CIS CH 4

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

________ is a feature of social institutions that means mechanisms are in place to determine responsibility for an action. The judicial system The courts of appeal Liability Due process Accountability

Accountability

Which of the following is a primary drawback to the "do anything anywhere" computing environment? It centralizes power at corporate headquarters. It leads to employees being paid less for the total amount of work performed. It makes work environments less pleasant. It creates inequality between workers who have home computing power and those who don't. It blurs the traditional boundaries between work and family time.

Blurs the traditional boundaries between work and family time

Unlike regular browser cookies, Flash cookies are installed only at the user's request. monitor the user's behavior at a Web site. are able to track much more of the user's personal information cannot be easily detected or deleted. are not stored on the user's computer.

Cannot by easily detected or deleted

________ protects the creators of intellectual property from having their work copied by others. Patent protection Fair Use Doctrine Intellectual property law Copyright law Trade Secret law

Copyright Law

The most common reason business systems fail is data quality. software errors. facilities failures. hardware failures. software bugs.

Data Quality

U.S. businesses are allowed to use personal data from EU countries if they have informed consent. register their activities with a central EU government databank. create a safe harbor. develop equivalent privacy protection policies. make their privacy protection policies publicly available.

Develop equivalent privacy protection policies

The extreme difference among different social groups regarding their access to computers and the Internet is called the ________ divide. computer technology electronic digital Internet

Digital

The ________ brought copyright law to the Internet age by outlawing the circumvention of technology-based protections of copyrighted materials.

Digital Millennium Copyright Act

________ is a societal practice of having laws that are known and understood, along with the ability to appeal to higher authorities to ensure that the laws are applied correctly. Liability Accountability Due process The courts of appeal The judicial system

Due Process

The Online Privacy Alliance protects user privacy during interactions with Web sites. encourages self regulation to develop a set of privacy guidelines for its members. is a lobbying organization promoting the online privacy interests of consumers. is a government agency regulating the use of customer information. has established technical guidelines for ensuring privacy.

Encourages self regulation to develop a set of privacy guidelines for its members

The European Parliament has yet to ban unsolicited commercial messaging. True False

False

The ethical guideline that asks you to put yourself in the place of others, and think of yourself as the object of the decision, is called the Utilitarian Principle. True False

False

The routine violation of individual privacy is made more difficult by advances in data storage. True False

False

________ enables advertisers to display more relevant ads based on user's search and browsing history. A Web bug NORA Behavioral targeting FIP An intelligent agent

Behavioral targeting

Which of the following is not one of the types of information gathered by Web site tracking tools? marital status purchases health concerns income birthplace

Birthplace

Cookies created during Web site visits are stored on servers owned by advertising networks. in the browser's application settings. nowhere, because they are only used during a visit and are discarded once a visitor leaves the Web site. on the Web site's server. on the user's computer.

On the user's computer

Which legal mechanism grants the owner exclusive ownership of the ideas behind an invention for 20 years? patent trademark trade secret protection copyright

Patent

A peer at work takes small amounts of office supplies for her own use at home, saying that this is a tiny loss to the company. You tell her that if everyone were to take office supplies, then the loss would no longer be minimal. Your rationale expresses which historical ethical principle? The Golden Rule Kant's Categorical Imperative The slippery-slope rule The Risk Aversion Principle The "No free lunch" rule

Kant's Categorical Imperative

________ is a new data analysis technology that finds hidden connections between data in disparate sources. NORA COPPA FIP HIPAA Spyware

NORA

________ prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use. The FIP set of guidelines P3P A legal safe harbor The opt-in model

Opt-In

_______ is the use of computers to assemble data from different sources to create electronic dossiers of detailed information about individuals. Profiling Phishing Spyware Spamming Targeting

Profiling

The U.S. CAN-SPAM Act of 2003 requires spammers to identify themselves. does not override state anti-spamming laws. makes spamming illegal. does not outlaw the use of fake return addresses. has dramatically cut down spamming.

Requires spammers to identify themselves

_______ means that you accept the potential costs and obligations for the decisions you make. Duty Due process Accountability Liability Responsibility

Responsibility

Taking the action that produces the least harm best describes the Utilitarian Principle. Golden Rule. Risk Aversion Principle. Categorical Imperative. "no free lunch" rule.

Risk Aversion

When a software product is considered ________, it becomes difficult to hold software producers liable for flaws in their product. to be an artistic expression a service a tangible product rather than a service similar to books to be part of a machine

Similar to books

Key differences between software and books include all of the following except it is more difficult to inspect software for flaws. software is less easily inspected than a book. software is understood to be more fallible than a book. software products are more easily compared to each other than books. software contains more information than a book.

