Chapter 14: Ethics and cybercrime Flashcards

1
Q

Which of the following is not needed for a fraudulent act?

a. A reason.
b. Pressure.
c. A system with weak internal controls.
d. An opportunity.

A

Which of the following is not needed for a fraudulent act?

a. A reason.
b. Pressure.

c. A system with weak internal controls.

d. An opportunity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The saying that an action is morally right if it is motivated by the goodwill that stems from a sense of duty is known as:

a. Kantianism.
b. hedonism.
c. realism.
d. utilitarianism.

A

The saying that an action is morally right if it is motivated by the goodwill that stems from a sense of duty is known as:

*a. Kantianism.

b. hedonism.
c. realism.
d. utilitarianism.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is not true?

a. Technology is advancing faster than the legislation can keep pace with.
b. The three main types of identity crime are fraud, hacking, and identity theft.
c. The cost of identity crime is not easy to calculate.
d. Much of the identity crime goes unreported.

A

Which of the following is not true?

a. Technology is advancing faster than the legislation can keep pace with.

*b. The three main types of identity crime are fraud, hacking, and identity theft.

c. The cost of identity crime is not easy to calculate.
d. Much of the identity crime goes unreported.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the factors below were not mentioned by Stajano and Wilson as having an influence on human behaviour?

a. Distraction principle.
b. Herd principle.
c. Technology principle.
d. Need and greed principle.

A

Which of the factors below were not mentioned by Stajano and Wilson as having an influence on human behaviour?

a. Distraction principle.
b. Herd principle.

c. Technology principle.

d. Need and greed principle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In terms of IT, spam is a problem because it:

a. can slow down email servers.
b. may spread computer viruses.
c. may affect the job efficiency of employees.
d. all of the options are correct.

A

In terms of IT, spam is a problem because it:

a. can slow down email servers.
b. may spread computer viruses.
c. may affect the job efficiency of employees.

*d. all of the options are correct.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A company discovers that an employee has created a fictitious vendor on the vendor master file and the company has paid a total of $250 000 to this vendor through fake invoices. This is an example of fraud in the:

a. revenue cycle.
b. inventory management cycle.
c. expenditure cycle.
d. cash receipts cycle.

A

A company discovers that an employee has created a fictitious vendor on the vendor master file and the company has paid a total of $250 000 to this vendor through fake invoices. This is an example of fraud in the:

a. revenue cycle.
b. inventory management cycle.
c. expenditure cycle.

d. cash receipts cycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In terms of IT, cookies cannot:

a. ensure the browser does not display ads the user has already seen.
b. ensure the user has adequate protection against online unethical behaviours.
c. track the previous and next sites the user visits.
d. track whether a user has visited the site before.

A

In terms of IT, cookies cannot:

a. ensure the browser does not display ads the user has already seen.

*b. ensure the user has adequate protection against online unethical behaviours.

c. track the previous and next sites the user visits.
d. track whether a user has visited the site before.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is not true?

a. Research studies have found that the incidence of fraud tends to be related to the ethical environment of the organisation.
b. Ethical conducts can be promoted through professional registration.
c. Ethical guidelines exist to guide auditors when making client acceptance decisions when determining the level of non-audit service fees, and on what gifts from the client can be accepted.
d. Codes of ethics should be formal.

A

Which of the following is not true?

a. Research studies have found that the incidence of fraud tends to be related to the ethical environment of the organisation.
b. Ethical conducts can be promoted through professional registration.
c. Ethical guidelines exist to guide auditors when making client acceptance decisions when determining the level of non-audit service fees, and on what gifts from the client can be accepted.

*d. Codes of ethics should be formal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following statements regarding Kantianism is not true?

a. Kantianism is embedded in duty or obligation and encompasses a dignity or respect for the individual.
b. According to Kantianism, a business that is doing respectful things, despite that it is motivated by profits, is acting in a prudent and moral way.
c. Critics point out that Kantianism’s universal obligations do not take into account particular situations.
d. Kantianism is grounded in the notion of respect for the individual.

A

Which of the following statements regarding Kantianism is not true?

a. Kantianism is embedded in duty or obligation and encompasses a dignity or respect for the individual.

*b. According to Kantianism, a business that is doing respectful things, despite that it is motivated by profits, is acting in a prudent and moral way.

c. Critics point out that Kantianism’s universal obligations do not take into account particular situations.
d. Kantianism is grounded in the notion of respect for the individual.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Spam is:

a. Sending unsolicited emails.
b. Acquiring personal details by means of deception.
c. Gaining unauthorised access to a system.
d. Pretending to be someone else in an online transaction.

A

Spam is:

a. Sending unsolicited emails.

b. Acquiring personal details by means of deception.
c. Gaining unauthorised access to a system.
d. Pretending to be someone else in an online transaction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is not an example of malicious code (malware)?

a. Trojan.
b. Virus.
c. Bots.
d. Social engineering.

A

Which of the following is not an example of malicious code (malware)?

a. Trojan.
b. Virus.
c. Bots.

d. Social engineering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following fraud can occur if an employee is responsible for both approving and paying invoices?

a. Paying non-existent suppliers.
b. Inventory theft.
c. Credit fraud.
d. All of the options are correct.

A

Which of the following fraud can occur if an employee is responsible for both approving and paying invoices?

*a. Paying non-existent suppliers.

b. Inventory theft.
c. Credit fraud.
d. All of the options are correct.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following is not an example of online fraud?

a. Paying non-existent suppliers with false invoices.
b. Credit card fraud.
c. Non-existent customers.
d. Phishing.

A

Which of the following is not an example of online fraud?

a. Paying non-existent suppliers with false invoices.

b. Credit card fraud.
c. Non-existent customers.
d. Phishing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The implicit rules that guide us in our everyday behaviour, thoughts and actions are collectively termed:

a. ethics.
b. morals.
c. code of conduct.
d. legislation.

A

The implicit rules that guide us in our everyday behaviour, thoughts and actions are collectively termed:

*a. ethics.

b. morals.
c. code of conduct.
d. legislation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following factors does not affect the usage of internet technology?

a. Age.
b. Education.
c. Geography.
d. Gender.

A

Which of the following factors does not affect the usage of internet technology?

a. Age.
b. Education.
c. Geography.

*d. Gender.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which of the following is not considered an invasion of privacy?

a. Blocking employee access to external websites.
b. Screening employee emails.
c. Maintaining a log that tracks employee usage of the internet.
d. None of the options is correct.

A

Which of the following is not considered an invasion of privacy?

*a. Blocking employee access to external websites.

b. Screening employee emails.
c. Maintaining a log that tracks employee usage of the internet.
d. None of the options is correct.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How a person approaches and responds to an ethical issue is termed:

a. ethics.
b. morals.
c. critical thinking.
d. decision making.

A

How a person approaches and responds to an ethical issue is termed:

a. ethics.

*b. morals.

c. critical thinking.
d. decision making.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which of the following is not a criticism of utilitarianism?

a. The rights of individuals are not taken into account.
b. It does not consider the minority question.
c. Some individuals may suffer great harm while others may receive only modest benefits.
d. Happiness is the ultimate goal of human behaviour.

A

Which of the following is not a criticism of utilitarianism?

a. The rights of individuals are not taken into account.
b. It does not consider the minority question.
c. Some individuals may suffer great harm while others may receive only modest benefits.

*d. Happiness is the ultimate goal of human behaviour.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which of the following statements regarding internet access is true?

a. Young people are more likely to have internet access.
b. Wealthier people are more likely to have internet access
c. Well educated people are more likely to have internet access
d. All of the options are correct.

A

Which of the following statements regarding internet access is true?

a. Young people are more likely to have internet access.
b. Wealthier people are more likely to have internet access
c. Well educated people are more likely to have internet access

*d. All of the options are correct.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

The first step of ethical decision-making is to:

a. Define the issue
b. Identify the principles that can be applied
c. Identify the facts
d. None of the options is correct.

A

The first step of ethical decision-making is to:

a. Define the issue
b. Identify the principles that can be applied

*c. Identify the facts

d. None of the options is correct.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

People are more likely to provide personal information to someone on the phone who purports to be a police officer or other authority figure. This is referred to as the:

a. kindness principle.
b. authority principle.
c. social compliance principle.
d. distraction principle.

A

People are more likely to provide personal information to someone on the phone who purports to be a police officer or other authority figure. This is referred to as the:

a. kindness principle.
b. authority principle.

*c. social compliance principle.

d. distraction principle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Some organisations restrict employee’s access to external websites such as Facebook and eBay that are not relevant to work. Such conduct is ________ from an employee’s perspective:

a. definitely unethical and illegal.
b. definitely unethical but legal.
c. potentially unethical and illegal.
d. potentially unethical but legal.

