MIS Chapter 4

Your page rank:

Total word count: 3746
Pages: 14

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

1) Which of the following best describes how new information systems can result in legal gray areas?
A) They work with networked, digital data, which are more difficult to control than information stored manually.
B) They result in new situations that are not covered by old laws.
C) They are implemented by technicians rather than managers.
D) They are created from sets of logical and technological rules rather than social or organizational mores.
E) They are little understood by politicians or lawyers.

B) They result in new situations that are not covered by old laws.

2) Which of the following best describes the effect that new information technology has on society?
A) It has a dampening effect on the discourse of business ethics.
B) It has a ripple effect, raising new ethical, social, and political issues.
C) It is beneficial for society as a whole, while raising dilemmas for consumers.
D) It has a waterfall effect in raising ever more complex ethical issues.
E) It has a magnifying effect, creating increasing numbers of ethical issues.

B) It has a ripple effect, raising new ethical, social, and political issues.

3) The obligations that individuals and organizations have concerning rights to intellectual property involve which of the following moral dimensions of the information age?
A) Property rights and obligations
B) System quality
C) Accountability and control
D) Information rights and obligations
E) Quality of life

A) Property rights and obligations

4) The obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within which of the following moral dimensions of the information age?
A) Family and home
B) Property rights and obligations
C) System quality
D) Accountability and control
E) Quality of life

E) Quality of life

5) Which of the following is not one of the current key technology trends that raises ethical issues?
A) Data storage improvements
B) Data analysis advancements
C) Increase in data quality
D) Increase in use of mobile devices
E) Advances in networking technology

C) Increase in data quality

6) Which of the five moral dimensions of the information age do the central business activities of DoubleClick involve?
A) Property rights and obligations
B) System quality
C) Accountability and control
D) Quality of life
E) Information rights and obligations

E) Information rights and obligations

7) The use of computers to assemble data from different sources to create digital dossiers of detailed information about individuals is known as which of the following?
A) Profiling
B) Phishing
C) Spamming
D) Targeting
E) Spyware

A) Profiling

8) Which of the following is a data analysis technology that finds hidden connections between data in disparate sources?
A) HIPAA
B) FIP
C) NORA
D) COPPA
E) Spyware

C) NORA

9) Which of the following is not an example of the potential dark side of big data?
A) Police visits to individuals whom a computer system identified as likely to commit a crime in the future.
B) Use of a device installed in a car to analyze driving habits.
C) Use of a predictive modeling system that predicts life expectancy by using data about individual consumers’ buying habits as well as personal and family medical histories.
D) Use of computerized systems to filter and hire job applicants.
E) Analyzing data from sensors installed in local parks to monitor soil moisture.

E) Analyzing data from sensors installed in local parks to monitor soil moisture.

10) Routine violations of individual privacy are made more difficult by advances in data storage.

FALSE

11) In today’s legal environment, managers who are convicted for the misuse of information systems are still unlikely to be given a prison sentence.

FALSE

12) Ethics describes the principles of right and wrong that can be used by individuals to make choices to guide their behavior.

TRUE

16) ________ means that you accept the potential costs and obligations for the decisions you make.
A) Responsibility
B) Accountability
C) Liability
D) Due process
E) Duty

A) Responsibility

17) ________ is a feature of social institutions that means mechanisms are in place to determine responsibility for an action.
A) Due process
B) Accountability
C) The courts of appeal
D) The judicial system
E) Liability

B) Accountability

18) ________ is a feature of law-governed society and involves having laws that are known and understood, along with the ability to appeal to higher authorities to ensure that the laws are applied correctly.
A) Liability
B) Due process
C) Responsibility
D) Accountability
E) The judicial system

B) Due process

19) All of the following are steps in the process for analyzing an ethical issue except:
A) assigning responsibility.
B) identifying the stakeholders.
C) identifying the options you can reasonably take.
D) identifying and clearly describing the facts.
E) identifying the potential consequences of your options.

A) assigning responsibility.

20) A colleague at work takes small amounts of office supplies for her own personal use, saying that this is a tiny loss to the company. You tell her that if everyone were to take office supplies, then the loss would no longer be minimal. Your rationale expresses which of the following ethical principles?
A) Kant’s Categorical Imperative
B) The Golden Rule
C) The Risk Aversion Principle
D) The "No free lunch" rule
E) The slippery-slope rule

A) Kant’s Categorical Imperative

21) A man steals from a grocery store in order to feed his starving family. Which of the following best expresses the utilitarian principle in evaluating this situation?
A) His action is acceptable, because the grocer suffers the least harm.
B) His action is acceptable, because the higher social value is the survival of the family.
C) His action is wrong, because the man would not want the grocer to steal from him.
D) His action is wrong, because if everyone were to do this, the concept of personal property is defeated.
E) His action is wrong, because the grocery store owner is harmed.

