Chapter 14: Ethics and cybercrime Flashcards
Which of the following is not needed for a fraudulent act?
a. A reason.
b. Pressure.
c. A system with weak internal controls.
d. An opportunity.
Which of the following is not needed for a fraudulent act?
a. A reason.
b. Pressure.
c. A system with weak internal controls.
d. An opportunity.
The saying that an action is morally right if it is motivated by the goodwill that stems from a sense of duty is known as:
a. Kantianism.
b. hedonism.
c. realism.
d. utilitarianism.
The saying that an action is morally right if it is motivated by the goodwill that stems from a sense of duty is known as:
*a. Kantianism.
b. hedonism.
c. realism.
d. utilitarianism.
Which of the following is not true?
a. Technology is advancing faster than the legislation can keep pace with.
b. The three main types of identity crime are fraud, hacking, and identity theft.
c. The cost of identity crime is not easy to calculate.
d. Much of the identity crime goes unreported.
Which of the following is not true?
a. Technology is advancing faster than the legislation can keep pace with.
*b. The three main types of identity crime are fraud, hacking, and identity theft.
c. The cost of identity crime is not easy to calculate.
d. Much of the identity crime goes unreported.
Which of the factors below were not mentioned by Stajano and Wilson as having an influence on human behaviour?
a. Distraction principle.
b. Herd principle.
c. Technology principle.
d. Need and greed principle.
Which of the factors below were not mentioned by Stajano and Wilson as having an influence on human behaviour?
a. Distraction principle.
b. Herd principle.
c. Technology principle.
d. Need and greed principle.
In terms of IT, spam is a problem because it:
a. can slow down email servers.
b. may spread computer viruses.
c. may affect the job efficiency of employees.
d. all of the options are correct.
In terms of IT, spam is a problem because it:
a. can slow down email servers.
b. may spread computer viruses.
c. may affect the job efficiency of employees.
*d. all of the options are correct.
A company discovers that an employee has created a fictitious vendor on the vendor master file and the company has paid a total of $250 000 to this vendor through fake invoices. This is an example of fraud in the:
a. revenue cycle.
b. inventory management cycle.
c. expenditure cycle.
d. cash receipts cycle.
A company discovers that an employee has created a fictitious vendor on the vendor master file and the company has paid a total of $250 000 to this vendor through fake invoices. This is an example of fraud in the:
a. revenue cycle.
b. inventory management cycle.
c. expenditure cycle.
d. cash receipts cycle.
In terms of IT, cookies cannot:
a. ensure the browser does not display ads the user has already seen.
b. ensure the user has adequate protection against online unethical behaviours.
c. track the previous and next sites the user visits.
d. track whether a user has visited the site before.
In terms of IT, cookies cannot:
a. ensure the browser does not display ads the user has already seen.
*b. ensure the user has adequate protection against online unethical behaviours.
c. track the previous and next sites the user visits.
d. track whether a user has visited the site before.
Which of the following is not true?
a. Research studies have found that the incidence of fraud tends to be related to the ethical environment of the organisation.
b. Ethical conducts can be promoted through professional registration.
c. Ethical guidelines exist to guide auditors when making client acceptance decisions when determining the level of non-audit service fees, and on what gifts from the client can be accepted.
d. Codes of ethics should be formal.
Which of the following is not true?
a. Research studies have found that the incidence of fraud tends to be related to the ethical environment of the organisation.
b. Ethical conducts can be promoted through professional registration.
c. Ethical guidelines exist to guide auditors when making client acceptance decisions when determining the level of non-audit service fees, and on what gifts from the client can be accepted.
*d. Codes of ethics should be formal.
Which of the following statements regarding Kantianism is not true?
a. Kantianism is embedded in duty or obligation and encompasses a dignity or respect for the individual.
b. According to Kantianism, a business that is doing respectful things, despite that it is motivated by profits, is acting in a prudent and moral way.
c. Critics point out that Kantianism’s universal obligations do not take into account particular situations.
d. Kantianism is grounded in the notion of respect for the individual.
Which of the following statements regarding Kantianism is not true?
a. Kantianism is embedded in duty or obligation and encompasses a dignity or respect for the individual.
*b. According to Kantianism, a business that is doing respectful things, despite that it is motivated by profits, is acting in a prudent and moral way.
c. Critics point out that Kantianism’s universal obligations do not take into account particular situations.
d. Kantianism is grounded in the notion of respect for the individual.
Spam is:
a. Sending unsolicited emails.
b. Acquiring personal details by means of deception.
c. Gaining unauthorised access to a system.
d. Pretending to be someone else in an online transaction.
Spam is:
a. Sending unsolicited emails.
b. Acquiring personal details by means of deception.
c. Gaining unauthorised access to a system.
d. Pretending to be someone else in an online transaction.
