Essays /

125327684 Chap 007 Essay

Essay preview

Chapter 07 - Ethical Decision Making: Technology and Privacy in the Workplace

Chapter 07
Ethical Decision Making: Technology and Privacy in the Workplace True/False Questions

1. (p. 255) Privacy issues in the workplace raise ethical issues involving individual rights as well as those involving deontological consequences.
FALSE

Privacy issues in the workplace raise ethical issues involving individual rights as well as those involving utilitarian consequences.

AACSB: 2
BT: Knowledge
Difficulty: Easy
Learning Objective: 1

2. (p. 257) Limiting access of personal information on the basis of the relationship that one shares with members of society is one way to preserve one's personal integrity. TRUE

Limiting access of personal information to only those with whom one has a personal relationship is one important way to preserve one's own personal integrity and individuality.

AACSB: 2
BT: Knowledge
Difficulty: Easy
Learning Objective: 1

7-1

Chapter 07 - Ethical Decision Making: Technology and Privacy in the Workplace

3. (p. 257) The right to privacy, which is founded on a universal right to autonomy, is restricted by a prevalent social contract in our culture.
TRUE

The right to privacy is founded in the individual's fundamental, universal right to autonomy, in our right to make decisions about our personal existence without restriction. This right is restricted by a social contract in our culture.

AACSB: 2, 3
BT: Knowledge
Difficulty: Medium
Learning Objective: 1

4. (p. 258) The value of privacy to civilized society is as great as the value of hypernorms to civilized existence.
TRUE

The value of privacy to civilized society is as great as the value of the various hypernorms to civilized existence.

AACSB: 2
BT: Knowledge
Difficulty: Medium
Learning Objective: 2

7-2

Chapter 07 - Ethical Decision Making: Technology and Privacy in the Workplace

5. (p. 259) The ‘invasion of privacy' claim is one that developed through case law called "intrusion into seclusion."
TRUE

The "invasion of privacy" claim with which most people are familiar is one that developed through case law called "intrusion into seclusion."

AACSB: 2
BT: Knowledge
Difficulty: Medium
Learning Objective: 3

7-3

Chapter 07 - Ethical Decision Making: Technology and Privacy in the Workplace

6. (p. 260) Most recent court cases regarding monitoring seem to depend upon the aspect of the worker's knowledge of possible monitoring through a notice.
TRUE

Most recent court decisions with regard to monitoring specifically seem to depend on whether the worker had notice that the monitoring might occur.

AACSB: 2
BT: Knowledge
Difficulty: Medium
Learning Objective: 4

7. (p. 261) The European Union's Directive on Personal Data Protection doesn't prohibit E.U. firms from transferring personal information to non-E.U. firms. FALSE

The European Union's Directive on Personal Data Protection prohibits E.U. firms from transferring personal information to a non-E.U. country unless that country maintains "adequate protections" of its own; in other words, protections equivalent to those the directive guarantees in E.U. countries.

AACSB: 2, 3
BT: Knowledge
Difficulty: Medium
Learning Objective: 4

7-4

Chapter 07 - Ethical Decision Making: Technology and Privacy in the Workplace

8. (p. 265) The instance of Google in the text has been essentially used to underline the importance of speed in the changing technological world.
FALSE

The example is used to explain that trust is truly the crux of the issue with the introduction of new technology.

AACSB: 2, 3
BT: Knowledge
Difficulty: Medium
Learning Objective: 4

7-5

Chapter 07 - Ethical Decision Making: Technology and Privacy in the Workplace

9. (p. 267) The most prevalent subject of monitoring is videotaping. FALSE

The most prevalent subject of monitoring is Internet use monitoring (76 percent) followed by e-mail monitoring (55 percent) and videotaping (10 percent).

AACSB: 3
BT: Knowledge
Difficulty: Easy
Learning Objective: 5

10. (p. 268) According to the text, the ethical validity of checking an employee's mail to ensure that it is being used only for business purposes is still undecided on. TRUE

Unfortunately, many of the ethical issues that arise in the area of managing information are not readily visible. When we do not completely understand the technology, we might not understand the ethical implications of our decisions.

AACSB: 2, 3
BT: Knowledge
Difficulty: Medium
Learning Objective: 6

7-6

Chapter 07 - Ethical Decision Making: Technology and Privacy in the Workplace

11. (p. 269) The ethical issues connected to employee monitoring is independent of the fact that a knowledge gap exists between people who understand technology and those who do not. FALSE

The ethical issues may be compounded by the fact that a knowledge gap exists between people who do understand the technology and others who are unable to protect themselves precisely because they do not understand.

