Deck 4: Ethical and Social Issues in Information Systems

Full screen (f)
exit full mode
Question
The obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within which of the following moral dimensions of the information age?

A)Family and home
B)Property rights and obligations
C)System quality
D)Accountability and control
E)Quality of life
Use Space or
up arrow
down arrow
to flip the card.
Question
Ethics describes the principles of right and wrong that can be used by individuals to make choices to guide their behavior.
Question
Which of the following is not one of the current key technology trends that raises ethical issues?

A)Data storage improvements
B)Data analysis advancements
C)Increase in data quality
D)Increase in use of mobile devices
E)Advances in networking technology
Question
A colleague at work takes small amounts of office supplies for her own personal use,saying that this is a tiny loss to the company.You tell her that if everyone were to take office supplies,then the loss would no longer be minimal.Your rationale expresses which of the following ethical principles?

A)Kant's Categorical Imperative
B)The Golden Rule
C)The Risk Aversion Principle
D)The "No free lunch" rule
E)The slippery-slope rule
Question
Which of the following is a data analysis technology that finds hidden connections between data in disparate sources?

A)HIPAA
B)FIP
C)NORA
D)COPPA
E)Spyware
Question
All of the following are steps in the process for analyzing an ethical issue except:

A)assigning responsibility.
B)identifying the stakeholders.
C)identifying the options you can reasonably take.
D)identifying and clearly describing the facts.
E)identifying the potential consequences of your options.
Question
Identify the five moral dimensions that are involved in political,social,and ethical issues and briefly describe each.Of these,which do you think is the most difficult for society to deal with? Support your opinion.
Question
________ is a feature of law-governed society and involves having laws that are known and understood,along with the ability to appeal to higher authorities to ensure that the laws are applied correctly.

A)Liability
B)Due process
C)Responsibility
D)Accountability
E)The judicial system
Question
________ means that you accept the potential costs and obligations for the decisions you make.

A)Responsibility
B)Accountability
C)Liability
D)Due process
E)Duty
Question
Which of the following best describes how new information systems can result in legal gray areas?

A)They work with networked,digital data,which are more difficult to control than information stored manually.
B)They result in new situations that are not covered by old laws.
C)They are implemented by technicians rather than managers.
D)They are created from sets of logical and technological rules rather than social or organizational mores.
E)They are little understood by politicians or lawyers.
Question
________ is a feature of social institutions that means mechanisms are in place to determine responsibility for an action.

A)Due process
B)Accountability
C)The courts of appeal
D)The judicial system
E)Liability
Question
In today's legal environment,managers who are convicted for the illegal use of information systems are still unlikely to be given a prison sentence.
Question
The obligations that individuals and organizations have concerning rights to intellectual property involve which of the following moral dimensions of the information age?

A)Property rights and obligations
B)System quality
C)Accountability and control
D)Information rights and obligations
E)Quality of life
Question
Which of the five moral dimensions of the information age do the central business activities of DoubleClick involve?

A)Property rights and obligations
B)System quality
C)Accountability and control
D)Quality of life
E)Information rights and obligations
Question
What is NORA and how does it work?
Question
Describe three technology trends that pose ethical issues,giving an example for each of its ethical or moral impact.
Question
Which of the following is not an example of the moral dimensions of the information age identified in the text?

A)Information rights and obligations
B)The emergence of giant tech firms that dominate their markets
C)Accountability and control
D)System quality
E)Quality of life
Question
The use of computers to assemble data from different sources to create digital dossiers of detailed information about individuals is known as which of the following?

A)Profiling
B)Phishing
C)Spamming
D)Targeting
E)Spyware
Question
Which of the following best describes the effect that new information technology has on society?

A)It has a dampening effect on the discourse of business ethics.
B)It has a ripple effect,raising new ethical,social,and political issues.
C)It is beneficial for society as a whole,while raising dilemmas for consumers.
D)It has a waterfall effect in raising ever more complex ethical issues.
E)It has a magnifying effect,creating increasing numbers of ethical issues.
Question
Routine violations of individual privacy are made easier by advances in data storage.
Question
In 2010,the FTC added all of the following recommendations to its privacy guidelines except:

A)firms should build products and services that protect privacy.
B)firms should increase the transparency of their data collection.
C)firms should require consumer consent and provide clear options to opt out of data collection.
D)firms should limit the length of time that any personal data is stored to six months or less.
E)consumers should be able to review and contest the accuracy and completeness of data.
Question
When a cookie is created during a website visit,it is stored:

A)on the website's server.
B)on the hard drive of the visitor's computer.
C)on the ISP's servers.
D)in the browser's application settings.
E)nowhere,because they are only used during a visit and are discarded once a visitor leaves the website.
Question
Which of the following best describes Immanuel Kant's categorical imperative?

