Final Exam Ch 8

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following situations would not qualify for the fair use exception to U.S. copyright law?

A student copies a photograph of his favorite band from a Web site created by the band's record label and places it on the student's personal Web site.

________ information is demographic and behavioral information that does not include any personal identifiers.

Anonymous

Which of the FTC's Fair Information Practices/FIP principles requires opt-in or opt-out policies to be in place?

Choice/Consent

Which of the following is a core Fair Information Practices/FIP principle?

Choice/Consent

Which of the following does not strengthen the ability of law enforcement agencies to monitor Internet users without their knowledge?

Computer Security Act of 1987

Which of the following authorizes the creation of a second level domain on the Internet where all Web sites have to declare they contain no material harmful to children?

Dot Kids Act

In 1998, the FTC issued its ________ principles, on which it has based its assessments and recommendations for online privacy.

Fair Information Practice/FIP

Which of the following requires financial institutions to inform consumers of their privacy policies and permits consumers some control over their records?

Financial Modernization Act, Graham-Leach-Bliley Act

Which of the FTC's FIP principles requires identification of the collector of data?

Notice/Awareness

________ is currently the most comprehensive technological privacy protection effort.

P3P

________ is a standard designed to communicate to Internet users a Web site's privacy policy, and to compare that policy to the user's own preferences or to other standards.

P3P/Platform for Privacy Preferences

________ is collected data that can be used to identify and locate an individual.

PII

Discuss in depth one ethical, social, or political issue that is presently in the news surrounding the Internet and e-commerce.

Possible topics include privacy issues, intellectual property rights issues like copyright, patents or trademarks, taxation, Internet governance issues, online pornography, gambling, or the sale of cigarettes and drugs.

Which of the following laws prohibits government agents from conducting unannounced searches of press offices and files, if no one in the office is suspected of committing a crime?

Privacy Protection Act of 1980

________ involves the creation of digital images that characterize online individual and group behavior.

Profiling

What is the FTC recommendation regarding choice as it relates to personally identifiable information/P I I?

Require firms to have consumers affirmatively opt-in before P I I is collected.

Which ethical principle states that when confronted with an ethical dilemma, an individual should take the action that produces the least harm, or the least potential cost?

Risk Aversion

Which case was instrumental in paving the way for Internet business methods patents?

State Street Bank & Trust Co. v. Signature Financial Group. Inc.

Which privacy protection program has the Federal Trade Commission/FTC approved as a safe harbor under COPPA?

TRUSTe children's privacy seal

Which ethical principle states that, when confronted with an ethical dilemma, individuals should take the action that achieves the greater value for all of society?

The Collective Utilitarian Principle

Which ethical principle emphasizes putting oneself into the place of others and thinking of oneself as the object of the decision?

The Golden Rule

Which ethical principle tells you that it is wise to assume perfect information markets?

The New York Times Test

Under the ________ Act, American intelligence authorities are permitted to tap into whatever Internet traffic they believe is relevant to the campaign against terrorism, in some circumstances without judicial review.

USA Patriot /Patriot

The three basic principles that all ethical schools of thought in western culture share are responsibility, liability, and ________.

accountability

Which of the following technologies allows you to send e-mail without a trace?

anonymous remailing

Downloading music tracks owned by record companies without paying for them is an example of a violation of:

copyright law.

Registering a domain name similar or identical to trademarks of others to divert Web traffic to their own sites is an example of:

cyberpiracy.

Registering a domain name similar or identical to trademarks of others to extort profits from legitimate holders is an example of:

cybersquatting.

Which of the following uses software installed at the ISP level to track all user clickstream behavior?

deep packet inspection

Over which of the following does ICANN have authority?

domain name system

Which of the following basic ethical concepts plays an important role in defining privacy?

due process

The doctrine of ________ permits teachers and writers to use copyrighted materials without permission under certain circumstances.

fair use

The display of a third-party's Web site or page within your own Web site is called:

framing

All of the following are factors that will be considered in determining whether use of copyrighted material is "fair use" except the:

free availability of the work on the Web.

