You are on page 1of 5
ess msu management Sefened University FINAL SEMESTER EXAMINATION (FEBRUARY 2017 SESSION) INFORMATION SYSTEM ETHICS AND LAW CLW20103/DLW20103 LECTURER MATRIC NO VENUE PROGRAMME : JUNE 2017 DURATION : 3 HOURS INSTRUCTIONS: 1. Candidates must read all questions carefully. 2. The examination script consists of the followings: Part Types of Instruction Answer Sheets Questions to be Used ONE 20 MCQ Answer ALL OMR sheet questions ae 7 Extended Answer ALL ‘Answer booklet Structure questions THREE | Extended [Answer THREE (3)| Answer booklet | Structures questions ONLY NOTE : PART ONE IS NOT AVAILABLE FOR REFERENCE THIS EXAMINATION SCRIPT CONTAINS 9 PAGES INCLUDING THE FRONT COVER DO NOT OPEN THE EXAMINATION SCRIPT UNTIL FURTHER INSTRUCTION CONFIDENTIAL PART TWO (20 marks) Time: 30 minutes INSTRUCTION This part consists of ONE (1) COMPULSORY question. Answer the question in the answer booklet provided 1 Jane is a signing agent and has been approached by ABX signings to perform a loan signing for the benefit of Ahmed and Alex, borrowers. ABX signings has been contracted by ZYZ Title, the title company responsible for the title work, who was hired by the Public Southern Bank. ABX signings sent the documents to Jane via POSLAJU Malaysia. Referring to the case study above, answer the following questions: (a) (b) (c) (d) What is Jane's role in this situation? (2 marks) Who should have and who should not have access to Ahmed’s and Alex's loan information? (10 marks) Under any circumstance, should Jane interpret the terms of the document for the signer or offer advice or commentary? (2 marks) In addition to keeping Nonpublic Personal Information (NPI) confidential and secure, sensitive information in Jane's possession should be used only in the manner for which Jane has been granted access. In the case of the notary public, what does this usually means? (6 marks) INFORMATION SYSTEM ETHICS AND LAW 6/9 CONFIDENTIAL PART THREE (60 marks) Time: 1 hour 30 minutes INSTRUCTION This part consists of FIVE (5) questions. Answer THREE (3) questions only in the answer booklet provided. 1. The welfare of individuals and their specific rights need to be safeguarded in the environment of an information society. (a) (b) (c) List ALL the principal ethical issues of concern with regard to information systems. (4 marks) Explain in detail TWO (2) of the principles listed in question 1a. (10 marks) The declining of data storage costs, the advances of data analysis and network are all the technology trends. Explain on, how this technology trend raises the ethical issue. (6 marks) 2. Profession is a calling that requires specialized knowledge, long and intensive academic preparation. (a) (b) (c) (d) A professional code of ethics states the principles and core values essential to the work of a particular occupational group. List TWO (2) main parts of the code of ethics. (2 marks) What are the benefits of the code of ethics? (4 marks) Define certification and licensing. (4 marks) Are there any issues associated with licensing IT professionals? Elaborate your answer. (10 marks) INFORMATION SYSTEM ETHICS AND LAW 719 CONFIDENTIAL 3. _ Computers are involved to some extent in almost every aspect of our lives. It is not regulated to the extent of medicine, air travel, or construction Zoning. (a) (b) (©) (d) The internet is the global system of interconnected computer networks to link billions of devices worldwide. Identify FOUR (4) general internet issues. (4 marks) Daren promptly respond to messages from unknown email sender. Did he do the right action? Give suitable justifications to support your answer. (6 marks) Information on intemet includes hate, violence, and information that is harmful for children. How to solve these problems? (4 marks) List any SIX (6) measures to protect computer security. (6 marks) Security, privacy, and ethical issues are the essential elements in information systems and the internet. (a) (b) (c) (d) Human resource employees need to prevent computer waste and mistakes. What is the definition of the computer waste and mistake? (4 marks) List FOUR (4) solutions on, how to prevent computer wastage and mistakes. (4 marks) What are the SIX (6) tips for avoiding viruses and worms? (6 marks) What is an antivirus program? Give FIVE (5) tips on how to use it. (6 marks) INFORMATION SYSTEM ETHICS AND LAW 8/9 CONFIDENTIAL 5. Computer crime is an international issue. (a) Give TWO (2) techniques for crime prevention used by corporate organization. (4 marks) (b) Discuss how the crimes over the Internet can be prevented. (10 marks) (c) Explain any THREE (3) health concerns while using computers. (6 marks) END OF QUESTION PAPER INFORMATION SYSTEM ETHICS AND LAW 9/9

You might also like