Business Ethics Now 4th Edition Andrew Ghillyer Test Bank
Business Ethics Now 4th Edition Andrew Ghillyer Test Bank
1. Workplace technology has changed dramatically over the last two decades.
True False
2. Companies can now make vast amounts of information available to employees and customers on
their Internet, intranet, and extranet sites.
True False
3. The intranet is a private piece of a company's Internet network that is made available to
customers and/or vendor partners on the basis of secured access by a unique password.
True False
4. The extranet is a part of a company's website which can only be accessed by its senior
executives.
True False
5. Technological advances over the last two decades have made it more difficult to pass the
personal data of customers from one place to another.
True False
6. Technological advances over the last two decades have made it possible for some employers to
read the personal e-mails that employees send from their workstations.
True False
7. One of the ways in which multinational corporations lower their expenses is by shipping work to
countries with lower labor costs.
True False
True False
8-1
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
9. Customer service calls and computer tech support are examples of services that cannot be
outsourced to another country.
True False
10. Sending digitized information across fiber-optic wires raises no ethical questions.
True False
11. Employers feel it necessary to monitor employees at the workplace because they have an
obligation to their stakeholders to operate as efficiently as possible.
True False
12. From an employer's perspective, monitoring an employee's computer activity at the workplace is
necessary to map their productivity.
True False
13. The availability of ongoing technological advancements has made it easier to determine precisely
where work ends and personal life begins.
True False
14. The argument over privacy at work traditionally centered on the amount of time that employees
were on-site.
True False
15. The work arrangement which allows employees to work from locations other than their office and
log into their company's network remotely is known as telecommuting.
True False
16. Telecommuting does not allow employees any degree of flexibility in terms of the location from
which they work.
True False
17. Telecommuting allows employees a certain degree of flexibility in terms of their work hours.
True False
18. With advances in technology, the availability of employees in the business environment is no
longer defined by their accessibility.
True False
8-2
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
19. Advances in technology make it harder for employers to assign employees work outside the
workplace.
True False
20. According to Adam Moore, consent given by employees with little choice is referred to as thick
consent.
True False
21. Thin consent leaves employees with little choice regarding the monitoring of their web activity at
the workplace.
True False
22. Thin consent is based on the assumption that the employee can easily find another job.
True False
23. When jobs are plentiful and an employee would have no difficulty finding another position, then
the consent given to the monitoring policy of a company is referred to as thin consent.
True False
24. One of the arguments cited by employers for the use of web-monitoring at the workplace is the
concept of vicarious liability.
True False
25. Vicarious liability is a legal concept that means a party may be held responsible for injury or
damage only if he or she were actively involved in an incident.
True False
26. Parties charged with vicarious liability are never in a supervisory role over the person or parties
personally responsible for the injury or damage.
True False
27. The implications of vicarious liability are that the party charged is responsible for the actions of his
or her subordinates.
True False
28. Parents can be charged with vicarious liability for the actions of their children.
True False
8-3
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
29. According to the legal concept of cyberliability, employers can be held liable for the actions of
their employees through Internet communications to the same degree as if they had written those
communications on company letterhead.
True False
30. Cyberliability applies the existing legal concept of liability to the field of computers.
True False
31. Cyberliability results in litigation for harassment through spam, obscenity, and pornography.
True False
32. The categories of litigation for cyberliability extend to defamation and libel.
True False
33. With employers being able to monitor every keystroke on a computer, track every website visited,
and record every call made by employees, the workplace is beginning to display Orwellian
characteristics.
True False
34. Copying and distributing unpaid-for proprietary software is not a violation of computer ethics.
True False
35. Using a computer to appropriate the intellectual output of another person is an example of ethical
employee behavior.
True False
36. Computer ethics extends to considering the social consequences of the program being written
and ensuring that your work doesn't harm people.
True False
37. Employee turnover, a long-term effect of monitoring employees, costs organizations thousands of
dollars in recruitment costs and training.
True False
38. Packet-sniffing software can be used to monitor employees' private accounts, as long as they are
accessed on workplace networks or phone lines.
True False
8-4
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
39. Keystroke loggers can only capture information that is not deleted.
True False
40. Video surveillance, under federal law, is acceptable where the camera focuses on publicly
accessible areas.
True False
41. Which of the following is true of technological advances over the last two decades?
42. The term "_____" refers to a company's internal website that contains information for employee
access only.
A. intranet
B. extranet
C. Ethernet
D. cybernet
43. Emily, a website designer, is hired by an organization to create an internal website that contains
information meant to be accessed solely by employees. This website is the company's _____.
A. cybernet
B. intranet
C. Ethernet
D. extranet
8-5
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
44. The term "_____" refers to a private piece of a company's Internet network that is made available
to customers and/or vendor partners on the basis of secured access by unique password.
