and dissecting a product or technology to understand its design, functionality, and underlying processes. It typically involves deconstructing and studying a competitor’s product to gain knowledge about its technical specifications, construction, or algorithms.
A) Competitive intelligence
B) Reverse engineering
C) Plagiarism
D) Infringement
B) Reverse engineering
It refers to the act of presenting someone else’s work, ideas, or content as one’s own without proper attribution or permission.
A) Competitive intelligence
B) Reverse engineering
C) Plagiarism
D) Infringement
C) Plagiarism