MIS Chapter 4

¡Supera tus tareas y exámenes ahora con Quizwiz!

What is not a feature of the General Data Protection Regulation (GDPR)? It prevents firms from using cookies. It imposes fines on companies for violating the regulation up to 4 percent of a firm's global revenue. It requires unambiguous consent for using personal data to construct profiles. It applies to all firms doing business in the EU. It creates a single EU privacy policy.

It prevents firms from using cookies

Which of the following is not protected by copyright law? Machines Maps Musical compositions Artwork Motion pictures

Machines

________ grants the owner exclusive ownership of the ideas behind an invention for 20 years. Trademark law Privacy law Copyright law Patent law Trade secret protection

Patent law

Which of the following statements about spam is not true? Spamming has mushroomed because it is so inexpensive and can reach so many people. Spamming is more tightly regulated in the United States than in Europe. Cell phone spam usually comes in the form of SMS text messages. Spam costs for business are very high. Most spam originates from bot networks.

Spamming is more tightly regulated in the United States than in Europe.

________ is a feature of social institutions that means mechanisms are in place to determine responsibility for an action. The judicial system The courts of appeal Accountability Due process Liability

Accountability

All of the following laws apply to actions by the federal government except the: Privacy Act. Freedom of Information Act. Children's Online Privacy Protection Act. Computer Security Act. E-Government Act.

Children's Online Privacy Protection Act.

Which of the following is the most common reason that business systems fail? Data quality Facilities failures Software errors Hardware failures Software bugs

Data quality

Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed? HIPAA Gramm-Leach-Bliley Act Privacy Protection Act COPPA Freedom of Information Act

HIPAA

A man steals from a grocery store in order to feed his starving family. Which of the following best expresses the utilitarian principle in evaluating this situation? His action is acceptable, because the higher social value is the survival of the family. His action is wrong, because if everyone were to do this, the concept of personal property is defeated. His action is wrong, because the man would not want the grocer to steal from him. His action is wrong, because the grocery store owner is harmed. His action is acceptable, because the grocer suffers the least harm.

His action is acceptable, because the higher social value is the survival of the family.

Which of the following is a primary drawback to the "do anything anywhere" work environment? It creates a digital divide. It makes work environments less pleasant. It centralizes power at corporate headquarters. It blurs the traditional boundaries between work and family time. It leads to employees being paid less for the total amount of work performed.

It blurs the traditional boundaries between work and family time.

Which of the following occurs when muscle groups are forced through tens of thousands of repetitions under low-impact loads? Technostress RSS RSI CTS CVS

RSI

Which ethical rule states that if an action cannot be taken repeatedly, it is not right to take at all? Slippery-slope rule High-failure cost rule Utilitarian principle Lemming rule Golden Rule

Slippery-slope rule

Which of the following is not true about the changes to EU data protection rules enacted in the GDPR? The new rules require Internet companies to retain information only as long as absolutely necessary. The new rules strengthen the right to be forgotten. The new rules require Internet companies to delete information at the user's request. The new rules require Internet companies to obtain explicit consent from consumers for the use of their personal data. The new rules do not allow consumers to have their data removed from company servers.

The new rules do not allow consumers to have their data removed from company servers.

________ allows an organization to collect personal information without the user's explicit consent. The opt-in model FIP principles P3P A safe harbor The opt-out model

The opt-out model

________ are not held liable for the messages they transmit. European ISPs Regulated common carriers Private individuals Elected officials Organizations and businesses

egulated common carriers

Which of the following ethical guidelines suggests that you put yourself in the place of others, and think of yourself as the object of the decision? the utilitarian principle Kant's categorical imperative the "no free lunch" rule the Golden Rule the risk aversion principle

he Golden Rule

Redesigning and automating business processes can be seen as a double-edged sword because: increases in efficiency may be accompanied by poor data quality. it can concentrate power in the hands of senior executives. reliance on technology results in the loss of hands-on knowledge. increases in efficiency may be accompanied by job losses. support for middle-management decision making may be offset by poor data quality.

increases in efficiency may be accompanied by job losses.

________ means that you accept the potential costs and obligations for the decisions you make. Duty Due process Liability Accountability Responsibility

Responsibility

Which of the following is not an example of the moral dimensions of the information age identified in the text? Information rights and obligations The emergence of giant tech firms that dominate their markets Accountability and control System quality Quality of life

The emergence of giant tech firms that dominate their markets

In 2010, the FTC added all of the following recommendations to its privacy guidelines except: firms should require consumer consent and provide clear options to opt out of data collection. firms should limit the length of time that any personal data is stored to six months or less. firms should increase the transparency of their data collection. firms should build products and services that protect privacy. consumers should be able to review and contest the accuracy and completeness of data.

firms should limit the length of time that any personal data is stored to six months or less.

"Look and feel" copyright infringement lawsuits are concerned with: using the graphical elements of another product. the distinction between an idea and its expression. the distinction between tangible and intangible ideas. using the creative elements of another product. violation of a monopoly on the ideas behind a product.

the distinction between an idea and its expression.

