Podcast
Questions and Answers
Zynga is known for offline console games like ChefVille and CityVille.
Zynga is known for offline console games like ChefVille and CityVille.
False (B)
The general manager of CityVille left Zynga to join a competitor called Kixeye.
The general manager of CityVille left Zynga to join a competitor called Kixeye.
True (A)
Zynga accused the former employee of stealing files containing non-critical information.
Zynga accused the former employee of stealing files containing non-critical information.
False (B)
Whistleblowing involves attracting attention to acts that benefit the company.
Whistleblowing involves attracting attention to acts that benefit the company.
Whistleblowers usually have special information based on their personal biases.
Whistleblowers usually have special information based on their personal biases.
A conscientious employee would not try to correct internal problems within the company.
A conscientious employee would not try to correct internal problems within the company.
IT workers and employers have a simple relationship that does not require ongoing effort.
IT workers and employers have a simple relationship that does not require ongoing effort.
An IT worker and an employer typically agree on fundamental aspects of their relationship after the worker accepts an employment offer.
An IT worker and an employer typically agree on fundamental aspects of their relationship after the worker accepts an employment offer.
Job title, general performance expectations, and salary are aspects that IT workers and employers may agree upon before the worker accepts an employment offer.
Job title, general performance expectations, and salary are aspects that IT workers and employers may agree upon before the worker accepts an employment offer.
The relationship between IT workers and employers does not involve any agreement on specific work responsibilities.
The relationship between IT workers and employers does not involve any agreement on specific work responsibilities.
The company's code of conduct is not a document where aspects of the relationship between IT workers and employers may be addressed.
The company's code of conduct is not a document where aspects of the relationship between IT workers and employers may be addressed.
IT workers and employers do not need to make any agreements regarding work hours and company benefits before the worker accepts an employment offer.
IT workers and employers do not need to make any agreements regarding work hours and company benefits before the worker accepts an employment offer.
The policy addresses protection of the data privacy rights of employees, customers, suppliers, and others.
The policy addresses protection of the data privacy rights of employees, customers, suppliers, and others.
Employee monitoring includes wiretapping and eavesdropping on phone conversations.
Employee monitoring includes wiretapping and eavesdropping on phone conversations.
The policy addresses the inappropriate use of IT resources, such as Web surfing and personal emailing.
The policy addresses the inappropriate use of IT resources, such as Web surfing and personal emailing.
Disciplinary actions for IT-related abuses are not defined in the policy.
Disciplinary actions for IT-related abuses are not defined in the policy.
There is a process in place for communicating the policy to employees.
There is a process in place for communicating the policy to employees.
The corporate firewall is not required according to the policy.
The corporate firewall is not required according to the policy.
Strong codes of ethics are common in the IT arena.
Strong codes of ethics are common in the IT arena.
Public trust in professionals is based on the expectation of ethical behavior.
Public trust in professionals is based on the expectation of ethical behavior.
Professionals can use a code of ethics for self-assessment.
Professionals can use a code of ethics for self-assessment.
Peers cannot use a code of ethics for recognition or censure.
Peers cannot use a code of ethics for recognition or censure.
There is a universal code of ethics for IT workers.
There is a universal code of ethics for IT workers.
Penalties for serious violations can include loss of the right to practice.
Penalties for serious violations can include loss of the right to practice.
Viewing sexually explicit material at work could lead to lawsuits and allegations of creating a harassment-friendly environment.
Viewing sexually explicit material at work could lead to lawsuits and allegations of creating a harassment-friendly environment.
One in four men admit to viewing porn at work according to the Fawcett Society's survey.
One in four men admit to viewing porn at work according to the Fawcett Society's survey.
Organizations rarely take disciplinary action against employees who view pornography at work.
Organizations rarely take disciplinary action against employees who view pornography at work.
The executive director of the Pentagon's Missile Defense Agency issued a memo warning employees to stop using work computers to access Internet porn sites.
The executive director of the Pentagon's Missile Defense Agency issued a memo warning employees to stop using work computers to access Internet porn sites.
Pornography sites are never used by criminals or foreign intelligence agencies as a means to access government and corporate computer networks.
Pornography sites are never used by criminals or foreign intelligence agencies as a means to access government and corporate computer networks.
Private data in organizations includes information like individual employees' salary, health records, and performance ratings.
Private data in organizations includes information like individual employees' salary, health records, and performance ratings.