Exam 3 Chapter 4
A colleague at work takes small amounts of office supplies for her own personal use, saying that this is a tiny loss to the company. You tell her that if everyone were to take office supplies, then the loss would no longer be minimal. Your rationale expresses which of the following ethical principles? A) Kant's Categorical Imperative B) The Golden Rule C) The Risk Aversion Principle D) The "no-free-lunch" rule E) The slippery-slope rule
A
Advertisers use ________ in order to display more relevant ads based on a user's search and browsing history. A) behavioral targeting B) Web bugs C) NORA D) intelligent agents E) FIP principles
A
All of the following are steps in the process for analyzing an ethical issue except: A) assigning responsibility. B) identifying the stakeholders. C) identifying the options you can reasonably take. D) identifying and clearly describing the facts. E) identifying the potential consequences of your options.
A
Redesigning and automating business processes can be seen as a double-edged sword because: A) increases in efficiency may be accompanied by job losses. B) increases in efficiency may be accompanied by poor data quality. C) support for middle-management decision making may be offset by poor data quality. D) reliance on technology results in the loss of hands-on knowledge. E) it can concentrate power in the hands of senior executives
A
The obligations that individuals and organizations have concerning rights to intellectual property involve which of the following moral dimensions of the information age? A) Property rights and obligations B) System quality C) Accountability and control D) Information rights and obligations E) Quality of life
A
The use of computers to assemble data from different sources to create digital dossiers of detailed information about individuals is known as which of the following?
A
Which of the five moral dimensions of the information age does the weakening of boundaries between work and family life involve? A) Quality of life B) System quality C) Accountability and control D) Information rights and obligations E) Property rights and obligations
A
Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials? A) Digital Millennium Copyright Act B) Privacy Act C) Freedom of Information Act D) Electronic Communications Privacy Act E) Computer Software Copyright Act
A
Which of the following is considered the most important U.S. federal statute setting forth conditions for the federal government's handling of information about individuals? A) The Privacy Act B) The Gramm-Leach-Bliley Act C) The Freedom of Information Act D) COPPA E) HIPAA
A
________ are not held liable for the messages they transmit. A) Regulated common carriers B) Private individuals C) Organizations and businesses D) Elected officials E) European ISPs
A
________ means that you accept the potential costs and obligations for the decisions you make. A) Responsibility B) Accountability C) Liability D) Due process E) Duty
A
Which ethical rule states that if an action cannot be taken repeatedly, it is not right to take at all? A) Slippery slope rule B) Lemming rule C) High-failure cost rule D) Utilitarian principle E) Golden Rule
A
_______ grants the owner exclusive ownership of the ideas behind an invention for 20 years. A) Copyright law B) Trademark law C) Patent law D) Trade secret protection E) Privacy law
C
In 2010, the FTC added all of the following recommendations to its privacy guidelines except: A) firms should build products and services that protect privacy. B) firms should increase the transparency of their data collection. C) firms should require consumer consent and provide clear options to opt out of data collection. D) firms should limit the length of time that any personal data is stored to six months or less. E) consumers should be able to review and contest the accuracy and completeness of data.
D
Which of the following best describes Immanuel Kant's categorical imperative? A) If an action cannot be taken repeatedly, then it is not right to be taken at any time. B) One should take the action that produces the least harm or incurs the least cost. C) One can put values in rank order and understand the consequences of various courses of action. D) If an action is not right for everyone to take, it is not right for anyone to take. E) You should act towards others as you would like them to act towards you.
D
Which of the following is not true about the changes to EU data protection rules enacted in the GDPR? A) The new rules require Internet companies to obtain explicit consent from consumers for the use of their personal data. B) The new rules require Internet companies to delete information at the user's request. C) The new rules require Internet companies to retain information only as long as absolutely necessary. D) The new rules do not allow consumers to have their data removed from company servers. E) The new rules strengthen the right to be forgotten.
D
1) Which of the following best describes how new information systems can result in legal gray areas? A) They work with networked, digital data, which are more difficult to control than information stored manually. B) They result in new situations that are not covered by old laws. C) They are implemented by technicians rather than managers. D) They are created from sets of logical and technological rules rather than social or organizational mores. E) They are little understood by politicians or lawyers.
