Business and society Chapter 13
The Children's Online Privacy Protection Act of 1998 requires:
Commercial websites to collect a verifiable form of consent from the parent or guardian of any user below the age of 13 website operators to post user privacy laws website operators to adhere to federal restrictions, even if the website is operated from outside the United States all of the above
This international gathering brought together leaders from the United States and 27 European countries to address the global nature of cyber attacks:
Data privacy day
This act makes it a crime to circumvent anti-piracy measures built into most commercial software agreement between the manufacturers and their users:
Digital Millennium Copyright Act
In the United Kingdom, offenders of software piracy and those who bridge intellectual property rights face:
Fines up to 50000 pounds (nearly 80,000) and/ or a prison sentence of up to 10 years
These individuals hack into government or corporate computer networks and then release information to try to embarrass those organizations or gain leverage against these organizations
Hacktivist
This term describes sensors and actuators that are embedded in physical objects from roadways to peacemakers and are linked through wired and wireless networks
Internet of Things
Intellectual property refers to:
Protecting one's ideas, concepts, & symbolic creations special laws protecting copyrights, patents, and trademarks prohibiting the downloading of commercial software or video games all of the above
The Motion Picture Association of America claimed that 44 percent of the industry's domestic losses came from illegal downloads of movies by:
college students and recent graduates
The identification of human genes is critical to:
early diagnosis of life threatening diseases new ways to prevent illnesses development of drug therapies All of the above
Over time the role of the CIO:
has changed dramatically, becoming more integrated into the overall strategic direction of the firm
In 2008 the F. D. A. declared that food from cloned animals and their offspring was safe to eat, but:
impose a voluntary ban on the sale of cloned animals
In 2005, the United Nations approved a declaration that
prohibited all forms of human cloning "in as much as cloning is incompatible with human dignity and the protection of human life"
In some economically developed countries and most developing countries around the world genetically modified food was
welcomed as a way to increase crop yields
According to the Center for Responsible nanotechnology how many separate and severe risks are associated with nanotechnology
11
The number of Americans who actively use mobile-banking services in 2009 and dust were increasingly vulnerable to attack games was
12 million
Loss of annual sales due to software piracy by software companies was estimated to be:
63.5 billion
In a survey of 583 US companies, how many wear briefs at least once by hackers over the past year?
90 Percent
In 2011 this region contains the highest commercial value of unlicensed (pirated) software
Asia Pacific
In a study of CIOs from around the world, McKenzie and company found that most CIOs reported to their
Chief executive officer
Piracy was most severe in this country where the illegal software market was worth nearly 9 billion in 2011
China
The "Perfect Citizen" program, monitored by the National Security Agency, is designed to protect against cyber assaults focused on
Electricity grids and nuclear power plants
A hijacked computer that can be remote-controlled by the hacker to respond to the hackers commands is called a:
Zombie
According to Bill joy, Sun Microsystems chief scientist, the 21st century technology
are so powerful they can spawn whole new classes of accidents and abuses
The application of engineering to create materials on a molecular or atomic scale is
nanotechnology