A. extranet
B. intranet
C. Ethernet
D. cybernet
45. Jordan, a software engineer, is responsible for maintaining the private piece of his company's
internet network that is accessible to clients by means of a unique password. This piece of the
company's network is known as the _____.
A. intranet
B. cybernet
C. extranet
D. Ethernet
46. Companies can make vast amounts of information available to customers through their _____
sites.
A. extranet
B. intranet
C. cybernet
D. Ethernet
A. Loss of privacy
B. Limited employee mobility
C. Reduced employee accessibility
D. Limited access to customers
48. Because of recent advances in technology, information can be digitized and transmitted over
fiber-optic cables. What implications does this have?
A. Customer services and tech support services are now bound by geographic borders.
B. Companies have fewer ways in which they can attend to the needs of their customers.
C. Customers' personal information can no longer be sent to or processed in other countries.
D. Companies can cut their expenses by shipping work to countries with low labor costs.
8-6
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
49. How have advances in technology affected customers?
A. Their personal data can no longer be sent to any part of the world.
B. They have round-the-clock access to customer services.
C. They no longer have access to after-hours tech support services.
D. Their personal data cannot be digitized, thus protecting their privacy.
50. Because of recent advances in technology, information can be digitized and transmitted over
fiber-optic cables. What privacy-related issue does this raise for the customer?
A. Should customers be charged more now that companies can offer them better customer
servicing?
B. Should customers be charged less now that companies have ways in which they can reduce
production costs?
C. Should customer service be relative to the amount of money customers spend on company
products?
D. Should customers be informed that their personal information is being sent to other countries?
51. Resolving the different perspectives on the issue of monitoring employee activity is difficult
because:
52. The argument over privacy at work has traditionally centered on:
53. _____ refers to a work arrangement that allows employees to work from home and log into to the
company's network remotely.
A. Telecommuting
B. Wiretapping
C. Hyper-networking
D. Cybersquatting
8-7
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
54. Because of _____, which allows employees to log into their company's network remotely from
any location, the concept of being "at work" is blurred.
A. wiretapping
B. hyper-networking
C. telecommuting
D. cybersquatting
55. _____ has made it difficult for organizations to precisely measure the amount of time that
employees are on-site.
A. Keystroke loggers
B. Smart ID cards
C. Telecommuting
D. Packet-sniffing software
57. Because of the changes that telecommuting has introduced into the work environment:
A. Employers find it easy to keep track of the number of hours employees put into a project.
B. Employees cannot be contacted by employers after a company's work hours.
C. Employers cannot request employees to work after a company's work hours.
D. Employees have the flexibility of taking care of their personal needs during work hours.
8-8
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
59. According to Adam Moore, the distinction between the two types of consent to employee-
monitoring—thin and thick—is created by _____.
60. Michelle receives formal notification from her company, stating that it will be monitoring all her e-
mail and web activity. The notification also indicates that her continued employment with the
company will depend on her agreement to abide by its monitoring policy. Because jobs are hard
to come by, Michelle accepts. She has given the company _____ consent.
A. thick
B. implicit
C. thin
D. tertiary
61. According to Adam Moore, which of the following is true of thin consent?
62. Andrew is informed by his company that he should be open to monitoring as a part of the
company's plans to improve productivity. Because of his qualifications and work experience, he
knows that he would have no difficulty finding a similar position in another company. Andrew
agrees to the policy, knowing that he can switch jobs if the new policy affects his job satisfaction.
He has given his company _____ consent.
A. thick
B. forced
C. thin
D. tertiary
8-9
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
63. Which of the following is true of thick consent?
64. _____ is a legal concept that means a party may be held responsible for injury or damage even
when he or she was not actively involved in an incident.
A. Thin consent
B. Vicarious liability
C. Ratability
D. Thick consent
65. Which of the following is true of parties charged with vicarious liability?
66. The legal concept of _____ holds employers liable for the actions of their employees through
Internet communications to the same degree as if they had written those communications on
company letterhead.
A. cyberliability
B. cybersquatting
C. hyper-networking
D. virtual-mirroring
67. Cyberliability:
8-10
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
68. Which of the following is true of cyberliability?
69. Which of the following explains why employers are in favor of monitoring and restricting the
actions of their employees?
70. Which of the following is an argument against creating a "locked-down" work environment?
71. Which of the following actions does the Computer Ethics Institute consider unethical?
72. Which of the following actions does the Computer Ethics Institute consider ethical?
8-11
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
73. Which of the following is true of the technology used to monitor employees at the workplace?
A. Keystroke loggers can track employees' location while they move through the workplace.
B. Packet-sniffing software can intercept and archive all communications on a network.
C. Cybersquatting software can automatically monitor breaks between receiving calls.
D. "Smart" ID cards can be employed to capture every key pressed on a computer keyboard.
76. The _____ is a company's internal website, containing information for employee access only.
________________________________________
77. The _____ is a private piece of a company's network that is made available to customers or
vendor partners using secured access with a unique password.
