CIS Chapter 4

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

the distinction between an idea and its expression

"Look and feel" copyright infringement lawsuits are concerned with:

Health risks:

- Repetitive stress injury (RSI) Largest source is computer keyboards Carpal tunnel syndrome (CTS) - Computer vision syndrome (CVS) Eyestrain and headaches related to screen use - Technostress Aggravation, impatience, fatigue

The principle sources of poor system performance are

1) software bugs and errors 2) hardware of facility failures caused by natural or other causes 3) poor input data quality

True

A Web beacon is a tiny object embedded in e-mail messages and Web pages that is designed to monitor online Internet user behavior

acceptable, because the higher value is the survival of the family

A classic ethical dilemma is the hypothetical case of a man stealing from a grocery store in order to feed his starving family. If you used the Utilitarian Principle to evaluate this situation, you might argue that stealing the food is

Kant's Categorical Imperative

A colleague of yours frequently takes, for his own personal use, small amounts of office supplies noting that the loss to the company is minimal. You counter that if everyone were to take office supplies the loss would no longer be minimal. Your rationale expresses which historical ethical principle?

Safe harbor

A private, self-regulating policy and enforcement mechanism that meets the objectives of government regulations and legislation but does NOT involve government regulation

patent

A(n) ________ grants the owner an exclusive monopoly on the ideas behind an invention for 20 years.

opt-out

A(n) ________ model of informed consent permits the collection of personal information until the consumer specifically requests that the data not be collected.

responsibility

Accepting the potential costs, duties, and obligations for the decisions you make is referred to as:

Risk Aversion Principle

According to the ________, you should take the action that produces the least harm

False

According to the courts, the creation of software, unique concepts, general functional features, and even colors are protectable by copyright law

False

Advances in data storage have made routine violation of individual privacy more difficult

behavioral targeting

Advertisers use ________ in order to display more relevant ads based on user's search and browsing history.

increase in multimedia quality

All of the following are current key technology trends raising ethical issues except

Negative social consequences of systems

Balancing power: computing power decentralizing but key decision making remains centralized Rapidity of change: maybe not have enough time to respond to global competition Maintaining boundaries: use lengthens work-day, infringes on family time Dependence and vulnerability: organizations more dependent on it

yestrain related to computer display screen use

CVS refers to:

Equity and access—the digital divide:

Certain ethnic and income groups in the United States less likely to have computers or Internet access

Privacy:

Claim of individuals to be left alone, free from surveillance or interference from other individuals, organizations, or state; claim to be able to control information about yourself

The impact of data analysis advances are

Companies can analyze vast quantities of data gathered on individuals to develop detailed profiles of individual behavior. Companies can assemble and combine little pieces of information about you-- from credit card purchases, phone calls, visits to websites, etc. Companies purchase this information for selling products. PROFILING

True

Copyright is the legal protection afforded intellectual property, such as a song, book, or video game.

the slippery-slope rule

Descartes' rule of change, that if an action cannot be taken repeatedly, it is not right to take at all, is also known as:

False

Despite the passage of several laws defining and addressing computer crime, accessing a computer system without authorization is not yet a federal crime

Technical solutions:

E-mail encryption Anonymity tools Anti-spyware tools Browser features "Private" browsing "Do not track" options Overall, few technical solutions

much more stringent

European privacy protection is ________ than in the United States

False

Even in today's legal climate, there is little incentive for firms to cooperate with prosecutors investigating financial crimes at their firm

mutuality of interest between the record holder and the individual

FIP principles are based on the notion of the

Most American and European privacy law is based on a regime called _____. It is a set of principles governing the collection and use of information about individuals. Mutual between individual and record holder. Record may not be used to support other activities with the individual's consent.

Fair Information Practices (FIP)

Spam is legally defined as any e-mail that is unsolicited.

False

cannot be easily detected or deleted

Flash cookies are different from ordinary cookies in that they

What is an acceptable, technologically feasible level of system quality?

Flawless software is economically unfeasible.

Recent cases of failed ethical judgment in business:

General motors - covered up faulty ignition switches Barclay's Bank - manipulated benchmark interest rates to benefit trading positions GlaxoSmithKline - unlawful and criminal promotion of certain prescription drugs Walmart- Bribes to Mexican officials for building permits

Computer-related liability problems If software fails, who is responsible?