B) His action is acceptable, because the higher social value is the survival of the family.

22) Which of the following best describes Immanuel Kant’s categorical imperative?
A) If an action cannot be taken repeatedly, then it is not right to be taken at any time.
B) One should take the action that produces the least harm or incurs the least cost.
C) One can put values in rank order and understand the consequences of various courses of action.
D) If an action is not right for everyone to take, it is not right for anyone to take.
E) You should act towards others as you would like them to act towards you.

D) If an action is not right for everyone to take, it is not right for anyone to take.

23) The ethical "no free lunch" rule states that:
A) if an action cannot be taken repeatedly, then it is not right to be taken at any time.
B) one should take the action that produces the least harm or incurs the least cost.
C) one can put values in rank order and understand the consequences of various courses of action.
D) if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work.
E) if an action is not right for everyone to take, it is not right for anyone to take.

D) if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work.

24) According to ________, you should take the action that produces the least harm.
A) Kant’s categorical imperative
B) the risk aversion principle
C) the utilitarian principle
D) the Golden Rule
E) the "no free lunch" rule

B) the risk aversion principle

25) Which ethical rule states that if an action cannot be taken repeatedly, it is not right to take at all?
A) Slippery-slope rule
B) Lemming rule
C) High-failure cost rule
D) Utilitarian principle
E) Golden Rule

A) Slippery-slope rule

26) Which of the following ethical guidelines suggests that you put yourself in the place of others, and think of yourself as the object of the decision?
A) Kant’s categorical imperative
B) the risk aversion principle
C) the utilitarian principle
D) the Golden Rule
E) the "no free lunch" rule

D) the Golden Rule

27) Identifying the stakeholders—people who have a vested interest in the outcome of the decision—is the last step in analyzing an ethical issue.

FALSE

28) Because of their special claims to knowledge, wisdom, and respect, professionals take on special rights and obligations.

TRUE

29) Liability is a feature of political systems and allows individuals to recover damages done to them by others.

TRUE

33) In 2010, the FTC added all of the following recommendations to its privacy guidelines except:
A) firms should build products and services that protect privacy.
B) firms should increase the transparency of their data collection.
C) firms should require consumer consent and provide clear options to opt out of data collection.
D) firms should limit the length of time that any personal data is stored to six months or less.
E) consumers should be able to review and contest the accuracy and completeness of data.

D) firms should limit the length of time that any personal data is stored to six months or less.

34) Which of the following restricts the information that the U.S. federal government can collect about an individual and regulates what it can do with the information?
A) The Privacy Act
B) The Gramm-Leach-Bliley Act
C) The Freedom of Information Act
D) COPPA
E) HIPPA

A) The Privacy Act

35) FIP principles are based on a belief in which of the following?
A) Accountability of the record holder
B) Responsibility of the record holder
C) Mutuality of interest between the record holder and the individual
D) Privacy of the individual
E) Difference between the interests of the individual and commercial organizations

C) Mutuality of interest between the record holder and the individual

36) The FIP principle of Notice/Awareness states that:
A) customers must be allowed to choose how their information will be used for secondary purposes other than the supporting transaction.
B) data collectors must take responsible steps to assure that consumer information is accurate and secure from unauthorized use.
C) there must be a mechanism in place to enforce FIP principles.
D) consumers should be able to review the data collected about them.
E) websites must disclose their information practices before collecting data.

E) websites must disclose their information practices before collecting data.

37) Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed?
A) HIPAA
B) Gramm-Leach-Bliley Act
C) Privacy Protection Act
D) Freedom of Information Act
E) COPPA

A) HIPAA

38) Which of the following is not a U.S. federal law affecting private institutions?
A) COPPA
B) HIPAA
C) Gramm-Leach-Bliley Act
D) Video Privacy Protection Act
E) Computer Matching and Privacy Protection Act

E) Computer Matching and Privacy Protection Act

39) All of the following laws apply to actions by the federal government except the:
A) Freedom of Information Act.
B) Privacy Act.
C) Computer Security Act.
D) Children’s Online Privacy Protection Act.
E) E-Government Act.

D) Children’s Online Privacy Protection Act.

40) When a cookie is created during a website visit, it is stored:
A) on the website’s server.
B) on the hard drive of the visitor’s computer.
C) on the ISP’s servers.
D) in the browser’s application settings.
E) nowhere, because they are only used during a visit and are discarded once a visitor leaves the Web site.

B) on the hard drive of the visitor’s computer.

41) The U.S. Department of Commerce developed a ________ framework in order to enable U.S. businesses to legally use personal data from EU countries.
A) COPPA
B) P3P
C) PGP
D) FIP
E) safe harbor

E) safe harbor

42) The Online Privacy Alliance:
A) encourages self-regulation to develop a set of privacy guidelines for its members.
B) protects user privacy during interactions with websites.
C) has established technical guidelines for ensuring privacy.
D) is a government agency regulating the use of customer information.
E) is a safe harbor program established by the U.S. government.

