CSIS 1010 Chapter 8
Which of the following situations would not qualify for the fair use exception to U.S. copyright law? -A journalist quotes a paragraph from a book in a review of the book. -A professor clips a newspaper article just before class and distributes copies of it to his class. -Google posts thumbnail images of books in the Google Book Search Project. -A student copies a photograph of his favorite band from a website created by the band's record label and places it on the student's personal website.
A student copies a photograph of his favorite band from a website created by the band's record label and places it on the student's personal website.
In which of the following cases did the U.S. Supreme Court rule that basic business methods cannot be patented? -State Street Bank & Trust v. Signature Financial Group, Inc. -BMG Rights Management v. Cox Communications -Bilski et al. v. Kappos -Alice Corporation Pty. Ltd. v. CLS Bank International
Alice Corporation Pty. Ltd. v. CLS Bank International
The Spokeo case involved a claim for damages based on which of the following? -Anticybersquatting Consumer Protection Act -Fair Credit Reporting Act -Digital Millennium Copyright Act -Defend Trade Secrets Act
Fair Credit Reporting Act
Copyright protection protects against others copying the underlying ideas in a work. True or False
False
Most adult social network participants do not have any expectation of personal privacy when using a social network. True or False
False
Online gambling is now legal throughout the United States. True or False
False
The principle of responsibility means that individuals, organizations, and societies should be held accountable to others for the consequences of their actions. True or False
False
Which of the following cases has chipped away at DMCA safe harbor protection? -Perfect 10, Inc. v. Amazon.com, Inc. et al. -Alice Corporation Pty. Ltd. v. CLS Bank International -Field v. Google, Inc. -BMG Rights Management v. Cox Communications
Field v. Google, Inc.
Which of the following cases involved the issue of keywording? -E. & J. Gallo Winery v. Spider Webs Ltd. -Ticketmaster Corp. v. Tickets.com -Bernina of America, Inc. v. Fashion Fabrics Int'l, Inc. -Government Employees Insurance Company v. Google, Inc.
Government Employees Insurance Company v. Google, Inc.
Which of the following requires financial institutions to inform consumers of their privacy policies and permits consumers some control over their records? -Freedom of Information Act -COPPA -Gramm-Leach-Bliley Act -HIPAA
Gramm-Leach-Bliley Act
The Day of Action in July 2017 was a protest to proposed changes in regulations pertaining to which of the following? -Net neutrality -fantasy sports -Internet sales taxes -the online sale of prescription drugs
Net neutrality
Which ethical principle asks you to assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise? -the Golden Rule -the Slippery Slope -No Free Lunch -the Social Contract Rule
No Free Lunch
Which of the FTC's Fair Information Practices (FIP) principles requires identification of the collector of data? -Notice/Awareness -Security -Access/Participation -Choice/Consent
Notice/Awareness
Which ethical principle states that when confronted with an ethical dilemma, an individual should take the action that produces the least harm, or the least potential cost? -Risk Aversion -the Slippery Slope -the Collective Utilitarian principle -No Free Lunch
Risk Aversion
"Do Not Track" falls under which of the following principles in the FTC's new privacy framework? -Simplified Choice -Scope -Greater Transparency -Privacy by Design
Simplified Choice
All of the following cases involved the doctrine of fair use except: -Kelly v. Arriba Soft. -Perfect 10, Inc. v. Amazon.com, Inc. et al. -Field v. Google, Inc. -Spokeo v. Robins
Spokeo v. Robins
Which case was instrumental in paving the way for Internet business methods patents? -Bilski et al. v. Kappos -State Street Bank & Trust Co. v. Signature Financial Group, Inc. -Alice Corporation Pty. Ltd. v. CLS Bank International -Ticketmaster Corp. v. Tickets.com
State Street Bank & Trust Co. v. Signature Financial Group, Inc.
Which of the following is not a privacy advocacy group? -EPIC -TIO -EFF -CDT
TIO
Which of the following statements about the E.U. General Data Protection Regulation (GDPR) is not true? -The GDPR replaces the E.U.'s existing Data Protection Directive. -The GDPR limits the ability of companies to use data for purposes other than those for which it was collected. -The GDPR applies to any firm operating in any E.U. country. -The GDPR eliminate the right to be forgotten.
The GDPR eliminate the right to be forgotten.
