MIS Chapter 4

¡Supera tus tareas y exámenes ahora con Quizwiz!

intellectual property

A photo you have taken of your family is considered​ ______________, and is protected by law.

data analysis advances

A store printing out receipts based on your buying patterns is related to the​ trend, ___________, where technology trends raise ethical issues.

Immanuel Kant's Categorial Imperative

Action is not right for everyone to take, it is not right for anyone refers to?

web bug

Another common name for a web beacon is a​ ____________, which tracks user activities.

70

Copyright is protected throughout the life of the author plus an additional​ ______ years after the​ author's death.

Leisure time has been converted into a time to do work.

How does the advent of information technology affect the work-life balance of an employee?

informed consent

If you want to collect data​ (i.e., photos) from someone and use the​ data, you must obtain​ _____________.

property rights and obligations

In the information​ age, the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of​ ________.

they raise concerns about the use of intellectual property

Information systems affect ethical principles because __________.

Google

Nearly 80 percent of the Internet searches conducted use​ ___________, which makes it the largest data repository in history.

ethics

Principles of right and wrong that you use to make choices are called​ _____________.

Websites must disclose their information practices before collecting data.

The Federal Trade Commission Fair Information Practice principle of​ Notice/Awareness states​ that:

Golden Rule

The ethical principle that calls for hypothetically walking in the other​ person's shoes before making a decision is called the​ ______________.

utilitarian principle

The ethical principle that calls ranking alternatives before making a decision is called the​ ______________.

The Utilitarian Principle

To take the action that achieves the higher or greater value refers to which ethical principle of conduct?

The Risk Aversion Principle

To take the action that produces the least harm or the least potential cost refers to which ethical principle of conduct?

mobile device growth impact

Tracking your movements without consent is most related to the​ trend, ___________, where technology trends raise ethical issues.

Fair Information Practices

United States privacy laws are largely based on the​ _________________ report.

computerized targeting

Using an algorithm to potentially determine people with shorter commute are more likely to stay in a job longer than those with longer computes could be part of _________________ that filters applicants.

no free

When thinking about downloading and using a photo off the​ Internet, don't forget the ethical​ __________ lunch rule.

On the​ visitor's computer

Where is a cookie that is created during a Web site visit​ stored?

Privacy Act of 1974

Which U.S. act restricts the information the federal government can collect and regulates what it can do with the​ information?

HIPAA

Which government act was enacted in 1996 to protect your medical​ records?

Medical records

Which is NOT a way in which NORA technology can create a detailed dossier of a​ person?

Intangible property created by individuals or corporations

Which is the BEST description of intellectual​ property?

Selling the information to an external organization

Which of the following actions from this scenario typically raises an ethical concern?

Digital Millennium Copyright Act

Which of the following adjusts copyright laws to the Internet age by making it illegal to​ make, distribute, or use devices that circumvent​ technology-based protections of copyrighted​ materials?

The claim of individuals to be left alone, free from surveillance

Which of the following best describes privacy?

Protection of personal privacy

Which of the following ethical issues in information systems has become a greater concern because of the rise of the Internet?

Affected people start to behave like​ computers, devoid of emotions.

Which of the following is FALSE about techno​ stress?

It outlaws unsolicited commercial messaging.

Which of the following is FALSE about the U.S.​ CAN-SPAM Act of​ 2003?

It is based only on having fair access to digital technology.

Which of the following is FALSE about the digital divide in the​ U.S.?

It is difficult to prevent ideas from falling into the public domain.

Which of the following is a limitation to protecting intellectual property through trade secret laws?

The ability to track user information based on browsing data

Which of the following is a threat posed by the Internet to individual privacy?

Organizations selling consumer profiles to other organizations

Which of the following is an ethical concern due to the advances in data analysis techniques?

Access to confidential information

Which of the following is an ethical issue caused by the advancement in data storage techniques?

Dependence on systems and increased vulnerability to system errors and poor data quality

Which of the following is an ethical issue caused by the doubling of computer power every 18 months?

Redesigning business processes has caused many employees to lose their jobs.

Which of the following is an impact of information technology on employment?

The traditional boundaries that separate work from family and just plain leisure have been weakened.

Which of the following is true about the social costs of information technology?

The law protects her against the copying of the entire software program.

Which of the following statements holds true in this scenario?

Ownership of computers and digital devices has broadened, but the digital divide still exists.

Which of the following statements is true about equality in access to information technology?

Individual claims to privacy are threatened by the cheap availability of information.

Which of the following statements is true about privacy and freedom in the Internet age?

Web beacons

__________ are tiny software programs that keep a record of users' online clickstream.

The Golden Rule

__________ is putting yourself into the place of others and thinking of yourself as the object of the decision.

Ethics

______________ refers to the principles of right and wrong that individuals use to make choices to guide their behaviors.

Liability

____________________ involves examining laws on the books that provide individuals and companies the opportunity to recover damages caused by others.

computer abuse

is the commission of acts involving a computer that may not be illegal but that are considered unethical

the ethical "no free lunch" rule

the principle that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise refers to which ethical principle of conduct?

Accountability

​____________________ involves determining who is responsible for actions taken.


Conjuntos de estudio relacionados

CSCI 315: Laravel, Flask, Docker

View Set

Mga Batayang Konseptong Pangwika

View Set

1.4 The internal and external environments

View Set

Bio 2 Monday Tests_Mrs.Flock's Class

View Set

First 100 from blood sweat and pixels

View Set