mis chapter 4

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

It blurs the traditional boundaries between work and family time.

Which of the following is a primary drawback to the "do anything anywhere" computing environment?

increase in multimedia quality

Which of the following is not one of the current key technology trends that raises ethical issues?

birthplace

Which of the following is not one of the types of information gathered by Web site tracking tools?

It is very inexpensive and can reach so many people.

Which of the following is the primary reason that the practice of spamming has grown exponentially?

Regulated common carriers

________ are not held liable for the messages they transmit.

Behavioral targeting

________ enables advertisers to display more relevant ads based on user's search and browsing history.

Accountability

________ is a feature of social institutions that means mechanisms are in place to determine responsibility for an action.

NORA

________ is a new data analysis technology that finds hidden connections between data in disparate sources.

Profiling

________ is the use of computers to assemble data from different sources to create electronic dossiers of detailed information about individuals.

Responsibility

________ means that you accept the potential costs and obligations for the decisions you make.

The opt-in model

________ prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use.

Copyright law

________ protects the creators of intellectual property from having their work copied by others.

The Privacy Act of 1974

________ restricts the information that the U.S. federal government can collect about an individual and regulates what it can do with the information.

the distinction between an idea and its expression.

"Look and feel" copyright infringement lawsuits are concerned with

intangible property created by individuals or corporations

Which of the following best describes intellectual property?

His action is acceptable, because the higher social value is the survival of the family.

A man steals from a grocery store in order to feed his starving family. Which of the following best expresses the Utilitarian Principle in evaluating this situation?

Kant's Categorical Imperative

A peer at work takes small amounts of office supplies for her own use at home, saying that this is a tiny loss to the company. You tell her that if everyone were to take office supplies, then the loss would no longer be minimal. Your rationale expresses which historical ethical principle?

false

According to several court findings, the general functional features of software are protected by copyright law.

false

Although online tracking gathers an enormous amount of information on individual users, it is anonymous and can't be tied to a specific person.

true

Any intellectual work product that isn't based on public knowledge can be classed as a trade secret.

assigning responsibility.

As discussed in the chapter, all of the following are steps in the process for analyzing an ethical issue except

true

Because of their special claims to knowledge, wisdom, and respect, professionals take on special rights and obligations.

false

COPPA is a set of five principles developed by the FTC that most American and European privacy law is based on.

eyestrain related to computer display screen use.

CVS refers to

it is too expensive to create perfect software.

Companies can't realistically create error-free software because

true

Computer abuse refers to acts involving the computer that may not be illegal but are considered unethical.

on the user's computer.

Cookies created during Web site visits are stored

false

Gaining unapproved access to a computer is not a federal crime.

the mutuality of interest between the record holder and the individual

Which of the following best describes the basis for the FIP principles?

false

Identifying the stakeholders-people who have a vested interest in the outcome of the decision-is the last step in analyzing an ethical issue.

firms should limit the length of time that any personal data is stored to six months or less.

In 2010, the FTC added all of the following recommendations to its privacy guidelines except

true

In recent years, the illegal sharing of music files has declined with the improvement of technological prevention.

opt-out

In the ________ model of informed consent, personal information can be collected until the consumer specifically requests that his or her data not be collected.

false

In today's legal environment, business managers who violate the law through the misuse of information systems are still unlikely to be fully prosecuted.

It has a ripple effect, raising new ethical, social, and political issues.

Which of the following best describes the effect that new information technology has on society?

software products are more easily compared to each other than books.

Key differences between software and books include all of the following except

true

Malicious software that is installed secretly on your computer by other applications and that tracks your online movements is called spyware.

true

Most Internet businesses do very little to protect the privacy of their customers.

the years of waiting to receive it.

One of the drawbacks of patent protection is

true

One of the key concepts in patent law is novelty.

much less stringent than

Privacy protection in the United States is ________ in Europe.

increases in efficiency may be accompanied by job losses.

Re-designing and automating business processes can be seen as a double-edged sword because

If an action is not right for everyone to take, it is not right for anyone to take.

Which of the following describes Immanuel Kant's Categorical Imperative?

false

Software programs were unprotected by copyright law until the early 1990s.

quality of life.

Spamming raises the moral dimension of

information rights and obligations

The central business activities of ChoicePoint raise which of the five moral dimensions?

Risk Aversion Principle.

Taking the action that produces the least harm best describes the

false

The European Parliament has yet to ban unsolicited commercial messaging.

Web sites must disclose their information practices before collecting data.

The Federal Trade Commission FIP principle of Notice/Awareness states that

Digital Millennium Copyright Act

The ________ brought copyright law to the Internet age by outlawing the circumvention of technology-based protections of copyrighted materials.

safe-harbor

The ________ framework developed by the U.S. Department of Commerce allows U.S. businesses to legally use personal data from EU countries.

patent

Which legal mechanism grants the owner exclusive ownership of the ideas behind an invention for 20 years?

everything is owned by someone else, and that the creator wants compensation for this work.

The ethical "no free lunch" rule states that

false

The ethical guideline that asks you to put yourself in the place of others, and think of yourself as the object of the decision, is called the Utilitarian Principle.

digital

The extreme difference among different social groups regarding their access to computers and the Internet is called the ________ divide.

property rights and obligations

The moral dimension of ________ can be described as the obligations that individuals and organizations have concerning rights to intellectual property.

true

The problem with Web browsers' Do Not Track options is that Web sites aren't obligated to honor these settings.

true

The rate of global piracy is approximately 42%.

false

The routine violation of individual privacy is made more difficult by advances in data storage.

grants a monopoly on underlying concepts and ideas.

The strength of patent protection is that it

True

The symptoms of technostress include aggravation and hostility toward humans.

HIPAA

Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed?

RSI

Which of the following ailments is caused by tens of thousands of repetitions under low-impact loads?

true

Web beacons are tiny, invisible software programs hidden in e-mail messages and Web pages that are used to track and report a user's online behavior.

similar to books

When a software product is considered ________, it becomes difficult to hold software producers liable for flaws in their product.


Set pelajaran terkait

ACT CH 2 HW Matching (characteristics, assumptions, principles, and constraint guide the FASB when it creates accounting standards)

View Set

Prep U 260 - Fluid & Electrolytes

View Set

Nevada Statutes and Codes Common to All Lines

View Set

Independent/dependent variable and control group

View Set

Managerial Finance Exam 3 - Kyle Wells

View Set

455 Ch 13 Motivating for Performance

View Set

Digital Marketing Content After Midterm

View Set

Unidad 3, Lección 3: Una lección de geografía

View Set