If seen as part of machine that injures or harms, software producer and operator may be liable. If seen as similar to book, difficult to hold author/publisher responsible. What should liability be if software seen as service? Would this be similar to telephone systems not being liable for transmitted messages?

if an action is not right for everyone to take, it is not right for anyone to take

Immanuel Kant's Categorical Imperative states that

similar to books

In general, it is very difficult to hold software producers liable for their software products when those products are considered to be

property rights and obligations

In the information age, the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of:

quality of life

In the information age, the obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within the moral dimension of:

Real world ethical problems

Info technology takes jobs, companies monitor what their employees are doing on the internet. Facebook sells user info. Not all call it unethical

intangible property created by individuals or corporations

Intellectual property can best be described as

it is too expensive to create perfect software

It is not feasible for companies to produce error-free software because

True

Liability refers to the existence of laws that permit individuals to recover damages done to them by other actors, systems, or organizations

Digital Millennium Copyright Act (DMCA)

Makes it illegal to circumvent technology-based protections of copyrighted materials

False

Most American and European privacy law is based on a set of five principles called COPPA

True

Most Internet businesses do very little to protect the privacy of their customers

new data analysis technology that finds hidden connections between data in disparate sources

NORA is a

Informed consent

Needed in Europe. Defined as consent given with knowledge of all the facts needed to make a rational decision.

Fair Information Practices (FIP) principles: Notice/Awareness Choice/consent Access/participation Security Enforcement

Notice/Awareness - Websites must disclose information practices before collecting data Choice/consent - There must be a choice regime in place to allow customers to choose how their information will be used for secondary purposes. Access/participation - Consumers should be able to review and contest the accuracy of the data collected about them. Security - Must take responsible steps to assure info is secure. Enforcement - self-regulation, legislation giving consumers legal remedies for violations, or federal statutes.

the years of waiting to receive it

One of the drawbacks of patent protection is

The impact of computing power doubling every 18 months is

Organizations use information systems for their core production processes. As a result, our dependence on them and vulnerability to system errors have increased. Social rules and laws have not yet adjusted to this dependence.

True

Privacy is the right to be left alone when you want to be, without surveillance or interference from other individuals or organizations.

True

Professionals take on special rights and obligations because of their special claims to knowledge, wisdom, and respect.

The impact of data storage costs rapidly declining is

Public and private organizations easily maintain detailed databases on individuals -- employees, customers, and potential customers. Routine violation of individual privacy is cheap and easy. Enormous data storage systems are available for companies.

increases in efficiency may be accompanied by job losses

Re-designing and automating business processes can be seen as a double-edged sword

Employment:

Reengineering work resulting in lost jobs

________ are *not* held liable for the messages they transmit.

Regulated common carriers (like phones)

Taking the action that produces the least harm best describes the

Risk Aversion Principle

False

Safe harbor is informal permission to reuse data, given with knowledge of all the facts needed to make a rational decision

Cookies

Small text files deposited on a computer hard drive when a user visits web sites. Cookies identify the visitor's web browser software and track visits to the web site.

Three principal sources of poor system performance:

Software bugs, errors Hardware or facility failures Poor input data quality (most common source of business system failure)

Computer abuse: unethical acts, not illegal Ex.

Spam: high costs for businesses in dealing with spam

True

Spyware is software that comes hidden in downloaded applications and can track your online movements.

Spyware

Surreptitiously installed on user's computer May transmit user's keystrokes or display unwanted ads

True

Technostress is a computer-related malady whose symptoms include fatigue

blur the traditional boundaries between work and family time

The "do anything anywhere" computing environment can

False

The Copyright Office began registering software programs in the 1990s

True

The European Parliament has passed a ban on unsolicited commercial messaging

Web sites must disclose their information practices before collecting data

The Federal Trade Commission FIP principle of Notice/Awareness states that:

encourages self regulation to develop a set of privacy guidelines for its members

The Online Privacy Alliance

requires spammers to identify themselves

The U.S. CAN-SPAM Act of 2003

False

The Utilitarian Principle asks you to put yourself in the place of others, and think of yourself as the object of the decision

opt-in

The ________ model prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use.

true

The commission of acts involving the computer that may not be illegal but are considered unethical is called computer abuse.

True

The drawback to copyright protection is that the underlying ideas behind the work are not protected, only their reproduction in a product

everything is owned by someone else, and that the creator wants compensation for this work

The ethical "no free lunch" rule states that

Accountability

The feature of social institutions that means mechanisms are in place to determine responsibility for an action is called:

ripple effect, raising new ethical, social, and political issues

The introduction of new information technology has a

False

The key concepts in patent law are originality, novelty, and value

False

The last step in analyzing an ethical issue should be to identify the stakeholders - people who have a vested interest in the outcome of the decision.

the software is widely distributed

The limitation of trade secret protection for software is that it is difficult to prevent the ideas in the work from falling into the public domain when:

data quality

The most common source of business system failure is

True

The most common type of computer-related RSI is CTS

due process

The practice in law-governed societies in which laws are known and understood, and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly is called

it is so inexpensive and can reach so many people

The practice of spamming has been growing because

False

The principles of right and wrong that can be used by individuals to make choices to guide their behavior are called morals

False

The rate of global piracy is approximately 20%

grants a monopoly on underlying concepts and ideas

The strength of patent protection is that it

digital

The term "________ divide" refers to large disparities in access to computers and the Internet among different social groups and different locations

profiling

The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called

False

Trade secret law does not protect the actual ideas in a work product

Three main ways that intellectual property is protected:

Trade secret: intellectual work or product belonging to business, not in the public domain Copyright: statutory grant protecting intellectual property from being copied for the life of the author, plus 70 years Patents: grants creator of invention an exclusive monopoly on ideas behind invention for 20 years

In recent years, the illegal sharing of music files has declined with the improvement of technological prevention.

