100% found this document useful (48 votes)
545 views42 pages

Business Ethics Now 4th Edition Andrew Ghillyer Test Bank

The document discusses ethics and technology in the workplace. It covers topics like intranets, extranets, monitoring employees, and outsourcing work. Advances in technology have changed how information is shared and raised new issues around privacy and liability.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (48 votes)
545 views42 pages

Business Ethics Now 4th Edition Andrew Ghillyer Test Bank

The document discusses ethics and technology in the workplace. It covers topics like intranets, extranets, monitoring employees, and outsourcing work. Advances in technology have changed how information is shared and raised new issues around privacy and liability.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 42

Chapter 08

Ethics and Technology

True / False Questions

1. Workplace technology has changed dramatically over the last two decades.

True False

2. Companies can now make vast amounts of information available to employees and customers on
their Internet, intranet, and extranet sites.

True False

3. The intranet is a private piece of a company's Internet network that is made available to
customers and/or vendor partners on the basis of secured access by a unique password.

True False

4. The extranet is a part of a company's website which can only be accessed by its senior
executives.

True False

5. Technological advances over the last two decades have made it more difficult to pass the
personal data of customers from one place to another.

True False

6. Technological advances over the last two decades have made it possible for some employers to
read the personal e-mails that employees send from their workstations.

True False

7. One of the ways in which multinational corporations lower their expenses is by shipping work to
countries with lower labor costs.

True False

8. Information, once digitized, cannot be sent over a fiber-optic cable.

True False

8-1
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
9. Customer service calls and computer tech support are examples of services that cannot be
outsourced to another country.

True False

10. Sending digitized information across fiber-optic wires raises no ethical questions.

True False

11. Employers feel it necessary to monitor employees at the workplace because they have an
obligation to their stakeholders to operate as efficiently as possible.

True False

12. From an employer's perspective, monitoring an employee's computer activity at the workplace is
necessary to map their productivity.

True False

13. The availability of ongoing technological advancements has made it easier to determine precisely
where work ends and personal life begins.

True False

14. The argument over privacy at work traditionally centered on the amount of time that employees
were on-site.

True False

15. The work arrangement which allows employees to work from locations other than their office and
log into their company's network remotely is known as telecommuting.

True False

16. Telecommuting does not allow employees any degree of flexibility in terms of the location from
which they work.

True False

17. Telecommuting allows employees a certain degree of flexibility in terms of their work hours.

True False

18. With advances in technology, the availability of employees in the business environment is no
longer defined by their accessibility.

True False

8-2
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
19. Advances in technology make it harder for employers to assign employees work outside the
workplace.

True False

20. According to Adam Moore, consent given by employees with little choice is referred to as thick
consent.

True False

21. Thin consent leaves employees with little choice regarding the monitoring of their web activity at
the workplace.

True False

22. Thin consent is based on the assumption that the employee can easily find another job.

True False

23. When jobs are plentiful and an employee would have no difficulty finding another position, then
the consent given to the monitoring policy of a company is referred to as thin consent.

True False

24. One of the arguments cited by employers for the use of web-monitoring at the workplace is the
concept of vicarious liability.

True False

25. Vicarious liability is a legal concept that means a party may be held responsible for injury or
damage only if he or she were actively involved in an incident.

True False

26. Parties charged with vicarious liability are never in a supervisory role over the person or parties
personally responsible for the injury or damage.

True False

27. The implications of vicarious liability are that the party charged is responsible for the actions of his
or her subordinates.

True False

28. Parents can be charged with vicarious liability for the actions of their children.

True False

8-3
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
29. According to the legal concept of cyberliability, employers can be held liable for the actions of
their employees through Internet communications to the same degree as if they had written those
communications on company letterhead.

True False

30. Cyberliability applies the existing legal concept of liability to the field of computers.

True False

31. Cyberliability results in litigation for harassment through spam, obscenity, and pornography.

True False

32. The categories of litigation for cyberliability extend to defamation and libel.

True False

33. With employers being able to monitor every keystroke on a computer, track every website visited,
and record every call made by employees, the workplace is beginning to display Orwellian
characteristics.

True False

34. Copying and distributing unpaid-for proprietary software is not a violation of computer ethics.

True False

35. Using a computer to appropriate the intellectual output of another person is an example of ethical
employee behavior.

True False

36. Computer ethics extends to considering the social consequences of the program being written
and ensuring that your work doesn't harm people.

True False

37. Employee turnover, a long-term effect of monitoring employees, costs organizations thousands of
dollars in recruitment costs and training.

True False

38. Packet-sniffing software can be used to monitor employees' private accounts, as long as they are
accessed on workplace networks or phone lines.

True False

8-4
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
39. Keystroke loggers can only capture information that is not deleted.

True False

40. Video surveillance, under federal law, is acceptable where the camera focuses on publicly
accessible areas.

True False

Multiple Choice Questions

41. Which of the following is true of technological advances over the last two decades?

A. They have not changed the work environment.


B. They have increased employees' accessibility.
C. They have raised no new ethical issues.
D. They have limited the mobility of employees.

42. The term "_____" refers to a company's internal website that contains information for employee
access only.

A. intranet
B. extranet
C. Ethernet
D. cybernet

43. Emily, a website designer, is hired by an organization to create an internal website that contains
information meant to be accessed solely by employees. This website is the company's _____.

A. cybernet
B. intranet
C. Ethernet
D. extranet

8-5
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
44. The term "_____" refers to a private piece of a company's Internet network that is made available
to customers and/or vendor partners on the basis of secured access by unique password.

A. extranet
B. intranet
C. Ethernet
D. cybernet

45. Jordan, a software engineer, is responsible for maintaining the private piece of his company's
internet network that is accessible to clients by means of a unique password. This piece of the
company's network is known as the _____.

