Chapter 6
Privacy advocates prefer which model of informed consent? a) Opt-in b) Opt-out c) Either A or B d) Neither A nor B
A
The _______________ ethical standard states that respect and compassion for all others is the basis for ethical actions. a) Common good b) Fairness c) Rights d) Utilitarian e) Well-being
A
The rights approach for ethical standards states: a) An ethical action is the one that best protects and respects the moral rights of the affected parties. b) An ethical action is one that shows respect and compassion for all others. c) An ethical action is the one that provides the most good or does the least harm. d) An ethical action is one that treats all human beings equally, or, if unequally, then fairly based on some defensible standard.
A
Various organizations that promote fair and responsible use of information systems often develop a _____. a) Code of ethics b) Strategic plan c) Mission statement d) Responsibility charter e) Goals outline
A
What are the four ethical issues that the ever-expanding use of IT applications have created? a) Property, accuracy, privacy, and accessibility. b) Property, accuracy, theft, accessibility. c) Patents, property, patients, and access codes. d) Accuracy, privacy, accessibility, and ownership .
A
_____ issues involve collecting, storing, and disseminating information about individuals. a) Privacy b) Accuracy c) Transferability d) Property e) Accessibility
A
20. _____ issues involve the authenticity and fidelity of information that is collected and processed. a) Privacy b) Accuracy c) Transferability d) Property e) Accessibility
B
Accuracy issues: a) Involve collecting, storing, and disseminating information about individuals. b) Involve the authenticity, fidelity, and accuracy of information that is collected and processed. c) Involve the ownership and value of information. d) Involve who can access information and whether they should have to pay for that access.
B
The _____________ ethical standard states that ethical actions treat all human beings equally. a) Common good b) Fairness c) Rights d) Utilitarian e) Well-being
B
The common good approach for ethical standards states: a) An ethical action is the one that best protects and respects the moral rights of the affected parties. b) An ethical action is one that shows respect and compassion for all others. c) An ethical action is the one that provides the most good or does the least harm. d) An ethical action is one that treats all human beings equally, or, if unequally, then fairly based on some defensible standard
B
The process of profiling: a) Increases individual privacy. b) Decreases individual privacy. c) Has no effect on individual privacy. d) Is illegal in more than half of the states. e) Is legal but unethical.
B
The relationship between ethics and legality can best be described in which of the following statements? a) If an act is unethical it is always illegal. b) An act can be unethical but still be legal. c) An ethical act is always legal. d) None of the above
B
When comparing data protection laws internationally, which laws are stricter? a) US laws b) EU laws c) US and EU laws are equally as strict.
B
Which of the following statements is correct? a) An individual's right to privacy is absolute. b) Determining and enforcing privacy regulations can be difficult. c) An individual's right to privacy supersedes the needs of society. d) Advances in information technologies have not affected individual privacy. e) The Internet has increased individuals' privacy.
B
_____________ means accepting the consequences of your decisions and actions. a) Privacy b) Responsibility c) Transferability d) Accountability e) Liability
B
18. What is _____ is not necessarily _____. a) Illegal, unethical b) Ethical, illegal c) Unethical, illegal d) Unethical, legal e) Ethical, legal
C
33. Data aggregators sell digital dossiers to companies that want to know their customers better, which is a process called ________. a) Customer relationships b) Customer profiling c) Customer intimacy d) Customer knowledge e) Spying
C
An electronic portfolio of you and your habits is called a(n): a) Profile. b) Electronic master record. c) Digital dossier. d) Surveillance report.
C
How does society keep owners of electronic bulletin boards from disseminating offensive or untrue content? This is a difficult question because it involves the conflict between _____ on the one hand and _____ on the other. a) The public, the individual b) The public, ethics c) Freedom of speech, privacy d) The individual, freedom of speech e) Ethics, security
C
Property issues: a) Involve collecting, storing, and disseminating information about individuals. b) Involve the authenticity, fidelity, and accuracy of information that is collected and processed. c) Involve the ownership and value of information. d) Involve providing information about individuals.
