Deck 8: Ethical, Social, and Political Issues in E-Commerce

ملء الشاشة (f)
exit full mode
سؤال
What is the first step in analyzing an ethical dilemma?

A) Define the conflict or dilemma and identify the higher-order values involved.
B) Identify the potential consequences of your opinions.
C) Identify the options you can reasonably take.
D) Identify and describe the facts.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Most adult social network participants do not have any expectation of personal privacy when using a social network.
سؤال
Section 230 of the Communications Decency Act (CDA) requires schools and libraries in the United States to install technology protection measures in an effort to shield children from pornography.
سؤال
The ethical principle of Universalism states that if an action is not right for all situations, then it is not right for any situation.
سؤال
Liability is a feature of political systems in which a body of law is in place that permits individuals to recover damages done to them by other actors, systems, or organizations.
سؤال
Copyright protection protects against others copying the underlying ideas in a work.
سؤال
Which of the following e-commerce technology dimensions creates greater opportunities for cyberbullying?

A) richness
B) interactivity
C) social technology
D) ubiquity
سؤال
In the United States, Google is required to remove results from its search engine if requested.
سؤال
Which of the following e-commerce technology dimensions has the potential to reduce cultural diversity in products?

A) richness
B) interactivity
C) information density
D) global reach
سؤال
Google defended its Library Project on the grounds of fair use.
سؤال
Net neutrality refers to Internet backbone owners treating all Internet traffic equally.
سؤال
The European Data Protection Directive prohibits the transfer of PII to organizations or countries that do not have similar privacy protection policies.
سؤال
Which of the following is not one of the four basic principles shared by ethical schools of thought in western culture?

A) accountability
B) privacy
C) due process
D) liability
سؤال
The opt-out model for informed consent requires an affirmative action by the consumer before a company can collect and use information.
سؤال
The Children's Internet Protection Act (CIPA) prohibits Web sites from collecting information on children under the age of 13.
سؤال
Online gambling is now legal throughout the United States.
سؤال
The AdChoices program is an industry-sponsored initiative to encourage Web sites to be more transparent about how they use personal information and to make it more likely that appropriate ads are shown to users.
سؤال
The principle of responsibility means that individuals, organizations, and societies should be held accountable to others for the consequences of their actions.
سؤال
The expansion of generic top-level domains recently authorized by ICANN is likely to be very disruptive in terms of copyright protection.
سؤال
Which ethical principle states that, when confronted with an ethical dilemma, individuals should take the action that achieves the greater value for all of society?

A) the Golden Rule
B) Universalism
C) the Collective Utilitarian principle
D) the Social Contract rule
سؤال
Which of the following can be used to record all keyboard activity of a user?

A) shopping carts
B) trusted computing environments
C) spyware
D) DRM
سؤال
Which ethical principle states that if an action cannot be taken repeatedly, then it is not right to take at all?

A) Universalism
B) the Slippery Slope
C) the Social Contract rule
D) the Golden Rule
سؤال
Which ethical principle states that when confronted with an ethical dilemma, an individual should take the action that produces the least harm, or the least potential cost?

A) the Slippery Slope
B) Risk Aversion
C) No Free Lunch
D) the Collective Utilitarian principle
سؤال
Which of the following is a tiered notice and response system aimed at reducing copyright infringement over P2P networks?

A) the CAS
B) FIP
C) Surfright
D) the Open Internet Order
سؤال
A social consequence of the richness of Internet information is:

A) an increase in shallowness.
B) an increase in the ease of creating misleading information.
C) very persuasive messages might reduce the need for multiple independent sources of information.
D) an increase in vulnerability to hacking attacks.
سؤال
Which of the FTC's Fair Information Practices (FIP) principles requires opt-in or opt-out policies to be in place?

A) Notice/Awareness
B) Choice/Consent
C) Access/Participation
D) Security
سؤال
Which of the following requires financial institutions to inform consumers of their privacy policies and permits consumers some control over their records?