A. intranet
B. cybernet
C. extranet
D. Ethernet

46. Companies can make vast amounts of information available to customers through their _____
sites.

A. extranet
B. intranet
C. cybernet
D. Ethernet

47. Which of the following is a disadvantage of technological advances in a workplace?

A. Loss of privacy
B. Limited employee mobility
C. Reduced employee accessibility
D. Limited access to customers

48. Because of recent advances in technology, information can be digitized and transmitted over
fiber-optic cables. What implications does this have?

A. Customer services and tech support services are now bound by geographic borders.
B. Companies have fewer ways in which they can attend to the needs of their customers.
C. Customers' personal information can no longer be sent to or processed in other countries.
D. Companies can cut their expenses by shipping work to countries with low labor costs.

8-6
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
49. How have advances in technology affected customers?

A. Their personal data can no longer be sent to any part of the world.
B. They have round-the-clock access to customer services.
C. They no longer have access to after-hours tech support services.
D. Their personal data cannot be digitized, thus protecting their privacy.

50. Because of recent advances in technology, information can be digitized and transmitted over
fiber-optic cables. What privacy-related issue does this raise for the customer?

A. Should customers be charged more now that companies can offer them better customer
servicing?
B. Should customers be charged less now that companies have ways in which they can reduce
production costs?
C. Should customer service be relative to the amount of money customers spend on company
products?
D. Should customers be informed that their personal information is being sent to other countries?

51. Resolving the different perspectives on the issue of monitoring employee activity is difficult
because:

A. federal laws for video surveillance in public areas do not exist.


B. technological advances have had no impact on the workplace.
C. it is legal for employers to wiretap employees' personal phones.
D. it is difficult to determine where work ends and personal life begins.

52. The argument over privacy at work has traditionally centered on:

A. the designations held by different employees.


B. the amount of time that employees were on-site.
C. whether the organization was vertically structured.
D. whether the organization was horizontally structured.

53. _____ refers to a work arrangement that allows employees to work from home and log into to the
company's network remotely.

A. Telecommuting
B. Wiretapping
C. Hyper-networking
D. Cybersquatting

8-7
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
54. Because of _____, which allows employees to log into their company's network remotely from
any location, the concept of being "at work" is blurred.

A. wiretapping
B. hyper-networking
C. telecommuting
D. cybersquatting

55. _____ has made it difficult for organizations to precisely measure the amount of time that
employees are on-site.

A. Keystroke loggers
B. Smart ID cards
C. Telecommuting
D. Packet-sniffing software

56. Which of the following is true of telecommuting?

A. It allows employees a certain degree of flexibility in terms of their work hours.


B. It allows employees no flexibility in terms of the locations from which they work.
C. It makes it easier for employers to measure the amount of time employees are on-site.
D. It makes it easier for employers to monitor the Internet activity of their employees.

57. Because of the changes that telecommuting has introduced into the work environment:

A. employers find it easy to tabulate the time employees spend working.


B. employees are unable to take care of personal needs during work hours.
C. the availability of employees is being defined by their accessibility.
D. the distinction between personal life and work life is clearly perceived.

58. Which of the following is a benefit of telecommuting?

A. Employers find it easy to keep track of the number of hours employees put into a project.
B. Employees cannot be contacted by employers after a company's work hours.
C. Employers cannot request employees to work after a company's work hours.
D. Employees have the flexibility of taking care of their personal needs during work hours.

8-8
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
59. According to Adam Moore, the distinction between the two types of consent to employee-
monitoring—thin and thick—is created by _____.

A. the state of the job market


B. cybersquatting
C. the organization's structure
D. wiretapping

60. Michelle receives formal notification from her company, stating that it will be monitoring all her e-
mail and web activity. The notification also indicates that her continued employment with the
company will depend on her agreement to abide by its monitoring policy. Because jobs are hard
to come by, Michelle accepts. She has given the company _____ consent.

A. thick
B. implicit
C. thin
D. tertiary

61. According to Adam Moore, which of the following is true of thin consent?

A. It is given when the employee has no other choice.


B. It is not dependent upon the state of the job market.
C. It is consent given on behalf of somebody else.
D. It is a form of consent that is not legally binding.

62. Andrew is informed by his company that he should be open to monitoring as a part of the
company's plans to improve productivity. Because of his qualifications and work experience, he
knows that he would have no difficulty finding a similar position in another company. Andrew
agrees to the policy, knowing that he can switch jobs if the new policy affects his job satisfaction.
He has given his company _____ consent.

A. thick
B. forced
C. thin
D. tertiary

8-9
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
63. Which of the following is true of thick consent?

A. It is given when employees have little or no choice.


B. It is not affected by the state of the job market.
C. It signals that the consent of employees was forced.
D. It is given when employees have realistic job alternatives.

64. _____ is a legal concept that means a party may be held responsible for injury or damage even
when he or she was not actively involved in an incident.

A. Thin consent
B. Vicarious liability
C. Ratability
D. Thick consent

65. Which of the following is true of parties charged with vicarious liability?

A. They are held responsible for the actions of their subordinates.


B. They are seldom in supervisory or managerial roles.
C. They only comprise the individuals directly responsible for the damage.
D. They only comprise individuals who were the recipients of the damage.

66. The legal concept of _____ holds employers liable for the actions of their employees through
Internet communications to the same degree as if they had written those communications on
company letterhead.

A. cyberliability
B. cybersquatting
C. hyper-networking
D. virtual-mirroring

67. Cyberliability:

A. does not include harassment that reaches employees' via e-mail.


B. applies the legal concept of liability to the world of computers.
C. is only enforceable in unregistered commercial Internet cafés.
D. does not cover categories like obscenity and pornography.