AACSB: 2, 3
BT: Knowledge
Difficulty: Medium
Learning Objective: 7

7-7

Chapter 07 - Ethical Decision Making: Technology and Privacy in the Workplace

12. (p. 270) Managing their workplaces to place workers in appropriate positions is one reason why employers choose to monitor the technology used.
TRUE

A firm chooses to monitor its employees and collect for numerous reasons. Employers need to manage their workplaces to place workers in appropriate positions, to ensure compliance with affirmative action requirements, or to administer workplace benefits.

AACSB: 2
BT: Knowledge
Difficulty: Easy
Learning Objective: 1

13. (p. 272) One of the problems associated with giving prior notice of monitoring is the ‘Hawthorne Effect'.
TRUE

By telling the worker which calls you are monitoring, your employees may be sure to be on their best behavior during those calls. This effect of employer monitoring is termed the "Hawthorne Effect".

AACSB: 2
BT: Knowledge
Difficulty: Hard
Learning Objective: 11

7-8

Chapter 07 - Ethical Decision Making: Technology and Privacy in the Workplace

14. (p. 272) In the bigger picture, financial capital appears to minimize shareholder risk, promote innovation, enhance reputation, and deepen brand loyalty.
FALSE

In the bigger picture, social capital appears to minimize shareholder risk, promote innovation, enhance reputation and deepen brand loyalty."

AACSB: 3
BT: Knowledge
Difficulty: Medium
Learning Objective: 11

7-9

Chapter 07 - Ethical Decision Making: Technology and Privacy in the Workplace

15. (p. 274) Drug testing is one area in which employers have had a relatively recent history of monitoring employees.
FALSE

Drug testing is one area in which employers have had a longer history of monitoring employees.

AACSB: 3
BT: Knowledge
Difficulty: Easy
Learning Objective: 12

Multiple Choice Questions

16. (p. 257) Two general and connected understandings of privacy have been identified as a right to be ‘let alone' within a personal space, and privacy as the a. right to understand one's emotions.

b. fundamental duty of every citizen.
c. right to control information about others.
D. right to control information about oneself.

Two general and connected understandings of privacy can be found in the legal and philosophical literature on this topic: privacy as a right to be "let alone" within a personal zone of solitude, and privacy as the right to control information about oneself.

AACSB: 3
BT: Knowledge
Difficulty: Easy
Learning Objective: 1

7-10

Chapter 07 - Ethical Decision Making: Technology and Privacy in the Workplace

17. (p. 257) The right to privacy, founded in the individual's universal right to autonomy, is restricted by a social contract in our culture which prevents us from infringing on someone else's right to his or her personal autonomy. This is referred to as a. obligatory independence.

b. fundamental privacy.
C. reciprocal obligation.
d. social autonomy.

Philosopher Patricia Werhane describes this boundary as a "reciprocal obligation"; that is, for an individual to expect respect for her or his personal autonomy, that individual has a reciprocal obligation to respect the autonomy of others.

AACSB: 3
BT: Knowledge
Difficulty: Medium
Learning Objective: 2

18. (p. 258) Values that are fundamental across culture are called a. moral freeness.
B. hypernorms.
c. global norms.
d. universalities.

Ethicists Thomas Donaldson and Thomas Dunfee have developed an approach to ethical analysis that seeks to differentiate between those values that are fundamental across culture and theory ("hypernorms") and those values that are determined within "moral free space" and that are not hypernorms.

AACSB: 3
BT: Knowledge
Difficulty: Easy
Learning Objective: 2

7-11

Chapter 07 - Ethical Decision Making: Technology and Privacy in the Workplace

19. (p. 258) The _____ depend upon the existence and enforcement of a set of rules that define who has a right to undertake which activities on their own initiative and how the returns from those activities will be allocated.

A. private property right
b. privacy
c. legal system
d. government administration

Private property rights depend upon the existence and enforcement of a set of rules that define who has a right to undertake which activities on their own initiative and how the returns from those activities will be allocated.

AACSB: 3
BT: Knowledge
Difficulty: Medium
Learning Objective: 2

20. (p. 259) Privacy can be protected by all of the following three ways except by a. the constitution.
B. judicial opinions.
c. federal and/or state statutes.
d. common law.

Privacy can be legally protected in three ways: by the constitution (federal or state), by federal and/or state statutes, and by the common law.