A) Freedom of Information Act
B) Gramm-Leach-Bliley Act
C) COPPA
D) HIPAA
سؤال
The sharing of a user's stored cookie information between Web sites and without the user's knowledge is:

A) legal in the United States but illegal in Europe.
B) illegal in the United States but legal in Europe.
C) legal in both the United States and Europe.
D) illegal in both the United States and Europe.
سؤال
Which of the following basic ethical concepts plays an important role in defining privacy?

A) responsibility
B) accountability
C) liability
D) due process
سؤال
Which ethical principle tells you that it is wise to assume perfect information markets?

A) the Golden Rule
B) the New York Times test
C) the Social Contract rule
D) the Collective Utilitarian principle
سؤال
Which of the FTC's Fair Information Practices (FIP) principles requires identification of the collector of data?

A) Notice/Awareness
B) Choice/Consent
C) Access/Participation
D) Security
سؤال
Which ethical principle asks you to consider the impact of your decision if the principles underlying your decision became an organizing principle of the entire society?

A) the Golden Rule
B) Risk Aversion
C) the Slippery Slope
D) the Social Contract rule
سؤال
Which of the following is not one of the issues complicating the taxation of e-commerce sales?

A) Taxes raised are used for different government purposes.
B) Sales taxes and policies vary by state and country.
C) Retailers legally only have to charge sales tax if they have operations located in the same state as a consumer.
D) Small online businesses are unable to manage sales taxes to thousands of different jurisdictions.
سؤال
Which of the following is not aimed at strengthening the ability of law enforcement agencies to monitor Internet users without their knowledge?

A) the USA PATRIOT Act
B) the Homeland Security Act
C) the Communications Assistance for Law Enforcement Act
D) the E-Government Act
سؤال
Which of the following statements about industry self-regulation regarding privacy is not True?

A) OPA members are required to implement the OPA's privacy guidelines.
B) The primary focus of industry efforts has been the use of online "seals" that attest to the site's policies.
C) Industry efforts have not so far succeeded in reducing American fears of privacy invasion.
D) The NAI's privacy policies have established the TRUSTe seal.
سؤال
What is the FTC recommendation regarding choice as it relates to personally identifiable information (PII)?

A) Require firms to have consumers affirmatively opt-in before PII is collected.
B) Require firms to allow consumers to opt-out before PII is collected.
C) Make collection of PII illegal.
D) Require robust notice only before PII is collected.
سؤال
Which of the following tools can companies use to track user statements and views on newsgroups, chat groups, and other public forums?

A) cookies
B) digital wallets
C) search engines
D) shopping carts
سؤال
Which ethical principle emphasizes putting oneself into the place of others and thinking of oneself as the object of the decision?

A) the Golden Rule
B) Universalism
C) the Collective Utilitarian principle
D) the Social Contract rule
سؤال
Which ethical principle asks you to assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise?

A) the Golden Rule
B) the Slippery Slope
C) the Social Contract rule
D) No Free Lunch
سؤال
Which of the following is a core Fair Information Practices (FIP) principle?

A) Choice/Consent
B) Access/Participation
C) Security
D) Enforcement
سؤال
Downloading music tracks owned by record companies without paying for them is an example of a violation of:

A) patent law.
B) copyright law.
C) trademark law.
D) privacy law.
سؤال
How long does copyright protection extend for corporate-owned works?

A) 25 years
B) 50 years
C) 75 years
D) 95 years
سؤال
Which of the following handles cybersquatting cases under its Uniform Dispute Resolution procedures?

A) ICANN
B) FTC
C) WIPO
D) USPTO
سؤال
All of the following are possible penalties for violating the Digital Millennium Copyright Act (DMCA) except:

A) up to ten years imprisonment for a first offense.
B) fines up to $500,000 for a first offense.
C) fines up to $1 million for a repeat offense.
D) restitution to the injured parties for any losses due to infringement.
سؤال
Amazon has a patent on:

A) download-based sales.
B) display of third-party advertisements in floating windows.
C) one-click purchasing.
D) hyperlinks.
سؤال
All of the following are factors that will be considered in determining whether use of copyrighted material is "fair use" except the:

A) nature of the work used.
B) amount of the work used.
C) market effect of the use.
D) free availability of the work on the Web.
سؤال
"Do Not Track" falls under which of the following principles in the FTC's new privacy framework?