B
2) Which of the following best describes the effect that new information technology has on society? A) It has a dampening effect on the discourse of business ethics. B) It has a ripple effect, raising new ethical, social, and political issues. C) It is beneficial for society as a whole, while raising dilemmas for consumers. D) It has a waterfall effect in raising ever more complex ethical issues. E) It has a magnifying effect, creating increasing numbers of ethical issues.
B
According to ________, you should take the action that produces the least harm. A) Kant's categorical imperative B) the risk aversion principle C) the utilitarian principle D) the Golden Rule E) the no-free-lunch rule
B
In the ________ model of informed consent, personal information can be collected until the consumer specifically requests that his or her data not be collected. A) opt-in B) opt-out C) P3P D) PGP E) safe harbor
B
The U.S. CAN-SPAM Act: A) makes spamming illegal. B) requires commercial email senders to identify themselves. C) has dramatically cut down spamming. D) does not override state anti-spamming laws. E) does not outlaw the use of fake return addresses.
B
When a cookie is created during a website visit, it is stored: A) on the website's server. B) on the hard drive of the visitor's computer. C) on the ISP's servers. D) in the browser's application settings. E) nowhere, because they are only used during a visit and are discarded once a visitor leaves the website.
B
________ is a feature of law-governed society and involves having laws that are known and understood, along with the ability to appeal to higher authorities to ensure that the laws are applied correctly. A) Liability B) Due process C) Responsibility D) Accountability E) The judicial system
B
________ is a feature of social institutions that means mechanisms are in place to determine responsibility for an action. A) Due process B) Accountability C) The courts of appeal D) The judicial system E) Liability
B
________ prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use. A) A safe harbor B) The opt-in model C) FIP principles D) P3P E) The opt-out model
B
All of the following are factors in U.S. federal sentencing guidelines with respect to business executives except: A) the monetary value of the crime. B) the presence of a conspiracy to prevent discovery of the crime. C) the use of technology to commit the crime. D) the use of structured financial transactions to hide the crime. E) the failure to cooperate with prosecutors.
C
Which of the following is a data analysis technology that finds hidden connections between data in disparate sources?
C
Which of the following is not one of the current key technology trends that raises ethical issues? A) Decline in data storage costs B) Advances in data analysis C) Increase in data quality D) Doubling of computing power every 18 months E) Advances in networking technology
C
Which of the following protects the authors of a book from having their work copied by others? A) Patent protection B) Due process C) Copyright law D) Fair Use Doctrine E) Trade Secret law
C
The ethical no-free-lunch rule states that: A) if an action cannot be taken repeatedly, then it is not right to be taken at any time. B) one should take the action that produces the least harm or incurs the least cost. C) one can put values in rank order and understand the consequences of various courses of action. D) if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work. E) if an action is not right for everyone to take, it is not right for anyone to take
D
Digital media differs from a physical book in all of the following ways except: A) ease of replication. B) ease of alteration. C) ease of transmission. D) ease of global distribution. E) ease of establishing uniqueness.
E
The FIP principle of Notice/Awareness states that: A) customers must be allowed to choose how their information will be used for secondary purposes other than the supporting transaction. B) data collectors must take responsible steps to assure that consumer information is accurate and secure from unauthorized use. C) there must be a mechanism in place to enforce FIP principles. D) consumers should be able to review the data collected about them. E) websites must disclose their information practices before collecting data.
E
The obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within which of the following moral dimensions of the information age? A) Family and home B) Property rights and obligations C) System quality D) Accountability and control E) Quality of life
E
What of the following is not a feature of the General Data Protection Regulation (GDPR)? A) It applies to all firms doing business in the EU. B) It requires unambiguous consent for using personal data to construct profiles. C) It imposes fines on companies for violating the regulation up to 4 percent of a firm's global revenue D) It creates a single EU privacy policy. E) It prevents firms from using cookies.
E
Which of the following forms of protection of intellectual property requires that the property be the subject of a nondisclosure agreement? A) Copyright B) Patent C) All forms of intellectual property protection D) Trademark E) Trade secret
E
Which of the following is not an example of the potential dark side of big data? A) Police visits to individuals whom a computer system identified as likely to commit a crime in the future B) Use of a device installed in a car to analyze driving habits C) Use of a predictive modeling system that predicts life expectancy by using data about individual consumers' buying habits as well as personal and family medical histories D) Use of computerized systems to filter and hire job applicants E) Analyzing data from sensors installed in local parks to monitor soil moisture
E