CIS 450 - Ch. 8
In which of the following cases did the U.S. Supreme Court rule that basic business methods cannot be patented? State Street Bank & Trust v. Signature Financial Group, Inc. Bilski et al. v. Kappos Alice Corporation Pty. Ltd. v. CLS Bank International Brown Bag Software v. Symantec Corp.
Alice Corporation Pty. Ltd. v. CLS Bank International
________ allow(s) you to send e-mail without a trace. Anonymous remailers Anonymous surfing Public key encryption P3P
Anonymous remailers
Most adult social network participants do not have any expectation of personal privacy when using a social network.
False
Online gambling is now legal throughout the United States
False
The principle of responsibility means that individuals, organizations, and societies should be held accountable to others for the consequences of their actions.
False
Which of the following cases involved the issue of keywording? Bernina of America, Inc. v. Fashion Fabrics Int'l, Inc. Ticketmaster Corp. v. Tickets.com Government Employees Insurance Company v. Google, Inc. E. & J. Gallo Winery v. Spider Webs Ltd.
Government employees insurance company v. Google, inc.
Which of the following requires financial institutions to inform consumers of their privacy policies and permits consumers some control over their records? HIPAA Freedom of Information Act COPPA Gramm-Leach-Bliley Act
Gramm-Leach-Bliley Act
All of the following statements about patents are true except: the four types of inventions protected by patent law are machines, manmade products, compositions of matter, and processing methods. computer programs can be patented. to be patented, an invention must be nonobvious. it is more difficult to obtain a copyright than it is to obtain a patent.
It is more difficult to obtain a copyright than it is to obtain a patent
Which ethical principle asks you to assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise? the Slippery Slope No Free Lunch the Social Contract rule the Golden Rule
No Free Lunch
________ allows someone to obtain an exclusive monopoly on the ideas behind an invention for 20 years. Trademark law Trade secret law Patent law Copyright law
Patent law
Which ethical principle states that when confronted with an ethical dilemma, an individual should take the action that produces the least harm, or the least potential cost? Risk Aversion the Slippery Slope the Collective Utilitarian principle No Free Lunch
Risk Aversion
Which case was instrumental in paving the way for Internet business methods patents? Ticketmaster Corp. v. Tickets.com State Street Bank & Trust Co. v. Signature Financial Group, Inc. Brown Bag v. Symantec Alice Corporation Pty. Ltd. v. CLS Bank International
State Street Bank & Trust Co. v. Signature Financial Group, Inc.
________ is a tiered notice and response system aimed at reducing copyright infringement over P2P networks.
The CAS
Which of the following statements about net neutrality is not true?
The FCC now regulates ISP pricing
Which of the following statements about the E.U. General Data Protection Regulation (GDPR) is not true? The GDPR applies to any firm operating in any E.U. country. The GDPR eliminates the right to be forgotten. The GDPR limits the ability of companies to use data for purposes other than those for which it was collected. The GDPR replaces the E.U.'s existing Data Protection Directive.
The GDPR eliminates the right to be forgotten
The expansion of generic top-level domains recently authorized by ICANN is likely to be very disruptive in terms of trademark protection.
True
The opt-in model for informed consent requires an affirmative action by the consumer before a company can collect and use information.
True
Registering the domain name Faceboik.com with the intent to divert web traffic from people misspelling Facebook.com is an example of:
Typosquatting
Which of the following is not aimed at strengthening the ability of law enforcement agencies to monitor Internet users without their knowledge? Communications Assistance for Law Enforcement Act USA Freedom Act Homeland Security Act USA PATRIOT Act
USA Freedom Act
Which of the following handles cybersquatting cases under its Uniform Dispute Resolution procedures? FTC WIPO ICANN USPTO
WIPO
According to data from Pew Research Center, which of the following is the action which the highest percentage of Internet users has taken to preserve their privacy online
cleared web browser history and cookies
Megaupload's founder, Kim Dotcom, was arrested in connection with which of the following? privacy violation patent infringement copyright infringement trademark infringement
copyright infringement
Downloading a music track owned by a record company without paying for it is an example of a violation of:
copyright law
Registering a domain name similar or identical to trademarks of others to divert web traffic to their own sites is an example of: cybersquatting. metatagging. cyberpiracy. framing.
cyberpiracy
Registering a domain name similar or identical to trademarks of others to extort profits from legitimate holders is an example of: cyberpiracy. framing. cybersquatting. metatagging.
cybersquatting
Which of the following involves bypassing the target site's home page and going directly to a content page? deep linking framing cybersquatting metatagging
deep linking
What is the first step in analyzing an ethical dilemma? Identify and describe the facts. Identify the options you can reasonably take. Define the conflict or dilemma and identify the higher-order values involved. Identify the potential consequences of your opinions.
identify and describe the facts
Disputes over federal trademarks involve establishing:
infringement
All of the following are required in order for information to be considered a trade secret except:
it must be unique
Which of the following is not one of the four basic principles shared by ethical schools of thought in western culture? liability accountability responsibility privacy
privacy
Which of the following tools can companies use to trace user statements and views on newsgroups, chat groups, and other public forums? shopping carts cookies digital wallets search engines
search engines
Which of the following e-commerce technology dimensions creates greater opportunities for cyberbullying? interactivity information density ubiquity social technology
social technology
Which ethical principle states that, when confronted with an ethical dilemma, individuals should take the action that achieves the greater value for all of society? the Golden Rule Risk Aversion the Collective Utilitarian principle the Social Contract rule
the Collective Utilitarian principle
All of the following statements about the Digital Millennium Copyright Act (DMCA) are true except:
the DMCA makes Internet Service Providers (ISPs) responsible and accountable for hosting websites or providing services to infringers regardless of whether the ISP is aware of infringement.