A) Privacy by Design
B) Simplified Choice
C) Greater Transparency
D) Scope
سؤال
Which case was instrumental in paving the way for Internet business methods patents?

A) Brown Bag v. Symantec
B) State Street Bank & Trust Co. v. Signature Financial Group, Inc.
C) Alice Corporation Pty. Ltd. v. CLS Bank International
D) Ticketmaster Corp. v. Tickets.com
سؤال
What is the major reason that the Internet has such potential for destroying traditional conceptions and implementations of intellectual property law?

A) the ability to make perfect copies of digital works at little cost
B) the anonymous nature of the Internet
C) the support for instant peer-to-peer communication
D) the use of standards for file formats
سؤال
All of the following statements about patents are True except:

A) it is more difficult to obtain a copyright than it is to obtain a patent.
B) the four types of inventions protected by patent law are machines, manmade products, compositions of matter, and processing methods.
C) computer programs can be patented.
D) in order to be patented, an invention must be nonobvious.
سؤال
Registering a domain name similar or identical to trademarks of others to divert Web traffic to their own sites is an example of:

A) cybersquatting.
B) cyberpiracy.
C) framing.
D) metatagging.
سؤال
Disputes over federal trademarks involve establishing:

A) underlying ideas.
B) intent.
C) piracy.
D) infringement.
سؤال
Registering the domain name Faceboik.com with the intent to divert Web traffic from people misspelling Facebook.com is an example of:

A) cybersquatting.
B) typosquatting.
C) metatagging.
D) linking.
سؤال
Which of the following allows someone to obtain an exclusive monopoly on the ideas behind an invention for 20 years?

A) copyright law
B) trade secret law
C) patent law
D) trademark law
سؤال
All of the following statements about the Digital Millennium Copyright Act (DMCA) are True except:

A) the DMCA makes it illegal to circumvent technological measures to protect works.
B) the DMCA makes Internet Service Providers (ISPs) responsible and accountable for hosting Web sites or providing services to infringers regardless of whether the ISP is aware of infringement.
C) the DMCA requires search engines to block access to infringing sites.
D) the DMCA allows libraries to make digital copies of works for internal use only.
سؤال
Which of the following situations would not qualify for the fair use exception to U.S. copyright law?

A) A professor clips a newspaper article just before class and distributes copies of it to his class.
B) A journalist quotes a paragraph from a book in a review of the book.
C) A student copies a photograph of his favorite band from a Web site created by the band's record label and places it on the student's personal Web site.
D) Google posts thumbnail images of books in the Google Book Search Project.
سؤال
Which of the following protects original forms of expression in a tangible medium?

A) trade secret law
B) copyright law
C) patent law
D) trademark law
سؤال
Which pricing plan charges fees to e-commerce firms based on the amount of traffic they generate?

A) highway pricing
B) cap pricing
C) usage-based billing
D) congestion pricing
سؤال
Which of the following technologies allows you to send e-mail without a trace?

A) anonymous surfing
B) P3P
C) anonymous remailers
D) public key encryption
سؤال
Registering a domain name similar or identical to trademarks of others to extort profits from legitimate holders is an example of:

A) cybersquatting.
B) cyberpiracy.
C) framing.
D) metatagging.
سؤال
________ involves bypassing the target site's home page and going directly to a content page.
سؤال
The issue of ________ pits those who wish that all Internet traffic is given equal backbone access against telephone and cable companies that would like to charge differentiated prices based on bandwidth and fees paid.
سؤال
Single words, pictures, shapes, packaging, and colors used to identify and distinguish goods are protected under ________ law.
سؤال
Megaupload is an example of a(n) ________, an online file storage service dedicated to sharing copyrighted material illegally.
سؤال
________ is another name for net neutrality.
سؤال
In trademark law, ________ is defined as any behavior that would weaken the connection between the trademark and the product.
سؤال
The four major dimensions of e-commerce ethical, social, and political issues are public safety and welfare; property rights; information rights; and ________.
سؤال
The President's Council of Advisors on Science and Technology has called for all of the following except:

A) a consumer privacy bill of rights.
B) a data breach law requiring firms to report losses of consumer data.
C) amendment of the Electronic Communications Privacy Act to strengthen protections against government surveillance.
D) a blanket prohibition on commercial data brokers.
سؤال
________ involves the creation of digital images that characterize online individual and group behavior.
سؤال
________ is the largest private personal database in the world.
سؤال
The doctrine of ________ permits teachers and writers to use copyrighted materials without permission under certain circumstances.
سؤال
Comcast's proposed merger with which of the following would make it the high-speed Internet provider for close to 40% of American homes?

A) Cablevision
B) AT&T
C) Verizon
D) Time Warner Cable
سؤال
According to data from Pew Research Center, which of the following is the action which the highest percentage of Internet users has taken to preserve their privacy online?

A) used an anonymous Web browsing service
B) encrypted their communications
C) cleared Web browser history and cookies
D) posted comments online anonymously
سؤال
________ copyright infringement lawsuits are concerned with the distinction between an idea and its expression.
سؤال
Under the ________ Act, American intelligence authorities are permitted to tap into whatever Internet traffic they believe is relevant to the campaign against terrorism, in some circumstances without judicial review.
سؤال
Demographic and behavioral information that does not include any personal identifiers is referred to as ________ information.
سؤال
A(n) ________ is a private self-regulating policy and enforcement mechanism that meets the objectives of government regulators and legislation, but does not involve government regulation or enforcement.
سؤال
The ________ of Internet and Web technology can result in work and shopping invading family life.
سؤال
The display of a third-party's Web site or page within your own Web site is called:

A) cybersquatting.
B) metatagging.
C) framing.
D) deep linking.
سؤال
In which of the following cases did the U.S. Supreme Court rule that basic business methods cannot be patented?

A) State Street Bank & Trust v. Signature Financial Group, Inc.
B) Bilski et al. v. Kappos
C) Alice Corporation Pty. Ltd. v. CLS Bank International
D) Brown Bag Software v. Symantec Corp.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/86
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 8: Ethical, Social, and Political Issues in E-Commerce
1
What is the first step in analyzing an ethical dilemma?

A) Define the conflict or dilemma and identify the higher-order values involved.
B) Identify the potential consequences of your opinions.
C) Identify the options you can reasonably take.
D) Identify and describe the facts.
D
2
Most adult social network participants do not have any expectation of personal privacy when using a social network.
False
3
Section 230 of the Communications Decency Act (CDA) requires schools and libraries in the United States to install technology protection measures in an effort to shield children from pornography.
False
4
The ethical principle of Universalism states that if an action is not right for all situations, then it is not right for any situation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
5
Liability is a feature of political systems in which a body of law is in place that permits individuals to recover damages done to them by other actors, systems, or organizations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
6
Copyright protection protects against others copying the underlying ideas in a work.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which of the following e-commerce technology dimensions creates greater opportunities for cyberbullying?

A) richness
B) interactivity
C) social technology
D) ubiquity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
8
In the United States, Google is required to remove results from its search engine if requested.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
9
Which of the following e-commerce technology dimensions has the potential to reduce cultural diversity in products?

A) richness
B) interactivity
C) information density
D) global reach
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
10
Google defended its Library Project on the grounds of fair use.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
11
Net neutrality refers to Internet backbone owners treating all Internet traffic equally.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
12
The European Data Protection Directive prohibits the transfer of PII to organizations or countries that do not have similar privacy protection policies.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
13
Which of the following is not one of the four basic principles shared by ethical schools of thought in western culture?

