OMIS Chapter 4

Ace your homework & exams now with Quizwiz!

Which of the following is the most common reason that business systems fail? a. Data quality b. Hardware failures c. Facilities failures d. Software bugs e. Software errors

Data quality

________ is a feature of law-governed society and involves having laws that are known and understood, along with the ability to appeal to higher authorities to ensure that the laws are applied correctly. a. The judicial system b. Due process c. Responsibility d. Accountability e. Liability

Due process

________ is a feature of social institutions that means mechanisms are in place to determine responsibility for an action. a. Accountability b. Liability c. Due process d. The courts of appeal e. The judicial system

Accountability

A man steals from a grocery store in order to feed his starving family. Which of the following best expresses the utilitarian principle in evaluating this situation? a. His action is wrong, because the man would not want the grocer to steal from him. b. His action is wrong, because the grocery store owner is harmed. c. His action is acceptable, because the higher social value is the survival of the family. d. His action is acceptable, because the grocer suffers the least harm. e. His action is wrong, because if everyone were to do this, the concept of personal property is defeated.

His action is acceptable, because the higher social value is the survival of the family.

Which of the following is not one of the current key technology trends that raises ethical issues? a. Data storage improvements b. Advances in networking technology c. Increase in data quality d. Increase in use of mobile devices e. Data analysis advancements

Increase in data quality

Which of the five moral dimensions of the information age do the central business activities of DoubleClick involve? a. Accountability and control b. Quality of life c. Property rights and obligations d. System quality e. Information rights and obligations

Information rights and obligations

Which of the following best describes the effect that new information technology has on society? a. It has a magnifying effect, creating increasing numbers of ethical issues. b. It is beneficial for society as a whole, while raising dilemmas for consumers. c. It has a waterfall effect in raising ever more complex ethical issues. d. It has a dampening effect on the discourse of business ethics. e. It has a ripple effect, raising new ethical, social, and political issues.

It has a ripple effect, raising new ethical, social, and political issues

A colleague at work takes small amounts of office supplies for her own personal use, saying that this is a tiny loss to the company. You tell her that if everyone were to take office supplies, then the loss would no longer be minimal. Your rationale expresses which of the following ethical principles? a. The "No free lunch" rule b. The Golden Rule c. The Risk Aversion Principle d. The slippery-slope rule e. Kant's Categorical Imperative

Kant's Categorical Imperative

What percent of global Internet users use Google Search and other Google services such as YouTube? a. About 50 percent b. Nearly 80 percent c. Over 90 percent d. Around 25 percent e. Less than 10 percent

Nearly 80 percent

The obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within which of the following moral dimensions of the information age? a. Property rights and obligations b. System quality c. Quality of life d. Accountability and control e. Family and home

Quality of life

Which of the five moral dimensions of the information age does the weakening of boundaries between work and family life involve? a. Quality of life b. Information rights and obligations c. Property rights and obligations d. System quality e. Accountability and control

Quality of life

________ are not held liable for the messages they transmit. a. European ISPs b. Regulated common carriers c. Elected officials d. Organizations and businesses e. Private individuals

Regulated common carriers

Which of the following is not an example of the moral dimensions of the information age identified in the text? a. Information rights and obligations b. System quality c. Quality of life d. Accountability and control e. The emergence of giant tech firms that dominate their markets

The emergence of giant tech firms that dominate their markets

________ allows an organization to collect personal information without the user's explicit consent. a. P3P b. FIP principles c. The opt-in model d. The opt-out model e. A safe harbor

The opt-out model

Which of the following is not a difficulty in establishing patent protection? a. Length of time required to receive protection b. The requirement that the work reflect some special understanding and contribution c. The requirement that the work must be original d. The requirement that the work must be novel e. The requirement that the work must be a secret

The requirement that the work must be a secret

Which of the following forms of protection of intellectual property requires that the property be the subject of a nondisclosure agreement? a. All forms of intellectual property protection b. Trade secret c. Copyright d. Patent e. Trademark

Trade secret

All of the following are steps in the process for analyzing an ethical issue except: a. identifying and clearly describing the facts. b. assigning responsibility. c. identifying the potential consequences of your options. d. identifying the stakeholders. e. identifying the options you can reasonably take.

assigning responsibility.

Advertisers use ________ in order to display more relevant ads based on a user's search and browsing history. a. FIP principles b. Web bugs c. NORA d. behavioral targeting e. intelligent agents

behavioral targeting

All of the following are technical solutions to protecting user privacy except: a. data use policies. b. anonymous email. c. anonymous surfing. d. preventing client computers from accepting cookies. e. email encryption.

data use policies

Digital media differs from a physical book in all of the following ways except: a. ease of global distribution. b. ease of establishing uniqueness. c. ease of replication. d. ease of alteration. e. ease of transmission.

ease of establishing uniqueness

The Network Advertising Initiative is an industry association that: a. encourages self-regulation to develop a set of privacy guidelines for its members. b. has established technical guidelines for ensuring privacy. c. regulates the use of customer information by firms. d. protects user privacy during interactions with websites. e. is a safe harbor program established by the U.S. government.

encourages self-regulation to develop a set of privacy guidelines for its members.

The ethical "no free lunch" rule states that: a. if an action is not right for everyone to take, it is not right for anyone to take. b. one can put values in rank order and understand the consequences of various courses of action. c. if an action cannot be taken repeatedly, then it is not right to be taken at any time. d. one should take the action that produces the least harm or incurs the least cost. e. if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work.

if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work

Redesigning and automating business processes can be seen as a double-edged sword because: a. it can concentrate power in the hands of senior executives. b. support for middle-management decision making may be offset by poor data quality. c. increases in efficiency may be accompanied by job losses. d. reliance on technology results in the loss of hands-on knowledge. e. increases in efficiency may be accompanied by poor data quality.

increases in efficiency may be accompanied by job losses

When a cookie is created during a website visit, it is stored: a. on the hard drive of the visitor's computer. b. in the browser's application settings. c. on the website's server. d. nowhere, because they are only used during a visit and are discarded once a visitor leaves the website. e. on the ISP's servers.

on the hard drive of the visitor's computer

In the ________ model of informed consent, personal information cannot be collected until the consumer specifically agrees that his or her data can be collected. a. opt-in b. safe harbor c. P3P d. PGP e. opt-out

opt-in

According to ________, you should take the action that produces the least harm. a. Kant's categorical imperative b. the risk aversion principle c. the "no free lunch" rule d. the Golden Rule e. the utilitarian principle

the risk aversion principle

________ grants the owner exclusive ownership of the ideas behind an invention for 20 years. a. Privacy law b. Patent law c. Trademark law d. Copyright law e. Trade secret protection

Patent law

The use of computers to assemble data from different sources to create digital dossiers of detailed information about individuals is known as which of the following? a. Spamming b. Spyware c. Phishing d. Targeting e. Profiling

Profiling

The obligations that individuals and organizations have concerning rights to intellectual property involve which of the following moral dimensions of the information age? a. Information rights and obligations b. Quality of life c. System quality d. Property rights and obligations e. Accountability and control

Property rights and obligations

Which of the following ethical guidelines suggests that you put yourself in the place of others, and think of yourself as the object of the decision? a. the utilitarian principle b. Kant's categorical imperative c. the Golden Rule d. the "no free lunch" rule e. the risk aversion principle

the Golden Rule


Related study sets

Math Rational And Irrational Numbers Terms

View Set

Sensory Changes in the Older Adult

View Set

health promotion giddens + yoost tb

View Set