AACSB: 2, 3
BT: Knowledge
Difficulty: Easy
Learning Objective: 3

7-12

Chapter 07 - Ethical Decision Making: Technology and Privacy in the Workplace

21. (p. 259) The reason the Constitution's Fourth Amendment protection applies only to public sector workplace is because
a. unions exist only in private sector organizations.
b. the private organization does not cater to appeals of unreasonable search or seizure. C. the Constitution applies only to the state.
d. it is illegal by common law to trespass on private property.

The Constitution's Fourth Amendment protection against an unreasonable search and seizure governs only the public sector workplace because the Constitution applies only to state action.

AACSB: 2, 3
BT: Knowledge
Difficulty: Medium
Learning Objective: 3

22. (p. 259) Which among the following prohibits the "interception" or unauthorized access of stored communications?
A. Electronic Communications Privacy Act of 1986.
b. Computer Security Act of 1987.
c. Privacy Act of 1974.
d. Computer Fraud and Abuse Act of 1986.

The Electronic Communications Privacy Act of 1986 (ECPA) prohibits the "interception" or unauthorized access of stored communications.

Difficulty: Medium

7-13

Chapter 07 - Ethical Decision Making: Technology and Privacy in the Workplace

23. (p. 259) The fact that it may no longer be reasonable to be offended by intrusions into one's private life, that used to be considered unacceptable, is dealt under the category of a. reverse obligation.

b. security of privacy.
C. intrusion into seclusion.
d. property rights.

The "invasion of privacy" claim with which most people are familiar is one that developed through case law called "intrusion into seclusion." This legal violation occurs when someone intentionally intrudes on the private affairs of another when the intrusion would be "highly offensive to a reasonable person."

AACSB: 3
BT: Knowledge
Difficulty: Hard
Learning Objective: 3

7-14

Chapter 07 - Ethical Decision Making: Technology and Privacy in the Workplace

24. (p. 260) If the basis for finding an invasion of privacy is often the employee's legitimate and reasonable expectation of privacy, then a situation where there is no real expectation of privacy occurs when

A. the employee has actual notice.
b. the employer is covered under the ECPA.
c. the work requires transference of sensitive data.
d. the employee belongs to a minority group.

Most recent court decisions w...

