LIS5487 Chapter 4 Quiz Questions

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

The feature of social institutions that means mechanisms are in place to determine responsibility for an action is called:

Accountability

What legal mechanism protects the owners of intellectual property from having their work copied by others

Copyright law

Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed

HIPAA

The most common source of business system failure is

data quality

The GDPR created a _______________________ framework in order to enable US businesses to legally use personal data from EU countries. a) COPPA b) P3P c) PGP d) FIP e) safe harbor

e) safe harbor

The Online Privacy Alliance

encourages self regulation to develop a set of privacy guidelines for its members

European privacy protection is ________ than in the United States

much more stringent

The U.S. CAN-SPAM Act of 2003

requires spammers to identify themselves

CVS refers to:

yestrain related to computer display screen use

A classic ethical dilemma is the hypothetical case of a man stealing from a grocery store in order to feed his starving family. If you used the Utilitarian Principle to evaluate this situation, you might argue that stealing the food is

acceptable, because the higher value is the survival of the family

The obligations that individuals and organizations have concerning rights to intellectual property involve which of the following moral dimensions of the information age? a) information rights and obligations b) Accountability and control c) Quality of life d) System Quality e) Property rights and obligations

e) Property rights and obligations

Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials

Digital Millennium Copyright Act

The practice in law-governed societies in which laws are known and understood, and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly is called: a) Due process b) liability c) the judicial system d) responsibility e) accountability

a) Due process

Which of the following ethical guidelines suggest that you put yourself in place of others and think of yourself as the object of the decision? a) The Golden Rule b) The "no free lunch" rule c) Kant's categorical imperative d) the utilitarian principle e) the risk aversion principle

a) The Golden Rule

Flash cookies are different from ordinary cookies in that they

cannot be easily detected or deleted

Which of the following is not a US federal law affecting private institutions? a) COPPA b) Gramm-Leach-Billiey Act c) Video privacy protection act d) Computer-Matching and privacy protection act e) HIPAA

d) Computer-Matching and privacy protection act

U.S. businesses are allowed to use personal data from EU countries if they

develop equivalent privacy protection policies

The term "________ divide" refers to large disparities in access to computers and the Internet among different social groups and different locations

digital

The ethical "no free lunch" rule states that

everything is owned by someone else, and that the creator wants compensation for this work

The strength of patent protection is that it

grants a monopoly on underlying concepts and ideas

Immanuel Kant's Categorical Imperative states that

if an action is not right for everyone to take, it is not right for anyone to take

All of the following are current key technology trends raising ethical issues except

increase in multimedia quality

Intellectual property can best be described as

intangible property created by individuals or corporations

FIP principles are based on the notion of the

mutuality of interest between the record holder and the individual

NORA is a

new data analysis technology that finds hidden connections between data in disparate sources

When a cookie is created during a Web site visit, it is stored

on the visitor's computer

The ________ model prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use.

opt-in

A(n) ________ grants the owner an exclusive monopoly on the ideas behind an invention for 20 years.

patent

The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called

profiling

In the information age, the obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within the moral dimension of:

quality of life

Accepting the potential costs, duties, and obligations for the decisions you make is referred to as:

responsibility

The introduction of new information technology has a

ripple effect, raising new ethical, social, and political issues

"Look and feel" copyright infringement lawsuits are concerned with:

the distinction between an idea and its expression

Descartes' rule of change, that if an action cannot be taken repeatedly, it is not right to take at all, is also known as:

the slippery-slope rule

Which of the following statements about cookies is NOT true? a) Cookies are installed only at the user's request. b) Cookies can be combined with other website data to develop detailed profiles of customers. c) Cookies cannot be easily detected or deleted. d) Cookies are stored on the user's computer. e) Cookies are used to support the user experience on websites.

a) Cookies are installed only at the user's request.

Which of the following is NOT true about the changes to the EU data protection rules enacted by the GDPR? a) The new rules do not allow consumers to have their data removed from company servers. b) The new rules require Internet companies to obtain explicit consent from consumers for the use of their personal data. c) The new rules strengthen the right to be forgotten. d) The new rules require Internet companies to delete information at the user's request. e) The new rules require Internet companies to retain information only as long as absolutely necessary.

a) The new rules do not allow consumers to have their data removed from company servers.

Advertisers use ________ in order to display more relevant ads based on user's search and browsing history.

behavioral targeting

Types of information gathered by Web site tracking tools include all of the following except

birthplace

The "do anything anywhere" computing environment can

blur the traditional boundaries between work and family time

________ are not held liable for the messages they transmit

Regulated common carriers

According to the ________, you should take the action that produces the least harm

Risk Aversion Principle

The Federal Trade Commission FIP principle of Notice/Awareness states that:

Web sites must disclose their information practices before collecting data

In 2010, the FTC added all of the following recommendations to its privacy guidelines EXCEPT: a) consumers should be able to review and contest the accuracy and completeness of data. b) firms should limit the length of time that any personal data is stored to six months or less. c) firms should build products and services that protect privacy. d) firms should require consumer consent and provide clear options to opt out of data collection. e) firms should increase the transparency of their data collection.

b) firms should limit the length of time that any personal data is stored to six months or less.

Which of the following is NOT a difficulty in establishing a patent protection? a) Length of time required to receive protection b) The requirement that the work must be novel c) The requirement that the work reflect some special understanding and contribution d) The requirement that the work must be a secret e) The requirement that the work must be original

d) The requirement that the work must be a secret

Which of the following restricts the information that the US Federal government can collect about an individual and regulates what it can do with the information? a) COPPA b) The Freedom of Information Act c) The Gram-Leach-Billiey Act d) HIPAA e) The Privacy Act of 1974

e) The Privacy Act of 1974

Which of the following protects the authors of a book from having their work copied by others? a) patent protection b) Trade secret law c) due process d) Fair use doctrine e) copyright law

e) copyright law

A(n) ________ model of informed consent permits the collection of personal information until the consumer specifically requests that the data not be collected. a) P3P b) safe harbor c) PGP d) opt-in e) opt-out

e) opt-out

Re-designing and automating business processes can be seen as a double-edged sword

increases in efficiency may be accompanied by job losses

The practice of spamming has been growing because

it is so inexpensive and can reach so many people

It is not feasible for companies to produce error-free software because

it is too expensive to create perfect software

In general, it is very difficult to hold software producers liable for their software products when those products are considered to be

similar to books

The limitation of trade secret protection for software is that it is difficult to prevent the ideas in the work from falling into the public domain when:

the software is widely distributed

One of the drawbacks of patent protection is

the years of waiting to receive it

Which of the following statements does not describe a key difference between software and books?

Software products are more easily compared to each other than books.

Which of the following is not one of the five steps discussed in the chapter as a process for analyzing an ethical issue

Assign responsibility

Which of the five moral dimensions of the information age do the central business activities of ChoicePoint raise

Information rights and obligations

A colleague of yours frequently takes, for his own personal use, small amounts of office supplies noting that the loss to the company is minimal. You counter that if everyone were to take office supplies the loss would no longer be minimal. Your rationale expresses which historical ethical principle?

Kant's Categorical Imperative

Which of the five moral dimensions of the information age does spamming raise?

Quality of life

________ can be induced by tens of thousands of repetitions under low-impact loads.

RSI

Which of the following best describes how new information systems result in legal gray areas?

They result in new situations that are not covered by old laws


Set pelajaran terkait

Pharm 5: Administering Injections

View Set

EAQ Psych - Mental Health Disorders

View Set

Chapter 11 Consumer Behavior - attitudes

View Set

Industrial Electronics Chapter 7 [Servo Motors]

View Set