The opt-in model for informed consent requires an affirmative action by the consumer before a company can collect and use information. True or False
True
Which of the following is not aimed at strengthening the ability of law enforcement agencies to monitor Internet users without their knowledge? -USA PATRIOT Act -Communications Assistance for Law Enforcement Act -Homeland Security Act -USA Freedom Act
USA Freedom Act
Which of the following handles cybersquatting cases under its Uniform Dispute Resolution procedures? -ICANN -WIPO -USPTO -FTC
WIPO
Safe harbor provisions of the DMCA were at the heart of which of the following lawsuits? -Government Employees Insurance Company v. Google, Inc. -a lawsuit filed by the Authors Guild and five major publishing companies against Google -Google, Inc. v. American Blind & Wallpaper Factory, Inc. -a lawsuit brought by Viacom against YouTube and Google
a lawsuit filed by the Authors Guild and five major publishing companies against Google
Which of the following technologies allows you to send e-mail without a trace? -anonymous surfing -P3P -anonymous remailers -public key encryption
anonymous remailers
According to data from Pew Research Center, which of the following is the action which the highest percentage of Internet users has taken to preserve their privacy online? -posted comments online anonymously -used an anonymous web browsing service -encrypted their communications -cleared web browser history and cookies
cleared web browser history and cookies
Which of the following protects original forms of expression in a tangible medium? -trade secret law -copyright law -patent law -trademark law
copyright law
Downloading a music track owned by a record company without paying for it is an example of a violation of: -copyright law. -privacy law. -trademark law. -patent law.
copyright law.
Registering a domain name similar or identical to trademarks of others to divert web traffic to their own sites is an example of: -metatagging. -framing. -cyberpiracy. -cybersquatting.
cyberpiracy
Registering a domain name similar or identical to trademarks of others to extort profits from legitimate holders is an example of: -framing. -cybersquatting. -cyberpiracy. -metatagging.
cybersquatting
Which of the following involves bypassing the target site's home page and going directly to a content page? -cybersquatting -framing -deep linking -metatagging
deep linking
Which of the following basic ethical concepts plays an important role in defining privacy? -due process -accountability -liability -responsibility
due process
The display of a third-party's website or page within your own website is called: -metatagging. -cybersquatting. -framing. -deep linking.
framing
All of the following are factors that will be considered in determining whether use of copyrighted material is "fair use" except the: -free availability of the work on the Web. -nature of the work used. -amount of the work used. -market effect of the use.
free availability of the work on the Web.
Which of the following e-commerce technology dimensions has the potential to reduce cultural diversity in products? -information density -interactivity -ubiquity -global reach
global reach
Disputes over federal trademarks involve establishing: -underlying ideas. -infringement. -piracy. -intent.
infringement
All of the following are required in order for information to be considered a trade secret except: -the owner must have taken steps to protect it. -it must be something that others do not know. -it must be unique. -it must have commercial value to its owner.
it must be unique.
Which of the following allows someone to obtain an exclusive monopoly on the ideas behind an invention for 20 years? -copyright law -patent law -trade secret law -trademark law
patent law
Which of the following is considered one of the most contentious e-commerce patents? -patent on one-click purchasing -patent on streaming video media transmission -Google's PageRank patent -patent on buyer-driven name your price tools
patent on one-click purchasing
Which of the following is not one of the four basic principles shared by ethical schools of thought in western culture? -responsibility -liability -accountability -privacy
privacy
Which of the following is not a major e-commerce public safety and welfare issue? -regulation of pornography -regulation of gambling -regulation of cigarette sales -regulation of taxation
regulation of taxation
Which of the following tools can companies use to track user statements and views on newsgroups, chat groups, and other public forums? -digital wallets -cookies -shopping carts -search engines
search engines
Which of the following e-commerce technology dimensions creates greater opportunities for cyberbullying? -social technology -ubiquity -information density -interactivity
social technology
Which of the following can be used to record all keyboard activity of a user? -DRM -trusted computing environments -shopping carts -spyware
spyware
Which ethical principle states that, when confronted with an ethical dilemma, individuals should take the action that achieves the greater value for all of society? -Risk Aversion -the Golden Rule -the Social Contract Rule -the Collective Utilitarian principle
the Collective Utilitarian principle
All of the following statements about the Digital Millennium Copyright Act (DMCA) are true except: -the DMCA makes it illegal to circumvent technological measures to protect works. -the DMCA requires search engines to block access to infringing sites. -the DMCA makes Internet Service Providers (ISPs) responsible and accountable for hosting websites or providing services to infringers regardless of whether the ISP is aware of infringement. -the DMCA allows libraries to make digital copies of works for internal use only.
the DMCA makes Internet Service Providers (ISPs) responsible and accountable for hosting websites or providing services to infringers regardless of whether the ISP is aware of infringement.
Which ethical principle emphasizes putting oneself into the place of others and thinking of oneself as the object of the decision? -the Social Contract Rule -the Golden Rule -the Collective Utilitarian principle -Universalism
the Golden Rule
Which ethical principle tells you that it is wise to assume perfect information markets? -the New York Times test -the Social Contract Rule -the Collective Utilitarian principle -the Golden Rule
the New York Times test
Which ethical principle states that if an action cannot be taken repeatedly, then it's not right to take at all? -the Social Contract Rule -the Golden Rule -the Slippery Slope -Universalism
the Slippery Slope
Which ethical principle asks you to consider the impact of your decision if the principles underlying your decision became an organizing principle of the entire society? -the Golden Rule -the Social Contract Rule -the Slippery Slope -Risk Aversion
the Social Contract Rule
All of the following are possible penalties for violating the Digital Millennium Copyright Act (DMCA) except: -fines up to $1 million for a repeat offense. -restitution to the injured parties for any losses due to infringement. -fines up to $500,000 for a first offense. -up to ten years imprisonment for a first offense.
up to ten years imprisonment for a first offense.
