MIS Chapter 4 Debbie Ballou
is a private, self-regulating policy and enforcement mechanism that meets the objectives of government regulation or enforcement.
A safe harbor
Which of the following best defines copyright?
A statutory grant that protects creators of intellectual property from having their work copied by others for any purpose during the life of the author plus an additional 70 years after the author's death is a copyright.
is the commission of acts involving a computer that may not be illegal but that are considered unethical.
Computer abuse
Which of the following best describes computer abuse?
Computer abuse is the commission of acts involving a computer that may not be illegal but that are considered unethical.
Judy is a data analyst who spends more than 6 hours a day at her computer. She has been experiencing headaches, blurred vision, and dry and irritated eyes. From which of the following occupational health risk does Judy likely suffer?
Computer vision syndrome
Which of the following refers to the principles of right and wrong that individuals, acting as free moral agents, use to make choices to guide their behaviors?
Ethics
When confronted with a situation that seems to present ethical issues, which steps should you walk through to analyze it?
Identify and describe the facts clearly, define the conflict or dilemma and identify the higher-order values involved, identify the stakeholders, identify the options that you can reasonably take, identify the potential consequences of your options.
Which of the following statements best describes the Immanuel Kant's Categorical Imperative?
If everyone did this, could the organization, or society, survive?
Which answer contains the correct list of moral dimensions of the Information Age?
Information rights and obligations, property rights and obligations, accountability and control, system quality, quality of life
Which statement describes how trade secret laws are limited in their ability to protect intellectual property?
It is difficult to prevent ideas from falling into the public domain.
How does the advent of information technology affect the work-life balance of an employee?
Leisure time has been converted into a time to do work.
Which of the following best describes NORA?
NORA is a new data analysis technology that takes information about people from many disparate sources and correlates relationship to find obscure hidden connections that might help identify criminals or terrorists.
is a new data analysis technology that takes information about people from many disparate sources and correlates relationships to find obscure hidden connections that might help identify criminals or terrorists.
Nonobvious relationship awareness
Which of the following is one of the five moral dimensions of the information age?
Property rights and obligations
What is a Web beacon?
Small software programs that keep a record of users' online clickstream
What is technostress?
Stress induced by computer and cell phone use
Which of the following best describes the Risk Aversion Principle?
Take the action that produces the least harm or the least potential cost.
Which of the following statements best describes the Golden Rule?
The Golden Rule is also known as "Do unto others as you would have them do unto you," this concept can help you think about fairness in decision making.
To take the action that produces the least harm or the least potential cost refers to which ethical principle of conduct?
The Risk Aversion Principle
Which of the following best describes a computer crime?
The intentional destruction of data and other computer components
Christine developed a new software program, copyrighted its source code, and licensed it to her customers to use for a fixed period of time. Which of the following statements holds true in this scenario?
The law protects her against the copying of the entire software program.
Which of the following statements about the social costs of information technology is true?
The traditional boundaries that separate work from family and just plain leisure have been weakened.
One of the characters in this video asks the question: "Are there any laws to keep companies from installing trackers on my computer?" According to his colleague's reply, which of the following statements describes current U.S. law regarding the information Websites can collect and how that information is used?
The Children's Online Privacy Protection Act regulates the collection of personal information on children and bans behavioral advertising to children younger than 13 years of age without parental consent.
Which of the following statements best describe web beacons?
Web beacons are tiny software programs that keep a record of users' online clickstream.
According to this video, the business benefits of behavioral tracking include
all of the answers
This video describes how advertisers use _____ in order to display more relevant ads based on a user's search and browsing history
behavioral tracking
Privacy is the __________.
claim of individuals to be left alone, free from surveillance
Based on the information in this video, all of the activities listed here describe behavioral tracking except
collecting credit card data from online purchases
Information systems affect ethical principles because they
create opportunities for intense social change
Although software bugs and facility catastrophes are likely to be widely reported in the press, by far the most common source of business system failure is
data quality
According to this video, behavioral tracking and targeted ads can be seen as a double-edged sword because
increases in targeted ads may result in higher sales but users may perceive them as a loss of privacy
FIP is a set of principles governing the collection and use of
information about individuals
The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called
profiling
Information systems affect ethical principles because they
raise concerns about the use of intellectual property
The ethical "no free lunch" rule states __________.
that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise
Ethical issues in information systems have been given new urgency by
the rise of the Internet and electronic commerce
The Utilitarian Principle rule assumes __________.
you can prioritize values in a rank order and understand the consequences of various courses of action
What are the basic concepts that form the underpinning of an ethical analysis of information systems and those who manage them?
Responsibility, accountability, liability, and due process