100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

D333 ETHICS IN TECHNOLOGY exams with correct questions and answers.

Rating
-
Sold
-
Pages
10
Grade
A
Uploaded on
02-04-2025
Written in
2024/2025

Ways to include ethical considerations in decision making? 1. Employ this decision-making model: 1. Define the ____ 2. Identify _____ 3. Choose an ____ 4. Implement the _____ 5. Monitor the _____ 2. Involve ____ 3. Weigh laws, guidelines, and principles that may apply 4. Consider the ___ of your decisions - CORRECT ANSWERS️️Problem, alternatives, alternative, decision, results, stakeholders, impact What relationships must an IT worker manage, and what key ethical issues can arise in each? IT worker-____ relationship issues: 1. Setting and enforcing ____ regarding the ethical use of IT 2. The potential for ______ 3. The safeguarding of ___ ___ IT worker-___ relationship issues: 1. Defining, sharing, and fulfilling each party's responsibilities for successfully completing an IT project 2. The IT worker must remain objective and guard against conflicts of interest, fraud, misrepresentation, or breach of contract IT workers-___ ____ relationships: 1. _____ inexperienced colleagues 2. Demonstrating professional __

Show more Read less
Institution
D333 ETHICS IN TECHNOLOGY
Course
D333 ETHICS IN TECHNOLOGY









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
D333 ETHICS IN TECHNOLOGY
Course
D333 ETHICS IN TECHNOLOGY

Document information

Uploaded on
April 2, 2025
Number of pages
10
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Content preview

D333 ETHICS IN TECHNOLOGY exams
with correct questions and answers.

Ways to include ethical considerations in decision making?

1. Employ this decision-making model:

1. Define the ____

2. Identify _____

3. Choose an ____

4. Implement the _____

5. Monitor the _____

2. Involve ____

3. Weigh laws, guidelines, and principles that may apply

4. Consider the ___ of your decisions - CORRECT ANSWERS✔️✔️Problem, alternatives, alternative,
decision, results, stakeholders, impact



What relationships must an IT worker manage, and what key ethical issues can arise in each?

IT worker-____ relationship issues:

1. Setting and enforcing ____ regarding the ethical use of IT

2. The potential for ______

3. The safeguarding of ___ ___

IT worker-___ relationship issues:

1. Defining, sharing, and fulfilling each party's responsibilities for successfully completing an IT project

2. The IT worker must remain objective and guard against conflicts of interest, fraud, misrepresentation,
or breach of contract

IT workers-___ ____ relationships:

1. _____ inexperienced colleagues

2. Demonstrating professional _____

, 3. Avoiding ____ ____ and the inappropriate sharing of corporate information

For IT workers-__ ____, important issues include:

1. ___ ____

2. Inappropriate use of __ ____

3. Inappropriate sharing of ____ - CORRECT ANSWERS✔️✔️Employer, policies, whistleblowing, trade
secrets, client, unethical, other professionals, mentoring, loyalty, resume inflation, IT users, software
piracy, IT resources, information



_____ _____ is a process designed to provide assurance for the effectiveness and efficiency of
operations, the reliability of financial reporting, and compliance with laws and regulations.



The goal of ___ ____ in IT security is to ensure that the ____ of control does not exceed the ____ or
____. - CORRECT ANSWERS✔️✔️Internal control, reasonable assurance, cost, benefits, risk



The ___-____ is a partnership between DHS and the public and private sectors that was established to
protect the nation's Internet infrastructure against ____ by serving as a clearinghouse for information on
new viruses, worms, etc. - CORRECT ANSWERS✔️✔U ️ S-CERT, cyberattacks



Organizations need a risk-based strategy with an active ___ ___ to minimize the potential impact of
security incidents and to ensure business continuity



Key elements of such a strategy include...

1. A ___ ____

2. A ___ ___ ___

3. Definition of ___ ____ needed to ensure employees follow best processes and practices

4. Periodic ___ ____

5. Compliance standards defined by external parties

6. Use of a ___ ____ to track key performance indicators - CORRECT ANSWERS✔️✔️Governance
process, risk assessment, disaster recovery plan, security policies, security audits, security dashboard



Actions to take in the event of a successful security intrusion;
$16.99
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
Sinzorah

Get to know the seller

Seller avatar
Sinzorah Havard School
View profile
Follow You need to be logged in order to follow users or courses
Sold
1
Member since
1 year
Number of followers
0
Documents
318
Last sold
1 month ago

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions