E-business Management- Ch.8 Ethical, Social, and Political Issues in E-commerce

Ace your homework & exams now with Quizwiz!

Global reach is an e-commerce technology dimensions that has the potential to reduce [....]? in products.

cultural diversity

What involves bypassing the target site's home page and going directly to a content page?

deep linking

The ability to make perfect copies of digital works at little cost is the major reason the Internet has such potential for [...]? traditional conceptions and implementations of intellectual property law

destroying

All of the following statements about [...]? are true: the four types of inventions protected by patent law are machines, manmade products, compositions of matter, and processing methods, computer programs can be patented and to be patented, an invention must be nonobvious.

patents

According to data from Pew Research Center, cleared web browser history and cookies is the action which the highest percentage of Internet users has taken to [.....]?

preserve their privacy online

What operates the largest private personal database in the world?

Acxiom

How long does copyright protection extend for corporate-owned works?

95 years

Nature of the work used, amount of the work used, and market effect of the use are factors that will be considered in determining whether use of copyrighted material is [....]?

"fair use"

What protects original forms of expression in a tangible medium?

Copyright law

All of the following statements about the [.......]? are true: makes it illegal to circumvent technological measures to protect works, requires search engines to block access to infringing sites, and allows libraries to make digital copies of works for internal use only.

Digital Millennium Copyright Act (DMCA)

What requires financial institutions to inform consumers of their privacy policies and permits consumers some control over their records?

Gramm-Leach-Bliley Act

What is a feature of political systems in which a body of law is in place allowing individuals to recover damages done to them by other actors, systems, or organizations?

Liability

What refers to the idea that Internet service providers (ISPs), including cable Internet and wireless carriers, should treat all data on the Internet in the same manner, and not discriminate or price differentially by content, protocol, platform, hardware, or application?

Net neutrality

What asks you to assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise?

No Free Lunch

What allows someone to obtain an exclusive monopoly on the ideas behind an invention for 20 years?

Patent law

What states that when confronted with an ethical dilemma, an individual should take the action that produces the least harm, or the least potential cost?

Risk Aversion

What can be used to record all keyboard activity of a user?

Spyware

What states that, when confronted with an ethical dilemma, individuals should take the action that achieves the greater value for all of society?

The Collective Utilitarian principle

What is the ethical principle that emphasizes putting oneself into the place of others and thinking of oneself as the object of the decision? AND The New York Times test tells you it's wise to assume perfect information markets what?

The Golden Rule

What states that if an action cannot be taken repeatedly, then it is not right to take at all?

The Slippery Slope

What asks you to consider the impact of your decision if the principles underlying your decision became an organizing principle of the entire society?

The Social Contract rule

The following situations would qualify for the fair use exception to [.....]?: A professor clips a newspaper article just before class and distributes copies of it to his class, a journalist quotes a paragraph from a book in a review of the book, and Google posts thumbnail images of books in the Google Book Search Project.

U.S. copyright law

The ethical principle of [...]? states that if an action is not right for all situations, then it is not right for any situation.

Universalism

Social technology is an e-commerce technology dimensions creates greater opportunities for [...]?

cyberbullying

Registering a domain name similar or identical to trademarks of others to divert web traffic to their own sites is an example of [...]?

cyberpiracy

Registering a domain name similar or identical to trademarks of others to extort profits from legitimate holders is an example of [...]?

cybersquatting

The display of a third-party's website or page within your own website is called [.....]? of intellectual property and the challenges involved in protecting it.

framing the various forms

A social consequence of the richness of Internet information is very persuasive messages might reduce the need for multiple [....]? of information.

independent sources

Disputes over federal trademarks involve establishing [...]?

infringement

Registering the domain name "Faceboik.com" with the intent to divert web traffic from people [...]?

misspelling

In the United States, Google (is) [....]? to remove results from its search engine if requested.

not required

Amazon has a patent on [...]? purchasing.

one-click

Choice/Consent of the FTC's Fair Information Practices (FIP) principles requires [.....]? policies to be in place.

opt-in or opt-out

Due process ethical concepts plays an important role in defining what?

privacy

The opt-in model for informed consent [...]? an affirmative action by the consumer before a company can collect and use information.

requires

Facebook.com is an example of [...]?

typosquatting

What can result in work and shopping invading family life?

ubiquity

Downloading a music track owned by a record company without paying for it is an example [.....]?

violation of copyright law

Anonymous re-mailers allow you to send e-mail [.....]?

without a trace

USA PATRIOT Act, Homeland Security Act, and Communications Assistance for Law Enforcement Act is aimed at strengthening the ability of law enforcement agencies to monitor Internet users [.....]?

without their knowledge


Related study sets

vSim Fundamentals | Vernon Russell (Stroke, Aspiration Risks, Final vSim)

View Set

Apprentice Lineman General Knowledge

View Set

How to get 0.5 seconds in Quizlet Match

View Set

Chapter 7 along with other quizlet

View Set

Medsurg endo nclex practice (thyroid)

View Set

Chapter 06: Basic Elements of Planning and Decision Making

View Set