True

One of the key concepts in patent law is novelty.

True

birthplace

Types of information gathered by Web site tracking tools include all of the following except

develop equivalent privacy protection policies

U.S. businesses are allowed to use personal data from EU countries if they

Web beacons (web bugs)

Used by marketers, tiny software programs that keep a record of users' online clickstream and report this data back to whomever owns the tracking file (invisibly embedded in emails and websites).

Copyright law

What legal mechanism protects the owners of intellectual property from having their work copied by others

on the visitor's computer

When a cookie is created during a Web site visit, it is stored

Privacy Act of 1974

Which U.S. act restricts the information the federal government can collect and regulates what they can do with the information

Information rights and obligations

Which of the five moral dimensions of the information age do the central business activities of ChoicePoint raise

Quality of life

Which of the five moral dimensions of the information age does spamming raise?

HIPAA

Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed

Digital Millennium Copyright Act

Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials

They result in new situations that are not covered by old laws

Which of the following best describes how new information systems result in legal gray areas?

Assign responsibility

Which of the following is not one of the five steps discussed in the chapter as a process for analyzing an ethical issue

Firms should limit the length of time that any personal data is stored to six months or less

Which of the following is not one of the practices added in 2010 by the FTC to its framework for privacy

Software products are more easily compared to each other than books.

Which of the following statements does not describe a key difference between software and books?

Regulated common carriers

________ are not held liable for the messages they transmit

RSI

________ can be induced by tens of thousands of repetitions under low-impact loads.

Accountability is

a feature of systems and social institutions. Mechanisms are in place to determine who took responsible action and who is responsible.

patent

a legal document that grants th owner an exclusive monopoly on the ideas behind an invention for 17 years; designed to ensure that inventors of new machines or methods are rewarded for their labor while making widespread use of their inventions

descartes' rule of change

a principle that states that if an action cannot be taken repeatedly, then it is not right to be taken at any time

immanuel kant's categorical imperative

a principle that states that if an action is not right for everyone to take it is not right for anyone

Due process is

a process in which laws are *known and understood*, and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly.

due process

a process in which laws are well-known and understood and there is an ability to appeal to higher authorities to ensure that laws are applied correctly

fair information practices

a set of principles originally set forth in 1973 that governs the collection and use of information about individuals and forms the basis of most us and european privacy laws

copyright

a statutory grant that protects creators of intellectual property against copying by others for any purpose for a minimum of 70 years

responsibility

accepting the potential costs, duties, and obligations for the decisions one makes

digital millennium copyright act

adjusts copyright laws to the internet age by making it illegal to make, distribute, or use devices that circumvent technology-based protections of copy-righted materials

trade secret

any intellectual work or product used for a business purpose that can be classified as belonging to that business, provided it is not based on information in the public domain

The introduction of information technology has a ripple effect, Social and political institutions cannot respond overnight to these ripples—it may take years to develop etiquette, expectations, laws.

arising new ethical, social, and political issues that must be dealt with on the individual, social and political levels.

ethical "no free lunch" rule

assumptions that all tangible and intangible objects are owned by someone else, unless there is a specific declaration otherwise, and that the creator wants compensation for this work

Power has become more ____ into the hands of a few private oligopolies and large government agencies.

centralized

Computer crime:

commission of illegal acts through use of computer or against a computer system—computer may be object or instrument of crime

informed consent

consent given with knowledge of all the facts needed to make a rational decision

Online Privacy Alliance helps

encourage self-regulation and set guidelines. Promotes use of online seals (TRUSTe), certifying websites adhering to privacy principles.

computer vision syndrome

eyestrain conditions related to computer display screen ousel symptoms include headaches, blurred vision, and dry and irritated eyes

CVS refers to

eyestrain related to computer display screen use.

The impact of network advances are

greatly reduce costs of moving and accessing large quantities of data and open the possibility of mining large pools of data remotely using small desktop machines. This permits an invasion of privacy with incredible precision.

Network Advertising Initiative (NAI)

has developed privacy policies to help customers opt out of advertising network programs and provide consumers redress from abuses.

The impact of mobile device growth is

individual cellphones may be tracked without user consent or knowledge.

