1) Which of the following best describes how new information systems can result in legal gray areas? |
B) They result in new situations that are not covered by old laws. |
2) Which of the following best describes the effect that new information technology has on society? |
B) It has a ripple effect, raising new ethical, social, and political issues. |
3) The obligations that individuals and organizations have concerning rights to intellectual property involve which of the following moral dimensions of the information age? |
A) Property rights and obligations |
4) The obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within which of the following moral dimensions of the information age? |
E) Quality of life |
5) Which of the following is not one of the current key technology trends that raises ethical issues? |
C) Increase in data quality |
6) Which of the five moral dimensions of the information age do the central business activities of DoubleClick involve? |
E) Information rights and obligations |
7) The use of computers to assemble data from different sources to create digital dossiers of detailed information about individuals is known as which of the following? |
A) Profiling |
8) Which of the following is a data analysis technology that finds hidden connections between data in disparate sources? |
C) NORA |
9) Which of the following is not an example of the potential dark side of big data? |
E) Analyzing data from sensors installed in local parks to monitor soil moisture. |
10) Routine violations of individual privacy are made more difficult by advances in data storage. |
FALSE |
11) In today’s legal environment, managers who are convicted for the misuse of information systems are still unlikely to be given a prison sentence. |
FALSE |
12) Ethics describes the principles of right and wrong that can be used by individuals to make choices to guide their behavior. |
TRUE |
16) ________ means that you accept the potential costs and obligations for the decisions you make. |
A) Responsibility |
17) ________ is a feature of social institutions that means mechanisms are in place to determine responsibility for an action. |
B) Accountability |
18) ________ is a feature of law-governed society and involves having laws that are known and understood, along with the ability to appeal to higher authorities to ensure that the laws are applied correctly. |
B) Due process |
19) All of the following are steps in the process for analyzing an ethical issue except: |
A) assigning responsibility. |
20) A colleague at work takes small amounts of office supplies for her own personal use, saying that this is a tiny loss to the company. You tell her that if everyone were to take office supplies, then the loss would no longer be minimal. Your rationale expresses which of the following ethical principles? |
A) Kant’s Categorical Imperative |
21) A man steals from a grocery store in order to feed his starving family. Which of the following best expresses the utilitarian principle in evaluating this situation? |
B) His action is acceptable, because the higher social value is the survival of the family. |
22) Which of the following best describes Immanuel Kant’s categorical imperative? |
D) If an action is not right for everyone to take, it is not right for anyone to take. |
23) The ethical "no free lunch" rule states that: |
D) if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work. |
24) According to ________, you should take the action that produces the least harm. |
B) the risk aversion principle |
25) Which ethical rule states that if an action cannot be taken repeatedly, it is not right to take at all? |
A) Slippery-slope rule |
26) Which of the following ethical guidelines suggests that you put yourself in the place of others, and think of yourself as the object of the decision? |
D) the Golden Rule |
27) Identifying the stakeholders—people who have a vested interest in the outcome of the decision—is the last step in analyzing an ethical issue. |
FALSE |
28) Because of their special claims to knowledge, wisdom, and respect, professionals take on special rights and obligations. |
TRUE |
29) Liability is a feature of political systems and allows individuals to recover damages done to them by others. |
TRUE |
33) In 2010, the FTC added all of the following recommendations to its privacy guidelines except: |
D) firms should limit the length of time that any personal data is stored to six months or less. |
34) Which of the following restricts the information that the U.S. federal government can collect about an individual and regulates what it can do with the information? |
A) The Privacy Act |
35) FIP principles are based on a belief in which of the following? |
C) Mutuality of interest between the record holder and the individual |
36) The FIP principle of Notice/Awareness states that: |
E) websites must disclose their information practices before collecting data. |
37) Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed? |
A) HIPAA |
38) Which of the following is not a U.S. federal law affecting private institutions? |
E) Computer Matching and Privacy Protection Act |
39) All of the following laws apply to actions by the federal government except the: |
D) Children’s Online Privacy Protection Act. |
40) When a cookie is created during a website visit, it is stored: |
B) on the hard drive of the visitor’s computer. |
41) The U.S. Department of Commerce developed a ________ framework in order to enable U.S. businesses to legally use personal data from EU countries. |
E) safe harbor |
42) The Online Privacy Alliance: |
A) encourages self-regulation to develop a set of privacy guidelines for its members. |
43) In the ________ model of informed consent, personal information can be collected until the consumer specifically requests that his or her data not be collected. |