Which of the following e-commerce technology dimensions has the potential to reduce cultural diversity in products?

global reach

The four major dimensions of e-commerce ethical, social, and political issues are public safety and welfare; property rights; information rights; and ________.

governance

Disputes over federal trademarks involve establishing:

infringement.

What is not a true statement about patents

it is more difficult to obtain a copyright than it is to obtain a patent.

The placing of a cookie on a user's hard drive by one site that is then used by another site to sell that user related products without the knowledge of the user is:

legal in the United States but illegal in Europe.

privacy

moral right of individuals to be left alone, free from surveillance, or interference from other individuals or organizations.

The issue of ________ pits those who wish that all Internet traffic is given equal backbone access against telephone and cable companies who would like to charge differentiated prices based on bandwidth and fees paid.

net neutrality

Amazon has a patent on:

one-click purchasing.

Which of the following allows someone to obtain an exclusive monopoly on the ideas behind an invention for 20 years?

patent law

The use of another party's trademarks as a meta tag is:

permitted only if the use does not mislead or confuse consumers.

Google's G mail advertising has raised concerns about which of the following issues?

privacy

online privacy seal programs

publicize the existence of online privacy seal programs that make it easier for U.S. chamber of commerce member to engage in e-commerce. Seal is a recognizable emblem on a website, which signifies that the site has met recognized industry privacy requirements.

In Western culture, the basic principles shared by ethical schools of thought are:

responsibility, liability, and accountability.

A(n) ________ is a private self-regulating policy and enforcement mechanism that meets the objectives of government regulators and legislation, but does not involve government regulation or enforcement.

safe harbor

private industry self-regulation

safe harbor programs - private policy mechanism to meet objectives of government regulations without government involvement. Privacy seal programs like TRUSTe. Industry associations include: OPA, NAI, ad choices program. Privacy advocacy groups. Emerging privacy protection business reputation.com, avira social network protection.

Which of the following tools do companies use to track user statements and views on newsgroups, chat groups, and other public forums?

search engines

Which of the following e-commerce technology dimensions creates greater opportunities for cyberbullying?

social technology

All of the following are possible penalties for violating the Digital Millennium Copyright Act/DMCA except:

ten years imprisonment for a first offense

What is not a true statement about the DMCA

the DMCA makes Internet Service Provider, ISP's, responsible and accountable for hosting Web sites or providing services to infringers regardless of whether the ISP is aware of infringement.

information privacy

the right to be forgotten. certain information should not be collected, individuals should control the use of whatever information is being collected about them. behavioral tracking on the internet, social sites and mobile devices

FTC's fair information practices

they are guidelines, not laws. used to base assessments and make recommendations. Sometimes used as a basis for laws, COPPA. Fair information practice principles remember CANSER: notice, choice, access, security, enforcement, restricted collection.

Single words, pictures, shapes, packaging, and colors used to identify and distinguish goods are protected under ________ law.

trademark

Registering the domain name gooogle.com with the intent to divert Web traffic from people misspelling google.com is an example of:

typosquatting.

The _______ of Internet and Web technology can result in work and shopping invading family life.

ubiquity

All the following are common techniques used to gather personal information on the Internet except:

weblining.


Conjuntos de estudio relacionados

Environmental History Final Identification Questions

View Set

Chapter 07: Section 7.1-7.4 - The Control of Microbial Growth

View Set

History Quiz Section 3: the Ming and Qing Dynasties

View Set

Karch: Ch. 16 - Anti-inflammatory, antiarthritis, and related agents

View Set

Medical Terminology - Lesson 17 Exercise

View Set

Property Insurance and General Insurance basics

View Set

Focus Nursing Pharmacology I Chapter 30 Adrenergic Agonists

View Set