Software products are more easily compared to each other than books

________ restricts the information that the U.S. federal government can collect about an individual and regulates what it can do with the information. COPPA The Freedom of Information Act The Privacy Act of 1974 The Gramm-Leach-Bliley Act of 1999 The FIP set of principles

The Privacy Act of 1974

"Look and feel" copyright infringement lawsuits are concerned with using the graphical elements of another product. the distinction between tangible and intangible ideas. the distinction between an idea and its expression. preventing the use of another product's graphical user interface. using the creative elements of another product.

The distinction between an idea and its expression

Any intellectual work product that isn't based on public knowledge can be classed as a trade secret. True False

True

Because of their special claims to knowledge, wisdom, and respect, professionals take on special rights and obligations. True False

True

Computer abuse refers to acts involving the computer that may not be illegal but are considered unethical. True False

True

Copyright is the legal protection afforded intellectual property, including drawings, movies, and maps. True False

True

Ethics describes the principles of right and wrong that can be used by individuals to make choices to guide their behavior. True False

True

In recent years, the illegal sharing of music files has declined with the improvement of technological prevention. True False

True

Liability is a feature of political systems and allows individuals to recover damages done to them by others. True False

True

Malicious software that is installed secretly on your computer by other applications and that tracks your online movements is called spyware. True False

True

One of the key concepts in patent law is novelty. True False

True

The problem with Web browsers' Do Not Track options is that Web sites aren't obligated to honor these settings. True False

True

The rate of global piracy is approximately 42%. True False

True

The symptoms of technostress include aggravation and hostility toward humans. True FalseI

True

Web beacons are tiny, invisible software programs hidden in e-mail messages and Web pages that are used to track and report a user's online behavior. True False

True

The Federal Trade Commission FIP principle of Notice/Awareness states that data collectors must take responsible steps to assure that consumer information is accurate and secure from unauthorized use. there must be a mechanism in place to enforce FIP principles. customers must be allowed to choose how their information will be used for secondary purposes other than the supporting transaction. consumers should be able to review the data collected about them. Web sites must disclose their information practices before collecting data.

Web sites must disclose their information practices before collecting data.

Which of the following best describes the basis for the FIP principles? the difference between the interests of the individual and commercial organizations the accountability of the record holder the responsibility of the record holder the privacy of the individual the mutuality of interest between the record holder and the individual

the mutuality of interest between the record holder and the individual

Software programs were unprotected by copyright law until the early 1990s. True False

False

Spam is legally defined as any e-mail that is unsolicited. True False

False

As discussed in the chapter, all of the following are steps in the process for analyzing an ethical issue except assigning responsibility. identifying the stakeholders. identifying the options you can reasonably take. identifying the potential consequences of your options. identifying and clearly describing the facts.

Assigning responsibility

The ethical "no free lunch" rule states that everything is owned by someone else, and that the creator wants compensation for this work. one can put values in rank order and understand the consequences of various courses of action. anything of value should not be taken. one should take the action that produces the least harm or incurs the least cost. if an action cannot be taken repeatedly, then it is not right to be taken at any time.

Everything is owned by someone else, and that the creator wants compensation for this work.

According to several court findings, the general functional features of software are protected by copyright law. True False

False

Although online tracking gathers an enormous amount of information on individual users, it is anonymous and can't be tied to a specific person. True False

False

COPPA is a set of five principles developed by the FTC that most American and European privacy law is based on. True False

False

Gaining unapproved access to a computer is not a federal crime. True False

False

Identifying the stakeholders-people who have a vested interest in the outcome of the decision-is the last step in analyzing an ethical issue. True False

False

In today's legal environment, business managers who violate the law through the misuse of information systems are still unlikely to be fully prosecuted. True False

False

The strength of patent protection is that it is easy to define. provides a clear distinction between software and books. grants a monopoly on underlying concepts and ideas. allows protection from Internet theft of ideas put forth publicly. puts the strength of law behind copyright.

Grants a monopoly on underlying concepts and ideas

Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed? HIPAA Freedom of Information Act Privacy Protection Act COPPA Gramm-Leach-Bliley Act

HIPAA

A man steals from a grocery store in order to feed his starving family. Which of the following best expresses the Utilitarian Principle in evaluating this situation? His action is acceptable, because the grocer suffers the least harm. His action is wrong, because the grocery store owner is harmed. His action is wrong, because if everyone were to do this, the concept of personal property is defeated. His action is wrong, because the man would not want the grocer to steal from him. His action is acceptable, because the higher social value is the survival of the family.

