ISM 3004 Chapter 4 Quiz

¡Supera tus tareas y exámenes ahora con Quizwiz!

Chapter 4 Review Questions

CH. 4 Review

Which of the following is not true about the changes to EU data protection rules proposed in 2012? Answer: The new rules would reject the right to be forgotten.

Changes to EU data protection rules proposed in 2012: The new rules would require Internet companies to retain information only as long as absolutely necessary. The new rules would apply only to all companies providing services in Europe. The new rules would require Internet companies to delete information at the user's request. The new rules would require Internet companies to obtain explicit consent from consumers for the use of their personal data.

Chapter 4 Video_Ethical and Social Issues in Information Systems_4.11 mins

Chapter 4 Video_Ethical and Social Issues in Information Systems_4.11 mins

________ are small text files loaded on a computer when a user visits Web sites.

Cookies

Which of the following protects the authors of a book from having their work copied by others?

Copyright law

Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials? Answer: Digital Millennium Copyright Act

Digital Millennium Copyright Act

Which of the following terms refers to significant disparities in access to computers and the Internet among different social groups and different locations? Answer: Digital divide

Digital divide

Digital media differs from a physical book in all of the following ways except: Answer: ease of establishing uniqueness.

Digital media differs from a physical book in all of the following ways: ease of global distribution. ease of replication. ease of transmission. ease of alteration.

​________ is an Internet advertising broker that tracks activities of users.

DoubleClick

Which of the following is not an example of the potential dark side of big data?

Answer: Analyzing data from sensors installed in local parks to monitor soil moisture.

Which of the following were involved in what has been called the patent trial of the century? Answer: Apple and Samsung

Apple and Samsung

The​ "patent trial of the​ century" in 2011 was between​ ________ and​ ________ for violating patents for iPhones.

Apple; Samsung

According to this​ video, the business benefits of behavioral tracking include​ _____.

E. All of the answers A. identifying prospective customers for products or services B. delivering ads based on social media activity C. delivering ads based on​ geo-location data D. delivering ads based on demographic data Correct. The business benefits of behavioral tracking include the ability to identify prospective customers and deliver ads to those persons based on their demographic​ traits, their​ location, or their social media activities.

​________ refers to the principles of right and wrong that individuals use to make choices.

Ethics

According to ________, you should take the action that produces the least harm. Answer: the risk aversion principle

From Glossary: Risk aversion principle Principle that one should take the action that produces the least harm or incurs the least cost.

Today, it appears that​ _________ possesses the largest collection of personal information in the world.

GOOGLE

​________ is the​ world's largest search engine.

GOOGLE

The act that aims at protecting medical records is the​ ________.

HIPAA

A man steals from a grocery store in order to feed his starving family. Which of the following best expresses the utilitarian principle in evaluating this situation?

His action is acceptable, because the higher social value is the survival of the family.

A colleague at work takes small amounts of office supplies for her own personal use, saying that this is a tiny loss to the company. You tell her that if everyone were to take office supplies, then the loss would no longer be minimal. Your rationale expresses which of the following ethical principles? Answer: Kant's Categorical Imperative

Kant's Categorical Imperative

Which of the following is not one of the current key technology trends that raises ethical issues? Answer: Increase in data quality

Key technology trends that raises ethical issues: Advances in networking technology Data analysis advancements Data storage improvements Increase in use of mobile devices

​________ scans data and can help identify a man at a ticket counter who shares a phone number with a known terrorist.

NORA

What percent of global Internet users use Google Search and other Google services? Nearly 80 percent

Nearly 80 percent

The NAI is an industry association formed to help with which of the following?

Online privacy issues

Which of the five moral dimensions of the information age does spamming involve? Answer: Quality of life

Quality of life

Which of the following occurs when muscle groups are forced through tens of thousands of repetitions under low-impact loads?

RSI

Which ethical rule states that if an action cannot be taken repeatedly, it is not right to take at all? Answer: Slippery-slope rule

Slippery-slope rule

All of the following are steps in the process for analyzing an ethical issue except: Answer: Assigning responsibility

Steps in analyzing an ethical issue: identifying and clearly describing the facts. identifying the potential consequences of your options. identifying the stakeholders. identifying the options you can reasonably take.