Which of the following is not an example of malicious code (malware)?
a. Trojan.
b. Virus.
c. Bots.
d. Social engineering.
Which of the following is not an example of malicious code (malware)?
a. Trojan.
b. Virus.
c. Bots.
d. Social engineering.
Which of the following fraud can occur if an employee is responsible for both approving and paying invoices?
a. Paying non-existent suppliers.
b. Inventory theft.
c. Credit fraud.
d. All of the options are correct.
Which of the following fraud can occur if an employee is responsible for both approving and paying invoices?
*a. Paying non-existent suppliers.
b. Inventory theft.
c. Credit fraud.
d. All of the options are correct.
Which of the following is not an example of online fraud?
a. Paying non-existent suppliers with false invoices.
b. Credit card fraud.
c. Non-existent customers.
d. Phishing.
Which of the following is not an example of online fraud?
a. Paying non-existent suppliers with false invoices.
b. Credit card fraud.
c. Non-existent customers.
d. Phishing.
The implicit rules that guide us in our everyday behaviour, thoughts and actions are collectively termed:
a. ethics.
b. morals.
c. code of conduct.
d. legislation.
The implicit rules that guide us in our everyday behaviour, thoughts and actions are collectively termed:
*a. ethics.
b. morals.
c. code of conduct.
d. legislation.
Which of the following factors does not affect the usage of internet technology?
a. Age.
b. Education.
c. Geography.
d. Gender.
Which of the following factors does not affect the usage of internet technology?
a. Age.
b. Education.
c. Geography.
*d. Gender.
Which of the following is not considered an invasion of privacy?
a. Blocking employee access to external websites.
b. Screening employee emails.
c. Maintaining a log that tracks employee usage of the internet.
d. None of the options is correct.
Which of the following is not considered an invasion of privacy?
*a. Blocking employee access to external websites.
b. Screening employee emails.
c. Maintaining a log that tracks employee usage of the internet.
d. None of the options is correct.
How a person approaches and responds to an ethical issue is termed:
a. ethics.
b. morals.
c. critical thinking.
d. decision making.
How a person approaches and responds to an ethical issue is termed:
a. ethics.
*b. morals.
c. critical thinking.
d. decision making.
Which of the following is not a criticism of utilitarianism?
a. The rights of individuals are not taken into account.
b. It does not consider the minority question.
c. Some individuals may suffer great harm while others may receive only modest benefits.
d. Happiness is the ultimate goal of human behaviour.
Which of the following is not a criticism of utilitarianism?
a. The rights of individuals are not taken into account.
b. It does not consider the minority question.
c. Some individuals may suffer great harm while others may receive only modest benefits.
*d. Happiness is the ultimate goal of human behaviour.
Which of the following statements regarding internet access is true?
a. Young people are more likely to have internet access.
b. Wealthier people are more likely to have internet access
c. Well educated people are more likely to have internet access
d. All of the options are correct.
Which of the following statements regarding internet access is true?
a. Young people are more likely to have internet access.
b. Wealthier people are more likely to have internet access
c. Well educated people are more likely to have internet access
*d. All of the options are correct.
The first step of ethical decision-making is to:
a. Define the issue
b. Identify the principles that can be applied
c. Identify the facts
d. None of the options is correct.
The first step of ethical decision-making is to:
a. Define the issue
b. Identify the principles that can be applied
*c. Identify the facts
d. None of the options is correct.
People are more likely to provide personal information to someone on the phone who purports to be a police officer or other authority figure. This is referred to as the:
a. kindness principle.
b. authority principle.
c. social compliance principle.
d. distraction principle.
People are more likely to provide personal information to someone on the phone who purports to be a police officer or other authority figure. This is referred to as the:
a. kindness principle.
b. authority principle.
*c. social compliance principle.
d. distraction principle.
Some organisations restrict employee’s access to external websites such as Facebook and eBay that are not relevant to work. Such conduct is ________ from an employee’s perspective:
a. definitely unethical and illegal.
b. definitely unethical but legal.
c. potentially unethical and illegal.
d. potentially unethical but legal.
Some organisations restrict employee’s access to external websites such as Facebook and eBay that are not relevant to work. Such conduct is ________ from an employee’s perspective:
a. definitely unethical and illegal.
b. definitely unethical but legal.
c. potentially unethical and illegal.
*d. potentially unethical but legal.
Kantianism suggests that:
a. an action is morally right if it is motivated by the goodwill that stems from a sense of duty.
b. maximisation of an individual’s utility should not be at the expense of the group or community.
c. there are always multiple ethical approaches.
d. none of the options is correct.
Kantianism suggests that:
*a. an action is morally right if it is motivated by the goodwill that stems from a sense of duty.
b. maximisation of an individual’s utility should not be at the expense of the group or community.
c. there are always multiple ethical approaches.
d. none of the options is correct.