A

Some organisations restrict employee’s access to external websites such as Facebook and eBay that are not relevant to work. Such conduct is ________ from an employee’s perspective:

a. definitely unethical and illegal.
b. definitely unethical but legal.
c. potentially unethical and illegal.

*d. potentially unethical but legal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Kantianism suggests that:

a. an action is morally right if it is motivated by the goodwill that stems from a sense of duty.
b. maximisation of an individual’s utility should not be at the expense of the group or community.
c. there are always multiple ethical approaches.
d. none of the options is correct.

A

Kantianism suggests that:

*a. an action is morally right if it is motivated by the goodwill that stems from a sense of duty.

b. maximisation of an individual’s utility should not be at the expense of the group or community.
c. there are always multiple ethical approaches.
d. none of the options is correct.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which principle is the foundation for phishing and social engineering?

a. Dishonesty principle.
b. Herd principle.
c. Distraction principle.
d. Social compliance principle.

A

Which principle is the foundation for phishing and social engineering?

a. Dishonesty principle.
b. Herd principle.
c. Distraction principle.

*d. Social compliance principle.

31
Q

Which of the following statements regarding ethical decision-making is true?

a. The number of alternative courses of action should be restricted to a small amount to avoid information overload.
b. When choosing from a set of alternative courses of action, the primary principle is to look for the one that will minimise the chance of legal sanction.
c. Each alternative course of action needs to be evaluated from the perspective of the different stakeholders.
d. All of the options are correct.

A

Which of the following statements regarding ethical decision-making is true?

a. The number of alternative courses of action should be restricted to a small amount to avoid information overload.
b. When choosing from a set of alternative courses of action, the primary principle is to look for the one that will minimise the chance of legal sanction.

*c. Each alternative course of action needs to be evaluated from the perspective of the different stakeholders.

d. All of the options are correct.

32
Q

There are three risk factors known as the ‘fraud triangle’ that are generally present when a fraud is committed. Which of the following is not one of them?

a. Incentive or pressure to commit fraud.
b. Perceived opportunity to commit fraud.
c. Ability to rationalise the fraudulent action.
d. Ability to avoid being discovered.

A

There are three risk factors known as the ‘fraud triangle’ that are generally present when a fraud is committed. Which of the following is not one of them?

a. Incentive or pressure to commit fraud.
b. Perceived opportunity to commit fraud.
c. Ability to rationalise the fraudulent action.

*d. Ability to avoid being discovered.

33
Q

A bank teller is experiencing pressure at home, with mortgage payments rapidly approaching and credit cards nearing their limit. The teller has the opportunity to ‘borrow’ some of the bank’s cash to place a bet on a ‘sure thing’ at the Saturday races with the intention of returning the cash to the bank on Monday morning. This is an example of:

(i) Pressure for fraud.
ii) Opportunity for fraud.
a. Only (i)
b. Only (ii)
c. Both (i) and (ii)
d. Neither (i) nor (ii)

A

A bank teller is experiencing pressure at home, with mortgage payments rapidly approaching and credit cards nearing their limit. The teller has the opportunity to ‘borrow’ some of the bank’s cash to place a bet on a ‘sure thing’ at the Saturday races with the intention of returning the cash to the bank on Monday morning. This is an example of:

(i) Pressure for fraud.
ii) Opportunity for fraud.
a. Only (i)
b. Only (ii)

*c. Both (i) and (ii)

d. Neither (i) nor (ii)

34
Q
A
35
Q

Which of the following is true?

a. The COSO framework, rather than the COBIT framework, can be utilised to reduce the risk of fraud and online fraud.
b. The COBIT framework, rather than the COSO framework, can be utilised to reduce the risk of fraud and online fraud.
c. The COSO and COBIT frameworks can both be utilised to reduce the risk of fraud and online fraud.
d. The COSO and COBIT frameworks are irrelevant to fraud and online fraud.

A

Which of the following is true?

a. The COSO framework, rather than the COBIT framework, can be utilised to reduce the risk of fraud and online fraud.
b. The COBIT framework, rather than the COSO framework, can be utilised to reduce the risk of fraud and online fraud.

*c. The COSO and COBIT frameworks can both be utilised to reduce the risk of fraud and online fraud.

d. The COSO and COBIT frameworks are irrelevant to fraud and online fraud.

