Business Its Legal Ethical & Global Environment
10th Edition
ISBN: 9781305224414
Author: JENNINGS
Publisher: Cengage
expand_more
expand_more
format_list_bulleted
Question
error_outline
This textbook solution is under construction.
Students have asked these similar questions
Which of the following MOST likely indicates a clear violation of an NFPO’s code of conduct?
John Adams, a volunteer for the local pet shelter, also owns a pet store and has offered a discount on pet food to the local shelter.
Cecilia Lam used inappropriate language on her Facebook page when referring to the NFPO for which she worked.
Mark Adams, an employee for a legal society, used the organization’s computer to research a new job.
Hanpreet Kaur, the accountant for a sports rehabilitation society, offered the society’s services to his sister free of charge without her needing to qualify.
Assuming no consent or authorization was given, which of these activities are prohibit under CybercrimePrevention Act of 2012?-Prying into the privacy of another's residence is prohibited.- Non-delivery in a sales transaction is prohibited.- Installing unlicensed software is prohibited.- Live streaming movies is prohibited.-Impersonation is prohibited.-Pornography is prohibited.
- Stealing is prohibited.- Libel is prohibited.- Piracy is prohibited.-Bullying is prohibited.- Voyeurism is prohibited.- Wire tapping is prohibited.- Distribution of photos or videos is prohibited.- Disposing sensitive personal information is prohibited.- Unauthorized copying of protected materials is prohibited.
Innovative Marketing, Inc. (IMI), sold “scareware”—computer security software. IMI’s Internet ads redirected consumers to sites where they were told that a scan of their computers had detected dangerous files—viruses, spyware, and “illegal” pornography. In fact, no scans were conducted. Kristy Ross, an IMI co-founder and vice president, reviewed and edited the ads, and was aware of the many com- plaints that consumers had made about them. An individual can be held liable under the Federal Trade Commission Act’s prohibition of deceptive acts or practices if the person (1) participated directly in the deceptive practices or had the authority to control them and (2) had or should have had knowledge of them.
Were IMI’s ads deceptive? If so, can Ross be held liable? Explain..
Knowledge Booster
Similar questions
- Controversy tends to surround the topic of whistleblowers. For example, should they be considered heroes or traitors? Many pro-whistleblowing policies have been enacted by the federal government to allow these individuals to reap significant monetary rewards for coming forward and giving information about behaviors and actions such as corporate fraud and unethical deeds. Many corporate whistleblowers face negative consequences of their actions, such as reassignment, revenge, and hate crimes, and are seen as traitors (e.g., Edward Snowden and Gina Gray). Yet Sherron Watkins and Cynthia Cooper were celebrated as heroes. Look up the stories of Sherron Watkins and Cynthia Cooper. Why do you think that some whistleblowers are vilified and others made to be heroes?arrow_forward.A city health inspector threatens to close down a restaurant for issuing a fake health notice if the owner does not make a financial payment to the inspector. If the restaurant owner does not cooperate, he will not be able to open for business and the publicity will drive away his customers permanently . Faced with a threat of economic loss the owner makes the payment.▪ what type of fraud is this and what controls can be implemented to prevent or detect fraud ??arrow_forwardWhich preventive, detective, and/or corrective controls would best mitigate the following threat, and why? (d) An employee received an email purporting to be from her boss informing her of an important new attendance policy. When she clicked on a link embedded in the email to view the new policy, she infected her laptop.arrow_forward
- Please describe a time when you were faced with a personal dilemma regarding whether to blow the whistle on a wrongdoing. Some examples of a wrongdoing are witnessing cheating on an exam, witnessing someone trying to steal, noticing someone trying to take advantage of another, and completing a project at work without recording time spent in order to meet time constraints. Who were the stakeholders in the situation and how were they impacted by the wrongdoing? How did rationalization encourage the wrongdoer to follow through with their wrongdoing? What did you do and why?arrow_forwardPlease describe a time when you were faced with a personal dilemma regarding whether to blow the whistle on a wrongdoing. Some examples of a wrongdoing are witnessing cheating on an exam, witnessing someone trying to steal, noticing someone trying to take advantage of another, and completing a project at work without recording time spent in order to meet time constraints. Who were the stakeholders in the situation and how were they impacted by the wrongdoing? How did rationalization encourage the wrongdoer to follow through with their wrongdoing? What did you do and why? Case scenario: for someone working but not clocking in How would this fit under this dilemma? Please explain:arrow_forwardThe following is a list of 10 common security problems. For each problem, describe why it is a problem and choose a control plan from this chapter that would prevent or detect the problem from occurring. Criminals posing as small business owners obtained names, addresses, and social security numbers from an organization whose business is providing such information only to legitimate customers who have a right to the data. An executive of a financial services firm implements a wireless network so that she can work at home from anywhere in her house. After setting up the network, she logs on using the default password. An organization’s top salesman uses a consumer-grade instant messaging (IM) client (e.g., AOL Instant Messaging). Such clients bypass antivirus and spam software, don’t have auditing and logging capabilities, and allow users to choose their IM names. A financial analyst’s laptop was stolen from his car. The laptop contained the names and social security numbers of…arrow_forward
- Two very common ways that employees commit fraud against their employers is the misstatement of reimbursable expense accounts and the misuse of office supplies for personal purposes. Although these schemes are usually not individually significant, their magnitude can be damaging if these practices are widespread. Please comment on these types of fraud (and other examples of employee fraud) and what internal controls they would put in place in an organization to curb this activity.arrow_forwardA situation where a respected individual’s reputation was tarnished by personal decisions is the resignation of David Petraeus, former U.S. military general and head of the Central Intelligence Agency (CIA). On November 9, 2012, Petraeus resigned from the CIA after it was announced he had an extramarital affair with a biographer, Paula Broadwell, who wrote a glowing book about his life. Petraeus acknowledged that he exercised poor judgment by engaging in the affair. When Federal Bureau of Investigation (FBI) agents investigated the matter because of concerns there may have been security leaks, they discovered a substantial number of classified documents on her computer. Broadwell told investigators that she ended up with the secret military documents after taking them from a government building. No security leaks had been found. In accepting Petraeus’s resignation, President Obama praised Petraeus’s leadership during the Iraq and Afghanistan wars and said: “By any measure, through his…arrow_forwardSelect the correct answer(s) for the following multiple choice questions. Note that there may be more than one correct answer. Which of the following statements is (are) true about computer fraud perpetrators? a. They are typically younger and are motivated by curiosity, the challenge of beating the system, and gaining stature in the hacking community. b. They do not see themselves as criminals and rarely, if ever, seek to turn their actions into money. c. They write and sell malicious software that infect computers with viruses or can be used to steal money or data that can be sold. d. They are a top FBI priority because they organize fraud schemes targeted at specific individuals and businesses.arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Business Its Legal Ethical & Global EnvironmentAccountingISBN:9781305224414Author:JENNINGSPublisher:CengagePrinciples of Accounting Volume 2AccountingISBN:9781947172609Author:OpenStaxPublisher:OpenStax CollegeBusiness/Professional Ethics Directors/Executives...AccountingISBN:9781337485913Author:BROOKSPublisher:Cengage
- Pkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE L
Business Its Legal Ethical & Global Environment
Accounting
ISBN:9781305224414
Author:JENNINGS
Publisher:Cengage
Principles of Accounting Volume 2
Accounting
ISBN:9781947172609
Author:OpenStax
Publisher:OpenStax College
Business/Professional Ethics Directors/Executives...
Accounting
ISBN:9781337485913
Author:BROOKS
Publisher:Cengage
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L