Deck 5: Ethical and Legal Issues 

ملء الشاشة (f)
exit full mode
سؤال
Favor for the model of self-regulation is supported by all of the following points except ________.

A) the private sector's speed in resolving problems within its area of expertise
B) the often contradictory and confusing nature of law
C) the motivation to voluntary compliance is compelled by greater consumer confidence
D) the insufficiently compelling incentives
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Critics of opt out presumptions argue which of the following points?

A) average consumers are often confused by many opt out routines
B) consumers prefer targeted advertising
C) the ability of consumers to opt-out cuts down on the effectiveness of marketing efforts
D) opt out policies keep marketers from learning anything about consumers
سؤال
Which of the following issues can be addressed by current conventional criminal statutes?

A) workers are extended an expectation of privacy from their employers
B) privacy of all American citizens is assured by federal law
C) sanctions against the misuse of consumer data
D) right of users to opt-out of data submission
سؤال
Thus far, ________ have been established as the primary means of protecting most of content on the Internet.

A) copyrights
B) patents
C) trademarks
D) licenses
سؤال
What is a legal method of protecting children from exposure to inappropriate, obscene, or indecent material online?

A) filtering models
B) censorship of the entire Internet
C) the Computer Decency Act of 1996
D) all of the above
سؤال
________ allow a buyer to use a company's product, but with restrictions on the ability to duplicate or distribute it.

A) Copyrights
B) Patents
C) Trademarks
D) Licenses
سؤال
According to trademark law, a certain redundancy is permitted as long as there is enough dissimilarity in which of the following factors?

A) type of business
B) product name
C) language in brand promotions
D) all of the above
سؤال
Which of the following is not a possible sanction for fraudulent conduct?

A) forfeiture of property
B) lifetime bans on Internet commerce
C) civil judgments
D) consumer education
سؤال
All of the following can be defined as trade secrets except ________.

A) formulas
B) facts
C) market data
D) algorithms
سؤال
What purpose(s) do digital cookies serve?

A) recalling stored sales information
B) collecting user data, such as name, addresses and phone numbers
C) creating/updating features such as virtual shopping baskets
D) all of the above
سؤال
Which of the following companies have been subject to criticism regarding their possible misuse of users' private information?

A) DoubleClick
B) America Online
C) Facebook
D) All of the above
سؤال
Which of the following is a ubiquitous application, meaning it is able to function without a user's knowledge or control?

A) Java applet
B) Windows
C) E-mail
D) XML
سؤال
The central focus of ________ is the analysis and description of what is right and wrong and how we judge the difference.

A) law
B) ethics
C) self-regulation
D) privacy
سؤال
Which of the following is an ethical issue currently confronting those who work in electronic environments?

A) intellectual property
B) the role of privacy
C) freedom of expression
D) all of the above
سؤال
Jurisdiction ________.

A) is a legal term that describes the authority of a court over individuals, groups, or firms
B) has traditionally been based upon physical presence/location
C) is unlikely to be exercised within the geographic boundaries of other nations or states
D) all of the above
سؤال
The concept of privacy encompasses ________.

A) ethical aspects
B) legal aspects
C) both of the above
D) neither of the above
سؤال
The general attributes of privacy fall into each of the following categories except the ________.

A) seclusion theory
B) autonomy model
C) access-control viewpoint
D) vacuum model
سؤال
Traditionally, the law has used _______ to define ownership and protect intellectual property rights?

A) copyrights
B) patents
C) trademarks
D) all of the above
سؤال
Which of the following is not true in relation to law?

A) law is directed toward the behavior of individuals or small groups, as opposed to entire populations
B) law attempts to be consistent in time and place
C) making law is often slow and complex
D) law is an expression of values
سؤال
Which of the following is not a widely held criticism of spam?

A) it places burdens on network resources
B) it reduces the costs of marketing to target consumers
C) it is an unwanted intrusion for receivers
D) it is often derived from mailing lists not intended to be used for mass solicitation
سؤال
If individuals copy, share, or distribute computer software without having purchased it under a licensed, then they may be supporting software piracy.
سؤال
Metatags can be used to protect against one's own or cyber squat against another's intellectual property, product, or trade name.
سؤال
What are some examples of trade secrets that could be distributed illegally according to the US Economic Espionage Act of 1996?
سؤال
The study of ethics has been in existence for over 2,500 years.
سؤال
What are the arguments for and against the mass distribution of unsolicited email? Support one of these viewpoints using evidence from your own use of email.
سؤال
Cyber squatting refers to practices whereby one party registers domain names belonging to or resembling the trade names of others.
سؤال
What are the arguments for and against self-regulation? Which position holds more validity in your opinion?
سؤال
What is the distinction between law and ethics?
سؤال
There is currently no law regulating consumers' right to opt-out of unwanted data collection.
سؤال
The mass distribution of unsolicited electronic mail is often referred to as spam.
سؤال
The issue of privacy can be broken down into three general areas. Identify and define these areas.
سؤال
Shrinkwrap, clickwrap, and break-the-seal represent methods of corporate attempts to communicate software licensing obligations to consumers.
سؤال
What are the norms used by the FTC that represent the minimum requirements essential to the ethical use of consumer information?
سؤال
The use of email or websites to impersonate individuals or corporations is known as spidering.
سؤال
Only registered trademarks are protected under the rules outlined in the US Lanham Act.
سؤال
According to the text, privacy issues have been a subject of close international attention.
سؤال
The Federal Economic Espionage Act of 1996 was enacted, in part, to prevent and prosecute against foreign distribution of corporate trade secrets.
سؤال
What are some ways for consumers to protect themselves from fraud? Your answer should include a definition of fraud and a specific website useful in protecting consumers.
سؤال
The issue of data collection is the only problem within the context of online privacy.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/39
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 5: Ethical and Legal Issues 
1
Favor for the model of self-regulation is supported by all of the following points except ________.