________________________________________
78. Information can be sent over fiber-optic cables only after it has been _____.
________________________________________
79. The ability to send digitized information over _____ led to the establishment of call centers.
________________________________________
8-12
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
80. ______ refers to the employees' ability to work from home and log into their company's network
remotely.
________________________________________
81. _____ is a work arrangement that enables employees to log into their company's network via a
secure gateway such as a virtual private network.
________________________________________
82. The new capability of _____ has blurred the concept of employees being "at work."
________________________________________
83. Advances in technology and the popularity of telecommuting now define the availability of
employees by their _____.
________________________________________
84. According to Adam Moore, when an employee consents to being monitored by a company
because he or she has no choice, the employee has given _____ consent.
________________________________________
85. According to Adam Moore, if jobs are plentiful and an employee would have no difficulty in finding
another position, then the consent given to a company's monitoring policy is _____ consent.
________________________________________
86. Vicarious _____ is a legal concept that means a party may be held responsible for injury or
damage even when he or she was not actively involved in an incident.
________________________________________
87. The implications of vicarious liability are that the party charged is responsible for the actions of his
or her _____.
________________________________________
88. _____ is a legal concept that holds employers liable for the actions of their employees in their
Internet communications to the same degree as if those employers had written those
communications on company letterhead.
________________________________________
89. The _____ argument and the recent availability of capable technology have been driving
companies toward creating an Orwellian work environment.
________________________________________
8-13
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
90. _____ can intercept, analyze, and archive all communications on a network.
________________________________________
91. _____ can be employed to capture every key pressed on a computer keyboard.
________________________________________
92. _____ can record information that has been typed into a computer using a keyboard even after
the information has been deleted.
________________________________________
93. _____, under federal law, is acceptable where the camera focuses on publicly accessible areas.
________________________________________
94. Video surveillance, under federal law, is acceptable where the camera focuses on _____
accessible areas.
________________________________________
95. _____ can track an employee's location while he or she moves through the workplace.
________________________________________
Essay Questions
96. How did the digitizing of information lead to the establishment of call centers in other countries?
8-14
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
97. Explain the employers' perspective on monitoring employees' activity at the workplace.
99. Discuss vicarious liability and cyberliability. List the top categories of litigation in cyberliability.
100.Explain how packet-sniffing software and keystroke loggers can be used to monitor employees at
the workplace.
8-15
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
8-16
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Chapter 08 Ethics and Technology Answer Key
1. Workplace technology has changed dramatically over the last two decades.
(p. 158)
TRUE
Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-01 Evaluate the ethical ramifications of recent technological advances.
2. Companies can now make vast amounts of information available to employees and customers
(p. 158) on their Internet, intranet, and extranet sites.
TRUE
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-01 Evaluate the ethical ramifications of recent technological advances.
3. The intranet is a private piece of a company's Internet network that is made available to
(p. 158) customers and/or vendor partners on the basis of secured access by a unique password.
FALSE
The extranet is a private piece of a company's Internet network that is made available to
customers and/or vendor partners on the basis of secured access by a unique password.
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-01 Evaluate the ethical ramifications of recent technological advances.
4. The extranet is a part of a company's website which can only be accessed by its senior
(p. 158) executives.
FALSE
The extranet is a private piece of a company's Internet network that is made available to
customers and/or vendor partners on the basis of secured access by a unique password.
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-01 Evaluate the ethical ramifications of recent technological advances.
8-17
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
5. Technological advances over the last two decades have made it more difficult to pass the
(p. 158) personal data of customers from one place to another.
FALSE
A major concern for customers about technology causing a loss of privacy is that companies
now have the technical capability to send their personal data to any part of the world to take
advantage of lower labor costs.
Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-01 Evaluate the ethical ramifications of recent technological advances.
6. Technological advances over the last two decades have made it possible for some employers
(p. 158) to read the personal e-mails that employees send from their workstations.
TRUE
Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-01 Evaluate the ethical ramifications of recent technological advances.
7. One of the ways in which multinational corporations lower their expenses is by shipping work
(p. 158) to countries with lower labor costs.
TRUE
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-01 Evaluate the ethical ramifications of recent technological advances.
Technically, anything that can be digitized can be sent over a fiber-optic cable.
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-01 Evaluate the ethical ramifications of recent technological advances.
8-18
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
9. Customer service calls and computer tech support are examples of services that cannot be
(p. 158) outsourced to another country.
