MIS - Chapter 4
Which of following statements about Flash cookies is not true?
Flash cookies are installed only at a user's request.
Which of the following is a primary drawback of the "do anything anywhere" computing environment?
It blurs the traditional boundaries between work and family time.
What percent of global Internet users use Google Search and other Google services?
Nearly 80 percent
TRUSTe is an example of which of the following?
Online seal program
______________ can be induced by tens of thousands of repetitions under low-impact loads.
RSI
_____________ are not held liable for the messages they transmit.
Regulated common carriers
_____________ prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use.
The opt-in model
Which of the following is not a difficulty in establishing patent protection?
The requirement that the work must be a secret
Which of the following forms of protection of intellectual property requires that the property be the subject of a nondisclosure agreement?
Trade secret
NORA is:
a data analysis technology that finds hidden connections between data in disparate sources.
The feature of social institutions that means mechanisms are in place to determine responsibility for an action is called:
accountability.
Advertisers use ____________ in order to display more relevant ads based on a user's search and browsing history.
behavioral targeting
All of the following are technical solutions to protecting user privacy except:
data use policies.
Immanuel Kant's categorical imperative states that:
if an action is not right for everyone to take, it is not right for anyone to take.
The ethical "no free lunch" rule states that:
if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work.
When a cookie is created during a website visit, it is stored:
on the hard drive of the visitor's computer
The use of computers to combine data from multiple sources and create digital dossiers of detailed information on individuals is called:
profiling.
The U.S. CAN-SPAM Act:
requires commercial email senders to identify themselves.
The U.S. Department of Commerce developed a(n) ______________ framework in order to enable U.S. businesses to legally use personal data from EU countries.
safe harbor
According to the ____________ rule, if an action cannot be taken repeatedly, it is not right to take at all.
slippery-slope