Chapter 29

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Online marketers of products and services have quickly recognized that learning about consumers' online behavior presents a real opportunity to increase their

A. Sales

The process in which a legitimate Web site is reproduced in order to fool users into thinking that they are connected to a trusted site is known as:

A. Spoofing

It is a problematic issue as to how offshore gambling can be regulated, where ___________ laws generally do not apply.

A. consumer protection

Federal legislation disallows most, but not all kinds of online:

A. gambling.

Under the ECPA, the individual must act ___ in order to commit a crime.

A. intentionally

The ECPA grants an Internet service provider (ISP) the right to __________ e-mail messages without the subscriber's consent.

A. monitor

Unsolicited e-mails sent for commercial purposes are popularly referred to as:

A. spam.

Instructions hidden in software with the potential to cause significant damage to both hardware and software is a:

A. virus.

A file that is imbedded on the hard drive of a computer, often without a person's knowledge, that collects and stores information about the user and his or her behavior including the Web sites that have been visited, is known as a:

B. Cookie

The rapid advances in technology being experienced today make it difficult for people to maintain online anonymity or distance between themselves and powerful.

B. Interests

A bank employee who programs the bank's computer to make deductions from one or several accounts, and to deposit the funds to an account set up and controlled by the employee, could be prosecuted for ______________even though he or she had not touched actual currency.

B. embezzlement

Federal and state laws make most forms of gambling:

B. illegal.

When a person sustains severe anxiety, the injured party may sue the offending party for:

B. intentional infliction of emotional distress.

Even if a person's intent is good and his or her conduct accidentally causes damage, then he or she may be prosecuted for a federal crime under the:

C. Computer Fraud and Abuse Act.

Speech that harms a person's reputation is referred to as:

C. defamation.

The Electronic Communications Privacy Act (ECPA) states that individuals may not gain access to a(n) _____without permission.

C. electronic communication system

Unauthorized access to computers invites violation of:

C. rights.

A type of computer crime concerns _____ access to computer data.

C. unauthorized

A federal statute passed to regulate Web sites that contain obscene material or child pornography has now been ruled _____ by the courts because it violates due process of law.

C. unconstitutional.

To use any device that is part of an electronic transfer mechanism to steal money, goods, or services or to alter data, interrupt wire transmissions, or use stolen codes or passwords, when the purpose of such activity is to obtain something of value unlawfully, is a federal offense under the:

D. Electronic Funds Transfer Act.

Consumers who believe that their right to privacy is being violated by the embedding of software can complain to the:

D. Federal Trade Commission.

There are ________ distinct rights of privacy generally recognized in the United States.

D. Two

In the case of newspapers, the ___________ may not recover damages unless he or she can show that the newspaper acted with actual malice.

D. defamed individual

A person who gains unauthorized access to computers, either for mischief or with criminal intent, is called a(n):

D. hacker.

Many experts argue that the problem with the legal definition of __________ is that it is too vague and ambiguous.

D. obscenity

Defamatory statements include slander but not libel.

False

Federal criminal statutes are not used to prosecute computer crime.

False

From a legal standpoint, it is not allowable for a seller to solicit via e-mail.

False

Individuals who post content on social media websites are not held legally responsible for any forms of criminal activity.

False

It is not a crime under the ECPA to disclose to a third party the contents of stored computer information that has been obtained without permission.

False

The Computer Fraud and Abuse Act (CFAA) at times limits the ECPA. Under the ECPA there must be an intent to exceed authorization for a crime to be committed, and the CFAA does not require such intent if the intrusion onto another person's computer-stored information caused damage.

False

The rules relating to legal purpose and competent parties in contract law do not apply to agreements made in the form of wagers placed online.

False

Transferring funds from one bank account to another, changing students' grades in college computer files, and crediting accounts for purchases made are not instances of unauthorized use of computers.

False

Even if an employer promises not to read the employee's e-m messages, courts in some states have still ruled that the promise does not create a reasonable expectation of privacy.

True

Spam is undesirable because it can drain an ISP's resources, strain network bandwidth, and clog a user's e-mail folders.

True

The Electronic Communications Privacy Act (ECPA) makes it a federal crime to monitor e-mail during real time, that is, when it is being sent or recieved.

True

The laws governing online gambling vary from state to state, and most states have pending regulations that would severely restrict how and when such gambling may take place.

True

The rules of defamation vary depending on whether one is or is not a public figure

True

When individuals learn that someone has posted an untruth about them, especially when such untruth harms them professionally, they often attempt to hold their ISP liable.

True

While there are currently no federal laws prohibiting the use of cookies when gathering information regarding adults, the Children's Online Privacy Protection Act prohibits this practice when minors are involved, unless there is parental consent.

True


Ensembles d'études connexes

massage first semester final exam

View Set

Concepts of Programming Chapters 7-14

View Set

14. The Watsons Go to Birmingham Vocabulary - Chapter 14

View Set

Psychology 101 Chapter 9: The Knowing Mind - Memory

View Set

Chapter 8, Section 3- Spanish American War (foldable questions)

View Set

The use of a glossary suggest which of the following?

View Set