Chapter 4

¡Supera tus tareas y exámenes ahora con Quizwiz!

________ is a feature of social institutions that means mechanisms are in place to determine responsibility for an action. Liability The judicial system Accountability Due process The courts of appeal

Accountability

All of the following laws apply to actions by the federal government except the: Freedom of Information Act. Computer Security Act. Children's Online Privacy Protection Act. E-Government Act. Privacy Act.

Children's Online Privacy Protection Act.

Which of the following statements about cookies is not true? Cookies cannot be easily detected or deleted. Cookies are installed only at the user's request. Cookies are used to support the user experience on websites. Cookies can be combined with other website data to develop detailed profiles of customers. Cookies are stored on the user's computer.

Cookies are installed only at the user's request.

The FIP principle of Notice/Awareness states that: consumers should be able to review the data collected about them. data collectors must take responsible steps to assure that consumer information is accurate and secure from unauthorized use. websites must disclose their information practices before collecting data. there must be a mechanism in place to enforce FIP principles. customers must be allowed to choose how their information will be used for secondary purposes other than the supporting transaction.

websites must disclose their information practices before collecting data.

Which of the following resulted in a Christmas Eve outage for millions of Netflix customers? A failure of Amazon's cloud computing service A hacking attack A bug in Netflix's credit card processing system A blackout at Netflix's primary data center A failure of Netflix's recommendation engine software

A failure of Amazon's cloud computing service

Which of the following is not a U.S. federal law affecting private institutions? HIPAA Computer Matching and Privacy Protection Act Gramm-Leach-Bliley Act COPPA Video Privacy Protection Act

Computer Matching and Privacy Protection Act

Which of the following protects the authors of a book from having their work copied by others? Due process Copyright law Fair Use Doctrine Trade Secret law Patent protection

Copyright law

Which of the following is the most common reason that business systems fail? Software bugs Software errors Hardware failures Data quality Facilities failures

Data quality

Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials? Freedom of Information Act Digital Millennium Copyright Act Electronic Communications Privacy Act Privacy Act Computer Software Copyright Act

Digital Millennium Copyright Act

Which of the following terms refers to significant disparities in access to computers and the Internet among different social groups and different locations? Digital divide RSI CVS CTS Technostress

Digital divide

________ is a feature of law-governed society and involves having laws that are known and understood, along with the ability to appeal to higher authorities to ensure that the laws are applied correctly. The judicial system Responsibility Due process Accountability Liability

Due process

Which of the five moral dimensions of the information age do the central business activities of DoubleClick involve? Accountability and control Quality of life Property rights and obligations System quality Information rights and obligations

Information rights and obligations

The NAI is an industry association formed to help with which of the following? Copyright protection Trade secret protection Online privacy issues Trademark protection Patent protection

Online privacy issues

Which of the following is not a file-sharing service? The Pirate Bay Morpheus Grokster Pandora Megaupload

Pandora

________ grants the owner exclusive ownership of the ideas behind an invention for 20 years. Copyright law Trademark law Privacy law Patent law Trade secret protection

Patent law

Which of the following is a primary drawback to the "do anything anywhere" work environment? It makes work environments less pleasant. It leads to employees being paid less for the total amount of work performed. It centralizes power at corporate headquarters. It blurs the traditional boundaries between work and family time. It creates a digital divide.

It blurs the traditional boundaries between work and family time.

Which of the following is a data analysis technology that finds hidden connections between data in disparate sources? NORA COPPA Spyware FIP HIPAA

NORA

What percent of global Internet users use Google Search and other Google services such as YouTube? Over 90 percent Around 25 percent Nearly 80 percent Less than 10 percent About 50 percent

Nearly 80 percent

The use of computers to assemble data from different sources to create digital dossiers of detailed information about individuals is known as which of the following? Spamming Targeting Spyware Phishing Profiling

Profiling

The obligations that individuals and organizations have concerning rights to intellectual property involve which of the following moral dimensions of the information age? Property rights and obligations Information rights and obligations Accountability and control System quality Quality of life

Property rights and obligations

he obligations that individuals and organizations have concerning rights to intellectual property involve which of the following moral dimensions of the information age? System quality Quality of life Property rights and obligations Information rights and obligations Accountability and control

Property rights and obligations

________ means that you accept the potential costs and obligations for the decisions you make. Liability Duty Due process Accountability Responsibility

Responsibility

Which ethical rule states that if an action cannot be taken repeatedly, it is not right to take at all? High-failure cost rule Lemming rule Slippery-slope rule Golden Rule Utilitarian principle

Slippery-slope rule

Which of the following statements about spam is not true? Spamming has mushroomed because it is so inexpensive and can reach so many people. Spamming is more tightly regulated in the United States than in Europe. Most spam originates from bot networks. Cell phone spam usually comes in the form of SMS text messages. Spam costs for business are very high.