B) opt-out |
44) What percent of global Internet users use Google Search and other Google services? |
D) Nearly 80 percent |
45) Which of the following forms of protection of intellectual property requires that the property be the subject of a nondisclosure agreement? |
E) Trade secret |
46) All of the following are technical solutions to protecting user privacy except: |
E) data use policies. |
47) Which of the following protects the authors of a book from having their work copied by others? |
C) Copyright law |
48) "Look and feel" copyright infringement lawsuits are concerned with: |
B) the distinction between an idea and its expression. |
49) The NAI is an industry association formed to help with which of the following? |
B) Online privacy issues |
50) Which of the following is not protected by copyright law? |
E) Machines |
51) Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials? |
A) Digital Millennium Copyright Act |
52) Which of the following statements about Flash cookies is not true? |
A) Flash cookies are installed only at the user’s request. |
53) Advertisers use ________ in order to display more relevant ads based on a user’s search and browsing history. |
A) behavioral targeting |
54) ________ prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use. |
B) The opt-in model |
55) ________ grants the owner exclusive ownership of the ideas behind an invention for 20 years. |
C) Patent law |
56) TRUSTe is an example of which of the following? |
E) Online seal program |
57) Which of the following is not a difficulty in establishing patent protection? |
E) The requirement that the work must be a secret |
58) Which of the following is not true about the changes to EU data protection rules proposed in 2012? |
D) The new rules would reject the right to be forgotten. |
59) Digital media differs from a physical book in all of the following ways except: |
E) ease of establishing uniqueness. |
60) Which of the following were involved in what has been called the patent trial of the century? |
E) Apple and Samsung |
61) Which of the following is not a file-sharing service? |
D) Pandora |
62) The European Parliament has banned unsolicited commercial messaging. |
TRUE |
63) A Facebook user’s visit to a website can be tracked even if they do not click a Like button. |
TRUE |
64) Malicious software that is installed secretly on your computer by other applications and that tracks your online movements is called spyware. |
TRUE |
65) Most Internet businesses do very little to protect the privacy of their customers. |
TRUE |
66) The rate of global software piracy in 2015 was approximately 50%. |
FALSE |
67) Any intellectual work product that isn’t based on public knowledge can be classed as a trade secret. |
TRUE |
68) Copyright is a legal protection given to creators of certain types of intellectual property. |
TRUE |
69) Software programs were unprotected by copyright law until the early 1990s. |
FALSE |
70) The problem with web browsers’ Do Not Track options is that websites aren’t obligated to honor these settings. |
TRUE |
71) European countries do not allow businesses to use personally identifiable information without consumers’ prior consent. |
TRUE |
72) One of the key concepts in patent law is novelty. |
TRUE |
73) Some forms of illegal sharing of music files have declined as legitimate online music stores have expanded. |
TRUE |
74) COPPA is a set of five principles developed by the FTC that most American and European privacy law is based on. |
FALSE |
75) Although online tracking gathers an enormous amount of information on individual users, it is anonymous and can’t be tied to a specific person. |
FALSE |
76) Web beacons are tiny, invisible software programs hidden in e-mail messages and web pages that are used to track and report a user’s online behavior. |
TRUE |
81) ________ are not held liable for the messages they transmit. |
A) Regulated common carriers |
82) Which of the following resulted in an outage for Netflix customers on Christmas Eve 2012? |
A) A failure of Amazon’s cloud computing service |
83) Which of the following is the most common reason that business systems fail? |
E) Data quality |
84) Which of the following is a primary drawback to the "do anything anywhere" computing environment? |
D) It blurs the traditional boundaries between work and family time. |
85) Which of the following statements about spam is not true? |
E) Spamming is more tightly regulated in Europe than in the United States. |
86) The U.S. CAN-SPAM Act: |
B) requires commercial email senders to identify themselves. |
87) Which of the five moral dimensions of the information age does spamming involve? |
A) Quality of life |
88) Redesigning and automating business processes can be seen as a double-edged sword because: |
A) increases in efficiency may be accompanied by job losses. |
89) Which of the following terms refers to significant disparities in access to computers and the Internet among different social groups and different locations? |
C) Digital divide |
90) CVS refers to: |
A) eyestrain related to computer display screen use. |
91) Which of the following occurs when muscle groups are forced through tens of thousands of repetitions under low-impact loads? |
C) RSI |
92) Gaining unapproved access to a computer is not a federal crime. |
FALSE |
93) Spam is legally defined as any e-mail that is unsolicited. |
FALSE |
94) Some experts believe that exposure to computers reduces intelligence and makes people dumb. |
TRUE |
95) Computer abuse refers to acts involving a computer that may not be illegal but are considered unethical. |
TRUE |
MIS Chapter 4
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price