8-10
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
68. Which of the following is true of cyberliability?

A. It extends to any form of harassment that reaches an employee via e-mail.


B. It has no negative repercussions for the employer or the company involved.
C. It only applies to crimes that involve the patrons of commercial Internet cafés.
D. It does not cover categories like racial discrimination, defamation, and libel.

69. Which of the following explains why employers are in favor of monitoring and restricting the
actions of their employees?

A. The implications of vicarious liability for employers


B. The federal restrictions placed upon wiretapping
C. The reluctance of employees to give thick consent
D. The federal restrictions placed on cybersquatting

70. Which of the following is an argument against creating a "locked-down" work environment?

A. Vicarious liability can have serious implications for the employer.


B. Cyberliability can have serious implications for the employer.
C. Employee turnover tends not to affect the company financially.
D. Employees who resent being constrained might leave the company.

71. Which of the following actions does the Computer Ethics Institute consider unethical?

A. Logging into one's company's intranet and extranet


B. Enabling cookies on one's own computer
C. Clearing the cache of one's own computer
D. Copying proprietary software without paying for it

72. Which of the following actions does the Computer Ethics Institute consider ethical?

A. Making one's password easily available to coworkers


B. Considering the social consequences of one's work
C. Using corporate software for private use
D. Using pirated software for commercial purposes

8-11
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
73. Which of the following is true of the technology used to monitor employees at the workplace?

A. Keystroke loggers can track employees' location while they move through the workplace.
B. Packet-sniffing software can intercept and archive all communications on a network.
C. Cybersquatting software can automatically monitor breaks between receiving calls.
D. "Smart" ID cards can be employed to capture every key pressed on a computer keyboard.

74. Which of the following is true of keystroke loggers?

A. They can record typed-in information even if it is deleted.


B. They can videotape employees in public areas.
C. They can analyze and archive calls made on personal phones.
D. They can track the movement of employees in the workplace.

75. Under federal law, video surveillance is legal only if:

A. the camera focuses on publicly accessible areas.


B. the camera is placed in employee rest areas.
C. the cameras aren't focused on customers.
D. the cameras aren't focused on employees.

Fill in the Blank Questions

76. The _____ is a company's internal website, containing information for employee access only.

________________________________________

77. The _____ is a private piece of a company's network that is made available to customers or
vendor partners using secured access with a unique password.

________________________________________

78. Information can be sent over fiber-optic cables only after it has been _____.

________________________________________

79. The ability to send digitized information over _____ led to the establishment of call centers.

________________________________________

8-12
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
80. ______ refers to the employees' ability to work from home and log into their company's network
remotely.

________________________________________

81. _____ is a work arrangement that enables employees to log into their company's network via a
secure gateway such as a virtual private network.

________________________________________

82. The new capability of _____ has blurred the concept of employees being "at work."

________________________________________

83. Advances in technology and the popularity of telecommuting now define the availability of
employees by their _____.

________________________________________

84. According to Adam Moore, when an employee consents to being monitored by a company
because he or she has no choice, the employee has given _____ consent.

________________________________________

85. According to Adam Moore, if jobs are plentiful and an employee would have no difficulty in finding
another position, then the consent given to a company's monitoring policy is _____ consent.

________________________________________

86. Vicarious _____ is a legal concept that means a party may be held responsible for injury or
damage even when he or she was not actively involved in an incident.

________________________________________

87. The implications of vicarious liability are that the party charged is responsible for the actions of his
or her _____.

________________________________________

88. _____ is a legal concept that holds employers liable for the actions of their employees in their
Internet communications to the same degree as if those employers had written those
communications on company letterhead.

________________________________________

89. The _____ argument and the recent availability of capable technology have been driving
companies toward creating an Orwellian work environment.

________________________________________

8-13
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
90. _____ can intercept, analyze, and archive all communications on a network.

________________________________________

91. _____ can be employed to capture every key pressed on a computer keyboard.

________________________________________

92. _____ can record information that has been typed into a computer using a keyboard even after
the information has been deleted.

________________________________________

93. _____, under federal law, is acceptable where the camera focuses on publicly accessible areas.

________________________________________

94. Video surveillance, under federal law, is acceptable where the camera focuses on _____
accessible areas.

________________________________________

95. _____ can track an employee's location while he or she moves through the workplace.

________________________________________

Essay Questions

96. How did the digitizing of information lead to the establishment of call centers in other countries?

8-14
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
97. Explain the employers' perspective on monitoring employees' activity at the workplace.

98. Explain the differences between thin and thick consent.

99. Discuss vicarious liability and cyberliability. List the top categories of litigation in cyberliability.

100.Explain how packet-sniffing software and keystroke loggers can be used to monitor employees at
the workplace.

8-15
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
8-16
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Chapter 08 Ethics and Technology Answer Key

True / False Questions

1. Workplace technology has changed dramatically over the last two decades.
(p. 158)
TRUE

Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-01 Evaluate the ethical ramifications of recent technological advances.

2. Companies can now make vast amounts of information available to employees and customers
(p. 158) on their Internet, intranet, and extranet sites.

TRUE

Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-01 Evaluate the ethical ramifications of recent technological advances.

3. The intranet is a private piece of a company's Internet network that is made available to
(p. 158) customers and/or vendor partners on the basis of secured access by a unique password.

FALSE

The extranet is a private piece of a company's Internet network that is made available to
customers and/or vendor partners on the basis of secured access by a unique password.

Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-01 Evaluate the ethical ramifications of recent technological advances.

4. The extranet is a part of a company's website which can only be accessed by its senior
(p. 158) executives.

FALSE

The extranet is a private piece of a company's Internet network that is made available to
customers and/or vendor partners on the basis of secured access by a unique password.

Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-01 Evaluate the ethical ramifications of recent technological advances.

8-17
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
5. Technological advances over the last two decades have made it more difficult to pass the
(p. 158) personal data of customers from one place to another.

FALSE

A major concern for customers about technology causing a loss of privacy is that companies
now have the technical capability to send their personal data to any part of the world to take
advantage of lower labor costs.

Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-01 Evaluate the ethical ramifications of recent technological advances.

6. Technological advances over the last two decades have made it possible for some employers
(p. 158) to read the personal e-mails that employees send from their workstations.

TRUE

Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-01 Evaluate the ethical ramifications of recent technological advances.

7. One of the ways in which multinational corporations lower their expenses is by shipping work
(p. 158) to countries with lower labor costs.

TRUE

Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-01 Evaluate the ethical ramifications of recent technological advances.

8. Information, once digitized, cannot be sent over a fiber-optic cable.


(p. 158)
FALSE

Technically, anything that can be digitized can be sent over a fiber-optic cable.

Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-01 Evaluate the ethical ramifications of recent technological advances.

8-18
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
9. Customer service calls and computer tech support are examples of services that cannot be
(p. 158) outsourced to another country.

FALSE

Technological advances make it possible for customer service calls to be answered by call
centers established in other parts of the world.

Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-01 Evaluate the ethical ramifications of recent technological advances.

10. Sending digitized information across fiber-optic wires raises no ethical questions.
(p. 159)
FALSE

Sending digitized information across fiber-optic wires raises several ethical issues, an example
of which is—should the customer be notified that his or her personal information is being sent
to and processed in another country?

Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-01 Evaluate the ethical ramifications of recent technological advances.

11. Employers feel it necessary to monitor employees at the workplace because they have an
(p. 159) obligation to their stakeholders to operate as efficiently as possible.

TRUE

Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-02 Explain the opposing employer and employee views of privacy at work.

12. From an employer's perspective, monitoring an employee's computer activity at the workplace
(p. 159) is necessary to map their productivity.

TRUE

Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-02 Explain the opposing employer and employee views of privacy at work.

8-19
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
13. The availability of ongoing technological advancements has made it easier to determine
(p. 160) precisely where work ends and personal life begins.

FALSE

The availability of ongoing technological advancements has made it increasingly difficult to


determine precisely where work ends and personal life begins.

Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-02 Explain the opposing employer and employee views of privacy at work.

14. The argument over privacy at work traditionally centered on the amount of time that
(p. 160) employees were on-site.

TRUE

Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-02 Explain the opposing employer and employee views of privacy at work.

15. The work arrangement which allows employees to work from locations other than their office
(p. 160) and log into their company's network remotely is known as telecommuting.

TRUE

Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-02 Explain the opposing employer and employee views of privacy at work.

16. Telecommuting does not allow employees any degree of flexibility in terms of the location from
(p. 160) which they work.

FALSE

Telecommuting allows employees to work from home (or anywhere) and log in to their
company's network remotely.

Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-02 Explain the opposing employer and employee views of privacy at work.

17. Telecommuting allows employees a certain degree of flexibility in terms of their work hours.
(p. 160-
161)
TRUE

Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-02 Explain the opposing employer and employee views of privacy at work.

8-20
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
18. With advances in technology, the availability of employees in the business environment is no
(p. 161) longer defined by their accessibility.

FALSE

With the development of e-mail and phone technology, the availability of employees in the
business environment is now being defined by their accessibility.

Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-02 Explain the opposing employer and employee views of privacy at work.

19. Advances in technology make it harder for employers to assign employees work outside the
(p. 161) workplace.

FALSE

With the development of e-mail and phone technology, the availability of employees in the
business environment is now being defined by their accessibility.

Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-02 Explain the opposing employer and employee views of privacy at work.

20. According to Adam Moore, consent given by employees with little choice is referred to as thick
(p. 161) consent.

FALSE

According to Adam Moore, consent given by employees with little choice is referred to as thin
consent.

Blooms: Remember
Difficulty: 2 Medium
Learning Objective: 08-03 Distinguish between thin and thick consent.

21. Thin consent leaves employees with little choice regarding the monitoring of their web activity
(p. 161) at the workplace.

TRUE

Blooms: Remember
Difficulty: 2 Medium
Learning Objective: 08-03 Distinguish between thin and thick consent.

8-21
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
22. Thin consent is based on the assumption that the employee can easily find another job.
(p. 161)
FALSE

Thin consent is based on the assumption that jobs are hard to come by and the employee is
not in a position to quit on principle and risk temporary unemployment while seeking a position
with another company.

Blooms: Remember
Difficulty: 2 Medium
Learning Objective: 08-03 Distinguish between thin and thick consent.

23. When jobs are plentiful and an employee would have no difficulty finding another position,
(p. 161- then the consent given to the monitoring policy of a company is referred to as thin consent.
162)

FALSE

When jobs are plentiful and an employee would have no difficulty finding another position,
then the consent given to the monitoring policy of a policy is thick consent.

Blooms: Remember
Difficulty: 2 Medium
Learning Objective: 08-03 Distinguish between thin and thick consent.

24. One of the arguments cited by employers for the use of web-monitoring at the workplace is the
(p. 164) concept of vicarious liability.

TRUE

Blooms: Remember
Difficulty: 2 Medium
Learning Objective: 08-04 Evaluate the concept of vicarious liability.

25. Vicarious liability is a legal concept that means a party may be held responsible for injury or
(p. 164) damage only if he or she were actively involved in an incident.

FALSE

Vicarious liability is a legal concept that means a party may be held responsible for injury or
damage even when he or she was not actively involved in an incident.

