INFO 3130 Exam 4, Ch 4 Practice

Ace your homework & exams now with Quizwiz!

The four key technical trends responsible for current ethical stresses related to information technology are

(1) doubling of computer power every 18 months, (2) data analysis advances, (3) declining data storage costs, and (4) networking advances and the Internet

Which of the following is NOT one of the five steps discussed in the chapter as a process for analyzing an ethical issue?

Assign responsibility

The most common type of computer-related RSI is

CTS

Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials?

Digital Millennium Copyright Act

Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed?

HIPAA

Steps as a process for analyzing an ethical issue

Identify the stakeholders Identify the options you can reasonably take. Identify and clearly describe the facts.

A colleague of yours frequently takes for his own personal use small amounts of office supplies, noting that the loss to the company is minimal. You counter that if everyone were to take the office supplies, the loss would no longer be minimal. Your rationale expresses which historical ethical principle?

Kant's Categorical Imperative

Which U.S. act restricts the information the federal government can collect and regulates what they can do with the information?

Privacy Act of 1974

A classic ethical dilemma is the hypothetical case of a man stealing from a grocery store in order to feed his starving family. If you used the Utilitarian Principle to evaluate this situation, you might argue that stealing the food is acceptable, because the higher value is the survival of the family.

TRUE

In general, it is very difficult to hold software producers liable for their software products when those products are considered to be similar to books.

TRUE

Most Internet businesses do very little to protect the privacy of their customers.

TRUE

RSI can be induced by tens of thousands of repetitions under low-impact loads.

TRUE

The "do anything anywhere" computing environment can blur the traditional boundaries between work and family time.

TRUE

The European Parliament has passed a ban on unsolicited commercial messaging.

TRUE

The U.S. Department of Commerce developed a safe-harbor framework in order to enable U.S. businesses to legally use personal data from EU countries.

TRUE

The strength of patent protection is that it grants a monopoly on underlying concepts and ideas.

TRUE

Which of the following best describes how new information systems result in legal gray areas?

They result in new situations that are not covered by old laws.

The Federal Trade Commission FIP principle of Notice/Awareness states that

Web sites must disclose their information practices before collecting data.

Techno-stress is

a computer-related malady whose symptoms include fatigue.

NORA is

a new data analysis technology that finds hidden connections between data in disparate sources.

A cookie is

a small file containing information about you and your Web activities that is deposited on your hard disk by a Web site.

The feature of social institutions that means mechanisms are in place to determine responsibility for an action is called

accountability.

FIP principles

are based on the notion of the mutuality of interest between the record holder and the individual.

The Internet has made the protection of intellectual property more difficult

because of the ease of copying and transmitting digitized media.

The P3P standard is concerned with

blocking or limiting cookies.

What legal mechanism protects the owners of intellectual property from having their work copied by others?

copyright law

The most common source of business system failure is

data quality.

Software presents liability problems in terms of legal protections for users because of the

difficulty in classifying its role as a machine, a service, or a book.

The process in law-governed societies in which laws are known and understood and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly is called

due process.

The Online Privacy Alliance

encourages self-regulation to develop a set of privacy guidelines for its members.

The introduction of new information technology has a ripple effect raising new

ethical, social, and political issues

CVS refers to

eyestrain related to computer display screen use.

Two of the three principal sources of poor system performance are

hardware or facility failures and poor input data quality.

Immanuel Kant's Categorical Imperative states that

if an action is not right for everyone to take, it is not right for anyone to take.

Re-designing and automating business processes can be seen as a double-edged sword because

increases in efficiency may be accompanied by job losses

Which of the five moral dimensions of the information age do the central business activities of Choice Point raise?

information rights and obligations

Intellectual property can best be described as

intangible property created by individuals or corporations

The practice of spamming has been growing because

it is so inexpensive and can reach so many people.

When a cookie is created during a Web site visit

it is stored on the visitor's computer

It is not feasible for companies to produce error-free software because

it is too expensive to create perfect software.

Professionals take on special rights and obligations because of their special claims to

knowledge, wisdom, and respect.

The term "digital divide" refers to

large disparities in access to computers and the Internet among different social groups and different locations.

The feature of political systems in which a body of laws is in place that permits individuals to recover the damages done to them by other actors, systems, or organizations is referred to as

liability.

European privacy protection is

much more stringent than in the United States

An ________ model of informed consent permits the collection of personal information until the consumer specifically requests that the data not be collected.

opt-out

The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called

profiling.

In the information age, the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of

property rights and obligations.

The robotics startup you work for has developed an AI-controlled robotic nurse, intended to care for end-of-life patients who are often unconscious. Which of the five moral dimensions does this raise?

quality of life

Which of the five moral dimensions of the information age does spamming raise?

quality of life

In the information age, the obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within the moral dimension of

quality of life.

The U.S. CAN-SPAM Act of 2003

requires spammers to identify themselves

Accepting the potential costs, duties, and obligations for the decisions you make is referred to as

responsibility.

Spyware is

software that comes hidden in downloaded applications and can track your online movements.

Copyright is the legal protection afforded intellectual property, such as a

song, book, or video game.

The ethical "no free lunch" rule states

that everything is owned by someone else, and that the creator wants compensation for this work.

A limitation of trade secret protection for software is

that it is difficult to prevent the ideas in the work from falling into the public domain.

Trade secret law protects

the actual ideas in a work product, not just their manifestations.

Look and feel" copyright infringement lawsuits are concerned with

the distinction between an idea and its expression.

Privacy is

the right to be left alone when you want to be, without surveillance or interference from other individuals or organizations.

One of the difficulties of patent protection is

the years of waiting to receive it.

According to the Risk Aversion Principle

you should take the action that produces the least harm.


Related study sets

Chapter 1, 2, 3 PowerPoint Questions

View Set

Introduction to network week 1 quiz and test

View Set

Chapter 6: Sedimentary Rocks Review

View Set

Interpersonal Communication Ch 3

View Set