A) encourages self-regulation to develop a set of privacy guidelines for its members.

43) In the ________ model of informed consent, personal information can be collected until the consumer specifically requests that his or her data not be collected.
A) opt-in
B) opt-out
C) P3P
D) PGP
E) safe harbor

B) opt-out

44) What percent of global Internet users use Google Search and other Google services?
A) Less than 10 percent
B) Around 25 percent
C) About 50 percent
D) Nearly 80 percent
E) Over 90 percent

D) Nearly 80 percent

45) Which of the following forms of protection of intellectual property requires that the property be the subject of a nondisclosure agreement?
A) Copyright
B) Patent
C) All forms of intellectual property protection
D) Trademark
E) Trade secret

E) Trade secret

46) All of the following are technical solutions to protecting user privacy except:
A) e-mail encryption.
B) anonymous surfing.
C) anonymous email.
D) preventing client computers from accepting cookies.
E) data use policies.

E) data use policies.

47) Which of the following protects the authors of a book from having their work copied by others?
A) Patent protection
B) Due process
C) Copyright law
D) Fair Use Doctrine
E) Trade Secret law

C) Copyright law

48) "Look and feel" copyright infringement lawsuits are concerned with:
A) the distinction between tangible and intangible ideas.
B) the distinction between an idea and its expression.
C) using the graphical elements of another product.
D) using the creative elements of another product.
E) violation of a monopoly on the ideas behind a product.

B) the distinction between an idea and its expression.

49) The NAI is an industry association formed to help with which of the following?
A) Copyright protection
B) Online privacy issues
C) Patent protection
D) Trademark protection
E) Trade secret protection

B) Online privacy issues

50) Which of the following is not protected by copyright law?
A) Musical compositions
B) Motion pictures
C) Maps
D) Artwork
E) Machines

E) Machines

51) Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials?
A) Digital Millennium Copyright Act
B) Privacy Act
C) Freedom of Information Act
D) Electronic Communications Privacy Act
E) Computer Software Copyright Act

A) Digital Millennium Copyright Act

52) Which of the following statements about Flash cookies is not true?
A) Flash cookies are installed only at the user’s request.
B) Flash cookies are stored on the user’s computer.
C) Flash cookies cannot be easily detected or deleted.
D) Flash cookies are sometimes called super cookies.
E) Flash cookies can be installed whenever a person clicks a Flash video.

A) Flash cookies are installed only at the user’s request.

53) Advertisers use ________ in order to display more relevant ads based on a user’s search and browsing history.
A) behavioral targeting
B) Web bugs
C) NORA
D) intelligent agents
E) FIP principles

A) behavioral targeting

54) ________ prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use.
A) A safe harbor
B) The opt-in model
C) FIP principles
D) P3P
E) The opt-out model

B) The opt-in model

55) ________ grants the owner exclusive ownership of the ideas behind an invention for 20 years.
A) Copyright law
B) Trademark law
C) Patent law
D) Trade secret protection
E) Privacy law

C) Patent law

56) TRUSTe is an example of which of the following?
A) Web beacon
B) Behavioral targeting program
C) Opt-out program
D) Spyware
E) Online seal program

E) Online seal program

57) Which of the following is not a difficulty in establishing patent protection?
A) Length of time required to receive protection
B) The requirement that the work reflect some special understanding and contribution
C) The requirement that the work must be original
D) The requirement that the work must be novel
E) The requirement that the work must be a secret

E) The requirement that the work must be a secret

58) Which of the following is not true about the changes to EU data protection rules proposed in 2012?
A) The new rules would require Internet companies to obtain explicit consent from consumers for the use of their personal data.
B) The new rules would require Internet companies to delete information at the user’s request.
C) The new rules would require Internet companies to retain information only as long as absolutely necessary.
D) The new rules would reject the right to be forgotten.
E) The new rules would apply only to all companies providing services in Europe.

D) The new rules would reject the right to be forgotten.

59) Digital media differs from a physical book in all of the following ways except:
A) ease of replication.
B) ease of alteration.
C) ease of transmission.
D) ease of global distribution.
E) ease of establishing uniqueness.

E) ease of establishing uniqueness.

60) Which of the following were involved in what has been called the patent trial of the century?
A) Apple and Microsoft
B) Apple and Hewlett-Packard
C) Microsoft and Symantec
D) Microsoft and Facebook
E) Apple and Samsung

E) Apple and Samsung

61) Which of the following is not a file-sharing service?
A) The Pirate Bay
B) Megaupload
C) Morpheus
D) Pandora
E) Grokster

D) Pandora

62) The European Parliament has banned unsolicited commercial messaging.