36
Q
A
37
Q

In terms of cybercrime, which of the following is true?

a. Employees are only the main risk inside the organisation.
b. Employees are only the main risk outside the organisation.
c. There must be clear and swift sanctions against security misconduct.
d. The external audit is more effective in detecting fraud than an internal audit.

A

In terms of cybercrime, which of the following is true?

a. Employees are only the main risk inside the organisation.
b. Employees are only the main risk outside the organisation.

*c. There must be clear and swift sanctions against security misconduct.

d. The external audit is more effective in detecting fraud than an internal audit.

38
Q

Which of the following factors is the most important one in addressing internet access issues in Australia?

a. Social barriers.
b. Economic barriers.
c. Technical barriers.
d. All of the options are correct.

A

Which of the following factors is the most important one in addressing internet access issues in Australia?

a. Social barriers.
b. Economic barriers.
c. Technical barriers.

*d. All of the options are correct.

39
Q
A
40
Q

Do electronic Accounting Information Systems pose more of a threat to customer privacy than paper-based systems?

a. No, because the data cannot be read by a human.
b. Yes, because organisations always sell the data onto marketing companies.
c. No, because there are laws that protect the privacy of customers.
d. Yes, because organisations can collect more data about more people than ever before.

A

Do electronic Accounting Information Systems pose more of a threat to customer privacy than paper-based systems?

a. No, because the data cannot be read by a human.
b. Yes, because organisations always sell the data onto marketing companies.
c. No, because there are laws that protect the privacy of customers.

*d. Yes, because organisations can collect more data about more people than ever before.

41
Q

Whether it is ethical for the purchasing manager to accept a gift from a supplier may depend on the:

a. social culture.
b. value of the gift.
c. company’s gift policy.
d. all of the options are correct.

A

Whether it is ethical for the purchasing manager to accept a gift from a supplier may depend on the:

a. social culture.
b. value of the gift.
c. company’s gift policy.

*d. all of the options are correct.

42
Q
A
43
Q

Which of the following statements regarding ethics and decision making is true?

a. An ethical framework is preferable but not essential in making good decisions.
b. Ethical theories are preferable but not essential in making good decisions.
c. In most cases, decisions based on intuition and personal feelings will achieve better outcomes than those based on an ethical framework.
d. Ethics is very complex.

A

Which of the following statements regarding ethics and decision making is true?

a. An ethical framework is preferable but not essential in making good decisions.
b. Ethical theories are preferable but not essential in making good decisions.
c. In most cases, decisions based on intuition and personal feelings will achieve better outcomes than those based on an ethical framework.

*d. Ethics is very complex.

44
Q

Which of the following is not a stage in ethical decision making?

a. Identify the facts.
b. Identify the laws that can be applied.
c. Consider alternative courses of action.
d. Make a decision.

A

Which of the following is not a stage in ethical decision making?

a. Identify the facts.

*b. Identify the laws that can be applied.

c. Consider alternative courses of action.
d. Make a decision.

45
Q

Which of the privacy principles covers the requirement that information should be protected from loss and unauthorised access?

a. Collection of information.
b. Recordkeeping.
c. Storage.
d. Access.

A

Which of the privacy principles covers the requirement that information should be protected from loss and unauthorised access?

a. Collection of information.
b. Recordkeeping.

*c. Storage.

d. Access.

46
Q
A
47
Q

Ethical theories help us to:

a. explore the implications of a decision.
b. better understand the implications of a decision.
c. be able to justify our choices.
d. all of the options are correct.

A

Ethical theories help us to:

a. explore the implications of a decision.
b. better understand the implications of a decision.
c. be able to justify our choices.

*d. all of the options are correct.

48
Q

The examination of principles, values, duties and norms, the consideration of available choices in order to make the decision and the strength of character to act in accordance with that decision is referred to as:

a. ethics.
b. morals.
c. beliefs.
d. meditations.

A

The examination of principles, values, duties and norms, the consideration of available choices in order to make the decision and the strength of character to act in accordance with that decision is referred to as:

*a. ethics.

b. morals.
c. beliefs.
d. meditations.

49
Q

A whistle-blower is:

a. another term for a disgruntled employee.
b. someone who highlights favourable company information.
c. someone who exposes corruption or malpractice.
d. none of the options is correct.