Which of the following is not a difficulty in establishing patent protection? Answer: The requirement that the work must be a secret

The following are a difficulty in establishing patent protection: The requirement that the work reflect some special understanding and contribution Length of time required to receive protection The requirement that the work must be original The requirement that the work must be novel

________ are not held liable for the messages they transmit. Answer: Regulated common carriers

The following are held liable for the messages they transmit: Elected officials European ISPs Private individuals Organizations and businesses

Which of the following is not protected by copyright law? Answer: Machines

The following is protected by copyright law: Motion pictures Maps Artwork Musical compositions

________ prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use. Answer: The opt-in model

The opt-in model

Which of the following is not a file-sharing service? Answer: Pandora

These are file-sharing services: Megaupload The Pirate Bay Morpheus Grokster

Which of the following statements about Flash cookies is not true? Answer: Flash cookies are installed only at the user's request.

These are true about cookies: Flash cookies are sometimes called super cookies. Flash cookies can be installed whenever a person clicks a Flash video. Flash cookies are stored on the user's computer. Flash cookies cannot be easily detected or deleted.

Which of the following statements about spam is not true? Answer: Spamming is more tightly regulated in Europe than in the United States.

These are true about spam: Most spam originates from bot networks. Spamming has mushroomed because it is so inexpensive and can reach so many people. Spam costs for business are very high. Cell phone spam usually comes in the form of SMS text messages.

One of the characters in this video asks the​ question: "Are there any laws to keep companies from installing trackers on my​ computer?" According to his​ colleague's reply, which of the following statements describes current U.S. law regarding the information Websites can collect and how that information is​ used?

The​ Children's Online Privacy Protection Act regulates the collection of personal information on children and bans behavioral advertising to children younger than 13 years of age without parental consent. Correct. Current U.S. law regulates the collection of personal information on children and bans behavioral advertising to children younger than 13 without parental consent.

The most common cause of repetitive stress injury​ (RSI) is​ ________.

a computer keyboard

Regarding moral dimensions of the information​ age, ________​ include(s) the issue of who can and will be held liable for harm done to property rights.

accountability and control

The Golden Rule is an example of​ ________.

an ethical principle

This video describes how advertisers use​ _____ in order to display more relevant ads based on a​ user's search and browsing history.

behavioral tracking. Correct. Behavioral tracking is the practice of collecting data on search and browsing history in order to present ads that are relevant to the user.

Based on the information in this​ video, all of the activities listed here describe behavioral tracking except​ _____.

collecting credit card data from online purchases. Correct. Behavioral tracking does not include the collection of personally identifiable information such as your​ address, bank​ account, or credit card data from online purchases.

The Internet has made intellectual property​ ________.

difficult to protect

The Online Privacy Alliance: encourages self-regulation to develop a set of privacy guidelines for its members.

encourages self-regulation to develop a set of privacy guidelines for its members.

Related to technology raising ethical​ issues, the doubling of computing power every 18 months makes it possible​ ________.

for organizations to use information system for their core production processes

The ethical "no free lunch" rule states that: if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work.

if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work.

Redesigning and automating business processes can be seen as a double-edged sword because:

increases in efficiency may be accompanied by job losses.

According to this​ video, behavioral tracking and targeted ads can be seen as a​ double-edged sword because​ _____.

increases in targeted ads may result in higher sales but users may perceive them as a loss of privacy Correct. Behavioral tracking may result in increased online sales but users may perceive them as a loss of privacy.

Regarding moral dimensions of the information​ age, ________​ include(s) the issue of what individuals and organizations can protect.

information rights and obligations

The most common type of computer security incident is​ ________.

malware infection

Which of the following restricts the information that the U.S. federal government can collect about an individual and regulates what it can do with the information? Answer The privacy Act

--The Gramm-Leach-Bliley Act: From E-Government Act of 2002 came GLBA that Requires financial institutions to ensure the security and confidentiality of customer data. --COPPA: From: E-Government Act of 2002 came Children's Online Privacy Protection Act (COPPA) of 1998 --The Privacy Act --HIPPA: From E-Government Act of 2002 came The Health Insurance Portability and Accountability Act (HIPAA) of 1996 --The Freedom of Information Act

The obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within which of the following moral dimensions of the information age? Answer: Quality of Life

4.1.2: Part of Five Moral Dimensions of the Information Age. Quality of life What values should be preserved in an information- and knowledge-based society? Which institutions should we protect from violation? Which cultural values and practices does the new information technology support?

Copyright protects creators​ (individuals) of intellectual property for​ ________.

70 years after the​ author's death

Copyright protects creators​ (corporate-owned) of intellectual property for​ ________.