C
The _________ approach to ethics maintains that an ethical action is the one that provides the most good or does the least harm: a) common good approach b) rights approach c) utilitarian approach d) fairness approach
C
The ____________ ethical standard states that an ethical action is the one that best protects and respects the moral rights of the affected parties. a) Common good b) Fairness c) Rights d) Utilitarian e) Well-being
C
The utilitarian approach for ethical standards states: a) An ethical action is the one that best protects and respects the moral rights of the affected parties. b) An ethical action is one that shows respect and compassion for all others. c) An ethical action is the one that provides the most good or does the least harm. d) An ethical action is one that treats all human beings equally, or, if unequally, then fairly based on some defensible standard
C
Which of the following is not an ethical issue related to IT? a) Privacy b) Accuracy c) Accountability d) Property (such as intellectual property) e) Accessibility to information
C
Which type of privacy policy restricts an organization from collecting personal information until the customer specifically authorizes it? a) electronic surveillance b) opt-out model c) opt-in model d) profiling
C
_______________ is the tenet of ethics that refers to determining who is responsible for actions that were taken. a) The code of ethics b) Liability c) Accountability d) Responsibility
C
32. Which of the following statements is correct? a) International privacy and security laws are very consistent. b) Consistent international privacy and security laws help companies with their regulatory requirements from country to country. c) Consistent international privacy and security laws enable information to flow freely among countries. d) The absence of consistent international privacy and security laws has led to a complex global legal framework. e) Consistent international privacy and security laws are followed by all countries.
D
34. Refer to Opening Case -- Pinterest: Which of the following statements is false? a) Users pinning pictures from other sites raises an ethical issue. b) Pinterest's users agree to only post their own original work. c) Pinterest will revoke access if the company discovers downloaded copyrighted material. d) Users can claim they aren't responsible because they didn't read the user agreement before they agreed to accept it.
D
The ____________ ethical standard states that an ethical action is the one that provides the most good or does the least harm. a) Common good b) Fairness c) Rights d) Utilitarian e) Well-being
D
The fairness approach for ethical standards states: a) An ethical action is the one that best protects and respects the moral rights of the affected parties. b) An ethical action is one that shows respect and compassion for all others. c) An ethical action is the one that provides the most good or does the least harm. d) An ethical action is one that treats all human beings equally, or, if unequally, then fairly based on some defensible standard.
D
What is the relationship between advances in information technology and the practice of profiling? a) Advances in IT make it more difficult to profile individuals. b) Advances in IT have no impact on profiling. c) Advances in IT make it more expensive to profile individuals. d) Advances in IT make it easier to profile individuals.
D
Which of the following statements is not correct? a) Employees have limited protection against surveillance by employers. b) The large majority of organizations monitor employee Internet usage. c) The large majority of organizations use URL filtering. d) As with normal first-class mail, employers cannot read employee e-mail. e) Employees should be aware that surveillance is legal.
D
______________ determines who is responsible for the actions taken. a) Privacy b) Responsibility c) Transferability d) Accountability e) Liability
D
Ethical issues may be categorized into which of the following types? a) privacy b) accuracy c) property d) accessibility e) all of the above
E
Which of the following is not a step in ethical decision making? a) Recognize the ethical issue. b) Get the facts. c) Evaluate alternative actions. d) Make a decision and test it. e) All of these are steps in ethical decision making.
E
_____ issues involve who may obtain information and how much they should pay for this information. a) Privacy b) Accuracy c) Transferability d) Property e) Accessibility
E
______________ is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems. a) Privacy b) Responsibility c) Transferability d) Accountability e) Liability
E
An ethical issue will fall into only one of four categories: privacy, accuracy, property, or access.
False
An individual or organization faced with an ethical decision is basically considering whether to break the law.
False
An organization that has a code of ethics does not need to devise a separate privacy code.
False
Ethics deals strictly with legal interpretations of what is right and wrong.
False
Every employee in a company may have his or her individual code of ethics.
False
Improvements in information technologies are leading to a decreasing number of ethical problems.
False
In general, employees have high legal protection against surveillance by employers.
False
Information ethics is the question of when, and to what extent, information about you can be gathered and communicated to others.
False
Privacy regulations are basically the same from country to country around the world.
False
The "safe harbor" framework details how the European Union exports data about U.S. citizens.
False
The individual's right of privacy supersedes the public's right to know.
False
The law basically does not support an employer's right to read electronic mail and other electronic documents.
False
The right of privacy is absolute.
False
A code of ethics is a collection of principles that are intended to guide decision making by members of the organization.
True
Derogatory personal information about you that has been posted on the Internet can be very difficult to remove.
True
Ethics is a branch of philosophy that deals with what is considered to be right and wrong.
True
The Platform for Privacy Preferences automatically communicates privacy policies between a commerce Web site and its visitors.
True
The flow of information among countries is called transborder data flows.
True
The opt-out model of informed consent allows a company to collect personal information until the customers specifically requests otherwise.
True
Unethical actions are not necessarily illegal.
True
When you interview for a job at a company, it is likely that the company will Google you and search social networking sites for information on you.
True