Professional Documents
Culture Documents
204-963142324-Chapter 8 Quiz PDF
204-963142324-Chapter 8 Quiz PDF
3. An extranet is a company's internal Web site, which contains information for employee access
only.
True False
5. The potential cost savings for American corporations who ship work to countries with lower
labor costs is becoming increasingly unattractive due to rising wages.
True False
6. The first wave of technological advance came with the establishment of call centers in other
parts of the world.
True False
7. The ethical obligations of new technical capability are only just being realized.
True False
8. Desktop computers, e-mail, instant messaging, and the World Wide Web have changed our
work environments and created a new world of ethical dilemmas.
True False
9. According to the employer position, all employee activity should be work-related, and any
monitoring of that activity is an infringement of employee privacy.
True False
10. An organization has an obligation to its stakeholders to operate as efficiently as possible, and
to do so it must ensure that company resources are not misused.
True False
11. Employees feel that their time at work represents the productivity for which they receive an
agreed upon hourly wage or salary; therefore, it's their employer's prerogative to monitor their
activities at work.
True False
12. Employees feel that electronic monitoring implies that they can't be trusted.
True False
8-1
Chapter 8 Quiz
13. The ability to work outside of your office and log in to your company network is known as
telecommuting.
True False
14. Differing opinions regarding monitoring employees at work are difficult because the
willingness to compromise has fallen in direct relation to the prevailing job market.
True False
16. The time of day or the day of the week significantly grows in importance when employers
attempt to contact employees about work-related issues.
True False
17. If an employee receives formal notification that the company will monitor all e-mail and
Web activity, and that notification makes clear that his/her continued employment with the
company depends on the employee's agreement to abide by that monitoring, then the employee
has given thick consent.
True False
18. When jobs are plentiful and an employee would have no difficulty finding another position,
then the consent given to the monitoring policy is thin.
True False
19. Though employees may resent the availability of technology that allows employers to
monitor every key stroke on their computers, it is often the documents written on their machines
that do the most harm.
True False
20. Parties charged with cyber-liability are generally in a supervisory role over the person or
parties personally responsible for the injury or damage.
True False
21. Implied liability is a legal concept that a party may be held responsible for injury or damage,
even if that party was not actively involved in the incident.
True False
22. Cyber-liability applies to the existing legal concept of liability to a new worldcomputers.
True False
23. There are many parallels between George Orwell's novel, 1984, and the current debate over
the right to privacy in the workplace.
True False
24. The liability argument and the recent availability of capable technology may be driving this
move towards an Orwellian work environment.
True False
8-2
Chapter 8 Quiz
25. "Thou shalt not use a computer to monitor employees" is one of the ten commandments of
computer ethics.
True False
26. "Thou shalt not appropriate other people's intellectual output" is one of the ten
commandments of computer ethics.
True False
27. In today's society, your employer's ability to intrude upon your private life is relatively the
same as it was a decade ago.
True False
28. "Smart" ID cards are tools used to monitor employees at the workplace, and can track an
employee's location while he or she moves through the workplace.
True False
29. The ______ is a private piece of a company's network made available to customers or vendor
partners using secured access with a unique password.
A. extranet
B. intranet
C. corpnet
D. govnet
30. The ______ is a company's internal Web site, containing information for employee access
only.
A. extranet
B. intranet
C. corpnet
D. govnet
31. As a(n) ______, companies now have the technical capability to send your personal data to
any part of the world in order to take advantage of lower labor costs.
A. shareholder
B. employer
C. employee
D. customer
32. The potential cost savings for ______ corporations who ship work overseas to countries with
lower labor costs is becoming increasingly attractive.
A. Chinese
B. Asian
C. American
D. African
8-3
Chapter 8 Quiz
33. The first wave of this technological advance came with the establishment of ______.
A. fiber-optic cables
B. extranets
C. call centers
D. intranets
35. Which of the following has NOT changed with our work environment over the last two
decades?
A. Desktop computers
B. Instant messaging
C. The World Wide Web
D. Face-to-face communication
36. As an employee of an organization, your productivity during your time at work represents the
performance portion of the ______ contract you entered into with the company when you were
hired.
A. piece-rate
B. pay-for-performance
C. private
D. political
38. According to employees, employers should not intrude upon their ______.
A. Internet activities
B. e-mails
C. civil rights
D. work calls
8-4
Chapter 8 Quiz
40. Why has arriving at a satisfactory resolution of the opposing arguments surrounding
electronic monitoring proven to be difficult?
A. Both sides are unwilling to negotiate the issue
B. Employers view electronic monitoring as a necessity to preserve the interests of their
stakeholders
C. Employees feel their corporate culture will be negatively impacted
D. It has become increasingly difficult to determine precisely where work ends and where an
employee's personal life begins
41. The ability to work outside of your office and log into your company network refers to
_______.
A. telecommuting
B. cyber-networking
C. virtual officiating
D. blogging
42. The new capability of ______ has blurred the concept of "at work."
A. instant messaging
B. e-mail
C. telecommunication
D. blogs
43. In this new environment, the concept of being at work has become far more ______.
A. rigid
B. flexible
C. unyielding
D. strict
44. Adam Moore has pointed out that ______ will inevitably create a distinction between two
types of consent: thin and thick.
A. the state of the job market
B. the state of the company
C. the state of the government
D. the state of the economy
45. If an employee receives formal notification that the company will be monitoring all e-mail
and Web activity and it has made clear in that notification that continued employment with the
company will be dependent on the employee's agreement to abide by that monitoring, then the
employee has given ______.
A. thick consent
B. conditional consent
C. thin consent
D. mutual consent
8-5
Chapter 8 Quiz
46. If jobs are plentiful and the employee would have no difficulty finding another position, then
the consent given to the monitoring policy is ______.
A. thick consent
B. conditional consent
C. thin consent
D. mutual consent
50. The text lists all of the following companies as examples of businesses that have recently
used technology to monitor ethical behavior, except for:
A. Chevron Corporation
B. Apple, Inc.
C. Xerox Corporation
D. Boeing
8-6
Chapter 8 Quiz
51. What type of liability implies that a party may be held responsible for injury or damage even
thought it was not actively involved in the incident?
A. Cyber
B. Vicarious
C. Associative
D. Mutual
52. What type of liability implies that employer liability for Internet communication behavior is
the same as liability for communication written out on company letterhead?
A. Mutual liability
B. Vicarious liability
C. Associative liability
D. Cyber-liability
53. The extent of cyber-liability can be seen in the all of the following top categories of
litigation, except:
A. injury or physical damage to people or property
B. discrimination
C. obscenity and pornography
D. information leaks
55. What type of software monitors employees at their workplace and can intercept, analyze, and
archive all communications on a network?
A. Hacker
B. Key stroke
C. "Smart" ID
D. Packet-sniffing
56. All of the following are invasive tools used to monitor employees at the workplace, except:
A. keystroke loggers
B. GPS micro-chips
C. "smart" ID cards
D. video surveillance
8-7