FALSE
Technological advances make it possible for customer service calls to be answered by call
centers established in other parts of the world.
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-01 Evaluate the ethical ramifications of recent technological advances.
10. Sending digitized information across fiber-optic wires raises no ethical questions.
(p. 159)
FALSE
Sending digitized information across fiber-optic wires raises several ethical issues, an example
of which is—should the customer be notified that his or her personal information is being sent
to and processed in another country?
Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-01 Evaluate the ethical ramifications of recent technological advances.
11. Employers feel it necessary to monitor employees at the workplace because they have an
(p. 159) obligation to their stakeholders to operate as efficiently as possible.
TRUE
Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-02 Explain the opposing employer and employee views of privacy at work.
12. From an employer's perspective, monitoring an employee's computer activity at the workplace
(p. 159) is necessary to map their productivity.
TRUE
Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-02 Explain the opposing employer and employee views of privacy at work.
8-19
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
13. The availability of ongoing technological advancements has made it easier to determine
(p. 160) precisely where work ends and personal life begins.
FALSE
Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-02 Explain the opposing employer and employee views of privacy at work.
14. The argument over privacy at work traditionally centered on the amount of time that
(p. 160) employees were on-site.
TRUE
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-02 Explain the opposing employer and employee views of privacy at work.
15. The work arrangement which allows employees to work from locations other than their office
(p. 160) and log into their company's network remotely is known as telecommuting.
TRUE
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-02 Explain the opposing employer and employee views of privacy at work.
16. Telecommuting does not allow employees any degree of flexibility in terms of the location from
(p. 160) which they work.
FALSE
Telecommuting allows employees to work from home (or anywhere) and log in to their
company's network remotely.
Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-02 Explain the opposing employer and employee views of privacy at work.
17. Telecommuting allows employees a certain degree of flexibility in terms of their work hours.
(p. 160-
161)
TRUE
Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-02 Explain the opposing employer and employee views of privacy at work.
8-20
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
18. With advances in technology, the availability of employees in the business environment is no
(p. 161) longer defined by their accessibility.
FALSE
With the development of e-mail and phone technology, the availability of employees in the
business environment is now being defined by their accessibility.
Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-02 Explain the opposing employer and employee views of privacy at work.
19. Advances in technology make it harder for employers to assign employees work outside the
(p. 161) workplace.
FALSE
With the development of e-mail and phone technology, the availability of employees in the
business environment is now being defined by their accessibility.
Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-02 Explain the opposing employer and employee views of privacy at work.
20. According to Adam Moore, consent given by employees with little choice is referred to as thick
(p. 161) consent.
FALSE
According to Adam Moore, consent given by employees with little choice is referred to as thin
consent.
Blooms: Remember
Difficulty: 2 Medium
Learning Objective: 08-03 Distinguish between thin and thick consent.
21. Thin consent leaves employees with little choice regarding the monitoring of their web activity
(p. 161) at the workplace.
TRUE
Blooms: Remember
Difficulty: 2 Medium
Learning Objective: 08-03 Distinguish between thin and thick consent.
8-21
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
22. Thin consent is based on the assumption that the employee can easily find another job.
(p. 161)
FALSE
Thin consent is based on the assumption that jobs are hard to come by and the employee is
not in a position to quit on principle and risk temporary unemployment while seeking a position
with another company.
Blooms: Remember
Difficulty: 2 Medium
Learning Objective: 08-03 Distinguish between thin and thick consent.
23. When jobs are plentiful and an employee would have no difficulty finding another position,
(p. 161- then the consent given to the monitoring policy of a company is referred to as thin consent.
162)
FALSE
When jobs are plentiful and an employee would have no difficulty finding another position,
then the consent given to the monitoring policy of a policy is thick consent.
Blooms: Remember
Difficulty: 2 Medium
Learning Objective: 08-03 Distinguish between thin and thick consent.
24. One of the arguments cited by employers for the use of web-monitoring at the workplace is the
(p. 164) concept of vicarious liability.
TRUE
Blooms: Remember
Difficulty: 2 Medium
Learning Objective: 08-04 Evaluate the concept of vicarious liability.
25. Vicarious liability is a legal concept that means a party may be held responsible for injury or
(p. 164) damage only if he or she were actively involved in an incident.
FALSE
Vicarious liability is a legal concept that means a party may be held responsible for injury or
damage even when he or she was not actively involved in an incident.
Blooms: Remember
Difficulty: 2 Medium
Learning Objective: 08-04 Evaluate the concept of vicarious liability.
8-22
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
26. Parties charged with vicarious liability are never in a supervisory role over the person or
(p. 164) parties personally responsible for the injury or damage.
FALSE
Parties charged with vicarious liability are generally in a supervisory role over the person or
parties personally responsible for the injury or damage.
Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-04 Evaluate the concept of vicarious liability.
27. The implications of vicarious liability are that the party charged is responsible for the actions of
(p. 164) his or her subordinates.
TRUE
Blooms: Remember
Difficulty: 2 Medium
Learning Objective: 08-04 Evaluate the concept of vicarious liability.
28. Parents can be charged with vicarious liability for the actions of their children.
(p. 164)
TRUE
Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-04 Evaluate the concept of vicarious liability.
29. According to the legal concept of cyberliability, employers can be held liable for the actions of
(p. 165) their employees through Internet communications to the same degree as if they had written
those communications on company letterhead.
TRUE
Blooms: Remember
Difficulty: 2 Medium
Learning Objective: 08-04 Evaluate the concept of vicarious liability.
30. Cyberliability applies the existing legal concept of liability to the field of computers.
(p. 165)
TRUE
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-04 Evaluate the concept of vicarious liability.
31. Cyberliability results in litigation for harassment through spam, obscenity, and pornography.
(p. 165)
TRUE
Blooms: Remember
8-23
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Difficulty: 2 Medium
Learning Objective: 08-04 Evaluate the concept of vicarious liability.
32. The categories of litigation for cyberliability extend to defamation and libel.
(p. 165)
TRUE
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-04 Evaluate the concept of vicarious liability.
33. With employers being able to monitor every keystroke on a computer, track every website
(p. 166) visited, and record every call made by employees, the workplace is beginning to display
Orwellian characteristics.
TRUE
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-05 Analyze an organization's employee-surveillance capabilities.
34. Copying and distributing unpaid-for proprietary software is not a violation of computer ethics.
(p. 167)
FALSE
Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-05 Analyze an organization's employee-surveillance capabilities.
35. Using a computer to appropriate the intellectual output of another person is an example of
(p. 167) ethical employee behavior.
FALSE
Using a computer to appropriate the intellectual output of other people is not considered
ethical behavior.
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-05 Analyze an organization's employee-surveillance capabilities.
36. Computer ethics extends to considering the social consequences of the program being written
(p. 167) and ensuring that your work doesn't harm people.
TRUE
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-05 Analyze an organization's employee-surveillance capabilities.
8-24
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
37. Employee turnover, a long-term effect of monitoring employees, costs organizations
(p. 166- thousands of dollars in recruitment costs and training.
167)
TRUE
Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-05 Analyze an organization's employee-surveillance capabilities.
38. Packet-sniffing software can be used to monitor employees' private accounts, as long as they
(p. 168) are accessed on workplace networks or phone lines.
TRUE
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-05 Analyze an organization's employee-surveillance capabilities.
39. Keystroke loggers can only capture information that is not deleted.
(p. 168)
FALSE
Keystroke loggers can capture every key pressed on a computer keyboard. These systems
will even record information that is typed and then deleted.
Blooms: Remember
Difficulty: 2 Medium
Learning Objective: 08-05 Analyze an organization's employee-surveillance capabilities.
40. Video surveillance, under federal law, is acceptable where the camera focuses on publicly
(p. 168) accessible areas.
TRUE
Blooms: Remember
Difficulty: 2 Medium
Learning Objective: 08-05 Analyze an organization's employee-surveillance capabilities.
8-25
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
41. Which of the following is true of technological advances over the last two decades?
(p. 158)
Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-01 Evaluate the ethical ramifications of recent technological advances.
42. The term "_____" refers to a company's internal website that contains information for
(p. 158) employee access only.
A. intranet
B. extranet
C. Ethernet
D. cybernet
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-01 Evaluate the ethical ramifications of recent technological advances.
43. Emily, a website designer, is hired by an organization to create an internal website that
(p. 158) contains information meant to be accessed solely by employees. This website is the
company's _____.
A. cybernet
B. intranet
C. Ethernet
D. extranet
Blooms: Understand
Difficulty: 1 Easy
Learning Objective: 08-01 Evaluate the ethical ramifications of recent technological advances.
8-26
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
44. The term "_____" refers to a private piece of a company's Internet network that is made
(p. 158) available to customers and/or vendor partners on the basis of secured access by unique
password.
A. extranet
B. intranet
C. Ethernet
D. cybernet
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-01 Evaluate the ethical ramifications of recent technological advances.
45. Jordan, a software engineer, is responsible for maintaining the private piece of his company's
(p. 158) internet network that is accessible to clients by means of a unique password. This piece of the
company's network is known as the _____.
A. intranet
B. cybernet
C. extranet
D. Ethernet
Blooms: Understand
Difficulty: 1 Easy
Learning Objective: 08-01 Evaluate the ethical ramifications of recent technological advances.
46. Companies can make vast amounts of information available to customers through their _____
(p. 158) sites.