Blooms: Remember
Difficulty: 2 Medium
Learning Objective: 08-04 Evaluate the concept of vicarious liability.

8-22
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
26. Parties charged with vicarious liability are never in a supervisory role over the person or
(p. 164) parties personally responsible for the injury or damage.

FALSE

Parties charged with vicarious liability are generally in a supervisory role over the person or
parties personally responsible for the injury or damage.

Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-04 Evaluate the concept of vicarious liability.

27. The implications of vicarious liability are that the party charged is responsible for the actions of
(p. 164) his or her subordinates.

TRUE

Blooms: Remember
Difficulty: 2 Medium
Learning Objective: 08-04 Evaluate the concept of vicarious liability.

28. Parents can be charged with vicarious liability for the actions of their children.
(p. 164)
TRUE

Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-04 Evaluate the concept of vicarious liability.

29. According to the legal concept of cyberliability, employers can be held liable for the actions of
(p. 165) their employees through Internet communications to the same degree as if they had written
those communications on company letterhead.

TRUE

Blooms: Remember
Difficulty: 2 Medium
Learning Objective: 08-04 Evaluate the concept of vicarious liability.

30. Cyberliability applies the existing legal concept of liability to the field of computers.
(p. 165)
TRUE

Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-04 Evaluate the concept of vicarious liability.

31. Cyberliability results in litigation for harassment through spam, obscenity, and pornography.
(p. 165)
TRUE

Blooms: Remember

8-23
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Difficulty: 2 Medium
Learning Objective: 08-04 Evaluate the concept of vicarious liability.

32. The categories of litigation for cyberliability extend to defamation and libel.
(p. 165)
TRUE

Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-04 Evaluate the concept of vicarious liability.

33. With employers being able to monitor every keystroke on a computer, track every website
(p. 166) visited, and record every call made by employees, the workplace is beginning to display
Orwellian characteristics.

TRUE

Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-05 Analyze an organization's employee-surveillance capabilities.

34. Copying and distributing unpaid-for proprietary software is not a violation of computer ethics.
(p. 167)
FALSE

Copying and distributing unpaid-for proprietary software is a violation of computer ethics.

Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-05 Analyze an organization's employee-surveillance capabilities.

35. Using a computer to appropriate the intellectual output of another person is an example of
(p. 167) ethical employee behavior.

FALSE

Using a computer to appropriate the intellectual output of other people is not considered
ethical behavior.

Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-05 Analyze an organization's employee-surveillance capabilities.

36. Computer ethics extends to considering the social consequences of the program being written
(p. 167) and ensuring that your work doesn't harm people.

TRUE

Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-05 Analyze an organization's employee-surveillance capabilities.

8-24
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
37. Employee turnover, a long-term effect of monitoring employees, costs organizations
(p. 166- thousands of dollars in recruitment costs and training.
167)

TRUE

Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-05 Analyze an organization's employee-surveillance capabilities.

38. Packet-sniffing software can be used to monitor employees' private accounts, as long as they
(p. 168) are accessed on workplace networks or phone lines.

TRUE

Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-05 Analyze an organization's employee-surveillance capabilities.

39. Keystroke loggers can only capture information that is not deleted.
(p. 168)
FALSE

Keystroke loggers can capture every key pressed on a computer keyboard. These systems
will even record information that is typed and then deleted.

Blooms: Remember
Difficulty: 2 Medium
Learning Objective: 08-05 Analyze an organization's employee-surveillance capabilities.

40. Video surveillance, under federal law, is acceptable where the camera focuses on publicly
(p. 168) accessible areas.

TRUE

Blooms: Remember
Difficulty: 2 Medium
Learning Objective: 08-05 Analyze an organization's employee-surveillance capabilities.

Multiple Choice Questions

8-25
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
41. Which of the following is true of technological advances over the last two decades?
(p. 158)

A. They have not changed the work environment.


B. They have increased employees' accessibility.
C. They have raised no new ethical issues.
D. They have limited the mobility of employees.

Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-01 Evaluate the ethical ramifications of recent technological advances.

42. The term "_____" refers to a company's internal website that contains information for
(p. 158) employee access only.

A. intranet
B. extranet
C. Ethernet
D. cybernet

Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-01 Evaluate the ethical ramifications of recent technological advances.

43. Emily, a website designer, is hired by an organization to create an internal website that
(p. 158) contains information meant to be accessed solely by employees. This website is the
company's _____.

A. cybernet
B. intranet
C. Ethernet
D. extranet

Blooms: Understand
Difficulty: 1 Easy
Learning Objective: 08-01 Evaluate the ethical ramifications of recent technological advances.

8-26
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
44. The term "_____" refers to a private piece of a company's Internet network that is made
(p. 158) available to customers and/or vendor partners on the basis of secured access by unique
password.

A. extranet
B. intranet
C. Ethernet
D. cybernet

Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-01 Evaluate the ethical ramifications of recent technological advances.

45. Jordan, a software engineer, is responsible for maintaining the private piece of his company's
(p. 158) internet network that is accessible to clients by means of a unique password. This piece of the
company's network is known as the _____.

A. intranet
B. cybernet
C. extranet
D. Ethernet

Blooms: Understand
Difficulty: 1 Easy
Learning Objective: 08-01 Evaluate the ethical ramifications of recent technological advances.

46. Companies can make vast amounts of information available to customers through their _____
(p. 158) sites.

A. extranet
B. intranet
C. cybernet
D. Ethernet

Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-01 Evaluate the ethical ramifications of recent technological advances.

8-27
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
47. Which of the following is a disadvantage of technological advances in a workplace?
(p. 158)

A. Loss of privacy
B. Limited employee mobility
C. Reduced employee accessibility
D. Limited access to customers

Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-01 Evaluate the ethical ramifications of recent technological advances.

