Chapter 4

¡Supera tus tareas y exámenes ahora con Quizwiz!

The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called: A) profiling. B) phishing. C) spamming. D) targeting.

A) profiling.

In the information age, the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of: A) property rights and obligations. B) system quality. C) accountability and control. D) information rights and obligations.

A) property rights and obligations.

Accepting the potential costs, duties, and obligations for the decisions you make is referred to as: A) responsibility. B) accountability. C) liability. D) due process.

A) responsibility.

The key concepts in patent law are originality, novelty, and value.

False

The last step in analyzing an ethical issue should be to identify the stakeholders - people who have a vested interest in the outcome of the decision.

False

The rate of global piracy is approximately 20%.

False

Trade secret law does not protect the actual ideas in a work product.

False

Copyright is the legal protection afforded intellectual property, such as a song, book, or video game.

True

Most Internet businesses do very little to protect the privacy of their customers.

True

Spyware is software that comes hidden in downloaded applications and can track your online movements.

True

Technostress is a computer-related malady whose symptoms include fatigue.

True

Which of the following best describes how new information systems result in legal gray areas? A) They work with networked, electronic data, which are more difficult to control than information stored manually. B) They result in new situations that are not covered by old laws. C) They are implemented by technicians rather than managers. D) They are created from sets of logical and technological rules rather than social or organizational mores.

B) They result in new situations that are not covered by old laws.

The introduction of new information technology has a: A) dampening effect on the discourse of business ethics. B) ripple effect, raising new ethical, social, and political issues. C) beneficial effect for society as a whole, while raising dilemmas for consumers. D) waterfall effect in raising ever more complex ethical issues.

B) ripple effect, raising new ethical, social, and political issues.

All of the following are current key technology trends raising ethical issues except: A) data storage improvements. B) data analysis advancements. C) increase in multimedia quality. D) increase in use of mobile devices.

C) increase in multimedia quality.

NORA is a: A) profiling technology used by the EU. B) federal privacy law protecting networked data. C) new data analysis technology that finds hidden connections between data in disparate sources. D) sentencing guideline adopted in 1987 mandating stiff sentences on business executives.

C) new data analysis technology that finds hidden connections between data in disparate sources.

Which of the following is not one of the practices added in 2010 by the FTC to its framework for privacy? A) Firms should build products and services that protect privacy. B) Firms should increase the transparency of their data collection. C) Firms should require consumer consent and provide clear options to opt out of data collection. D) Firms should limit the length of time that any personal data is stored to six months or less.

D) Firms should limit the length of time that any personal data is stored to six months or less.

Which of the five moral dimensions of the information age do the central business activities of ChoicePoint raise? A) Property rights and obligations B) System quality C) Accountability and control D) Information rights and obligations

D) Information rights and obligations

In the information age, the obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within the moral dimension of: A) family and home. B) property rights and obligations. C) system quality. D) quality of life.

D) quality of life.

According to the courts, the creation of software, unique concepts, general functional features, and even colors are protectable by copyright law.

False

Advances in data storage have made routine violation of individual privacy more difficult.

False

Any unsolicited e-mail is legally considered spam.

False

Despite the passage of several laws defining and addressing computer crime, accessing a computer system without authorization is not yet a federal crime.

False

Even in today's legal climate, there is little incentive for firms to cooperate with prosecutors investigating financial crimes at their firm.

False

Most American and European privacy law is based on a set of five principles called COPPA.

False

The Copyright Office began registering software programs in the 1990s.

False

Privacy is the right to be left alone when you want to be, without surveillance or interference from other individuals or organizations.

True

Professionals take on special rights and obligations because of their special claims to knowledge, wisdom, and respect.

True

The European Parliament has passed a ban on unsolicited commercial messaging.

True

The drawback to copyright protection is that the underlying ideas behind the work are not protected, only their reproduction in a product.

True

The most common type of computer-related RSI is CTS.

True


Conjuntos de estudio relacionados

Chapter 17: Nursing care of the child with an alteration in sensory perception/ disorder of the eyes or ears.

View Set

embedding quotations English quiz

View Set

Social Psychology: Chapter 3 - Automatic vs. Controlled Thinking

View Set

Anatomy and Physiology - Phonatory System

View Set

World History Chapter 23: War and Revolution

View Set

Chapter 34 Heart Failure - Complex Fall 2021

View Set

Personal Finance Buying a car Test

View Set