A

A whistle-blower is:

a. another term for a disgruntled employee.
b. someone who highlights favourable company information.

*c. someone who exposes corruption or malpractice.

d. none of the options is correct.

50
Q

Ethics can be defined as:

a. a synonymous term for a country’s legal system.
b. rules that guide us in our everyday behaviour, thoughts and actions.
c. both a and b are correct.
d. none of the options is correct.

A

Ethics can be defined as:

a. a synonymous term for a country’s legal system.

*b. rules that guide us in our everyday behaviour, thoughts and actions.

c. both a and b are correct.
d. none of the options is correct.

51
Q

Which of the following controls can ensure that all software is properly licensed in an organisation?

a. Users are restricted from installing programs or running unauthorised programs on their work computer.
b. Administrator rights and power user rights are not assigned to any common user.
c. Centralised deployment of software.
d. All of the options are correct.

A

Which of the following controls can ensure that all software is properly licensed in an organisation?

a. Users are restricted from installing programs or running unauthorised programs on their work computer.
b. Administrator rights and power user rights are not assigned to any common user.
c. Centralised deployment of software.

*d. All of the options are correct.

52
Q

Which of the following is not a type of Consequentialist theory?

a. Ethical utilitarianism.
b. Ethical Kantianism.
c. Ethical egoism.
d. Ethical altruism.

A

Which of the following is not a type of Consequentialist theory?

a. Ethical utilitarianism.

*b. Ethical Kantianism.

c. Ethical egoism.
d. Ethical altruism.

53
Q

Ethical theories are important for managers to understand because:

a. their decisions should include a framework to make good decisions.
b. they are not able to make decisions without considering the ethical issues.
c. they have to make decisions based on the best financial outcome for the organisation.
d. ethics is a legal requirement.

A

Ethical theories are important for managers to understand because:

a. their decisions should include a framework to make good decisions.

b. they are not able to make decisions without considering the ethical issues.
c. they have to make decisions based on the best financial outcome for the organisation.
d. ethics is a legal requirement.

54
Q

Gaining unauthorised access to a system is called:

a. hacking.
b. identity theft.
c. phishing.
d. none of the options is correct.

A

Gaining unauthorised access to a system is called:

*a. hacking.

b. identity theft.
c. phishing.
d. none of the options is correct.

55
Q

An individual’s perceived ability to carry out the fraud and conceal the fraudulent activity is referred to as:

a. pressure for fraud.
b. opportunity for fraud.
c. the rationalisation for fraud.
d. concealing for fraud.

A

An individual’s perceived ability to carry out the fraud and conceal the fraudulent activity is referred to as:

a. pressure for fraud.

*b. opportunity for fraud.

c. the rationalisation for fraud.
d. concealing for fraud.

56
Q

________ refers to the individual consenting to the information gathering through their subsequent actions.

a. Informed consent
b. Implied consent
c. Forced consent
d. None of the options is correct

A

________ refers to the individual consenting to the information gathering through their subsequent actions.

a. Informed consent

*b. Implied consent

c. Forced consent
d. None of the options is correct

57
Q

The reporting, by an employee or member of an organisation, of the unethical behaviour of a colleague is called:

a. informing.
b. insider report.
c. whistle-blowing.
d. ethical action.

A

The reporting, by an employee or member of an organisation, of the unethical behaviour of a colleague is called:

a. informing.
b. insider report.

*c. whistle-blowing.

d. ethical action.

58
Q
A
59
Q

When submitting their online registration form, a pop-up dialogue box appears in the customers’ Internet browser asking them to confirm the submission of information. This is an example of:

a. informed consent.
b. implied consent.
c. forced consent.
d. conscious consent.

A

When submitting their online registration form, a pop-up dialogue box appears in the customers’ Internet browser asking them to confirm the submission of information. This is an example of:

*a. informed consent.

b. implied consent.
c. forced consent.
d. conscious consent.

60
Q
A
61
Q
A
62
Q

Once a person realises that they have been involved in a scam, the victim may be reluctant to tell the authorities. This is referred to as:

a. distraction principle.
b. social compliance principle.
c. kindness principle.
d. dishonesty principle.

A

Once a person realises that they have been involved in a scam, the victim may be reluctant to tell the authorities. This is referred to as:

a. distraction principle.
b. social compliance principle.
c. kindness principle.

*d. dishonesty principle.

