A large telecommunications company pledged to adopt green computing in everything it does. The telecommunications company hired a consulting firm to help it evaluate, compare, and select supplies based on standard eco-friendly criteria.
What should the consulting firm use to help achieve this goal?
What are two outcomes of adherence to a professional code of ethics for individuals, their profession, and society as a whole? Choose 2 answers.
How can organizations differentiate between ethical decision-making and legal decision-making frameworks?
Which act prohibits U.S. government agencies from concealing the existence of personal data record-keeping systems?
A robotics company engages an IT firm to deliver a marketing software solution. During the project, the robotics company asks for additional features that were not in the initial contract. The IT firm's project leader is unsure whether it can deliver these features but verbally agrees to the scope change. On delivery, the robotics company notes that several of the additional features are not included and that because of this, the solution is not compatible with certain legacy systems the company did not initially disclose.
Which factor might have mitigated the problem if the IT firm's project leader had abided by a professional code of ethics?
A factory manager must decide whether to replace assembly-line workers with robots but is concerned about employees losing their jobs. The factory manager also believes this automation would enhance worker safety, save the factory money, raise corporate profits, and lower the prices of goods produced. The factory manager weighs all possible outcomes and chooses the action that produces the greatest good.
Which ethical theory does this approach represent?
What is the first step in ethical decision-making for an IT professional?
An organization's security policy states that only authorized employees are granted access to the payroll database. During the onboarding process, two newly hired employees realize they have been erroneously granted access to the payroll database.
Which security practice has been violated?
An organization plans to hire three external software engineers to build client software to connect its lightweight wireless devices to the cloud. It will do so according to specific terms and a specific duration defined in a legal document. The duration of the work will be six months.
Which workforce category should the organization hire within?