95 years after the initial creation

Which of the five moral dimensions of the information age do the central business activities of DoubleClick involve? Answer: Information rights and obligations

P. 128 Section: 4.1 Five Moral Dimensions of the Information Age The major ethical, social, and political issues that information systems raise include the following moral dimensions. --"Information rights and obligations" What information rights do individuals and organizations possess with respect to themselves? What can they protect? --"Property rights and obligations" How will traditional intellectual property rights be protected in a digital society in which tracing and accounting for ownership are difficult and ignoring such property rights is so easy? --"Accountability and control" Who can and will be held accountable and liable for the harm done to individual and collective information and property rights? --"System quality" What standards of data and system quality should we demand to protect individual rights and the safety of society? --"Quality of life" What values should be preserved in an information- and knowledge-based society? Which institutions should we protect from violation? Which cultural values and practices does the new information technology support?

The FIP principle of Notice/Awareness states that: Answer: websites must disclose their information practices before collecting data.

P. 135: Table 4.4 Glossary: Fair Information Practices (FIP) A set of principles originally set forth in 1973 that governs the collection and use of information about individuals and forms the basis of most U.S. and European privacy laws.

In 2010, the FTC added all of the following recommendations to its privacy guidelines except: firms should limit the length of time that any personal data is stored to six months or less.

P. 136. In 2010, the FTC added three practices to its framework for privacy. 1. Firms should adopt privacy by design, building products and services that protect privacy, 2. firms should increase the transparency of their data practices, and 3. firms should require consumer consent and provide clear options to opt out of data collection schemes. Recommendations as written in question: --firms should increase the transparency of their data collection. --firms should build products and services that protect privacy. --firms should require consumer consent and provide clear options to opt out of data collection. --consumers should be able to review and contest the accuracy and completeness of data.

All of the following are technical solutions to protecting user privacy except: Answer: Data use policies

P. 141 Technical solutions The following are technical solutions to protecting user privacy: --anonymous surfing. --preventing client computers from accepting cookies. --anonymous email. --e-mail encryption.

​Lexis/Nexis Risk Solutions​ (formerly ChoicePoint) gathers data from​ ________.

Police

The​ ________ is the most important U.S. federal statute regarding conditions for handling information regarding credit reporting and financial records.

Privacy Act of 1974

All of the following laws apply to actions by the federal government except the: Answer: Children's Online Privacy Protection Act.

Privacy Act. E-Government Act. Freedom of Information Act. Computer Security Act.

The use of computers to assemble data from different sources to create digital dossiers of detailed information about individuals is known as which of the following? Profiling

Profiling

Regarding moral dimensions of the information​ age, ________​ include(s) which cultural values are supported by a digital society.

Quality of life

Which of the following resulted in an outage for Netflix customers on Christmas Eve 2012? P. 146. Answer: A failure of Amazon's cloud computing service

p. 146: The debate over liability and accountability for unintentional consequences of system use raises a related but independent moral dimension: What is an acceptable, technologically feasible level of system quality? At what point should system managers say, "Stop testing, we've done all we can to perfect this software. Ship it!" Individuals and organizations may be held responsible for avoidable and foreseeable consequences, which they have a duty to perceive and correct. The gray area is that some system errors are foreseeable and correctable only at very great expense, expense so great that pursuing this level of perfection is not feasible economically—no one could afford the product.

The​ Children's Online Privacy Protection Act​ (COPPA) focuses on​ ________.

parental permissions

​A(n) ________ grants the owner an exclusive monopoly on an invention for 20 years.

patent

Regarding moral dimensions of the information​ age, ________​ include(s) the issue addressing intellectual property rights in a digital society.

property rights and obligations

Regarding moral dimensions of the information​ age, ________​ include(s) the issue of what standards should we demand to protect the safety of society.

system quality

Which of the following ethical guidelines suggests that you put yourself in the place of others, and think of yourself as the object of the decision?

the Golden Rule

Related to technology raising ethical​ issues, advances in data storage techniques and rapidly declining associated costs are responsible for​ ________.

the multiplying databases on​ individuals, employees,​ customers, and potential customers


Conjuntos de estudio relacionados

Physics 1401 Final Exam Review (Chapters 4-18)

View Set

欢乐伙伴 5B 第12课(听写)

View Set

International Business Chapters 1-3

View Set

Chapter 4 - Intermediate Accounting Spiceland 9e

View Set

Multiple choice (speech Ballard)

View Set

Chapter 30: Ecology and PopulationsAssignment

View Set

ATI RN MENTAL HEALTH EXAM 2023 WITH NGN

View Set

Chemistry- Polyatomic Ions & Molecular compounds

View Set

Chapter 13: Genuineness of Assent and Undue Influence

View Set