A social consequence of the richness of Internet information is: -very persuasive messages might reduce the need for multiple independent sources of information. -an increase in shallowness. -an increase in vulnerability to hacking attacks. -an increase in the ease of creating misleading information.
very persuasive messages might reduce the need for multiple independent sources of information.
Which of the FTC's Fair Information Practices (FIP) principles requires opt-in or opt-out policies to be in place? -Notice/Awareness -Choice/Consent -Access/Participation -Security
Choice/Consent
Which of the following is a core Fair Information Practices (FIP) principle? -Security -Enforcement -Choice/Consent -Access/Participation
Choice/Consent
Google owns which of the following, whose data it can use to create what some refer to as super profiles? -TransUnion Corporation -DoubleClick -Experian -Acxiom
DoubleClick
Which of the following is not true about the evolution of Facebook's privacy policies over the ten-year period from 2005 to 2015? -Facebook's privacy policies improved from 2005 to 2009. -Facebook's privacy policies have steadily declined since 2009. -The amount of information gathered and monitored by Facebook increased. -Facebook's privacy policy became easier to understand.
Facebook's privacy policy became easier to understand.
The Children's Internet Protection Act (CIPA) has been struck down by the U.S. Supreme Court as unconstitutional. True or False
False
The TrustArc program is an industry-sponsored initiative to encourage websites to be more transparent about how they use personal information, and to make it more likely that appropriate ads are shown to users. True or False
False
What is the first step in analyzing an ethical dilemma? -Identify the options you can reasonably take. -Identify and describe the facts. -Identify the potential consequences of your opinions. -Define the conflict or dilemma and identify the higher-order values involved.
Identify and describe the facts.
What is the FTC recommendation regarding choice as it relates to personally identifiable information (PII)? -Require robust notice only before PII is collected. -Require firms to have consumers affirmatively opt-in before PII is collected. -Require firms to allow consumers to opt-out before PII is collected. -Make collection of PII illegal.
Require firms to have consumers affirmatively opt-in before PII is collected.
Which of the following is not one of the issues complicating the taxation of e-commerce sales? -Taxes raised are used for different government purposes. -Small online businesses are unable to manage sales taxes to thousands of different jurisdictions. -Sales taxes and policies vary by state and country. -Retailers are only legally required to charge sales tax if they have operations located in the same state as a consumer.
Taxes raised are used for different government purposes.
Google defended its Library Project on the grounds of fair use. True or False
True
In the United States, Google is not required to remove results from its search engine if requested. True or False
True
Liability is a feature of political systems in which a body of law is in place that permits individuals to recover damages done to them by other actors, systems, or organizations. True or False
True
Net neutrality refers to the idea that Internet service providers (ISPs), including cable Internet and wireless carriers, should treat all data on the Internet in the same manner, and not discriminate or price differentially by content, protocol, platform, hardware, or application. True or False
True
Section 230 of the Communications Decency Act (CDA) provides immunity for providers and users of interactive computer services (such as ISPs and websites) from being considered a publisher that might be liable for harmful content posted by others. True or False
True
The Federal Communications Commission's privacy rules, applicable to broadband ISPs, were repealed by Congress in 2017. True or False
True
The ethical principle of Universalism states that if an action is not right for all situations, then it is not right for any situation. True or False
True
The expansion of generic top-level domains recently authorized by ICANN is likely to be disruptive in terms of trademark protection. Group of answer? True or False
True
All of the following statements about patents are true except: -it is more difficult to obtain a copyright than it is to obtain a patent. -computer programs can be patented. -in order to be patented, an invention must be nonobvious. -the four types of inventions protected by patent law are machines, manmade products, compositions of matter, and processing methods.
it is more difficult to obtain a copyright than it is to obtain a patent.
What is the major reason why the Internet has such potential for destroying traditional conceptions and implementations of intellectual property law? -the use of standards for file formats -the ability to make perfect copies of digital works at little cost -the anonymous nature of the Internet -the support for instant peer-to-peer communication
the ability to make perfect copies of digital works at little cost
Registering the domain name Faceboik.com with the intent to divert web traffic from people misspelling Facebook.com is an example of: -cybersquatting. -metatagging. -linking. -typosquatting.
typosquatting
Which of the following features of e-commerce technology can result in work and shopping invading family life? -interactivity -global reach -ubiquity -information density
ubiquity
Which of the following statements about industry self-regulation regarding privacy is not true? -Critics argue that the most effective form of industry self-regulation to safeguard privacy are online seal programs that attest to a company's privacy policies. -The NAI offers consumers a global opt-out feature to prevent network advertising agencies from placing cookies on a user's computer. -The AdChoices program is an industry-sponsored initiative to encourage websites to be more transparent about how they use personal information and to make it more likely that appropriate ads are shown to users. -Industry efforts have not so far succeeded in reducing American fears of privacy invasion.
Critics argue that the most effective form of industry self-regulation to safeguard privacy are online seal programs that attest to a company's privacy policies.