A) accountability
B) privacy
C) due process
D) liability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
14
The opt-out model for informed consent requires an affirmative action by the consumer before a company can collect and use information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
15
The Children's Internet Protection Act (CIPA) prohibits Web sites from collecting information on children under the age of 13.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
16
Online gambling is now legal throughout the United States.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
17
The AdChoices program is an industry-sponsored initiative to encourage Web sites to be more transparent about how they use personal information and to make it more likely that appropriate ads are shown to users.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
18
The principle of responsibility means that individuals, organizations, and societies should be held accountable to others for the consequences of their actions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
19
The expansion of generic top-level domains recently authorized by ICANN is likely to be very disruptive in terms of copyright protection.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
20
Which ethical principle states that, when confronted with an ethical dilemma, individuals should take the action that achieves the greater value for all of society?

A) the Golden Rule
B) Universalism
C) the Collective Utilitarian principle
D) the Social Contract rule
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
21
Which of the following can be used to record all keyboard activity of a user?

A) shopping carts
B) trusted computing environments
C) spyware
D) DRM
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
22
Which ethical principle states that if an action cannot be taken repeatedly, then it is not right to take at all?

A) Universalism
B) the Slippery Slope
C) the Social Contract rule
D) the Golden Rule
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
23
Which ethical principle states that when confronted with an ethical dilemma, an individual should take the action that produces the least harm, or the least potential cost?

A) the Slippery Slope
B) Risk Aversion
C) No Free Lunch
D) the Collective Utilitarian principle
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
24
Which of the following is a tiered notice and response system aimed at reducing copyright infringement over P2P networks?

A) the CAS
B) FIP
C) Surfright
D) the Open Internet Order
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
25
A social consequence of the richness of Internet information is:

A) an increase in shallowness.
B) an increase in the ease of creating misleading information.
C) very persuasive messages might reduce the need for multiple independent sources of information.
D) an increase in vulnerability to hacking attacks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
26
Which of the FTC's Fair Information Practices (FIP) principles requires opt-in or opt-out policies to be in place?

A) Notice/Awareness
B) Choice/Consent
C) Access/Participation
D) Security
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
27
Which of the following requires financial institutions to inform consumers of their privacy policies and permits consumers some control over their records?

A) Freedom of Information Act
B) Gramm-Leach-Bliley Act
C) COPPA
D) HIPAA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
28
The sharing of a user's stored cookie information between Web sites and without the user's knowledge is:

A) legal in the United States but illegal in Europe.
B) illegal in the United States but legal in Europe.
C) legal in both the United States and Europe.
D) illegal in both the United States and Europe.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
29
Which of the following basic ethical concepts plays an important role in defining privacy?

A) responsibility
B) accountability
C) liability
D) due process
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
30
Which ethical principle tells you that it is wise to assume perfect information markets?

A) the Golden Rule
B) the New York Times test
C) the Social Contract rule
D) the Collective Utilitarian principle
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
31
Which of the FTC's Fair Information Practices (FIP) principles requires identification of the collector of data?

A) Notice/Awareness
B) Choice/Consent
C) Access/Participation
D) Security
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
32
Which ethical principle asks you to consider the impact of your decision if the principles underlying your decision became an organizing principle of the entire society?

A) the Golden Rule
B) Risk Aversion
C) the Slippery Slope
D) the Social Contract rule
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
33
Which of the following is not one of the issues complicating the taxation of e-commerce sales?

A) Taxes raised are used for different government purposes.
B) Sales taxes and policies vary by state and country.
C) Retailers legally only have to charge sales tax if they have operations located in the same state as a consumer.
D) Small online businesses are unable to manage sales taxes to thousands of different jurisdictions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
34
Which of the following is not aimed at strengthening the ability of law enforcement agencies to monitor Internet users without their knowledge?

A) the USA PATRIOT Act
B) the Homeland Security Act
C) the Communications Assistance for Law Enforcement Act
D) the E-Government Act
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
35
Which of the following statements about industry self-regulation regarding privacy is not True?

A) OPA members are required to implement the OPA's privacy guidelines.
B) The primary focus of industry efforts has been the use of online "seals" that attest to the site's policies.
C) Industry efforts have not so far succeeded in reducing American fears of privacy invasion.
D) The NAI's privacy policies have established the TRUSTe seal.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
36
What is the FTC recommendation regarding choice as it relates to personally identifiable information (PII)?