His action is acceptable because the higher social value is the survival of the family

Which of the following describes Immanuel Kant's Categorical Imperative? One should take the action that produces the least harm or incurs the least cost. If an action is not right for everyone to take, it is not right for anyone to take. You should act towards others as you would like them to act towards you. One can put values in rank order and understand the consequences of various courses of action. If an action cannot be taken repeatedly, then it is not right to be taken at any time.

If an action is not right for everyone to take, it is not right for anyone to take

Re-designing and automating business processes can be seen as a double-edged sword because senior executives may not approve the changes. increases in efficiency may be accompanied by job losses. reliance on technology results in the loss of hands-on knowledge. increases in efficiency may be accompanied by poor data quality. support for middle-management decision making may be offset by poor data quality.

Increases in efficiency may be accompanied by job losses.

The central business activities of ChoicePoint raise which of the five moral dimensions? information rights and obligations property rights and obligations system quality quality of life accountability and control

Information rights and obligations

Which of the following best describes the effect that new information technology has on society? It has a waterfall effect in raising ever more complex ethical issues. It has a magnifying effect, creating increasing numbers of ethical issues. It is beneficial for society as a whole, while raising dilemmas for consumers. It has a dampening effect on the discourse of business ethics. It has a ripple effect, raising new ethical, social, and political issues.

It has a ripple effect, raising new ethical, social, and political issues.

Companies can't realistically create error-free software because errors can be introduced in the maintenance stage of development. many errors are brought on by the user's operating system. any software of any complexity will have errors. any programming code is susceptible to error. it is too expensive to create perfect software.

It is too expensive to create perfect software

Which of the following is the primary reason that the practice of spamming has grown exponentially? It is good advertising practice and brings in many new customers. It helps pay for the Internet. Telephone solicitation is no longer legal. It is very inexpensive and can reach so many people. There are no legal preventions against it.

It is very inexpensive and can reach so many people

As per the ________, if an action cannot be taken repeatedly, it is not right to take at all. lemming rule utilitarian principle Golden Rule high-failure cost rule slippery-slope rule

Lemming Rule

Privacy protection in the United States is ________ in Europe. much less stringent than more far reaching than more liable to laws than at about the same level of strictness as much more stringent than

Much less stringent than

In the information age, the obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within the moral dimension of family and home. quality of life. accountability and control. system quality. property rights and obligations.

Quality of Life

Spamming raises the moral dimension of quality of life. system quality. accountability and control. property rights and obligations. information rights and obligations.

Quality of Life?

Which of the following ailments is caused by tens of thousands of repetitions under low-impact loads? RSI RSS CTS technostress CVS

RSI

The limitation of trade secret protection for software is that it is difficult to prevent the ideas in the work from falling into the public domain when a new version of the software is released. the courts become involved. the software is widely distributed. hackers are able to break into the source code. the software's programming code is released.

The software is widely distributed

One of the drawbacks of patent protection is the years of waiting to receive it. that only the underlying ideas are protected. the limited period of protection. digital media cannot be patented. preventing the ideas from falling into public domain.

The years of waiting to receive it.

Which of the following best describes how new information systems result in legal gray areas? They result in new situations that are not covered by old laws. They are little understood by politicians or lawyers. They are created from sets of logical and technological rules rather than social or organizational mores. They work with networked, electronic data, which are more difficult to control than information stored manually. They are implemented by technicians rather than managers.

They result in new situations that are not covered by old laws

A Facebook users' visit to a Web site can be tracked even if they do not click a Like button. True False

True

CVS refers to a type of antivirus protection software. eyestrain related to computer display screen use. carpal vision syndrome. a business practice that attempts to evaluate the intangible values of computer systems. wrist injuries brought about by incorrect hand position when using a keyboard. 1 points

eyestrain related to computer display screen use.

Which of the following is not one of the current key technology trends that raises ethical issues? increase in multimedia quality advances in networking technology data analysis advancements increase in use of mobile devices data storage improvements

increase in multimedia quality

Which of the following best describes intellectual property? any tangible or intangible property within the creative arts intangible property created by individuals or corporations tangible or intangible property created from a unique idea the expression of an intangible idea unique creative work or ideas

intangible property created by individuals or corporations


Set pelajaran terkait

Biology 223 Chapter 6 Practice Questions

View Set

Praxis Interactive Test ESOL 5362

View Set

Financial Management Study Guide

View Set

FMCSA DOT Physical ME Test Annie

View Set

FON Chapter 22 - Fluids and Electrolytes

View Set

Uppers Downers All Arounders 8th Ed Quiz 1

View Set

Informational vs Analytical Reports

View Set