Podcast
Questions and Answers
Zynga is known for offline console games like ChefVille and CityVille.
Zynga is known for offline console games like ChefVille and CityVille.
False
The general manager of CityVille left Zynga to join a competitor called Kixeye.
The general manager of CityVille left Zynga to join a competitor called Kixeye.
True
Zynga accused the former employee of stealing files containing non-critical information.
Zynga accused the former employee of stealing files containing non-critical information.
False
Whistleblowing involves attracting attention to acts that benefit the company.
Whistleblowing involves attracting attention to acts that benefit the company.
Signup and view all the answers
Whistleblowers usually have special information based on their personal biases.
Whistleblowers usually have special information based on their personal biases.
Signup and view all the answers
A conscientious employee would not try to correct internal problems within the company.
A conscientious employee would not try to correct internal problems within the company.
Signup and view all the answers
IT workers and employers have a simple relationship that does not require ongoing effort.
IT workers and employers have a simple relationship that does not require ongoing effort.
Signup and view all the answers
An IT worker and an employer typically agree on fundamental aspects of their relationship after the worker accepts an employment offer.
An IT worker and an employer typically agree on fundamental aspects of their relationship after the worker accepts an employment offer.
Signup and view all the answers
Job title, general performance expectations, and salary are aspects that IT workers and employers may agree upon before the worker accepts an employment offer.
Job title, general performance expectations, and salary are aspects that IT workers and employers may agree upon before the worker accepts an employment offer.
Signup and view all the answers
The relationship between IT workers and employers does not involve any agreement on specific work responsibilities.
The relationship between IT workers and employers does not involve any agreement on specific work responsibilities.
Signup and view all the answers
The company's code of conduct is not a document where aspects of the relationship between IT workers and employers may be addressed.
The company's code of conduct is not a document where aspects of the relationship between IT workers and employers may be addressed.
Signup and view all the answers
IT workers and employers do not need to make any agreements regarding work hours and company benefits before the worker accepts an employment offer.
IT workers and employers do not need to make any agreements regarding work hours and company benefits before the worker accepts an employment offer.
Signup and view all the answers
The policy addresses protection of the data privacy rights of employees, customers, suppliers, and others.
The policy addresses protection of the data privacy rights of employees, customers, suppliers, and others.
Signup and view all the answers
Employee monitoring includes wiretapping and eavesdropping on phone conversations.
Employee monitoring includes wiretapping and eavesdropping on phone conversations.
Signup and view all the answers
The policy addresses the inappropriate use of IT resources, such as Web surfing and personal emailing.
The policy addresses the inappropriate use of IT resources, such as Web surfing and personal emailing.
Signup and view all the answers
Disciplinary actions for IT-related abuses are not defined in the policy.
Disciplinary actions for IT-related abuses are not defined in the policy.
Signup and view all the answers
There is a process in place for communicating the policy to employees.
There is a process in place for communicating the policy to employees.
Signup and view all the answers
The corporate firewall is not required according to the policy.
The corporate firewall is not required according to the policy.
Signup and view all the answers
Strong codes of ethics are common in the IT arena.
Strong codes of ethics are common in the IT arena.
Signup and view all the answers
Public trust in professionals is based on the expectation of ethical behavior.
Public trust in professionals is based on the expectation of ethical behavior.
Signup and view all the answers
Professionals can use a code of ethics for self-assessment.
Professionals can use a code of ethics for self-assessment.
Signup and view all the answers
Peers cannot use a code of ethics for recognition or censure.
Peers cannot use a code of ethics for recognition or censure.
Signup and view all the answers
There is a universal code of ethics for IT workers.
There is a universal code of ethics for IT workers.
Signup and view all the answers
Penalties for serious violations can include loss of the right to practice.
Penalties for serious violations can include loss of the right to practice.
Signup and view all the answers
Viewing sexually explicit material at work could lead to lawsuits and allegations of creating a harassment-friendly environment.
Viewing sexually explicit material at work could lead to lawsuits and allegations of creating a harassment-friendly environment.
Signup and view all the answers
One in four men admit to viewing porn at work according to the Fawcett Society's survey.
One in four men admit to viewing porn at work according to the Fawcett Society's survey.
Signup and view all the answers
Organizations rarely take disciplinary action against employees who view pornography at work.
Organizations rarely take disciplinary action against employees who view pornography at work.
Signup and view all the answers
The executive director of the Pentagon's Missile Defense Agency issued a memo warning employees to stop using work computers to access Internet porn sites.
The executive director of the Pentagon's Missile Defense Agency issued a memo warning employees to stop using work computers to access Internet porn sites.
Signup and view all the answers
Pornography sites are never used by criminals or foreign intelligence agencies as a means to access government and corporate computer networks.
Pornography sites are never used by criminals or foreign intelligence agencies as a means to access government and corporate computer networks.
Signup and view all the answers
Private data in organizations includes information like individual employees' salary, health records, and performance ratings.
Private data in organizations includes information like individual employees' salary, health records, and performance ratings.
Signup and view all the answers