A) Require firms to have consumers affirmatively opt-in before PII is collected.
B) Require firms to allow consumers to opt-out before PII is collected.
C) Make collection of PII illegal.
D) Require robust notice only before PII is collected.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
37
Which of the following tools can companies use to track user statements and views on newsgroups, chat groups, and other public forums?

A) cookies
B) digital wallets
C) search engines
D) shopping carts
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
38
Which ethical principle emphasizes putting oneself into the place of others and thinking of oneself as the object of the decision?

A) the Golden Rule
B) Universalism
C) the Collective Utilitarian principle
D) the Social Contract rule
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
39
Which ethical principle asks you to assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise?

A) the Golden Rule
B) the Slippery Slope
C) the Social Contract rule
D) No Free Lunch
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
40
Which of the following is a core Fair Information Practices (FIP) principle?

A) Choice/Consent
B) Access/Participation
C) Security
D) Enforcement
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
41
Downloading music tracks owned by record companies without paying for them is an example of a violation of:

A) patent law.
B) copyright law.
C) trademark law.
D) privacy law.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
42
How long does copyright protection extend for corporate-owned works?

A) 25 years
B) 50 years
C) 75 years
D) 95 years
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
43
Which of the following handles cybersquatting cases under its Uniform Dispute Resolution procedures?

A) ICANN
B) FTC
C) WIPO
D) USPTO
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
44
All of the following are possible penalties for violating the Digital Millennium Copyright Act (DMCA) except:

A) up to ten years imprisonment for a first offense.
B) fines up to $500,000 for a first offense.
C) fines up to $1 million for a repeat offense.
D) restitution to the injured parties for any losses due to infringement.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
45
Amazon has a patent on:

A) download-based sales.
B) display of third-party advertisements in floating windows.
C) one-click purchasing.
D) hyperlinks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
46
All of the following are factors that will be considered in determining whether use of copyrighted material is "fair use" except the:

A) nature of the work used.
B) amount of the work used.
C) market effect of the use.
D) free availability of the work on the Web.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
47
"Do Not Track" falls under which of the following principles in the FTC's new privacy framework?

A) Privacy by Design
B) Simplified Choice
C) Greater Transparency
D) Scope
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
48
Which case was instrumental in paving the way for Internet business methods patents?

A) Brown Bag v. Symantec
B) State Street Bank & Trust Co. v. Signature Financial Group, Inc.
C) Alice Corporation Pty. Ltd. v. CLS Bank International
D) Ticketmaster Corp. v. Tickets.com
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
49
What is the major reason that the Internet has such potential for destroying traditional conceptions and implementations of intellectual property law?

A) the ability to make perfect copies of digital works at little cost
B) the anonymous nature of the Internet
C) the support for instant peer-to-peer communication
D) the use of standards for file formats
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
50
All of the following statements about patents are True except:

A) it is more difficult to obtain a copyright than it is to obtain a patent.
B) the four types of inventions protected by patent law are machines, manmade products, compositions of matter, and processing methods.
C) computer programs can be patented.
D) in order to be patented, an invention must be nonobvious.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
51
Registering a domain name similar or identical to trademarks of others to divert Web traffic to their own sites is an example of:

A) cybersquatting.
B) cyberpiracy.
C) framing.
D) metatagging.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
52
Disputes over federal trademarks involve establishing:

A) underlying ideas.
B) intent.
C) piracy.
D) infringement.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
53
Registering the domain name Faceboik.com with the intent to divert Web traffic from people misspelling Facebook.com is an example of:

A) cybersquatting.
B) typosquatting.
C) metatagging.
D) linking.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
54
Which of the following allows someone to obtain an exclusive monopoly on the ideas behind an invention for 20 years?

