MIS 4
Which ethical rule states that if an action cannot be taken repeatedly, it is not right to take at all?
Slippery-slope rule
Which of the following statements about spam is not true?
Spamming is more tightly regulated in Europe than in the United States.
Which of the following is not true about the changes to EU data protection rules proposed in 2012?
The new rules would reject the right to be forgotten.
Which of the following is not a difficulty in establishing patent protection?
The requirement that the work must be a secret
Regarding moral dimensions of the information age, ________ include(s) the issue of who can and will be held liable for harm done to property rights.
accountability and control
The Golden Rule is an example of ________.
an ethical principle
All of the following are steps in the process for analyzing an ethical issue except:
assigning responsibility.
Advertisers use ________ in order to display more relevant ads based on a user's search and browsing history.
behavioral targeting
The most common cause of repetitive stress injury (RSI) is
computer keyboard
are small text files loaded on a computer when a user visits Web sites
cookies
Which of the following is the most common reason that business systems fail?
data quality
All of the following are technical solutions to protecting user privacy except:
data use policies.
The Internet has made intellectual property
difficult to protect
Which of the following terms refers to significant disparities in access to computers and the Internet among different social groups and different locations?
digital divide
________ is a feature of law-governed society and involves having laws that are known and understood, along with the ability to appeal to higher authorities to ensure that the laws are applied correctly.
due process
Digital media differs from a physical book in all of the following ways except:
ease of establishing uniqueness.
The Online Privacy Alliance:
encourages self-regulation to develop a set of privacy guidelines for its members.
________ refers to the principles of right and wrong that individuals use to make choices.
ethics
CVS refers to
eyestrain related to computer display screen use
In 2010, the FTC added all of the following recommendations to its privacy guidelines except:
firms should limit the length of time that any personal data is stored to six months or less.
Related to technology raising ethical issues, the doubling of computing power every 18 months makes it possible ________.
for organizations to use information system for their core production processes
is the world's largest search engine
The ethical "no free lunch" rule states that:
if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work.
Redesigning and automating business processes can be seen as a double-edged sword because:
increases in efficiency may be accompanied by job losses.
Regarding moral dimensions of the information age, ________ include(s) the issue of what individuals and organizations can protect.
information rights and obligations
the most common type of computer security incident is
malware infection
In the ________ model of informed consent, personal information can be collected until the consumer specifically requests that his or her data not be collected.
opt-out
The Children's Online Privacy Protection Act (COPPA) focuses on ________.
parental permissions
A(n) ________ grants the owner an exclusive monopoly on an invention for 20 years
patent
Lexis/Nexis Risk Solutions (formerly ChoicePoint) gathers data from ________.
police
The use of computers to assemble data from different sources to create digital dossiers of detailed information about individuals is known as which of the following?
profiling
Regarding moral dimensions of the information age, ________ include(s) the issue addressing intellectual property rights in a digital society.
property rights and obligations
Regarding moral dimensions of the information age, ________ include(s) which cultural values are supported by a digital society.
quality of life
The obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within which of the following moral dimensions of the information age?
quality of lift
The U.S. CAN-SPAM Act:
requires commercial email senders to identify themselves.
Regarding moral dimensions of the information age, ________ include(s) the issue of what standards should we demand to protect the safety of society.
system quality
Which of the following ethical guidelines suggests that you put yourself in the place of others, and think of yourself as the object of the decision?
the Golden Rule
Related to technology raising ethical issues, advances in data storage techniques and rapidly declining associated costs are responsible for ________.
the multiplying databases on individuals, employees, customers, and potential customers
________ prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use.
the opt-in model
Which of the following restricts the information that the U.S. federal government can collect about an individual and regulates what it can do with the information?
the privacy act
According to ________, you should take the action that produces the least harm.
the risk aversion principle
Which of the following forms of protection of intellectual property requires that the property be the subject of a nondisclosure agreement?
trade secret
The FIP principle of Notice/Awareness states that:
websites must disclose their information practices before collecting data.
Which of the following is not an example of the potential dark side of big data?
Analyzing data from sensors installed in local parks to monitor soil moisture.
Which of the following were involved in what has been called the patent trial of the century?
Apple and Samsung
The "patent trial of the century" in 2011 was between ________ and ________ for violating patents for iPhones
Apple, Samsung
All of the following laws apply to actions by the federal government except the:
Children's Online Privacy Protection Act.
Which of the following protects the authors of a book from having their work copied by others?
Copyright law
Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials?
Digital Millennium Copyright Act
________ is an Internet advertising broker that tracks activities of users.
Doubleclick
Which of the following statements about Flash cookies is not true?
Flash cookies are installed only at the user's request.
Today, it appears that _________ possesses the largest collection of personal information in the world.
The act that aims at protecting medical records is the
HIPAA
Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed?
HIPAA
A man steals from a grocery store in order to feed his starving family. Which of the following best expresses the utilitarian principle in evaluating this situation?
His action is acceptable, because the higher social value is the survival of the family.
Which of the following best describes Immanuel Kant's categorical imperative?
If an action is not right for everyone to take, it is not right for anyone to take.
Which of the following occurs when muscle groups are forced through tens of thousands of repetitions under low-impact loads?
RSI
________ are not held liable for the messages they transmit.
Regulated common carriers
________ means that you accept the potential costs and obligations for the decisions you make.
Responsibility
Copyright protects creators (individuals) of intellectual property for
70 years after the author's death
copyright protects creators (corporate-owned) of intellectual property for
95 years after the initial creation
Which of the following resulted in an outage for Netflix customers on Christmas Eve 2012?
A failure of Amazon's cloud computing service
Which of the following is not one of the current key technology trends that raises ethical issues?
Increase in data quality
Which of the five moral dimensions of the information age do the central business activities of DoubleClick involve?
Information rights and obligations
Which of the following is a primary drawback to the "do anything anywhere" computing environment?
It blurs the traditional boundaries between work and family time.
Which of the following best describes the effect that new information technology has on society?
It has a ripple effect, raising new ethical, social, and political issues.
A colleague at work takes small amounts of office supplies for her own personal use, saying that this is a tiny loss to the company. You tell her that if everyone were to take office supplies, then the loss would no longer be minimal. Your rationale expresses which of the following ethical principles?
Kant's Categorical Imperative
Which of the following is not protected by copyright law?
Machines
FIP principles are based on a belief in which of the following?
Mutuality of interest between the record holder and the individual
________ scans data and can help identify a man at a ticket counter who shares a phone number with a known terrorist.
NORA
What percent of global Internet users use Google Search and other Google services?
Nearly 80 percent
The NAI is an industry association formed to help with which of the following?
Online privacy issues
Which of the following is not a file-sharing service?
Pandora
The ________ is the most important U.S. federal statute regarding conditions for handling information regarding credit reporting and financial records.
Privacy Act of 1974
Which of the five moral dimensions of the information age does spamming involve?
Quality of life