TRUE

63) A Facebook user’s visit to a website can be tracked even if they do not click a Like button.

TRUE

64) Malicious software that is installed secretly on your computer by other applications and that tracks your online movements is called spyware.

TRUE

65) Most Internet businesses do very little to protect the privacy of their customers.

TRUE

66) The rate of global software piracy in 2015 was approximately 50%.

FALSE

67) Any intellectual work product that isn’t based on public knowledge can be classed as a trade secret.

TRUE

68) Copyright is a legal protection given to creators of certain types of intellectual property.

TRUE

69) Software programs were unprotected by copyright law until the early 1990s.

FALSE

70) The problem with web browsers’ Do Not Track options is that websites aren’t obligated to honor these settings.

TRUE

71) European countries do not allow businesses to use personally identifiable information without consumers’ prior consent.

TRUE

72) One of the key concepts in patent law is novelty.

TRUE

73) Some forms of illegal sharing of music files have declined as legitimate online music stores have expanded.

TRUE

74) COPPA is a set of five principles developed by the FTC that most American and European privacy law is based on.

FALSE

75) Although online tracking gathers an enormous amount of information on individual users, it is anonymous and can’t be tied to a specific person.

FALSE

76) Web beacons are tiny, invisible software programs hidden in e-mail messages and web pages that are used to track and report a user’s online behavior.

TRUE

81) ________ are not held liable for the messages they transmit.
A) Regulated common carriers
B) Private individuals
C) Organizations and businesses
D) Elected officials
E) European ISPs

A) Regulated common carriers

82) Which of the following resulted in an outage for Netflix customers on Christmas Eve 2012?
A) A failure of Amazon’s cloud computing service
B) A failure of Netflix’s recommendation engine software
C) A blackout at Netflix’s primary data center
D) A hacking attack
E) A bug in Netflix’s credit card processing system

A) A failure of Amazon’s cloud computing service

83) Which of the following is the most common reason that business systems fail?
A) Software bugs
B) Software errors
C) Hardware failures
D) Facilities failures
E) Data quality

E) Data quality

84) Which of the following is a primary drawback to the "do anything anywhere" computing environment?
A) It makes work environments less pleasant.
B) It creates a digital divide.
C) It centralizes power at corporate headquarters.
D) It blurs the traditional boundaries between work and family time.
E) It leads to employees being paid less for the total amount of work performed.

D) It blurs the traditional boundaries between work and family time.

85) Which of the following statements about spam is not true?
A) Most spam originates from bot networks.
B) Cell phone spam usually comes in the form of SMS text messages.
C) Spam costs for business are very high.
D) Spamming has mushroomed because it is so inexpensive and can reach so many people.
E) Spamming is more tightly regulated in Europe than in the United States.

E) Spamming is more tightly regulated in Europe than in the United States.

86) The U.S. CAN-SPAM Act:
A) makes spamming illegal.
B) requires commercial email senders to identify themselves.
C) has dramatically cut down spamming.
D) does not override state anti-spamming laws.
E) does not outlaw the use of fake return addresses.

B) requires commercial email senders to identify themselves.

87) Which of the five moral dimensions of the information age does spamming involve?
A) Quality of life
B) System quality
C) Accountability and control
D) Information rights and obligations
E) Property rights and obligations

A) Quality of life

88) Redesigning and automating business processes can be seen as a double-edged sword because:
A) increases in efficiency may be accompanied by job losses.
B) increases in efficiency may be accompanied by poor data quality.
C) support for middle-management decision making may be offset by poor data quality.
D) reliance on technology results in the loss of hands-on knowledge.
E) it can concentrate power in the hands of senior executives.

A) increases in efficiency may be accompanied by job losses.

89) Which of the following terms refers to significant disparities in access to computers and the Internet among different social groups and different locations?
A) CVS
B) Technostress
C) Digital divide
D) RSI
E) CTS

C) Digital divide

90) CVS refers to:
A) eyestrain related to computer display screen use.
B) a business practice that attempts to evaluate the intangible values of computer systems.
C) carpal vision syndrome.
D) a type of antivirus protection software.
E) wrist injuries brought about by incorrect hand position when using a keyboard.

A) eyestrain related to computer display screen use.

91) Which of the following occurs when muscle groups are forced through tens of thousands of repetitions under low-impact loads?
A) CTS
B) CVS
C) RSI
D) Technostress
E) RSS

C) RSI

92) Gaining unapproved access to a computer is not a federal crime.

FALSE

93) Spam is legally defined as any e-mail that is unsolicited.

FALSE

94) Some experts believe that exposure to computers reduces intelligence and makes people dumb.

TRUE

95) Computer abuse refers to acts involving a computer that may not be illegal but are considered unethical.

TRUE

Share This
Flashcard

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more

NCLEX 300-NEURO

A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message
sending