Read more

Keywords

-1 -10 -11 -12 -13 -14 -15 -16 -17 -18 -19 -2 -20 -21 -22 -23 -24 -25 -26 -27 -28 -29 -3 -30 -31 -32 -33 -34 -35 -36 -37 -38 -39 -4 -40 -41 -42 -43 -44 -45 -46 -47 -48 -49 -5 -50 -51 -52 -53 -54 -55 -56 -6 -7 -8 -9 007 07 1 10 11 12 125327684 13 13145 14 15 16 17 18 19 1974 1986 1987 2 20 2001 2005 21 22 23 24 25 255 256 257 258 259 26 260 261 263 264 265 266 267 268 269 27 270 271 272 273 274 275 276 277 279 28 280 283 29 3 30 31 32 33 34 35 36 37 38 39 4 40 41 42 43 44 45 46 47 48 49 5 50 51 52 53 54 55 55.1 56 57 58 59 6 60 61 62 63 64 65 66 67 68 69 7 70 71 72 73 74 75 76 8 80 86 9 aacsb abil abus accept access accord account accumul accur accuraci achiev across act action activ actual addit adequ administ administr admit adopt advanc advers advertis advoc affabl affair affirm age agenc agreement aid alloc allow almost alon alreadi also altern amend america american among analysi and/or ann anonym anoth antidiscrimin antinepot antonio anxieti anyon anywher appeal appear appli approach appropri approv area argandona argu arguabl argument aris around art ascertain ask aspect associ at-wil attack attain attitud attribut author automot autonomi avoid awar b background balanc bandwidth base basi basic becom beep begin behavior belief believ belong benefit best better beyond bigger blank blur bodi bona boundari brand briefli broad bt burden busi button c call cannot capit care careless carpal case categori cater caus center certain challeng chang chap chapter check choic choos circumst citizen civil claim clearest clinton close closer clue coher collabor collect colleg combat come comfort commensur commerc commit common communic compani compel compet complaint complet compli complianc compound comprehens compris comput concept concern conclud concurr conduct confidenti conflict conflict-of-interest connect connecticut consent consequ consid constitut constrain consum consumpt contend content context continu contract contrast contribut control converg convers cooper core corpor correct cost could countri cours court cover creat creation creativ crimin critic crucial crux cultur current custom d data dealt decis deepen defens defin definit degre demonstr deontolog depart depend depress deriv describ design desir determin develop differ differenti difficulti digniti direct director disabl disclos disclosur discrimin discuss diseas disgruntl disord distanc distinct distinguish distribut dna doesn domain donaldson done drawback drug due dunfe duti e e-mail e.g e.u easi easier eavesdrop economist ecpa effect effici effort eighti electron element els emot empathi employ employe enact enforc engag enhanc ensur environ epca equip equival espionag essay essenti establish ethic ethicist eu european even ever everi evid evok examin exampl except exclus execut exhaust exig exist expand expans expect experiment explain explicit extraordinari extrem face faceless fact factor failur fairest fals famili familiar fatigu favor feder feel fewer fide field fill final financ financi find fire firm first first-tim fisa fleet focus follow forc foreign form found four fourth fraud free freedom freeness fund fundament gain gap gather general genet get give given global googl govern government grant great greater greatest ground group guarante guard half halo hand handl harass harbor hard hawthorn health help high high-trust higher hipaa hire histori hit hold hostil hour howev human hypernorm idea ident identif identifi ignor illeg illinoi immun impact imperson implement impli implic import impos inabl inappropri includ incorrect increas independ indic individu inform information-gath infring inher initi injuri innov inquir instanc instead institut insur intang integr intellig intent intercept interest internet intim introduct intrud intrus invas invest investig involuntari involv issu job job-rel judgment judici justic justif keep key kind knew know knowledg known lack larg large-s largest launder law lead learn least led legal legislatur legitim less lesson let level liabil life lifestyl like limit line link literatur littl live longer look loss low lower loyalti made mail maintain make manag mani manner manufactur marit market marri may mean medic medium meet member membership mere messag method michigan mid might mind minim minor misinform mission modif money monitor moral moreov movement much multipl must nation naval necess necessari necessarili neck need negat neglect negoti network never new non non- non-busi non-monitor non-procr nonetheless norm normal notic notifi notwithstand nuanc number numer object oblig obligatori observ obstruct occas occup occur off-duti off-work offend offens offer often ohio one one-fourth oneself ongo onset opinion opportun oppos opt order organ organiz other otherwis outlin outweigh p paramet part parti particular past patchwork patient patricia patriot pay penalti peopl per percent perform perhap permiss person perspect persuas pertain philosoph phone physic pictur pillsburi pivot place placebo planet play plus polici polit polygraph portabl pose posit possibl potenti practic preced precis prerequisit preserv presid pressur prevail preval prevent principl prior prioriti privaci privat problem procedur proceed procreat produc product profession profit program prohibit promot proof properti propos proprietari protect provid provis psycholog public punish purpos put qualifi question quit rais random rate rather ration reach read readili real reason receiv recent reciproc recogn record recreat reduc reduct refer refus regard regim regul reject relat related relationship releas relev reli religi remain report repres reput request requir research resolv resourc respect respond respons rest restraint restrict restroom result retain return revers review right rise risk role rule sabotag safe safeti said salari say scan screen search seclus secret sector secur see seek seem seizur seldom send sens sensit sent septemb sequenc serv servic set sever sex sexual share sharehold sign signifi signific similar simpli simultan sinc singl site situat size smyth social societi solitud solv someon sourc space specif specifi speech speed spend spirit spous stabil stakehold standard state state-of-the-art status statut still stimulus stipul store strain stranger stream strengthen stress strive strong structur student studi subject submit subpoena substanc success suffer suffici suggest suit summar supervisor supervisori support suppos sure surf surpris surveil survey suspici suspicion svendsen syndrom system take tangibl target task technolog tell term termin terror terrorist test text theft then-presid theori therebi therefor third third-parti thoma though thought three thus time toler tool topic toward transact transfer transit transpar treat treatment trespass true true/false truli trust truth tunnel turnov two type u u.s ultim unabl unaccept unauthor uncov undecid underlin understand understood undertak uneth unfortun unhappi unheard unintent union unit univers unless unmonitor unreason unsettl upon us usa usag use user utilitarian v valid valu valuabl variabl varieti various videotap viewpoint violat virtual visibl vital voluntari voluntarili vulner want warrant way wealth well well-b werhan whenev whether whose widespread within without word work workday worker workplac world would wrong wrongdo year yet york zone