Final Exam Ch 8
Which of the following situations would not qualify for the fair use exception to U.S. copyright law?
A student copies a photograph of his favorite band from a Web site created by the band's record label and places it on the student's personal Web site.
________ information is demographic and behavioral information that does not include any personal identifiers.
Anonymous
Which of the FTC's Fair Information Practices/FIP principles requires opt-in or opt-out policies to be in place?
Choice/Consent
Which of the following is a core Fair Information Practices/FIP principle?
Choice/Consent
Which of the following does not strengthen the ability of law enforcement agencies to monitor Internet users without their knowledge?
Computer Security Act of 1987
Which of the following authorizes the creation of a second level domain on the Internet where all Web sites have to declare they contain no material harmful to children?
Dot Kids Act
In 1998, the FTC issued its ________ principles, on which it has based its assessments and recommendations for online privacy.
Fair Information Practice/FIP
Which of the following requires financial institutions to inform consumers of their privacy policies and permits consumers some control over their records?
Financial Modernization Act, Graham-Leach-Bliley Act
Which of the FTC's FIP principles requires identification of the collector of data?
Notice/Awareness
________ is currently the most comprehensive technological privacy protection effort.
P3P
________ is a standard designed to communicate to Internet users a Web site's privacy policy, and to compare that policy to the user's own preferences or to other standards.
P3P/Platform for Privacy Preferences
________ is collected data that can be used to identify and locate an individual.
PII
Discuss in depth one ethical, social, or political issue that is presently in the news surrounding the Internet and e-commerce.
Possible topics include privacy issues, intellectual property rights issues like copyright, patents or trademarks, taxation, Internet governance issues, online pornography, gambling, or the sale of cigarettes and drugs.
Which of the following laws prohibits government agents from conducting unannounced searches of press offices and files, if no one in the office is suspected of committing a crime?
Privacy Protection Act of 1980
________ involves the creation of digital images that characterize online individual and group behavior.
Profiling
What is the FTC recommendation regarding choice as it relates to personally identifiable information/P I I?
Require firms to have consumers affirmatively opt-in before P I I is collected.
Which ethical principle states that when confronted with an ethical dilemma, an individual should take the action that produces the least harm, or the least potential cost?
Risk Aversion
Which case was instrumental in paving the way for Internet business methods patents?
State Street Bank & Trust Co. v. Signature Financial Group. Inc.
Which privacy protection program has the Federal Trade Commission/FTC approved as a safe harbor under COPPA?
TRUSTe children's privacy seal
Which ethical principle states that, when confronted with an ethical dilemma, individuals should take the action that achieves the greater value for all of society?
The Collective Utilitarian Principle
Which ethical principle emphasizes putting oneself into the place of others and thinking of oneself as the object of the decision?
The Golden Rule
Which ethical principle tells you that it is wise to assume perfect information markets?
The New York Times Test
Under the ________ Act, American intelligence authorities are permitted to tap into whatever Internet traffic they believe is relevant to the campaign against terrorism, in some circumstances without judicial review.
USA Patriot /Patriot
The three basic principles that all ethical schools of thought in western culture share are responsibility, liability, and ________.
accountability
Which of the following technologies allows you to send e-mail without a trace?
anonymous remailing
Downloading music tracks owned by record companies without paying for them is an example of a violation of:
copyright law.
Registering a domain name similar or identical to trademarks of others to divert Web traffic to their own sites is an example of:
cyberpiracy.
Registering a domain name similar or identical to trademarks of others to extort profits from legitimate holders is an example of:
cybersquatting.
Which of the following uses software installed at the ISP level to track all user clickstream behavior?
deep packet inspection
Over which of the following does ICANN have authority?
domain name system
Which of the following basic ethical concepts plays an important role in defining privacy?
due process
The doctrine of ________ permits teachers and writers to use copyrighted materials without permission under certain circumstances.
fair use
The display of a third-party's Web site or page within your own Web site is called:
framing
All of the following are factors that will be considered in determining whether use of copyrighted material is "fair use" except the:
free availability of the work on the Web.
Which of the following e-commerce technology dimensions has the potential to reduce cultural diversity in products?
global reach
The four major dimensions of e-commerce ethical, social, and political issues are public safety and welfare; property rights; information rights; and ________.
governance
Disputes over federal trademarks involve establishing:
infringement.
What is not a true statement about patents
it is more difficult to obtain a copyright than it is to obtain a patent.
The placing of a cookie on a user's hard drive by one site that is then used by another site to sell that user related products without the knowledge of the user is:
legal in the United States but illegal in Europe.
privacy
moral right of individuals to be left alone, free from surveillance, or interference from other individuals or organizations.
The issue of ________ pits those who wish that all Internet traffic is given equal backbone access against telephone and cable companies who would like to charge differentiated prices based on bandwidth and fees paid.
net neutrality
Amazon has a patent on:
one-click purchasing.
Which of the following allows someone to obtain an exclusive monopoly on the ideas behind an invention for 20 years?
patent law
The use of another party's trademarks as a meta tag is:
permitted only if the use does not mislead or confuse consumers.
Google's G mail advertising has raised concerns about which of the following issues?
privacy
online privacy seal programs
publicize the existence of online privacy seal programs that make it easier for U.S. chamber of commerce member to engage in e-commerce. Seal is a recognizable emblem on a website, which signifies that the site has met recognized industry privacy requirements.
In Western culture, the basic principles shared by ethical schools of thought are:
responsibility, liability, and accountability.
A(n) ________ is a private self-regulating policy and enforcement mechanism that meets the objectives of government regulators and legislation, but does not involve government regulation or enforcement.
safe harbor
private industry self-regulation
safe harbor programs - private policy mechanism to meet objectives of government regulations without government involvement. Privacy seal programs like TRUSTe. Industry associations include: OPA, NAI, ad choices program. Privacy advocacy groups. Emerging privacy protection business reputation.com, avira social network protection.
Which of the following tools do companies use to track user statements and views on newsgroups, chat groups, and other public forums?
search engines
Which of the following e-commerce technology dimensions creates greater opportunities for cyberbullying?
social technology
All of the following are possible penalties for violating the Digital Millennium Copyright Act/DMCA except:
ten years imprisonment for a first offense
What is not a true statement about the DMCA
the DMCA makes Internet Service Provider, ISP's, responsible and accountable for hosting Web sites or providing services to infringers regardless of whether the ISP is aware of infringement.
information privacy
the right to be forgotten. certain information should not be collected, individuals should control the use of whatever information is being collected about them. behavioral tracking on the internet, social sites and mobile devices
FTC's fair information practices
they are guidelines, not laws. used to base assessments and make recommendations. Sometimes used as a basis for laws, COPPA. Fair information practice principles remember CANSER: notice, choice, access, security, enforcement, restricted collection.
Single words, pictures, shapes, packaging, and colors used to identify and distinguish goods are protected under ________ law.
trademark
Registering the domain name gooogle.com with the intent to divert Web traffic from people misspelling google.com is an example of:
typosquatting.
The _______ of Internet and Web technology can result in work and shopping invading family life.
ubiquity
All the following are common techniques used to gather personal information on the Internet except:
weblining.