48. Because of recent advances in technology, information can be digitized and transmitted over
(p. 158) fiber-optic cables. What implications does this have?

A. Customer services and tech support services are now bound by geographic borders.
B. Companies have fewer ways in which they can attend to the needs of their customers.
C. Customers' personal information can no longer be sent to or processed in other countries.
D. Companies can cut their expenses by shipping work to countries with low labor costs.

Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-01 Evaluate the ethical ramifications of recent technological advances.

49. How have advances in technology affected customers?


(p. 158)

A. Their personal data can no longer be sent to any part of the world.
B. They have round-the-clock access to customer services.
C. They no longer have access to after-hours tech support services.
D. Their personal data cannot be digitized, thus protecting their privacy.

Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-01 Evaluate the ethical ramifications of recent technological advances.

8-28
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
50. Because of recent advances in technology, information can be digitized and transmitted over
(p. 159) fiber-optic cables. What privacy-related issue does this raise for the customer?

A. Should customers be charged more now that companies can offer them better customer
servicing?
B. Should customers be charged less now that companies have ways in which they can
reduce production costs?
C. Should customer service be relative to the amount of money customers spend on company
products?
D. Should customers be informed that their personal information is being sent to other
countries?

Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-01 Evaluate the ethical ramifications of recent technological advances.

51. Resolving the different perspectives on the issue of monitoring employee activity is difficult
(p. 160) because:

A. federal laws for video surveillance in public areas do not exist.


B. technological advances have had no impact on the workplace.
C. it is legal for employers to wiretap employees' personal phones.
D. it is difficult to determine where work ends and personal life begins.

Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-02 Explain the opposing employer and employee views of privacy at work.

52. The argument over privacy at work has traditionally centered on:
(p. 160)

A. the designations held by different employees.


B. the amount of time that employees were on-site.
C. whether the organization was vertically structured.
D. whether the organization was horizontally structured.

Blooms: Remember
Difficulty: 2 Medium
Learning Objective: 08-02 Explain the opposing employer and employee views of privacy at work.

8-29
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
53. _____ refers to a work arrangement that allows employees to work from home and log into to
(p. 160) the company's network remotely.

A. Telecommuting
B. Wiretapping
C. Hyper-networking
D. Cybersquatting

Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-02 Explain the opposing employer and employee views of privacy at work.

54. Because of _____, which allows employees to log into their company's network remotely from
(p. 160) any location, the concept of being "at work" is blurred.

A. wiretapping
B. hyper-networking
C. telecommuting
D. cybersquatting

Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-02 Explain the opposing employer and employee views of privacy at work.

55. _____ has made it difficult for organizations to precisely measure the amount of time that
(p. 160) employees are on-site.

A. Keystroke loggers
B. Smart ID cards
C. Telecommuting
D. Packet-sniffing software

Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-02 Explain the opposing employer and employee views of privacy at work.

56. Which of the following is true of telecommuting?


(p. 161)

A. It allows employees a certain degree of flexibility in terms of their work hours.


B. It allows employees no flexibility in terms of the locations from which they work.
C. It makes it easier for employers to measure the amount of time employees are on-site.
D. It makes it easier for employers to monitor the Internet activity of their employees.

Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-02 Explain the opposing employer and employee views of privacy at work.

8-30
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
57. Because of the changes that telecommuting has introduced into the work environment:
(p. 161)

A. employers find it easy to tabulate the time employees spend working.


B. employees are unable to take care of personal needs during work hours.
C. the availability of employees is being defined by their accessibility.
D. the distinction between personal life and work life is clearly perceived.

Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-02 Explain the opposing employer and employee views of privacy at work.

58. Which of the following is a benefit of telecommuting?


(p. 161)

A. Employers find it easy to keep track of the number of hours employees put into a project.
B. Employees cannot be contacted by employers after a company's work hours.
C. Employers cannot request employees to work after a company's work hours.
D. Employees have the flexibility of taking care of their personal needs during work hours.

Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-02 Explain the opposing employer and employee views of privacy at work.

59. According to Adam Moore, the distinction between the two types of consent to employee-
(p. 161) monitoring—thin and thick—is created by _____.

A. the state of the job market


B. cybersquatting
C. the organization's structure
D. wiretapping

Blooms: Remember
Difficulty: 2 Medium
Learning Objective: 08-03 Distinguish between thin and thick consent.

8-31
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
60. Michelle receives formal notification from her company, stating that it will be monitoring all her
(p. 161) e-mail and web activity. The notification also indicates that her continued employment with the
company will depend on her agreement to abide by its monitoring policy. Because jobs are
hard to come by, Michelle accepts. She has given the company _____ consent.

A. thick
B. implicit
C. thin
D. tertiary

Blooms: Apply
Difficulty: 2 Medium
Learning Objective: 08-03 Distinguish between thin and thick consent.

61. According to Adam Moore, which of the following is true of thin consent?
(p. 161)

A. It is given when the employee has no other choice.


B. It is not dependent upon the state of the job market.
C. It is consent given on behalf of somebody else.
D. It is a form of consent that is not legally binding.

Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-03 Distinguish between thin and thick consent.

62. Andrew is informed by his company that he should be open to monitoring as a part of the
(p. 161) company's plans to improve productivity. Because of his qualifications and work experience,
he knows that he would have no difficulty finding a similar position in another company.
Andrew agrees to the policy, knowing that he can switch jobs if the new policy affects his job
satisfaction. He has given his company _____ consent.

A. thick
B. forced
C. thin
D. tertiary

Blooms: Apply
Difficulty: 2 Medium
Learning Objective: 08-03 Distinguish between thin and thick consent.