All of the following are possible penalties for violating the Digital Millennium Copyright Act (DMCA) except: fines up to $500,000 for a first offense. fines up to $1 million for a repeat offense. restitution to the injured parties for any losses due to infringement. up to ten years' imprisonment for a first offense.
up to ten years' imprisonment for a first offense
How long does copyright protection extend for corporate-owned works? 95 years 50 years 25 years 75 years
95 years
Which ethical principle tells you it's wise to assume perfect information markets? the Social Contract rule the New York Times test the Golden Rule the Collective Utilitarian principle
the New York Times test
Which ethical principle states that if an action cannot be taken repeatedly, then it is not right to take at all?
the Slippery Slope
A social consequence of the richness of Internet information is:
very persuasive messages might reduce the need for multiple independent sources of information.
Which of the following situations would not qualify for the fair use exception to U.S. copyright law? A professor clips a newspaper article just before class and distributes copies of it to his class. A journalist quotes a paragraph from a book in a review of the book. Google posts thumbnail images of books in the Google Book Search Project. A student copies a photograph of his favorite band from a website created by the band's record label and places it on the student's personal website.
A student copies a photograph of his favorite band from a website created by the band's record label and places it on the student's personal website.
Which of the following is not true about the evolution of Facebook's privacy policies between 2005 and 2015? Facebook's privacy policies improved from 2005 to 2009. Facebook's privacy policy became easier to understand. Facebook's privacy policies have steadily declined since 2009. The amount of information gathered and monitored by Facebook increased.
Facebook's privacy policy became easier to understand
The Spokeo case involved a claim for damages based on which of the following? Fair Credit Reporting Act Digital Millennium Copyright Act Defend Trade Secrets Act Anticybersquatting Consumer Protection Act
Fair Credit Reporting Act
Which of the FTC's Fair Information Practices (FIP) principles requires identification of the collector of data? Choice/Consent Notice/Awareness Security Access/Participation
Notice/Awareness
Which of the following statements about industry self-regulation regarding privacy is not true? The primary focus of industry efforts has been the use of online "seals" that attest to the site's policies. Industry efforts have not so far succeeded in reducing American fears of privacy invasion. OPA members are required to implement the OPA's privacy guidelines. The NAI's privacy policies have established the TRUSTe seal.
The NAI's privacy policies have established the TRUSTe seal
Which ethical principle asks you to consider the impact of your decision if the principles underlying your decision became an organizing principle of the entire society? Risk Aversion the Social Contract rule the Golden Rule the Slippery Slope
The Social Contract Rule
Which of the following statements about the patent battle between Apple and Samsung is not true? The courts have ruled that Samsung has infringed on some of Apple's patents. Analysts believe the cost to Apple of this litigation is at least equal to the damage award it may ultimately be paid. The courts have decided that Apple does not have a valid patent on the iPhone's user interface. Over the last five years of litigation, Samsung has changed its interface and functionality to greatly reduce its infringement.
The courts have decided that Apple does not have a valid patent on the iPhone's user interface
Google defended its Library Project on the grounds of fair use.
True
The display of a third-party's website or page within your own website is called: deep linking. framing. metatagging. cybersquatting.
framing
The display of a third-party's website or page within your own website is called: framing. deep linking. metatagging. cybersquatting.
framing
Which of the following e-commerce technology dimensions has the potential to reduce cultural diversity in products? global reach ubiquity information density interactivity
global reach
Amazon has a patent on:
one-click purchasing
All of the following cases involved the doctrine of fair use except
Brown Bag Software vs. Symantec Corp.
________ operates the largest private personal database in the world. Apple Experian Acxiom TransUnion Corporation
Acxiom
________ protects original forms of expression in a tangible medium. Copyright law Patent law Trademark law Trade secret law
Copyright law
The Children's Internet Protection Act (CIPA) has been struck down by the U.S. Supreme Court as unconstitutional.
False
The Federal Communications Commission's new privacy rules apply to both broadband ISPs and websites.
False
________ is not a privacy advocacy group.
Reputation.com
What is the FTC recommendation regarding choice as it relates to personally identifiable information (PII)?
Require firms to have consumers affirmatively opt-in before PII is collected
"Do Not Track" falls under which of the following principles in the FTC's new privacy framework?
Simplified Choice
________ can be used to record all keyboard activity of a user.
Spyware
In the United States, Google is not required to remove results from its search engine if requested.
True
Liability is a feature of political systems in which a body of law is in place allowing individuals to recover damages done to them by other actors, systems, or organizations.
True
Net neutrality refers to the idea that Internet service providers (ISPs), including cable Internet and wireless carriers, should treat all data on the Internet in the same manner, and not discriminate or price differentially by content, protocol, platform, hardware, or application.
True
Section 230 of the Communications Decency Act (CDA) provides immunity for providers and users of interactive computer services (such as ISPs and websites) from being considered a publisher that might be liable for harmful content posted by others.
True
The AdChoices program is an industry-sponsored initiative to encourage websites to be more transparent about how they use personal information and to make it more likely that appropriate ads are shown to users.
True
The ethical principle of Universalism states that if an action is not right for all situations, then it is not right for any situation.
True
What is the major reason the Internet has such potential for destroying traditional conceptions and implementations of intellectual property law? the support for instant peer-to-peer communication the anonymous nature of the Internet the ability to make perfect copies of digital works at little cost the use of standards for file formats
the ability to make perfect copies of digital works at little cost
Which of the following features of e-commerce technology can result in work and shopping invading family life?
ubiquity