978-1259535437 Test Bank Chapter 8 Part 2

subject Type Homework Help
subject Pages 12
subject Words 3371
subject Authors Andrew Ghillyer

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
8-19
52. The argument over privacy at work has traditionally centered on:
53. _____ refers to a new capability that allows employees to work from home and log into to
their company's network remotely.
54. Which of the following statements is true of the effects of telecommuting?
page-pf2
55. _____ has made it difficult for organizations to precisely measure the amount of time that
employees are on-site.
56. Which of the following statements is true of telecommuting?
page-pf3
57. Which of the following is true of the changes that telecommuting has introduced into the
work environment?
58. Telecommuting has changed the work environment in a way that:
59. _____ will create a distinction between thin consent and thick consent according to Adam
Moore.
page-pf4
60. Michelle receives a formal notification from her company stating that it will be monitoring
all her e-mail and web activity. The notification also indicates that her continued employment
with the company will depend on her agreement to abide by its monitoring policy. Because jobs
are hard to come by, Michelle accepts. The consent given by Michelle can be classified as _____
consent.
61. Which of the following statements is true of thin consent according to Adam Moore?
page-pf5
62. Andrew is informed by his company that he should be open to monitoring as a part of the
company's plans to improve productivity. Because of his qualifications and work experience, he
knows that he would have no difficulty finding a similar position in another company. Andrew
agrees to the policy, knowing that he can switch jobs if the new policy affects his job satisfaction.
He has given his company _____ consent.
63. Which of the following statements is true of thick consent?
64. _____ is a legal concept that means a party may be held responsible for injury or damage
even when he or she was not actively involved in an incident.
page-pf6
65. Which of the following statements is true of parties charged with vicarious liability?
66. The legal concept of _____ holds employers liable for the actions of their employees
through Internet communications to the same degree as if they had written those
communications on company letterhead.
page-pf7
67. The concept of cyberliability:
68. Which of the following is true of cyberliability?
D. It does not cover categories like racial discrimination, defamation, and libel.
69. Which of the following explains why employers are in favor of monitoring and restricting
the actions of their employees?
page-pf8
70. What is the reason for the increased monitoring of employees at work by organizations?
71. Which of the following actions does the Computer Ethics Institute consider unethical?
page-pf9
8-27
72. Which of the following actions does the Computer Ethics Institute consider ethical?
73. Which of the following is true of the technology used to monitor employees at the
workplace?
74. Which of the following statements is true of keystroke loggers?
page-pfa
75. Under federal law, video surveillance is legal only if:
Accessibility: Keyboard Navigation
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-05 Analyze an organization's employee-surveillance capabilities.
Fill in the Blank Questions
76. The _____ is a company's internal website, containing information for employee access
only.
page-pfb
77. The _____ is a private piece of a company's network that is made available to customers or
vendor partners using secured access with a unique password.
78. Information can be sent over fiber-optic cables only after it has been _____.
79. The ability to send digitized information over _____ led to the establishment of call
centers.
80. _____ refers to employees' ability to work from home and log into their company's network
remotely.
page-pfc
81. _____ is a work arrangement that enables employees to log into their company's network
via a secure gateway such as a virtual private network.
82. The new capability of _____ has blurred the concept of employees being "at work."
83. Advances in technology and the popularity of telecommuting now define the availability of
employees by their _____.
84. According to Adam Moore, when an employee consents to being monitored by a company
because he or she has no choice, the employee has given _____ consent.
page-pfd
85. According to Adam Moore, if jobs are plentiful and an employee would have no difficulty in
finding another position, then the consent given to a company's monitoring policy is _____
consent.
86. Vicarious _____ is a legal concept that means a party may be held responsible for injury or
damage even when he or she was not actively involved in an incident.
87. The implications of vicarious liability are that the party charged is responsible for the
actions of his or her _____.
88. _____ is a legal concept that holds employers liable for the actions of their employees in
their Internet communications to the same degree as if those employers had written those
communications on company letterhead.
page-pfe
89. The _____ argument and the recent availability of capable technology have been driving
companies toward creating an Orwellian work environment.
90. _____ can intercept, analyze, and archive all communications on a network.
91. _____ can be employed to capture every key pressed on a computer keyboard.
92. _____ can record information that has been typed into a computer using a keyboard even if
the information is deleted after typing.
page-pff
8-33
93. _____, under federal law, is acceptable where the camera focuses on publicly accessible
areas.
94. Video surveillance, under federal law, is acceptable where the camera focuses on _____
accessible areas.
95. _____ can track an employee's location while he or she moves through the workplace.
Blooms: Remember
Difficulty: 1 Easy
Learning Objective: 08-05 Analyze an organization's employee-surveillance capabilities.
Essay Questions
page-pf10
96. How did the digitizing of information lead to the establishment of call centers in other
countries?
97. Explain the employers' perspective on monitoring employees' activity at the workplace.
page-pf11
98. Explain the differences between thin and thick consent.
99. Discuss vicarious liability and cyberliability. List the top categories of litigation in
cyberliability.
page-pf12
100. Explain how packet-sniffing software and keystroke loggers can be used to monitor
employees at the workplace.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.