MIS Chapter 4
intellectual property
A photo you have taken of your family is considered ______________, and is protected by law.
data analysis advances
A store printing out receipts based on your buying patterns is related to the trend, ___________, where technology trends raise ethical issues.
Immanuel Kant's Categorial Imperative
Action is not right for everyone to take, it is not right for anyone refers to?
web bug
Another common name for a web beacon is a ____________, which tracks user activities.
70
Copyright is protected throughout the life of the author plus an additional ______ years after the author's death.
Leisure time has been converted into a time to do work.
How does the advent of information technology affect the work-life balance of an employee?
informed consent
If you want to collect data (i.e., photos) from someone and use the data, you must obtain _____________.
property rights and obligations
In the information age, the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of ________.
they raise concerns about the use of intellectual property
Information systems affect ethical principles because __________.
Nearly 80 percent of the Internet searches conducted use ___________, which makes it the largest data repository in history.
ethics
Principles of right and wrong that you use to make choices are called _____________.
Websites must disclose their information practices before collecting data.
The Federal Trade Commission Fair Information Practice principle of Notice/Awareness states that:
Golden Rule
The ethical principle that calls for hypothetically walking in the other person's shoes before making a decision is called the ______________.
utilitarian principle
The ethical principle that calls ranking alternatives before making a decision is called the ______________.
The Utilitarian Principle
To take the action that achieves the higher or greater value refers to which ethical principle of conduct?
The Risk Aversion Principle
To take the action that produces the least harm or the least potential cost refers to which ethical principle of conduct?
mobile device growth impact
Tracking your movements without consent is most related to the trend, ___________, where technology trends raise ethical issues.
Fair Information Practices
United States privacy laws are largely based on the _________________ report.
computerized targeting
Using an algorithm to potentially determine people with shorter commute are more likely to stay in a job longer than those with longer computes could be part of _________________ that filters applicants.
no free
When thinking about downloading and using a photo off the Internet, don't forget the ethical __________ lunch rule.
On the visitor's computer
Where is a cookie that is created during a Web site visit stored?
Privacy Act of 1974
Which U.S. act restricts the information the federal government can collect and regulates what it can do with the information?
HIPAA
Which government act was enacted in 1996 to protect your medical records?
Medical records
Which is NOT a way in which NORA technology can create a detailed dossier of a person?
Intangible property created by individuals or corporations
Which is the BEST description of intellectual property?
Selling the information to an external organization
Which of the following actions from this scenario typically raises an ethical concern?
Digital Millennium Copyright Act
Which of the following adjusts copyright laws to the Internet age by making it illegal to make, distribute, or use devices that circumvent technology-based protections of copyrighted materials?
The claim of individuals to be left alone, free from surveillance
Which of the following best describes privacy?
Protection of personal privacy
Which of the following ethical issues in information systems has become a greater concern because of the rise of the Internet?
Affected people start to behave like computers, devoid of emotions.
Which of the following is FALSE about techno stress?
It outlaws unsolicited commercial messaging.
Which of the following is FALSE about the U.S. CAN-SPAM Act of 2003?
It is based only on having fair access to digital technology.
Which of the following is FALSE about the digital divide in the U.S.?
It is difficult to prevent ideas from falling into the public domain.
Which of the following is a limitation to protecting intellectual property through trade secret laws?
The ability to track user information based on browsing data
Which of the following is a threat posed by the Internet to individual privacy?
Organizations selling consumer profiles to other organizations
Which of the following is an ethical concern due to the advances in data analysis techniques?
Access to confidential information
Which of the following is an ethical issue caused by the advancement in data storage techniques?
Dependence on systems and increased vulnerability to system errors and poor data quality
Which of the following is an ethical issue caused by the doubling of computer power every 18 months?
Redesigning business processes has caused many employees to lose their jobs.
Which of the following is an impact of information technology on employment?
The traditional boundaries that separate work from family and just plain leisure have been weakened.
Which of the following is true about the social costs of information technology?
The law protects her against the copying of the entire software program.
Which of the following statements holds true in this scenario?
Ownership of computers and digital devices has broadened, but the digital divide still exists.
Which of the following statements is true about equality in access to information technology?
Individual claims to privacy are threatened by the cheap availability of information.
Which of the following statements is true about privacy and freedom in the Internet age?
Web beacons
__________ are tiny software programs that keep a record of users' online clickstream.
The Golden Rule
__________ is putting yourself into the place of others and thinking of yourself as the object of the decision.
Ethics
______________ refers to the principles of right and wrong that individuals use to make choices to guide their behaviors.
Liability
____________________ involves examining laws on the books that provide individuals and companies the opportunity to recover damages caused by others.
computer abuse
is the commission of acts involving a computer that may not be illegal but that are considered unethical
the ethical "no free lunch" rule
the principle that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise refers to which ethical principle of conduct?
Accountability
____________________ involves determining who is responsible for actions taken.