63
Q

Information privacy principles from the Privacy Act 1988 do not dictate that:

a. information shall not be disclosed to a third party unless such disclosure was made known to the subject at the time the information was solicited and the subject consented to such disclosure.
b. individuals have the right to view the information that is kept about them.
c. individuals have the right to require that any inaccuracy regarding information that is kept about them be corrected.
d. the person gathering information should use whatever means to ensure that the information is complete and up to date.

A

Information privacy principles from the Privacy Act 1988 do not dictate that:

a. information shall not be disclosed to a third party unless such disclosure was made known to the subject at the time the information was solicited and the subject consented to such disclosure.
b. individuals have the right to view the information that is kept about them.
c. individuals have the right to require that any inaccuracy regarding information that is kept about them be corrected.

*d. the person gathering information should use whatever means to ensure that the information is complete and up to date.

64
Q

The principles of the Privacy Act 1988 do not explicitly cover:

a. collection of information.
b. storage of information
c. usage of information
d. disposal of information

A

The principles of the Privacy Act 1988 do not explicitly cover:

a. collection of information.
b. storage of information
c. usage of information

*d. disposal of information

65
Q

Which of the following is not one of the seven recurring behavioural patterns and related principles identified by Stajano and Wilson?

a. Need and greed principle.
b. Time principle.
c. Authority principle.
d. Herd principle.

A

Which of the following is not one of the seven recurring behavioural patterns and related principles identified by Stajano and Wilson?

a. Need and greed principle.
b. Time principle.

*c. Authority principle.

d. Herd principle.

66
Q

An ethical decision-making model provides guidance on:

a. how to navigate difficult and complex issues in reaching an effective solution for a business problem.
b. how to navigate difficult and complex issues in reaching the best practice for an issue.
c. how to navigate difficult and complex issues in reaching a decision.
d. all of the options are correct.

A

An ethical decision-making model provides guidance on:

a. how to navigate difficult and complex issues in reaching an effective solution for a business problem.
b. how to navigate difficult and complex issues in reaching the best practice for an issue.

*c. how to navigate difficult and complex issues in reaching a decision.

d. all of the options are correct.

67
Q

Privacy is:

a. a legal issue only.
b. an ethical issue only.
c. both a legal and an ethical issue.
d. neither a legal nor an ethical issue.

A

Privacy is:

a. a legal issue only.
b. an ethical issue only.

*c. both a legal and an ethical issue.

d. neither a legal nor an ethical issue.

68
Q

Consumer profiling is less likely to be able to gather information regarding:

a. consumer interests.
b. consumer purchasing patterns.
c. consumer spending capability.
d. consumer viewing patterns.

A

Consumer profiling is less likely to be able to gather information regarding:

a. consumer interests.
b. consumer purchasing patterns.

*c. consumer spending capability.

d. consumer viewing patterns.

69
Q

Ideally, a website should not store any data of the potential customer during the customer registration process until the customer has:

a. agreed to relevant Terms and Conditions.
b. elected to press the ‘Submit’ button on the electronic registration form.
c. reviewed all information entered in previous steps of registration.
d. all of the options are correct.

A

Ideally, a website should not store any data of the potential customer during the customer registration process until the customer has:

a. agreed to relevant Terms and Conditions.
b. elected to press the ‘Submit’ button on the electronic registration form.
c. reviewed all information entered in previous steps of registration.

*d. all of the options are correct.

70
Q

Cost-benefit analysis is an example of:

a. opportunism.
b. hedonism.
c. realism.
d. utilitarianism.

A

Cost-benefit analysis is an example of:

a. opportunism.
b. hedonism.
c. realism.

*d. utilitarianism.

71
Q
A
72
Q

Consequentialist theories are also known as:

a. Kantianism.
b. teleological theories.
c. both a and b are correct.
d. none of the options is correct.

A

Consequentialist theories are also known as:

a. Kantianism.

*b. teleological theories.

c. both a and b are correct.
d. none of the options is correct.

73
Q

Which of the following according to futurists is unlikely to be a technology trend?

a. Internet of everywhere.
b. Increased security and privacy.
c. Jobs changing and evolving as technology disrupts more industries.
d. Big data.

A

Which of the following according to futurists is unlikely to be a technology trend?

a. Internet of everywhere.

b. Increased security and privacy.

c. Jobs changing and evolving as technology disrupts more industries.
d. Big data.