A. extranet
B. intranet
C. cybernet
D. Ethernet
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-01 Evaluate the ethical ramifications of recent technological advances.
8-27
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
47. Which of the following is a disadvantage of technological advances in a workplace?
(p. 158)
A. Loss of privacy
B. Limited employee mobility
C. Reduced employee accessibility
D. Limited access to customers
Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-01 Evaluate the ethical ramifications of recent technological advances.
48. Because of recent advances in technology, information can be digitized and transmitted over
(p. 158) fiber-optic cables. What implications does this have?
A. Customer services and tech support services are now bound by geographic borders.
B. Companies have fewer ways in which they can attend to the needs of their customers.
C. Customers' personal information can no longer be sent to or processed in other countries.
D. Companies can cut their expenses by shipping work to countries with low labor costs.
Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-01 Evaluate the ethical ramifications of recent technological advances.
A. Their personal data can no longer be sent to any part of the world.
B. They have round-the-clock access to customer services.
C. They no longer have access to after-hours tech support services.
D. Their personal data cannot be digitized, thus protecting their privacy.
Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-01 Evaluate the ethical ramifications of recent technological advances.
8-28
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
50. Because of recent advances in technology, information can be digitized and transmitted over
(p. 159) fiber-optic cables. What privacy-related issue does this raise for the customer?
A. Should customers be charged more now that companies can offer them better customer
servicing?
B. Should customers be charged less now that companies have ways in which they can
reduce production costs?
C. Should customer service be relative to the amount of money customers spend on company
products?
D. Should customers be informed that their personal information is being sent to other
countries?
Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-01 Evaluate the ethical ramifications of recent technological advances.
51. Resolving the different perspectives on the issue of monitoring employee activity is difficult
(p. 160) because:
Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-02 Explain the opposing employer and employee views of privacy at work.
52. The argument over privacy at work has traditionally centered on:
(p. 160)
Blooms: Remember
Difficulty: 2 Medium
Learning Objective: 08-02 Explain the opposing employer and employee views of privacy at work.
8-29
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
53. _____ refers to a work arrangement that allows employees to work from home and log into to
(p. 160) the company's network remotely.
A. Telecommuting
B. Wiretapping
C. Hyper-networking
D. Cybersquatting
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-02 Explain the opposing employer and employee views of privacy at work.
54. Because of _____, which allows employees to log into their company's network remotely from
(p. 160) any location, the concept of being "at work" is blurred.
A. wiretapping
B. hyper-networking
C. telecommuting
D. cybersquatting
Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-02 Explain the opposing employer and employee views of privacy at work.
55. _____ has made it difficult for organizations to precisely measure the amount of time that
(p. 160) employees are on-site.
A. Keystroke loggers
B. Smart ID cards
C. Telecommuting
D. Packet-sniffing software
Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-02 Explain the opposing employer and employee views of privacy at work.
Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-02 Explain the opposing employer and employee views of privacy at work.
8-30
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
57. Because of the changes that telecommuting has introduced into the work environment:
(p. 161)
Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-02 Explain the opposing employer and employee views of privacy at work.
A. Employers find it easy to keep track of the number of hours employees put into a project.
B. Employees cannot be contacted by employers after a company's work hours.
C. Employers cannot request employees to work after a company's work hours.
D. Employees have the flexibility of taking care of their personal needs during work hours.
Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-02 Explain the opposing employer and employee views of privacy at work.
59. According to Adam Moore, the distinction between the two types of consent to employee-
(p. 161) monitoring—thin and thick—is created by _____.
Blooms: Remember
Difficulty: 2 Medium
Learning Objective: 08-03 Distinguish between thin and thick consent.
8-31
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
60. Michelle receives formal notification from her company, stating that it will be monitoring all her
(p. 161) e-mail and web activity. The notification also indicates that her continued employment with the
company will depend on her agreement to abide by its monitoring policy. Because jobs are
hard to come by, Michelle accepts. She has given the company _____ consent.
A. thick
B. implicit
C. thin
D. tertiary
Blooms: Apply
Difficulty: 2 Medium
Learning Objective: 08-03 Distinguish between thin and thick consent.
61. According to Adam Moore, which of the following is true of thin consent?
(p. 161)
Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-03 Distinguish between thin and thick consent.
62. Andrew is informed by his company that he should be open to monitoring as a part of the
(p. 161) company's plans to improve productivity. Because of his qualifications and work experience,
he knows that he would have no difficulty finding a similar position in another company.
Andrew agrees to the policy, knowing that he can switch jobs if the new policy affects his job
satisfaction. He has given his company _____ consent.
A. thick
B. forced
C. thin
D. tertiary
Blooms: Apply
Difficulty: 2 Medium
Learning Objective: 08-03 Distinguish between thin and thick consent.