8-32
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
63. Which of the following is true of thick consent?
(p. 161)

A. It is given when employees have little or no choice.


B. It is not affected by the state of the job market.
C. It signals that the consent of employees was forced.
D. It is given when employees have realistic job alternatives.

Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-03 Distinguish between thin and thick consent.

64. _____ is a legal concept that means a party may be held responsible for injury or damage
(p. 164) even when he or she was not actively involved in an incident.

A. Thin consent
B. Vicarious liability
C. Ratability
D. Thick consent

Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-04 Evaluate the concept of vicarious liability.

65. Which of the following is true of parties charged with vicarious liability?
(p. 164)

A. They are held responsible for the actions of their subordinates.


B. They are seldom in supervisory or managerial roles.
C. They only comprise the individuals directly responsible for the damage.
D. They only comprise individuals who were the recipients of the damage.

Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-04 Evaluate the concept of vicarious liability.

66. The legal concept of _____ holds employers liable for the actions of their employees through
(p. 165) Internet communications to the same degree as if they had written those communications on
company letterhead.

A. cyberliability
B. cybersquatting
C. hyper-networking
D. virtual-mirroring

Blooms: Remember
Difficulty: 2 Medium
Learning Objective: 08-04 Evaluate the concept of vicarious liability.

8-33
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
67. Cyberliability:
(p. 165)

A. does not include harassment that reaches employees' via e-mail.


B. applies the legal concept of liability to the world of computers.
C. is only enforceable in unregistered commercial Internet cafés.
D. does not cover categories like obscenity and pornography.

Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-04 Evaluate the concept of vicarious liability.

68. Which of the following is true of cyberliability?


(p. 165)

A. It extends to any form of harassment that reaches an employee via e-mail.


B. It has no negative repercussions for the employer or the company involved.
C. It only applies to crimes that involve the patrons of commercial Internet cafés.
D. It does not cover categories like racial discrimination, defamation, and libel.

Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-04 Evaluate the concept of vicarious liability.

69. Which of the following explains why employers are in favor of monitoring and restricting the
(p. 166) actions of their employees?

A. The implications of vicarious liability for employers


B. The federal restrictions placed upon wiretapping
C. The reluctance of employees to give thick consent
D. The federal restrictions placed on cybersquatting

Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-04 Evaluate the concept of vicarious liability.

70. Which of the following is an argument against creating a "locked-down" work environment?
(p. 167)

A. Vicarious liability can have serious implications for the employer.


B. Cyberliability can have serious implications for the employer.
C. Employee turnover tends not to affect the company financially.
D. Employees who resent being constrained might leave the company.

Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-04 Evaluate the concept of vicarious liability.

8-34
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
71. Which of the following actions does the Computer Ethics Institute consider unethical?
(p. 167)

A. Logging into one's company's intranet and extranet


B. Enabling cookies on one's own computer
C. Clearing the cache of one's own computer
D. Copying proprietary software without paying for it

Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-04 Evaluate the concept of vicarious liability.

72. Which of the following actions does the Computer Ethics Institute consider ethical?
(p. 167)

A. Making one's password easily available to coworkers


B. Considering the social consequences of one's work
C. Using corporate software for private use
D. Using pirated software for commercial purposes

Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-04 Evaluate the concept of vicarious liability.

73. Which of the following is true of the technology used to monitor employees at the workplace?
(p. 168)

A. Keystroke loggers can track employees' location while they move through the workplace.
B. Packet-sniffing software can intercept and archive all communications on a network.
C. Cybersquatting software can automatically monitor breaks between receiving calls.
D. "Smart" ID cards can be employed to capture every key pressed on a computer keyboard.

Blooms: Remember
Difficulty: 2 Medium
Learning Objective: 08-05 Analyze an organization's employee-surveillance capabilities.

74. Which of the following is true of keystroke loggers?


(p. 168)

A. They can record typed-in information even if it is deleted.


B. They can videotape employees in public areas.
C. They can analyze and archive calls made on personal phones.
D. They can track the movement of employees in the workplace.

Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-05 Analyze an organization's employee-surveillance capabilities.

8-35
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
75. Under federal law, video surveillance is legal only if:
(p. 168)

A. the camera focuses on publicly accessible areas.


B. the camera is placed in employee rest areas.
C. the cameras aren't focused on customers.
D. the cameras aren't focused on employees.

Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-05 Analyze an organization's employee-surveillance capabilities.

Fill in the Blank Questions

76. The _____ is a company's internal website, containing information for employee access only.
(p. 158)
intranet

Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-01 Evaluate the ethical ramifications of recent technological advances.

77. The _____ is a private piece of a company's network that is made available to customers or
(p. 158) vendor partners using secured access with a unique password.

extranet

Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-01 Evaluate the ethical ramifications of recent technological advances.

78. Information can be sent over fiber-optic cables only after it has been _____.
(p. 158)
digitized

Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-01 Evaluate the ethical ramifications of recent technological advances.

79. The ability to send digitized information over _____ led to the establishment of call centers.
(p. 158)
fiber-optic cables

Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-01 Evaluate the ethical ramifications of recent technological advances.

8-36
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
80. ______ refers to the employees' ability to work from home and log into their company's
(p. 160) network remotely.

Telecommuting

Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-02 Explain the opposing employer and employee views of privacy at work.

81. _____ is a work arrangement that enables employees to log into their company's network via a
(p. 160) secure gateway such as a virtual private network.

Telecommuting

Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-02 Explain the opposing employer and employee views of privacy at work.

82. The new capability of _____ has blurred the concept of employees being "at work."
(p. 160)
telecommuting

Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-02 Explain the opposing employer and employee views of privacy at work.

83. Advances in technology and the popularity of telecommuting now define the availability of
(p. 161) employees by their _____.

accessibility

Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-02 Explain the opposing employer and employee views of privacy at work.

