Quiz Chapter 4 IS290
Which of the following is the most common reason that business systems fail?
Data quality
Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials?
Digital Millennium Copyright Act
A man steals from a grocery store in order to feed his starving family. Which of the following best expresses the utilitarian principle in evaluating this situation?
His action is acceptable, because the higher social value is the survival of the family.
Which of the following best describes Immanuel Kant's categorical imperative?
If an action is not right for everyone to take, it is not right for anyone to take.
Which of the following is a primary drawback to the "do anything anywhere" computing environment?
It blurs the traditional boundaries between work and family time.
Which of the following best describes the effect that new information technology has on society?
It has a ripple effect, raising new ethical, social, and political issues.
Which of the following is a data analysis technology that finds hidden connections between data in disparate sources?
NORA
Which of the following is not a file-sharing service?
Pandora
Which of the following replaced the U.S. Department of Commerce safe harbor framework that enabled U.S. businesses to legally use personal data from EU countries?
Privacy Shield
Which of the following occurs when muscle groups are forced through tens of thousands of repetitions under low-impact loads?
RSI
Which ethical rule states that if an action cannot be taken repeatedly, it is not right to take at all?
Slippery slope rule
Which of the following is considered the most important U.S. federal statute setting forth conditions for handling information about individuals?
The Privacy Act
________ prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use.
The opt-in model
Which of the following is not a difficulty in establishing patent protection?
The requirement that the work must be a secret
The Online Privacy Alliance:
encourages self-regulation to develop a set of privacy guidelines for its members.
The U.S. CAN-SPAM Act:
requires commercial email senders to identify themselves.
All of the following laws apply to actions by the federal government except:
the Children's Online Privacy Protection Act.
According to ________, you should take the action that produces the least harm.
the risk aversion principle
All of the following are factors in U.S. federal sentencing guidelines with respect to business executives except:
the use of technology to commit the crime.
The FIP principle of Notice/Awareness states that:
websites must disclose their information practices before collecting data.