Which of the following resulted in a Christmas Eve outage for millions of Netflix customers? A blackout at Netflix's primary data center A bug in Netflix's credit card processing system A failure of Netflix's recommendation engine software A hacking attack A failure of Amazon's cloud computing service

A failure of Amazon's cloud computing service

Which of the following is not a U.S. federal law affecting private institutions? Video Privacy Protection Act COPPA Computer Matching and Privacy Protection Act Gramm-Leach-Bliley Act HIPAA

Computer Matching and Privacy Protection Act

Which of the following statements about cookies is not true? Cookies are stored on the user's computer. Cookies are installed only at the user's request. Cookies can be combined with other website data to develop detailed profiles of customers. Cookies cannot be easily detected or deleted. Cookies are used to support the user experience on websites.

Cookies are installed only at the user's request.

Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials? Privacy Act Computer Software Copyright Act Freedom of Information Act Electronic Communications Privacy Act Digital Millennium Copyright Act

Digital Millennium Copyright Act

Which of the following is not one of the current key technology trends that raises ethical issues? Increase in use of mobile devices Data storage improvements Data analysis advancements Increase in data quality Advances in networking technology

Increase in data quality

Which of the five moral dimensions of the information age do the central business activities of DoubleClick involve? Quality of life Property rights and obligations System quality Accountability and control Information rights and obligation

Information rights and obligations

Which of the following best describes the effect that new information technology has on society? It has a dampening effect on the discourse of business ethics. It has a waterfall effect in raising ever more complex ethical issues. It is beneficial for society as a whole, while raising dilemmas for consumers. It has a ripple effect, raising new ethical, social, and political issues. It has a magnifying effect, creating increasing numbers of ethical issues.

It has a ripple effect, raising new ethical, social, and political issues.

What is not a feature of the General Data Protection Regulation (GDPR)? It creates a single EU privacy policy. It requires unambiguous consent for using personal data to construct profiles. It imposes fines on companies for violating the regulation up to 4 percent of a firm's global revenue. It prevents firms from using cookies. It applies to all firms doing business in the EU.

It prevents firms from using cookies.

A colleague at work takes small amounts of office supplies for her own personal use, saying that this is a tiny loss to the company. You tell her that if everyone were to take office supplies, then the loss would no longer be minimal. Your rationale expresses which of the following ethical principles? The Risk Aversion Principle The slippery-slope rule Kant's Categorical Imperative The Golden Rule The "No free lunch" rule

Kant's Categorical Imperative

A colleague at work takes small amounts of office supplies for her own personal use, saying that this is a tiny loss to the company. You tell her that if everyone were to take office supplies, then the loss would no longer be minimal. Your rationale expresses which of the following ethical principles? The slippery-slope rule Kant's Categorical Imperative The Risk Aversion Principle The "No free lunch" rule The Golden Rule

Kant's Categorical Imperative

The NAI is an industry association formed to help with which of the following? Trade secret protection Online privacy issues Copyright protection Trademark protection Patent protection

Online privacy issues

Which of the following is not a file-sharing service? The Pirate Bay Grokster Pandora Morpheus Megaupload

Pandora

The use of computers to assemble data from different sources to create digital dossiers of detailed information about individuals is known as which of the following? Profiling Spamming Targeting Phishing Spyware

Profiling

The obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within which of the following moral dimensions of the information age? Accountability and control Family and home System quality Property rights and obligations Quality of life

Quality of life

Which of the following is not true about the changes to EU data protection rules enacted in the GDPR? The new rules strengthen the right to be forgotten. The new rules do not allow consumers to have their data removed from company servers. The new rules require Internet companies to retain information only as long as absolutely necessary. The new rules require Internet companies to obtain explicit consent from consumers for the use of their personal data. The new rules require Internet companies to delete information at the user's request

The new rules do not allow consumers to have their data removed from company servers

Which of the following is not true about the changes to EU data protection rules enacted in the GDPR? The new rules require Internet companies to obtain explicit consent from consumers for the use of their personal data. The new rules strengthen the right to be forgotten. The new rules require Internet companies to delete information at the user's request. The new rules require Internet companies to retain information only as long as absolutely necessary. The new rules do not allow consumers to have their data removed from company servers.

The new rules do not allow consumers to have their data removed from company servers.

Which of the following is not a difficulty in establishing patent protection? The requirement that the work must be original The requirement that the work must be a secret The requirement that the work reflect some special understanding and contribution The requirement that the work must be novel Length of time required to receive protection

The requirement that the work must be a secre

Which of the following best describes how new information systems can result in legal gray areas? They work with networked, digital data, which are more difficult to control than information stored manually. They result in new situations that are not covered by old laws. They are implemented by technicians rather than managers. They are created from sets of logical and technological rules rather than social or organizational mores. They are little understood by politicians or lawyers.