84. According to Adam Moore, when an employee consents to being monitored by a company
(p. 161) because he or she has no choice, the employee has given _____ consent.

thin

Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-03 Distinguish between thin and thick consent.

85. According to Adam Moore, if jobs are plentiful and an employee would have no difficulty in
(p. 161) finding another position, then the consent given to a company's monitoring policy is _____
consent.

thick

Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-03 Distinguish between thin and thick consent.

8-37
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
86. Vicarious _____ is a legal concept that means a party may be held responsible for injury or
(p. 164) damage even when he or she was not actively involved in an incident.

liability

Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-04 Evaluate the concept of vicarious liability.

87. The implications of vicarious liability are that the party charged is responsible for the actions of
(p. 164) his or her _____.

subordinates

Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-04 Evaluate the concept of vicarious liability.

88. _____ is a legal concept that holds employers liable for the actions of their employees in their
(p. 164) Internet communications to the same degree as if those employers had written those
communications on company letterhead.

Cyberliability

Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-04 Evaluate the concept of vicarious liability.

89. The _____ argument and the recent availability of capable technology have been driving
(p. 166) companies toward creating an Orwellian work environment.

vicarious liability

Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-05 Analyze an organization's employee-surveillance capabilities.

90. _____ can intercept, analyze, and archive all communications on a network.
(p. 168)
Packet-sniffing software

Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-05 Analyze an organization's employee-surveillance capabilities.

91. _____ can be employed to capture every key pressed on a computer keyboard.
(p. 168)
Keystroke loggers

Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-05 Analyze an organization's employee-surveillance capabilities.

8-38
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
92. _____ can record information that has been typed into a computer using a keyboard even
(p. 168) after the information has been deleted.

Keystroke loggers

Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-05 Analyze an organization's employee-surveillance capabilities.

93. _____, under federal law, is acceptable where the camera focuses on publicly accessible
(p. 168) areas.

Video surveillance

Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-05 Analyze an organization's employee-surveillance capabilities.

94. Video surveillance, under federal law, is acceptable where the camera focuses on _____
(p. 168) accessible areas.

publicly

Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-05 Analyze an organization's employee-surveillance capabilities.

95. _____ can track an employee's location while he or she moves through the workplace.
(p. 168)
Smart ID cards

Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-05 Analyze an organization's employee-surveillance capabilities.

Essay Questions

8-39
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
96. How did the digitizing of information lead to the establishment of call centers in other
(p. 158) countries?

Digitized information can be sent over fiber-optic cables. With the availability of a network of
fiber-optic cable that spans the globe and an increasingly educated global workforce that is
fluent in English, the potential cost savings for American corporations in shipping work
overseas to countries with lower labor costs is becoming increasingly attractive. By
establishing call centers in those countries, companies cut down on their costs while giving
customers access to customer services round-the-clock.

Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-01 Evaluate the ethical ramifications of recent technological advances.

97. Explain the employers' perspective on monitoring employees' activity at the workplace.
(p. 159)

From an employer's viewpoint, the productivity of employees during their time at work
represents the performance portion of the pay-for-performance contract they entered into with
the company when they were hired. Therefore, their actions during that time are at the
discretion of the company. Other than lunch and any scheduled breaks, all their activity should
be work-related, and any monitoring of that activity should not be regarded as an infringement
of privacy. The organization has an obligation to its stakeholders to operate as efficiently as
possible, and to do so, it must ensure that company resources are not being misused or stolen
and that company data and proprietary information are being closely guarded. The issue of
vicarious liability, which holds employers responsible for the misconduct of their employees,
also makes monitoring their actions a policy worth implementing.

Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-02 Explain the opposing employer and employee views of privacy at work.

8-40
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
98. Explain the differences between thin and thick consent.
(p. 161)

When an employee receives formal notification that the company will be monitoring all his or
her e-mail and web activity—either at the time of hire or during employment—and it is made
clear that his or her continued employment with the company will be dependent on the
employee's agreement to abide by that monitoring, the consent given is said to be thin consent
if the employee does so because he or she has no other alternative. Thick consent is consent
given when an employee has an alternative to unacceptable monitoring. For example, if jobs
are plentiful and the employee would have no difficulty in finding another position, then the
employee has a realistic alternative for avoiding an unacceptable policy.

Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 08-03 Distinguish between thin and thick consent.

99. Discuss vicarious liability and cyberliability. List the top categories of litigation in cyberliability.
(p. 164)

Vicarious liability is a legal concept that means a party may be held responsible for injury or
damage even when he or she was not actively involved in an incident. The implications of
vicarious liability are that the party charged is responsible for the actions of his or her
subordinates.
Cyberliability is a legal concept that holds employers liable for the actions of their employees
in their Internet communications to the same degree as if those employers had written those
communications on company letterhead. The top categories of litigation of cyber-liability are:
discrimination, harassment, obscenity and pornography, defamation and libel, information
leaks, and spam.

Blooms: Remember
Difficulty: 2 Medium
Learning Objective: 08-04 Evaluate the concept of vicarious liability.

8-41
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
100. Explain how packet-sniffing software and keystroke loggers can be used to monitor employees
(p. 168) at the workplace.

Packet-sniffing software can intercept, analyze, and archive all communications on a network,
including employee e-mail, chat sessions, file sharing, and Internet browsing. Employees who
use the workplace network to access personal e-mail accounts not provided by the company
are not protected. Their private accounts, as long as they are accessed on workplace network
or phone lines, can be monitored.
Keystroke loggers can be employed to capture every key pressed on a computer keyboard.
These systems will even record information that is typed and then deleted.

Blooms: Remember
Difficulty: 2 Medium
Learning Objective: 08-05 Analyze an organization's employee-surveillance capabilities.

8-42
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.

You might also like