MIS Chapter 4 Debbie Ballou

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

is a private, self-regulating policy and enforcement mechanism that meets the objectives of government regulation or enforcement.

A safe harbor

Which of the following best defines copyright?

A statutory grant that protects creators of intellectual property from having their work copied by others for any purpose during the life of the author plus an additional 70 years after the author's death is a copyright.

is the commission of acts involving a computer that may not be illegal but that are considered unethical.

Computer abuse

Which of the following best describes computer abuse?

Computer abuse is the commission of acts involving a computer that may not be illegal but that are considered unethical.

Judy is a data analyst who spends more than 6 hours a day at her computer. She has been experiencing headaches, blurred vision, and dry and irritated eyes. From which of the following occupational health risk does Judy likely suffer?

Computer vision syndrome

Which of the following refers to the principles of right and wrong that individuals, acting as free moral agents, use to make choices to guide their behaviors?

Ethics

When confronted with a situation that seems to present ethical​ issues, which steps should you walk through to analyze​ it?

Identify and describe the facts​ clearly, define the conflict or dilemma and identify the​ higher-order values​ involved, identify the​ stakeholders, identify the options that you can reasonably​ take, identify the potential consequences of your options.

Which of the following statements best describes the Immanuel Kant's Categorical Imperative?

If everyone did this, could the organization, or society, survive?

Which answer contains the correct list of moral dimensions of the Information​ Age?

Information rights and​ obligations, property rights and​ obligations, accountability and​ control, system​ quality, quality of life

Which statement describes how trade secret laws are limited in their ability to protect intellectual property?

It is difficult to prevent ideas from falling into the public domain.

How does the advent of information technology affect the work-life balance of an employee?

Leisure time has been converted into a time to do work.

Which of the following best describes NORA?

NORA is a new data analysis technology that takes information about people from many disparate sources and correlates relationship to find obscure hidden connections that might help identify criminals or terrorists.

is a new data analysis technology that takes information about people from many disparate sources and correlates relationships to find obscure hidden connections that might help identify criminals or terrorists.

Nonobvious relationship awareness

Which of the following is one of the five moral dimensions of the information age?

Property rights and obligations

What is a Web​ beacon?

Small software programs that keep a record of​ users' online clickstream

What is​ technostress?

Stress induced by computer and cell phone use

Which of the following best describes the Risk Aversion Principle?

Take the action that produces the least harm or the least potential cost.

Which of the following statements best describes the Golden Rule?

The Golden Rule is also known as "Do unto others as you would have them do unto you," this concept can help you think about fairness in decision making.

To take the action that produces the least harm or the least potential cost refers to which ethical principle of conduct?

The Risk Aversion Principle

Which of the following best describes a computer crime?

The intentional destruction of data and other computer components

Christine developed a new software program, copyrighted its source code, and licensed it to her customers to use for a fixed period of time. Which of the following statements holds true in this scenario?

The law protects her against the copying of the entire software program.

Which of the following statements about the social costs of information technology is true?

The traditional boundaries that separate work from family and just plain leisure have been weakened.

One of the characters in this video asks the​ question: "Are there any laws to keep companies from installing trackers on my​ computer?" According to his​ colleague's reply, which of the following statements describes current U.S. law regarding the information Websites can collect and how that information is​ used?

The​ Children's Online Privacy Protection Act regulates the collection of personal information on children and bans behavioral advertising to children younger than 13 years of age without parental consent.

Which of the following statements best describe web beacons?

Web beacons are tiny software programs that keep a record of users' online clickstream.

According to this​ video, the business benefits of behavioral tracking include

all of the answers

This video describes how advertisers use​ _____ in order to display more relevant ads based on a​ user's search and browsing history

behavioral tracking

Privacy is the __________.

claim of individuals to be left alone, free from surveillance

Based on the information in this​ video, all of the activities listed here describe behavioral tracking except

collecting credit card data from online purchases

Information systems affect ethical principles because they

create opportunities for intense social change

Although software bugs and facility catastrophes are likely to be widely reported in the​ press, by far the most common source of business system failure is​

data quality

According to this​ video, behavioral tracking and targeted ads can be seen as a​ double-edged sword because

increases in targeted ads may result in higher sales but users may perceive them as a loss of privacy

FIP is a set of principles governing the collection and use of

information about individuals

The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called

profiling

Information systems affect ethical principles because they

raise concerns about the use of intellectual property

The ethical "no free lunch" rule states __________.

that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise

Ethical issues in information systems have been given new urgency by

the rise of the Internet and electronic commerce

The Utilitarian Principle rule assumes __________.

you can prioritize values in a rank order and understand the consequences of various courses of action

What are the basic concepts that form the underpinning of an ethical analysis of information systems and those who manage​ them?

​Responsibility, accountability,​ liability, and due process


Set pelajaran terkait

JS225 Object Oriented JavaScript

View Set

Oxygenation & Perfusion - Multiple Choice Quiz

View Set

Legislative and Executive Test (MCQ)

View Set

WHOLE TEST answers and study guide

View Set

Foundations Chapter 3 - The World Marketplace

View Set

Perry chapter 31: SIDS and Immunizations

View Set