They result in new situations that are not covered by old laws.

Advertisers use ________ in order to display more relevant ads based on a user's search and browsing history. behavioral targeting NORA Web bugs FIP principles intelligent agents

behavioral targeting

All of the following are technical solutions to protecting user privacy except: anonymous surfing. email encryption. preventing client computers from accepting cookies. data use policies. anonymous email.

data use policies.

All of the following are technical solutions to protecting user privacy except: preventing client computers from accepting cookies. anonymous surfing. data use policies. email encryption. anonymous email.

data use policies.

________ is a feature of law-governed society and involves having laws that are known and understood, along with the ability to appeal to higher authorities to ensure that the laws are applied correctly. Liability The judicial system Responsibility Accountability Due process

due process

The Network Advertising Initiative is an industry association that: has established technical guidelines for ensuring privacy. protects user privacy during interactions with websites. is a safe harbor program established by the U.S. government. encourages self-regulation to develop a set of privacy guidelines for its members. regulates the use of customer information by firms.

encourages self-regulation to develop a set of privacy guidelines for its members.

CVS refers to: a business practice that attempts to evaluate the intangible values of computer systems. a type of antivirus protection software. carpal vision syndrome. eyestrain related to computer display screen use. wrist injuries brought about by incorrect hand position when using a keyboard.

eyestrain related to computer display screen use.

The ethical "no free lunch" rule states that: one should take the action that produces the least harm or incurs the least cost. if an action is not right for everyone to take, it is not right for anyone to take. one can put values in rank order and understand the consequences of various courses of action. if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work. if an action cannot be taken repeatedly, then it is not right to be taken at any time.

if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work

The U.S. CAN-SPAM Act: does not outlaw the use of fake return addresses. makes spamming illegal. requires commercial email senders to identify themselves. has dramatically cut down spamming. does not override state anti-spamming laws.

requires commercial email senders to identify themselves.

The GDPR created a ________ framework in order to enable U.S. businesses to legally use personal data from EU countries. FIP COPPA P3P safe harbor PGP

safe harbor

According to ________, you should take the action that produces the least harm. the utilitarian principle the risk aversion principle Kant's categorical imperative the "no free lunch" rule the Golden Rule

the risk aversion principle

Which of the following is not a U.S. federal law affecting private institutions? COPPA Computer Matching and Privacy Protection Act Gramm-Leach-Bliley Act HIPAA Video Privacy Protection Act

Computer Matching and Privacy Protection Act

Which of the following protects the authors of a book from having their work copied by others? Patent protection Trade Secret law Fair Use Doctrine Copyright law Due process 1 points

Copyright law

Which of the following terms refers to significant disparities in access to computers and the Internet among different social groups and different locations? RSI CVS Digital divide CTS Technostress

Digital divide

FIP principles are based on a belief in which of the following? Difference between the interests of the individual and commercial organizations Accountability of the record holder Privacy of the individual Mutuality of interest between the record holder and the individual Responsibility of the record holder

Mutuality of interest between the record holder and the individual

Which of the following is a data analysis technology that finds hidden connections between data in disparate sources? FIP Spyware NORA HIPAA COPPA 1 points

NORA

What percent of global Internet users use Google Search and other Google services such as YouTube? Less than 10 percent Nearly 80 percent Around 25 percent Over 90 percent About 50 percent

Nearly 80 percent

Which of the five moral dimensions of the information age does the weakening of boundaries between work and family life involve? Information rights and obligations System quality Accountability and control Property rights and obligations Quality of life

Quality of life

Which of the following restricts the information that the U.S. federal government can collect about an individual and regulates what it can do with the information? The Gramm-Leach-Bliley Act HIPPA The Freedom of Information Act COPPA The Privacy Act

The Privacy Act

Which of the following restricts the information that the U.S. federal government can collect about an individual and regulates what it can do with the information? The Privacy Act COPPA The Freedom of Information Act The Gramm-Leach-Bliley Act HIPPA

The Privacy Act

Digital media differs from a physical book in all of the following ways except: ease of alteration. ease of establishing uniqueness. ease of global distribution. ease of replication. ease of transmission.

ease of establishing uniqueness.

Which of the following is a data analysis technology that finds hidden connections between data in disparate sources? COPPA NORA Spyware HIPAA FIP

nora

In the ________ model of informed consent, personal information cannot be collected until the consumer specifically agrees that his or her data can be collected. opt-out safe harbor opt-in P3P PGP

opt-out

The GDPR created a ________ framework in order to enable U.S. businesses to legally use personal data from EU countries. PGP safe harbor P3P FIP COPPA

safe harbor


Conjuntos de estudio relacionados

Cognitive Behavioral Therapy/Techniques

View Set

HA Chapter 23: Abdomen PrepU (COMBINED)

View Set

Thème 6 L'enjeu de la connaissance : Intro + Axe 1

View Set

Week 8 notes Health data management

View Set