BMIS 311 Chp 4 - FINAL

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

________ is a feature of social institutions that means mechanisms are in place to determine responsibility for an action.

Accountability

Which of the following protects the authors of a book from having their work copied by others?

Copyright law

Which of the following terms refers to significant disparities in access to computers and the Internet among different social groups and different locations?

Digital divide

________ is a feature of law-governed society and involves having laws that are known and understood, along with the ability to appeal to higher authorities to ensure that the laws are applied correctly.

Due process

Which of the following is a primary drawback to the "do anything anywhere" computing environment?

It blurs the traditional boundaries between work and family time

________ means that you accept the potential costs and obligations for the decisions you make.

Responsibility

Which ethical rule states that if an action cannot be taken repeatedly, it is not right to take at all?

Slippery-slope rule

Which of the following restricts the information that the U.S. federal government can collect about an individual and regulates what it can do with the information?

The Privacy Act

Which of the following is the most common reason that business systems fail? A. Data quality B. Hardware failures C. Software errors D. Facilities failures E. Software bugs

data quality

All of the following are technical solutions to protecting user privacy except: A. data use policies. B. e-mail encryption. C. anonymous email. D. preventing client computers from accepting cookies. E. anonymous surfing.

data use policies

The ethical "no free lunch" rule states that:

if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work

In the ________ model of informed consent, personal information can be collected until the consumer specifically requests that his or her data not be collected.

opt-out

Which of the following ethical guidelines suggests that you put yourself in the place of others, and think of yourself as the object of the decision?

the Golden Rule

"Look and feel" copyright infringement lawsuits are concerned with:

the distinction between an idea and its expression

According to ________, you should take the action that produces the least harm.

the risk aversion principle

Which of the following is not an example of the potential dark side of big data? A. Use of a predictive modeling system that predicts life expectancy by using data about individual consumers' buying habits as well as personal and family medical histories. B. Use of computerized systems to filter and hire job applicants. C. Analyzing data from sensors installed in local parks to monitor soil moisture. D. Police visits to individuals whom a computer system identified as likely to commit a crime in the future. E. Use of a device installed in a car to analyze driving habits.

Analyzing data from sensors installed in local parks to monitor soil moisture

Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed?

HIPAA

A man steals from a grocery store in order to feed his starving family. Which of the following best expresses the utilitarian principle in evaluating this situation? A. His action is acceptable, because the grocer suffers the least harm. B. His action is wrong, because the grocery store owner is harmed. C. His action is acceptable, because the higher social value is the survival of the family. D. His action is wrong, because if everyone were to do this, the concept of personal property is defeated. E. His action is wrong, because the man would not want the grocer to steal from him.

His action is acceptable, because the higher social value is the survival of the family

Which of the following best describes Immanuel Kant's categorical imperative? A. One should take the action that produces the least harm or incurs the least cost. B. If an action is not right for everyone to take, it is not right for anyone to take. C. You should act towards others as you would like them to act towards you. D. One can put values in rank order and understand the consequences of various courses of action. E. If an action cannot be taken repeatedly, then it is not right to be taken at any time.

If an action is not right for everyone to take, it is not right for anyone to take

Which of the five moral dimensions of the information age do the central business activities of DoubleClick involve?

Information rights and obligations

Which of the following is not one of the current key technology trends that raises ethical issues? A. Increase in data quality B. Data analysis advancements C. Data storage improvements D. Increase in use of mobile devices E. Advances in networking technology

Increase in data quality

Which of the following best describes the effect that new information technology has on society? A. It has a ripple effect, raising new ethical, social, and political issues. B. It has a dampening effect on the discourse of business ethics. C. It is beneficial for society as a whole, while raising dilemmas for consumers. D. It has a waterfall effect in raising ever more complex ethical issues. E. It has a magnifying effect, creating increasing numbers of ethical issues.

It has a ripple effect, raising new ethical, social, and political issues

The obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within which of the following moral dimensions of the information age?

Quality of life

Which of the following is not true about the changes to EU data protection rules proposed in 2012? A. The new rules would apply only to all companies providing services in Europe. B. The new rules would require Internet companies to obtain explicit consent from consumers for the use of their personal data. C. The new rules would require Internet companies to delete information at the user's request. D. The new rules would reject the right to be forgotten. E. The new rules would require Internet companies to retain information only as long as absolutely necessary.

The new rules would require Internet companies to obtain explicit consent from consumers for the use of their personal data

________ prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use.

The opt-in model

Which of the following best describes how new information systems can result in legal gray areas?

They result in new situations that are not covered by old laws

Which of the following forms of protection of intellectual property requires that the property be the subject of a nondisclosure agreement?

Trade secret

All of the following are steps in the process for analyzing an ethical issue except: A. assigning responsibility. B. identifying the potential consequences of your options. C. identifying the options you can reasonably take. D. identifying the stakeholders. E. identifying and clearly describing the facts.

assigning responsibility

In 2010, the FTC added all of the following recommendations to its privacy guidelines except: A. consumers should be able to review and contest the accuracy and completeness of data. B. firms should require consumer consent and provide clear options to opt out of data collection. C. firms should limit the length of time that any personal data is stored to six months or less. D. firms should increase the transparency of their data collection. E. firms should build products and services that protect privacy

firms should limit the length of time that any personal data is stored to six months or less

Redesigning and automating business processes can be seen as a double-edged sword because:

increases in efficiency may be accompanied by job losses


संबंधित स्टडी सेट्स

Principles of Marketing Chapter 10

View Set

Prep-U Ch. 66: Caring for Clients with Burns

View Set

5.5 Explain privacy and sensitive data concepts in relation to security

View Set

Origins and Insertions (Extensor Pollicis Longus)

View Set

Physics: Power/Energy/Work Last Concepts

View Set

Schizophrenia; Dissociative, Personality, and Eating Disorders

View Set

Chapter 6: Epigenetics and Disease

View Set