A) copyright law
B) trade secret law
C) patent law
D) trademark law
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
55
All of the following statements about the Digital Millennium Copyright Act (DMCA) are True except:

A) the DMCA makes it illegal to circumvent technological measures to protect works.
B) the DMCA makes Internet Service Providers (ISPs) responsible and accountable for hosting Web sites or providing services to infringers regardless of whether the ISP is aware of infringement.
C) the DMCA requires search engines to block access to infringing sites.
D) the DMCA allows libraries to make digital copies of works for internal use only.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
56
Which of the following situations would not qualify for the fair use exception to U.S. copyright law?

A) A professor clips a newspaper article just before class and distributes copies of it to his class.
B) A journalist quotes a paragraph from a book in a review of the book.
C) A student copies a photograph of his favorite band from a Web site created by the band's record label and places it on the student's personal Web site.
D) Google posts thumbnail images of books in the Google Book Search Project.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
57
Which of the following protects original forms of expression in a tangible medium?

A) trade secret law
B) copyright law
C) patent law
D) trademark law
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
58
Which pricing plan charges fees to e-commerce firms based on the amount of traffic they generate?

A) highway pricing
B) cap pricing
C) usage-based billing
D) congestion pricing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
59
Which of the following technologies allows you to send e-mail without a trace?

A) anonymous surfing
B) P3P
C) anonymous remailers
D) public key encryption
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
60
Registering a domain name similar or identical to trademarks of others to extort profits from legitimate holders is an example of:

A) cybersquatting.
B) cyberpiracy.
C) framing.
D) metatagging.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
61
________ involves bypassing the target site's home page and going directly to a content page.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
62
The issue of ________ pits those who wish that all Internet traffic is given equal backbone access against telephone and cable companies that would like to charge differentiated prices based on bandwidth and fees paid.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
63
Single words, pictures, shapes, packaging, and colors used to identify and distinguish goods are protected under ________ law.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
64
Megaupload is an example of a(n) ________, an online file storage service dedicated to sharing copyrighted material illegally.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
65
________ is another name for net neutrality.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
66
In trademark law, ________ is defined as any behavior that would weaken the connection between the trademark and the product.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
67
The four major dimensions of e-commerce ethical, social, and political issues are public safety and welfare; property rights; information rights; and ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
68
The President's Council of Advisors on Science and Technology has called for all of the following except:

A) a consumer privacy bill of rights.
B) a data breach law requiring firms to report losses of consumer data.
C) amendment of the Electronic Communications Privacy Act to strengthen protections against government surveillance.
D) a blanket prohibition on commercial data brokers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
69
________ involves the creation of digital images that characterize online individual and group behavior.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
70
________ is the largest private personal database in the world.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
71
The doctrine of ________ permits teachers and writers to use copyrighted materials without permission under certain circumstances.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
72
Comcast's proposed merger with which of the following would make it the high-speed Internet provider for close to 40% of American homes?

A) Cablevision
B) AT&T
C) Verizon
D) Time Warner Cable
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
73
According to data from Pew Research Center, which of the following is the action which the highest percentage of Internet users has taken to preserve their privacy online?

A) used an anonymous Web browsing service
B) encrypted their communications
C) cleared Web browser history and cookies
D) posted comments online anonymously
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
74
________ copyright infringement lawsuits are concerned with the distinction between an idea and its expression.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
75
Under the ________ Act, American intelligence authorities are permitted to tap into whatever Internet traffic they believe is relevant to the campaign against terrorism, in some circumstances without judicial review.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
76
Demographic and behavioral information that does not include any personal identifiers is referred to as ________ information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
77
A(n) ________ is a private self-regulating policy and enforcement mechanism that meets the objectives of government regulators and legislation, but does not involve government regulation or enforcement.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
78
The ________ of Internet and Web technology can result in work and shopping invading family life.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
79
The display of a third-party's Web site or page within your own Web site is called:

A) cybersquatting.
B) metatagging.
C) framing.
D) deep linking.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
80
In which of the following cases did the U.S. Supreme Court rule that basic business methods cannot be patented?

A) State Street Bank & Trust v. Signature Financial Group, Inc.
B) Bilski et al. v. Kappos
C) Alice Corporation Pty. Ltd. v. CLS Bank International
D) Brown Bag Software v. Symantec Corp.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.