A) the private sector's speed in resolving problems within its area of expertise
B) the often contradictory and confusing nature of law
C) the motivation to voluntary compliance is compelled by greater consumer confidence
D) the insufficiently compelling incentives
D
2
Critics of opt out presumptions argue which of the following points?

A) average consumers are often confused by many opt out routines
B) consumers prefer targeted advertising
C) the ability of consumers to opt-out cuts down on the effectiveness of marketing efforts
D) opt out policies keep marketers from learning anything about consumers
A
3
Which of the following issues can be addressed by current conventional criminal statutes?

A) workers are extended an expectation of privacy from their employers
B) privacy of all American citizens is assured by federal law
C) sanctions against the misuse of consumer data
D) right of users to opt-out of data submission
C
4
Thus far, ________ have been established as the primary means of protecting most of content on the Internet.

A) copyrights
B) patents
C) trademarks
D) licenses
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
5
What is a legal method of protecting children from exposure to inappropriate, obscene, or indecent material online?

A) filtering models
B) censorship of the entire Internet
C) the Computer Decency Act of 1996
D) all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
6
________ allow a buyer to use a company's product, but with restrictions on the ability to duplicate or distribute it.

A) Copyrights
B) Patents
C) Trademarks
D) Licenses
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
7
According to trademark law, a certain redundancy is permitted as long as there is enough dissimilarity in which of the following factors?

A) type of business
B) product name
C) language in brand promotions
D) all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
8
Which of the following is not a possible sanction for fraudulent conduct?

A) forfeiture of property
B) lifetime bans on Internet commerce
C) civil judgments
D) consumer education
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
9
All of the following can be defined as trade secrets except ________.

A) formulas
B) facts
C) market data
D) algorithms
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
10
What purpose(s) do digital cookies serve?

A) recalling stored sales information
B) collecting user data, such as name, addresses and phone numbers
C) creating/updating features such as virtual shopping baskets
D) all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which of the following companies have been subject to criticism regarding their possible misuse of users' private information?

A) DoubleClick
B) America Online
C) Facebook
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
12
Which of the following is a ubiquitous application, meaning it is able to function without a user's knowledge or control?

A) Java applet
B) Windows
C) E-mail
D) XML
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
13
The central focus of ________ is the analysis and description of what is right and wrong and how we judge the difference.

A) law
B) ethics
C) self-regulation
D) privacy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
14
Which of the following is an ethical issue currently confronting those who work in electronic environments?

A) intellectual property
B) the role of privacy
C) freedom of expression
D) all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
15
Jurisdiction ________.

A) is a legal term that describes the authority of a court over individuals, groups, or firms
B) has traditionally been based upon physical presence/location
C) is unlikely to be exercised within the geographic boundaries of other nations or states
D) all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
16
The concept of privacy encompasses ________.

A) ethical aspects
B) legal aspects
C) both of the above
D) neither of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
17
The general attributes of privacy fall into each of the following categories except the ________.

A) seclusion theory
B) autonomy model
C) access-control viewpoint
D) vacuum model
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
18
Traditionally, the law has used _______ to define ownership and protect intellectual property rights?

A) copyrights
B) patents
C) trademarks
D) all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
19
Which of the following is not true in relation to law?

A) law is directed toward the behavior of individuals or small groups, as opposed to entire populations
B) law attempts to be consistent in time and place
C) making law is often slow and complex
D) law is an expression of values
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
20
Which of the following is not a widely held criticism of spam?

A) it places burdens on network resources
B) it reduces the costs of marketing to target consumers
C) it is an unwanted intrusion for receivers
D) it is often derived from mailing lists not intended to be used for mass solicitation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
21
If individuals copy, share, or distribute computer software without having purchased it under a licensed, then they may be supporting software piracy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
22
Metatags can be used to protect against one's own or cyber squat against another's intellectual property, product, or trade name.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
23
What are some examples of trade secrets that could be distributed illegally according to the US Economic Espionage Act of 1996?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
24
The study of ethics has been in existence for over 2,500 years.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
25
What are the arguments for and against the mass distribution of unsolicited email? Support one of these viewpoints using evidence from your own use of email.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
26
Cyber squatting refers to practices whereby one party registers domain names belonging to or resembling the trade names of others.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
27
What are the arguments for and against self-regulation? Which position holds more validity in your opinion?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
28
What is the distinction between law and ethics?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
29
There is currently no law regulating consumers' right to opt-out of unwanted data collection.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
30
The mass distribution of unsolicited electronic mail is often referred to as spam.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
31
The issue of privacy can be broken down into three general areas. Identify and define these areas.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
32
Shrinkwrap, clickwrap, and break-the-seal represent methods of corporate attempts to communicate software licensing obligations to consumers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
33
What are the norms used by the FTC that represent the minimum requirements essential to the ethical use of consumer information?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
34
The use of email or websites to impersonate individuals or corporations is known as spidering.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
35
Only registered trademarks are protected under the rules outlined in the US Lanham Act.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
36
According to the text, privacy issues have been a subject of close international attention.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
37
The Federal Economic Espionage Act of 1996 was enacted, in part, to prevent and prosecute against foreign distribution of corporate trade secrets.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
38
What are some ways for consumers to protect themselves from fraud? Your answer should include a definition of fraud and a specific website useful in protecting consumers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
39
The issue of data collection is the only problem within the context of online privacy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.