Spamming is more tightly regulated in the United States than in Europe.

Which of the following restricts the information that the U.S. federal government can collect about an individual and regulates what it can do with the information? The Freedom of Information Act COPPA HIPPA The Gramm-Leach-Bliley Act The Privacy Act

The Privacy Act

Which of the following is not an example of the moral dimensions of the information age identified in the text? System quality Quality of life The emergence of giant tech firms that dominate their markets Accountability and control Information rights and obligations

The emergence of giant tech firms that dominate their markets

Advertisers use ________ in order to display more relevant ads based on a user's search and browsing history. intelligent agents NORA FIP principles Web bugs behavioral targeting

behavioral targeting

All of the following are technical solutions to protecting user privacy except: email encryption. preventing client computers from accepting cookies. anonymous email. data use policies. anonymous surfing.

data use policies.

Digital media differs from a physical book in all of the following ways except: ease of replication. ease of alteration. ease of global distribution. ease of establishing uniqueness. ease of transmission.

ease of establishing uniqueness.

The Network Advertising Initiative is an industry association that: encourages self-regulation to develop a set of privacy guidelines for its members. regulates the use of customer information by firms. is a safe harbor program established by the U.S. government. protects user privacy during interactions with websites. has established technical guidelines for ensuring privacy.

encourages self-regulation to develop a set of privacy guidelines for its members.

The ethical "no free lunch" rule states that: if an action is not right for everyone to take, it is not right for anyone to take. if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work. one should take the action that produces the least harm or incurs the least cost. one can put values in rank order and understand the consequences of various courses of action. if an action cannot be taken repeatedly, then it is not right to be taken at any time.

if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work.

When a cookie is created during a website visit, it is stored: on the ISP's servers. on the hard drive of the visitor's computer. in the browser's application settings. on the website's server. nowhere, because they are only used during a visit and are discarded once a visitor leaves the website.

on the hard drive of the visitor's computer.

In the ________ model of informed consent, personal information cannot be collected until the consumer specifically agrees that his or her data can be collected. opt-out PGP opt-in safe harbor P3P

opt-in

The obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within which of the following moral dimensions of the information age? Property rights and obligations Quality of life System quality Family and home Accountability and control

quality of life

The U.S. CAN-SPAM Act: has dramatically cut down spamming. requires commercial email senders to identify themselves. does not outlaw the use of fake return addresses. makes spamming illegal. does not override state anti-spamming laws.

requires commercial email senders to identify themselves.

The GDPR created a ________ framework in order to enable U.S. businesses to legally use personal data from EU countries. FIP COPPA safe harbor PGP P3P

safe harbor

Which of the following ethical guidelines suggests that you put yourself in the place of others, and think of yourself as the object of the decision? the risk aversion principle Kant's categorical imperative the utilitarian principle the Golden Rule the "no free lunch" rule

the Golden Rule

"Look and feel" copyright infringement lawsuits are concerned with: using the graphical elements of another product. the distinction between tangible and intangible ideas. violation of a monopoly on the ideas behind a product. using the creative elements of another product. the distinction between an idea and its expression.

the distinction between an idea and its expression.

According to ________, you should take the action that produces the least harm. the risk aversion principle Kant's categorical imperative the "no free lunch" rule the Golden Rule the utilitarian principle

the risk aversion principle

Which of the following were involved in what has been called the patent trial of the century? Apple and Microsoft Apple and Hewlett-Packard Apple and Samsung Microsoft and Symantec Microsoft and Facebook

Apple and Samsung

Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed? Privacy Protection Act Gramm-Leach-Bliley Act Freedom of Information Act HIPAA COPPA

HIPAA

Which of the following best describes Immanuel Kant's categorical imperative? You should act towards others as you would like them to act towards you. One should take the action that produces the least harm or incurs the least cost. If an action cannot be taken repeatedly, then it is not right to be taken at any time. One can put values in rank order and understand the consequences of various courses of action. If an action is not right for everyone to take, it is not right for anyone to take.

If an action is not right for everyone to take, it is not right for anyone to take.

Which of the following is not one of the current key technology trends that raises ethical issues? Increase in data quality Data analysis advancements Data storage improvements Increase in use of mobile devices Advances in networking technology

Increase in data quality

Which of the following best describes the effect that new information technology has on society? It has a waterfall effect in raising ever more complex ethical issues. It has a dampening effect on the discourse of business ethics. It is beneficial for society as a whole, while raising dilemmas for consumers. It has a ripple effect, raising new ethical, social, and political issues. It has a magnifying effect, creating increasing numbers of ethical issues.

