CIS 365-Q4
All of the following are steps in the process for analyzing an ethical issue except: assigning responsibility. identifying the stakeholders. identifying the options you can reasonably take. identifying and describing the facts clearly. identifying the potential consequences of your options.
a
The Network Advertising Initiative is an industry association that: has developed privacy policies to help consumers opt out of advertising network programs and provide consumers redress from abuses. protects user privacy during interactions with websites. has established technical guidelines for ensuring privacy. regulates the use of customer information by firms. is a safe harbor program established by the U.S. government.
a
The use of computers to assemble data from different sources to create digital dossiers of detailed information about individuals is known as which of the following? Profiling Phishing Spamming Targeting Spyware
a
Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials? Digital Millennium Copyright Act Privacy Act Freedom of Information Act Electronic Communications Privacy Act Computer Software Copyright Act
a
A man steals from a grocery store in order to feed his starving family. Which of the following best expresses the utilitarian principle in evaluating this situation? His action is acceptable, because the grocer suffers the least harm. His action is acceptable, because the higher social value is the survival of the family. His action is wrong, because the man would not want the grocer to steal from him. His action is wrong, because if everyone were to do this, the concept of personal property is defeated. His action is wrong, because the grocery store owner is harmed.
b
The U.S. CAN-SPAM Act: makes spamming illegal. requires commercial email senders to identify themselves. has dramatically cut down spamming. makes it difficult for recipients to remove their names from email lists. does not outlaw the use of fake return addresses.
b
Which of the following best describes how new information systems can result in legal gray areas? They work with networked, digital data, which are more difficult to control than information stored manually. They result in new situations that are not covered by old laws. They are implemented by technicians rather than managers. They are created from sets of logical and technological rules rather than social or organizational mores. They are little understood by politicians or lawyers.
b
Which of the following protects the authors of a book from having their work copied by others? Patent protection Due process Copyright law Fair Use Doctrine Trade Secret law
c
The ethical no-free-lunch rule states that: if an action cannot be taken repeatedly, then it is not right to be taken at any time. one should take the action that produces the least harm or incurs the least cost. one can put values in rank order and understand the consequences of various courses of action. if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work. if an action is not right for everyone to take, it is not right for anyone to take.
d
Which of the following best describes Immanuel Kant's categorical imperative? If an action cannot be taken repeatedly, then it is not right to be taken at any time. One should take the action that produces the least harm or incurs the least cost. One can put values in rank order and understand the consequences of various courses of action. If an action is not right for everyone to take, it is not right for anyone to take. You should act towards others as you would like them to act towards you.
d
Which of the following forms of protection of intellectual property requires that the property be the subject of a nondisclosure agreement? Copyright Patent All forms of intellectual property protection Trademark Trade secret
e
Which of the following were involved in what has been called the patent trial of the century? Apple and Microsoft Apple and Hewlett-Packard Microsoft and Symantec Microsoft and Facebook Apple and Samsung
e
Which of the following ethical guidelines suggests that you put yourself in the place of others, and think of yourself as the object of the decision? Kant's categorical imperative the risk aversion principle the utilitarian principle the Golden Rule the no-free-lunch rule
d
FIP principles are based on a belief in which of the following? Accountability of the record holder Responsibility of the record holder Mutuality of interest between the record holder and the individual Privacy of the individual Difference between the interests of the individual and commercial organizations
d (not right answer)
When a cookie is created during a website visit, it is stored: on the website's server. on the hard drive of the visitor's computer. on the ISP's servers. in the browser's application settings. nowhere, because they are only used during a visit and are discarded once a visitor leaves the website.
e (not right answer)