What are the five moral dimensions in the ripple effect?

information rights and obligations, property rights and obligations, system quality, quality of life, and accountability and control.

Opt-in model

informed consent in which a business is prohibited from collecting any personal information unless the consumer specifically takes action to approve information collection and use.

intellectual property

intangible property created by individuals or corporations that is subject to protections under trade secret, copyright, and patent law

Intellectual property:

intangible property of any kind created by individuals or corporations

digital divide

large disparities in access to computers and the internet among different social groups and different locations

opt-in

model of informed consent permitting prohibiting an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use

opt-out

model of informed consent permitting the collection of personal information until the consumer specifically requires that the data not be collected

______ has given the government and private sector even more powerful profiling capabilities. It can take information about people from many sources, and correlate relationships to find hidden connections that might help identify terrorists/criminals. It works in real time.

nonobvious relationship awareness (NORA)

repetitive stress injury

occupational disease that occurs when muscle groups are forces through repetitive actions with high-impact loads or thousands of repetitions with low-impact loads

Opt-out model

of informed consent permits the collection of personal information until the customer specifically requests that the data not be collected.

Which legal mechanism grants the owner exclusive ownership of the ideas behind an invention for 20 years?

patent

Liability is

political systems in which a body of laws is in place that permits individuals to recover the damages done to them by other actors, systems or organizations.

utilitarian principle

principle that assumes one can put values in rank order and understand the consequences of various courses of action

risk aversion principle

principle that one should take the action that produces the least harm or incurs the least cost

ethics

principles of right and wrong that can be used by individuals acting as fee moral agents to make choices to guide their behavior

safe harbor

private self-regulating policy and enforcement mechanism that meets the objectives of government regulations but does not involve government regulation or enforcement

The use of computers to combine data from multiple sources and create documents of detailed information on individuals is called: Ex. DoubleClick Ex. ChoicePoint (police records on everyone)

profiling

________ is the use of computers to assemble data from different sources to create electronic dossiers of detailed information about individuals.

profiling

The moral dimension of ________ can be described as the obligations that individuals and organizations have concerning rights to intellectual property.

property rights and obligations

golden rule

putting oneself in the place of others as the object of a decision

Ethics

refers to the principles of right and wrong that individuals, acting as free moral agents, use to make choices to guide their behaviors.

Key concepts of ethical choices are:

responsibility, accountability and liability

The online industry has preferred ____ to privacy legislation for protecting customers

self-regulation

technostress

stress induced by computer use; symptoms include aggravation, hostility toward humans, impatience, and enervation

spyware

technology that aids in gathering information about a person or organizations without their knowledge

nonobvious relationship awareness

technology that can find obscure hidden connections between people or other entities by analyzing information from many different sources to correlate relationships

safe-harbour

the U.S. Department of Commerce developed a ________ framework in order to enable U.S. businesses to legally use personal data from EU countries.

Privacy

the claim of individuals to be left alone, free from surveillance or interference from other individuals, organizations, or state; claim to be able to control information about yourself

privacy

the claim of individuals to be left alone; free from surveillance or interference from other individuals, organizations, or the state

computer abuse

the commission of acts involving a computer that may not be illegal but are considered unethical

computer crime

the commission of illegal acts through the use of a computer or against a computer system

liability

the hesitance of laws that permit individuals to recover the damages done to them by other actors, systems, or organizations

accountability

the mechanisms for assessing responsibility for decisions made and actions taken

information rights

the rights that individuals and organizations have with respect to information that pertains to themselves

profiling

the use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals

Information systems raise new ethical questions because

they create opportunities for intense social change, and thus threaten existing distributions of power, money, rights and obligations. New kinds of crime

cookies

tiny file deposited on a computer hard drive when an individual visits certain web site. Used to identity the visitor and track visits to the web site

web beacons

tiny objects invisibly embedded in e-mail messages and web pages that are designed to monitor the behavior of the user visiting a web site or sending and e-mail

Because of their special claims to knowledge, wisdom, and respect, professionals take on special rights and obligations. T/F

true

Ethics describes the principles of right and wrong that can be used by individuals to make choices to guide their behavior. T/F

true

carpal tunnel syndrome

type of RSI in which pressure on the median nerve through the wrist's bony carpal tunnel structure produces pain

spam

unsolicited commercial e-mail

information rights and obligations protects

what information rights do they posses and what can they protect

Responsibility means

you accept the potential costs, duties and obligations for the decisions you make.


Kaugnay na mga set ng pag-aaral

Chapter 1: Overview of Marketing

View Set

Concepts of care for patients with inflammatory intestinal conditions chapter 49

View Set

Frankenstein Study Guide: Ch 19-21

View Set

Macroeconomics Final Exam Review

View Set