8-32
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
63. Which of the following is true of thick consent?
(p. 161)
Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-03 Distinguish between thin and thick consent.
64. _____ is a legal concept that means a party may be held responsible for injury or damage
(p. 164) even when he or she was not actively involved in an incident.
A. Thin consent
B. Vicarious liability
C. Ratability
D. Thick consent
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-04 Evaluate the concept of vicarious liability.
65. Which of the following is true of parties charged with vicarious liability?
(p. 164)
Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-04 Evaluate the concept of vicarious liability.
66. The legal concept of _____ holds employers liable for the actions of their employees through
(p. 165) Internet communications to the same degree as if they had written those communications on
company letterhead.
A. cyberliability
B. cybersquatting
C. hyper-networking
D. virtual-mirroring
Blooms: Remember
Difficulty: 2 Medium
Learning Objective: 08-04 Evaluate the concept of vicarious liability.
8-33
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
67. Cyberliability:
(p. 165)
Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-04 Evaluate the concept of vicarious liability.
Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-04 Evaluate the concept of vicarious liability.
69. Which of the following explains why employers are in favor of monitoring and restricting the
(p. 166) actions of their employees?
Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-04 Evaluate the concept of vicarious liability.
70. Which of the following is an argument against creating a "locked-down" work environment?
(p. 167)
Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-04 Evaluate the concept of vicarious liability.
8-34
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
71. Which of the following actions does the Computer Ethics Institute consider unethical?
(p. 167)
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-04 Evaluate the concept of vicarious liability.
72. Which of the following actions does the Computer Ethics Institute consider ethical?
(p. 167)
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-04 Evaluate the concept of vicarious liability.
73. Which of the following is true of the technology used to monitor employees at the workplace?
(p. 168)
A. Keystroke loggers can track employees' location while they move through the workplace.
B. Packet-sniffing software can intercept and archive all communications on a network.
C. Cybersquatting software can automatically monitor breaks between receiving calls.
D. "Smart" ID cards can be employed to capture every key pressed on a computer keyboard.
Blooms: Remember
Difficulty: 2 Medium
Learning Objective: 08-05 Analyze an organization's employee-surveillance capabilities.
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-05 Analyze an organization's employee-surveillance capabilities.
8-35
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
75. Under federal law, video surveillance is legal only if:
(p. 168)
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-05 Analyze an organization's employee-surveillance capabilities.
76. The _____ is a company's internal website, containing information for employee access only.
(p. 158)
intranet
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-01 Evaluate the ethical ramifications of recent technological advances.
77. The _____ is a private piece of a company's network that is made available to customers or
(p. 158) vendor partners using secured access with a unique password.
extranet
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-01 Evaluate the ethical ramifications of recent technological advances.
78. Information can be sent over fiber-optic cables only after it has been _____.
(p. 158)
digitized
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-01 Evaluate the ethical ramifications of recent technological advances.
79. The ability to send digitized information over _____ led to the establishment of call centers.
(p. 158)
fiber-optic cables
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-01 Evaluate the ethical ramifications of recent technological advances.
8-36
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
80. ______ refers to the employees' ability to work from home and log into their company's
(p. 160) network remotely.
Telecommuting
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-02 Explain the opposing employer and employee views of privacy at work.
81. _____ is a work arrangement that enables employees to log into their company's network via a
(p. 160) secure gateway such as a virtual private network.
Telecommuting
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-02 Explain the opposing employer and employee views of privacy at work.
82. The new capability of _____ has blurred the concept of employees being "at work."
(p. 160)
telecommuting
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-02 Explain the opposing employer and employee views of privacy at work.
83. Advances in technology and the popularity of telecommuting now define the availability of
(p. 161) employees by their _____.
accessibility
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-02 Explain the opposing employer and employee views of privacy at work.
84. According to Adam Moore, when an employee consents to being monitored by a company
(p. 161) because he or she has no choice, the employee has given _____ consent.
thin
Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-03 Distinguish between thin and thick consent.
85. According to Adam Moore, if jobs are plentiful and an employee would have no difficulty in
(p. 161) finding another position, then the consent given to a company's monitoring policy is _____
consent.
thick
Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-03 Distinguish between thin and thick consent.
8-37
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
86. Vicarious _____ is a legal concept that means a party may be held responsible for injury or
(p. 164) damage even when he or she was not actively involved in an incident.
liability
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-04 Evaluate the concept of vicarious liability.
87. The implications of vicarious liability are that the party charged is responsible for the actions of
(p. 164) his or her _____.
subordinates
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-04 Evaluate the concept of vicarious liability.
88. _____ is a legal concept that holds employers liable for the actions of their employees in their
(p. 164) Internet communications to the same degree as if those employers had written those
communications on company letterhead.
