MIS Ch. 4

¡Supera tus tareas y exámenes ahora con Quizwiz!

Any unsolicited e-mail is legally considered spam.

False

In white-collar fraud, information systems are most typically used as a means to hide financial evidence of crimes.

True

Most Internet businesses do very little to protect the privacy of their customers.

True

Spyware is software that comes hidden in downloaded applications and can track your online movements.

True

Technostress is a computer-related malady whose symptoms include fatigue.

True

According to the courts, in the creation of software, unique concepts, general functional features, and even colors are protectable by copyright law.

False

Advances in data storage have made routine violation of individual privacy more difficult.

False

Data gathered by online behavioral tracking firms is limited to the user's behavior on a single Web site.

False

Despite the passage of several laws defining and addressing computer crime, accessing a computer system without authorization is not yet a federal crime.

False

Even in today's legal climate, there is little incentive for firms to cooperate with prosecutors investigating financial crimes at their firm.

False

Most American and European privacy law is based on a set of five principles called COPPA.

False

The Copyright Office began registering software programs in the 1990s.

False

The key concepts in patent law are originality, novelty, and value.

False

The last step in analyzing an ethical issue should be to identify the stakeholders—people who have a vested interest in the outcome of the decision.

False

Copyright is the legal protection afforded intellectual property, such as a song, book, or video game.

True

Privacy is the right to be left alone when you want to be, without surveillance or interference from other individuals or organizations.

True

Professionals take on special rights and obligations because of their special claims to knowledge, wisdom, and respect.

True

The European Parliament has passed a ban on unsolicited commercial messaging.

True

The drawback to copyright protection is that the underlying ideas behind the work are not protected, only their reproduction in a product.

True

The most common type of computer-related RSI is CTS.

True


Conjuntos de estudio relacionados

Chapter 3: Legal Concerns and Insurance Issues

View Set

1.1 WHAT IS EARTH SCIENCE? AND 1.2 A VIEW OF EARTH

View Set

Questions for Final You Got Wrong(:

View Set

Ch 59: Management of Patients With Hearing and Balance Disorders

View Set

Chapter 27: Management of Patients With Coronary Vascular Disorders

View Set

PHI midterm exam study question #3

View Set

Declaration of Independence Study Guide

View Set