Info Systems Chapter Four

¡Supera tus tareas y exámenes ahora con Quizwiz!

What legal mechanism protects the owners of intellectual property from having their work copied by others?

Copyright law

Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials?

Digital Millennium Copyright Act

The Federal Trade Commission FIP principle of Notice/Awareness states that:

Web sites must disclose their information practices before collecting data.

U.S. businesses are allowed to use personal data from EU countries if they:

develop equivalent privacy protection policies.

The term "________ divide" refers to large disparities in access to computers and the Internet among different social groups and different locations.

digital

The practice in law-governed societies in which laws are known and understood, and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly is called:

due process.

The Online Privacy Alliance:

encourages self regulation to develop a set of privacy guidelines for its members.

The ethical "no free lunch" rule states that:

everything is owned by someone else, and that the creator wants compensation for this work.

CVS refers to:

eyestrain related to computer display screen use.

The strength of patent protection is that it:

grants a monopoly on underlying concepts and ideas.

Immanuel Kant's Categorical Imperative states that:

if an action is not right for everyone to take, it is not right for anyone to take.

All of the following are current key technology trends raising ethical issues except:

increase in multimedia quality.

Re-designing and automating business processes can be seen as a double-edged sword because:

increases in efficiency may be accompanied by job losses.

Intellectual property can best be described as:

intangible property created by individuals or corporations.

The practice of spamming has been growing because:

it is so inexpensive and can reach so many people.

It is not feasible for companies to produce error-free software because:

it is too expensive to create perfect software.

European privacy protection is ________ than in the United States.

much more stringent

FIP principles are based on the notion of the:

mutuality of interest between the record holder and the individual.

NORA is a:

new data analysis technology that finds hidden connections between data in disparate sources.

When a cookie is created during a Web site visit, it is stored:

on the visitor's computer.

The ________ model prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use.

opt-in

A(n) ________ model of informed consent permits the collection of personal information until the consumer specifically requests that the data not be collected.

opt-out

A(n) ________ grants the owner an exclusive monopoly on the ideas behind an invention for 20 years.

patent

The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called:

profiling.

In the information age, the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of:

property rights and obligations.

In the information age, the obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within the moral dimension of:

quality of life.

The U.S. CAN-SPAM Act of 2003:

requires spammers to identify themselves.

Accepting the potential costs, duties, and obligations for the decisions you make is referred to as:

responsibility.

The introduction of new information technology has a:

ripple effect, raising new ethical, social, and political issues.

The U.S. Department of Commerce developed a ________ framework in order to enable U.S. businesses to legally use personal data from EU countries.

safe-harbor

In general, it is very difficult to hold software producers liable for their software products when those products are considered to be:

similar to books.

"Look and feel" copyright infringement lawsuits are concerned with:

the distinction between an idea and its expression.

Descartes' rule of change, that if an action cannot be taken repeatedly, it is not right to take at all, is also known as:

the slippery-slope rule.

The limitation of trade secret protection for software is that it is difficult to prevent the ideas in the work from falling into the public domain when:

the software is widely distributed.

One of the drawbacks of patent protection is:

the years of waiting to receive it.

Which of the following is not one of the five steps discussed in the chapter as a process for analyzing an ethical issue?

Assign responsibility.

Which of the following is not one of the practices added in 2010 by the FTC to its framework for privacy?

Firms should limit the length of time that any personal data is stored to six months or less.

Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed?

HIPAA

Which of the five moral dimensions of the information age do the central business activities of ChoicePoint raise?

Information rights and obligations

A colleague of yours frequently takes, for his own personal use, small amounts of office supplies noting that the loss to the company is minimal. You counter that if everyone were to take office supplies the loss would no longer be minimal. Your rationale expresses which historical ethical principle?

Kant's Categorical Imperative

Which U.S. act restricts the information the federal government can collect and regulates what they can do with the information?

Privacy Act of 1974

Which of the five moral dimensions of the information age does spamming raise?

Quality of life

________ can be induced by tens of thousands of repetitions under low-impact loads.

RSI

________ are not held liable for the messages they transmit.

Regulated common carriers

According to the ________, you should take the action that produces the least harm.

Risk Aversion Principle

Which of the following statements does not describe a key difference between software and books?

Software products are more easily compared to each other than books.

Which of the following best describes how new information systems result in legal gray areas?

They result in new situations that are not covered by old laws.

A classic ethical dilemma is the hypothetical case of a man stealing from a grocery store in order to feed his starving family. If you used the Utilitarian Principle to evaluate this situation, you might argue that stealing the food is:

acceptable, because the higher value is the survival of the family.

The feature of social institutions that means mechanisms are in place to determine responsibility for an action is called:

accountability.

Advertisers use ________ in order to display more relevant ads based on user's search and browsing history.

behavioral targeting

Types of information gathered by Web site tracking tools include all of the following except:

birthplace.

The "do anything anywhere" computing environment can:

blur the traditional boundaries between work and family time.

Flash cookies are different from ordinary cookies in that they:

cannot be easily detected or deleted.

The most common source of business system failure is:

data quality.


Conjuntos de estudio relacionados

Earth Science Final Exam Review Guide

View Set

OB Exam #1, Part 4: Ch. 8 (34 questions)

View Set

Absolutism In England: 16-17th Centries

View Set

Social Work Licensing Clinical Practice Test, 2nd Ed.

View Set

Present Simple und Present Continuous

View Set

Ch. 11. _ Deceptive Trade Practices and Consumer Protection Act _ Quiz

View Set

Chapter 13 Entrepreneurial Business

View Set