Cyberliability
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-04 Evaluate the concept of vicarious liability.
89. The _____ argument and the recent availability of capable technology have been driving
(p. 166) companies toward creating an Orwellian work environment.
vicarious liability
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-05 Analyze an organization's employee-surveillance capabilities.
90. _____ can intercept, analyze, and archive all communications on a network.
(p. 168)
Packet-sniffing software
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-05 Analyze an organization's employee-surveillance capabilities.
91. _____ can be employed to capture every key pressed on a computer keyboard.
(p. 168)
Keystroke loggers
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-05 Analyze an organization's employee-surveillance capabilities.
8-38
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
92. _____ can record information that has been typed into a computer using a keyboard even
(p. 168) after the information has been deleted.
Keystroke loggers
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-05 Analyze an organization's employee-surveillance capabilities.
93. _____, under federal law, is acceptable where the camera focuses on publicly accessible
(p. 168) areas.
Video surveillance
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-05 Analyze an organization's employee-surveillance capabilities.
94. Video surveillance, under federal law, is acceptable where the camera focuses on _____
(p. 168) accessible areas.
publicly
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-05 Analyze an organization's employee-surveillance capabilities.
95. _____ can track an employee's location while he or she moves through the workplace.
(p. 168)
Smart ID cards
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-05 Analyze an organization's employee-surveillance capabilities.
Essay Questions
8-39
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
96. How did the digitizing of information lead to the establishment of call centers in other
(p. 158) countries?
Digitized information can be sent over fiber-optic cables. With the availability of a network of
fiber-optic cable that spans the globe and an increasingly educated global workforce that is
fluent in English, the potential cost savings for American corporations in shipping work
overseas to countries with lower labor costs is becoming increasingly attractive. By
establishing call centers in those countries, companies cut down on their costs while giving
customers access to customer services round-the-clock.
Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-01 Evaluate the ethical ramifications of recent technological advances.
97. Explain the employers' perspective on monitoring employees' activity at the workplace.
(p. 159)
From an employer's viewpoint, the productivity of employees during their time at work
represents the performance portion of the pay-for-performance contract they entered into with
the company when they were hired. Therefore, their actions during that time are at the
discretion of the company. Other than lunch and any scheduled breaks, all their activity should
be work-related, and any monitoring of that activity should not be regarded as an infringement
of privacy. The organization has an obligation to its stakeholders to operate as efficiently as
possible, and to do so, it must ensure that company resources are not being misused or stolen
and that company data and proprietary information are being closely guarded. The issue of
vicarious liability, which holds employers responsible for the misconduct of their employees,
also makes monitoring their actions a policy worth implementing.
Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-02 Explain the opposing employer and employee views of privacy at work.
8-40
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
98. Explain the differences between thin and thick consent.
(p. 161)
When an employee receives formal notification that the company will be monitoring all his or
her e-mail and web activity—either at the time of hire or during employment—and it is made
clear that his or her continued employment with the company will be dependent on the
employee's agreement to abide by that monitoring, the consent given is said to be thin consent
if the employee does so because he or she has no other alternative. Thick consent is consent
given when an employee has an alternative to unacceptable monitoring. For example, if jobs
are plentiful and the employee would have no difficulty in finding another position, then the
employee has a realistic alternative for avoiding an unacceptable policy.
Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-03 Distinguish between thin and thick consent.
99. Discuss vicarious liability and cyberliability. List the top categories of litigation in cyberliability.
(p. 164)
Vicarious liability is a legal concept that means a party may be held responsible for injury or
damage even when he or she was not actively involved in an incident. The implications of
vicarious liability are that the party charged is responsible for the actions of his or her
subordinates.
Cyberliability is a legal concept that holds employers liable for the actions of their employees
in their Internet communications to the same degree as if those employers had written those
communications on company letterhead. The top categories of litigation of cyber-liability are:
discrimination, harassment, obscenity and pornography, defamation and libel, information
leaks, and spam.
Blooms: Remember
Difficulty: 2 Medium
Learning Objective: 08-04 Evaluate the concept of vicarious liability.
8-41
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
100. Explain how packet-sniffing software and keystroke loggers can be used to monitor employees
(p. 168) at the workplace.
Packet-sniffing software can intercept, analyze, and archive all communications on a network,
including employee e-mail, chat sessions, file sharing, and Internet browsing. Employees who
use the workplace network to access personal e-mail accounts not provided by the company
are not protected. Their private accounts, as long as they are accessed on workplace network
or phone lines, can be monitored.
Keystroke loggers can be employed to capture every key pressed on a computer keyboard.
These systems will even record information that is typed and then deleted.
Blooms: Remember
Difficulty: 2 Medium
Learning Objective: 08-05 Analyze an organization's employee-surveillance capabilities.
8-42
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.