It has a ripple effect, raising new ethical, social, and political issues.

What is not a feature of the General Data Protection Regulation (GDPR)? It imposes fines on companies for violating the regulation up to 4 percent of a firm's global revenue. It creates a single EU privacy policy. It applies to all firms doing business in the EU. It requires unambiguous consent for using personal data to construct profiles. It prevents firms from using cookies.

It prevents firms from using cookies.

A colleague at work takes small amounts of office supplies for her own personal use, saying that this is a tiny loss to the company. You tell her that if everyone were to take office supplies, then the loss would no longer be minimal. Your rationale expresses which of the following ethical principles? The Golden Rule The slippery-slope rule Kant's Categorical Imperative The "No free lunch" rule The Risk Aversion Principle

Kant's Categorical Imperative

Which of the following is not protected by copyright law? Motion pictures Machines Musical compositions Artwork Maps

Machines

FIP principles are based on a belief in which of the following? Accountability of the record holder Mutuality of interest between the record holder and the individual Responsibility of the record holder Privacy of the individual Difference between the interests of the individual and commercial organizations

Mutuality of interest between the record holder and the individual

Which of the five moral dimensions of the information age does the weakening of boundaries between work and family life involve? System quality Quality of life Information rights and obligations Accountability and control Property rights and obligations

Quality of life

Which of the following occurs when muscle groups are forced through tens of thousands of repetitions under low-impact loads? CVS CTS RSS RSI Technostress

RSI

________ are not held liable for the messages they transmit. Private individuals Elected officials Organizations and businesses European ISPs Regulated common carriers

Regulated common carriers

Which of the following is not true about the changes to EU data protection rules enacted in the GDPR? The new rules require Internet companies to delete information at the user's request. The new rules require Internet companies to retain information only as long as absolutely necessary. The new rules require Internet companies to obtain explicit consent from consumers for the use of their personal data. The new rules do not allow consumers to have their data removed from company servers. The new rules strengthen the right to be forgotten.

The new rules do not allow consumers to have their data removed from company servers.

________ allows an organization to collect personal information without the user's explicit consent. FIP principles A safe harbor The opt-out model The opt-in model P3P

The opt-out model

Which of the following is not a difficulty in establishing patent protection? Length of time required to receive protection The requirement that the work must be a secret The requirement that the work must be original The requirement that the work reflect some special understanding and contribution The requirement that the work must be novel

The requirement that the work must be a secret

Which of the following best describes how new information systems can result in legal gray areas? They are little understood by politicians or lawyers. They work with networked, digital data, which are more difficult to control than information stored manually. They are implemented by technicians rather than managers. They result in new situations that are not covered by old laws. They are created from sets of logical and technological rules rather than social or organizational mores.

They result in new situations that are not covered by old laws

Which of the following forms of protection of intellectual property requires that the property be the subject of a nondisclosure agreement? Copyright Trademark All forms of intellectual property protection Patent Trade secret

Trade secret

All of the following are steps in the process for analyzing an ethical issue except: identifying the stakeholders. identifying and clearly describing the facts. identifying the potential consequences of your options. identifying the options you can reasonably take. assigning responsibility.

assigning responsibility.

CVS refers to: eyestrain related to computer display screen use. a business practice that attempts to evaluate the intangible values of computer systems. wrist injuries brought about by incorrect hand position when using a keyboard. a type of antivirus protection software. carpal vision syndrome.

eyestrain related to computer display screen use.

In 2010, the FTC added all of the following recommendations to its privacy guidelines except: firms should require consumer consent and provide clear options to opt out of data collection. consumers should be able to review and contest the accuracy and completeness of data. firms should build products and services that protect privacy. firms should increase the transparency of their data collection. firms should limit the length of time that any personal data is stored to six months or less.

firms should limit the length of time that any personal data is stored to six months or less.

Redesigning and automating business processes can be seen as a double-edged sword because: increases in efficiency may be accompanied by poor data quality. support for middle-management decision making may be offset by poor data quality. it can concentrate power in the hands of senior executives. reliance on technology results in the loss of hands-on knowledge. increases in efficiency may be accompanied by job losses.

increases in efficiency may be accompanied by job losses.


Conjuntos de estudio relacionados

Beaufort 6 - Contact 7 - woordenschat

View Set

Finance 3000 Chapter 1 - Mizzou Hegger

View Set

3.2 Basic Machine Power Off - Basic Mill Operator

View Set

CSA+ CH4 Security Architecture 1/2

View Set

Government in America, Edwards: Chapter 1

View Set

Chapter 2 Biological Molecules/ Organic compounds

View Set