A)If an action cannot be taken repeatedly,then it is not right to be taken at any time.
B)One should take the action that produces the least harm or incurs the least cost.
C)One can put values in rank order and understand the consequences of various courses of action.
D)If an action is not right for everyone to take,it is not right for anyone to take.
E)You should act towards others as you would like them to act towards you.
Question
Which of the following ethical guidelines suggests that you put yourself in the place of others,and think of yourself as the object of the decision?

A)Kant's categorical imperative
B)the risk aversion principle
C)the utilitarian principle
D)the Golden Rule
E)the "no free lunch" rule
Question
The ethical "no free lunch" rule states that:

A)if an action cannot be taken repeatedly,then it is not right to be taken at any time.
B)one should take the action that produces the least harm or incurs the least cost.
C)one can put values in rank order and understand the consequences of various courses of action.
D)if something someone else has created is useful to you,it has value,and you should assume the creator wants compensation for this work.
E)if an action is not right for everyone to take,it is not right for anyone to take.
Question
According to ________,you should take the action that produces the least harm.

A)Kant's categorical imperative
B)the risk aversion principle
C)the utilitarian principle
D)the Golden Rule
E)the "no free lunch" rule
Question
Identify and discuss the six ethical principles discussed in the chapter.
Question
Which of the following is not a U.S.federal law affecting private institutions?

A)COPPA
B)HIPAA
C)Gramm-Leach-Bliley Act
D)Video Privacy Protection Act
E)Computer Matching and Privacy Protection Act
Question
Which of the following U.S.laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed?

A)HIPAA
B)Gramm-Leach-Bliley Act
C)Privacy Protection Act
D)Freedom of Information Act
E)COPPA
Question
Because of their special claims to knowledge,wisdom,and respect,professionals take on special rights and obligations.
Question
A man steals from a grocery store in order to feed his starving family.Which of the following best expresses the utilitarian principle in evaluating this situation?

A)His action is acceptable,because the grocer suffers the least harm.
B)His action is acceptable,because the higher social value is the survival of the family.
C)His action is wrong,because the man would not want the grocer to steal from him.
D)His action is wrong,because if everyone were to do this,the concept of personal property is defeated.
E)His action is wrong,because the grocery store owner is harmed.
Question
What are the steps in conducting an ethical analysis?
Question
Define the basic concepts of responsibility,accountability,and liability as applied to ethical decisions.How are these concepts related?
Question
Liability is a feature of political systems and allows individuals to recover damages done to them by others.
Question
FIP principles are based on a belief in which of the following?

A)Accountability of the record holder
B)Responsibility of the record holder
C)Mutuality of interest between the record holder and the individual
D)Privacy of the individual
E)Difference between the interests of the individual and commercial organizations
Question
The FIP principle of Notice/Awareness states that:

A)customers must be allowed to choose how their information will be used for secondary purposes other than the supporting transaction.
B)data collectors must take responsible steps to assure that consumer information is accurate and secure from unauthorized use.
C)there must be a mechanism in place to enforce FIP principles.
D)consumers should be able to review the data collected about them.
E)websites must disclose their information practices before collecting data.
Question
Identifying the stakeholders-people who have a vested interest in the outcome of the decision-is the last step in analyzing an ethical issue.
Question
All of the following laws apply to actions by the federal government except the:

A)Freedom of Information Act.
B)Privacy Act.
C)Computer Security Act.
D)Children's Online Privacy Protection Act.
E)E-Government Act.
Question
Which ethical rule states that if an action cannot be taken repeatedly,it is not right to take at all?

A)Slippery-slope rule
B)Lemming rule
C)High-failure cost rule
D)Utilitarian principle
E)Golden Rule
Question
Which of the following restricts the information that the U.S.federal government can collect about an individual and regulates what it can do with the information?

A)The Privacy Act
B)The Gramm-Leach-Bliley Act
C)The Freedom of Information Act
D)COPPA
E)HIPPA
Question
________ grants the owner exclusive ownership of the ideas behind an invention for 20 years.

A)Copyright law
B)Trademark law
C)Patent law
D)Trade secret protection
E)Privacy law
Question
Which of the following is not a difficulty in establishing patent protection?

A)Length of time required to receive protection
B)The requirement that the work reflect some special understanding and contribution
C)The requirement that the work must be original
D)The requirement that the work must be novel
E)The requirement that the work must be a secret
Question
What is not a feature of the General Data Protection Regulation (GDPR)?

A)It applies to all firms doing business in the EU.
B)It requires unambiguous consent for using personal data to construct profiles.
C)It imposes fines on companies for violating the regulation up to 4 percent of a firm's global revenue.
D)It creates a single EU privacy policy.
E)It prevents firms from using cookies.
Question
The ________ is a feature of the GDPR that allows individuals to have their personal information removed from social network and search sites.

A)right to opt-out of data collection
B)right to a safe harbor
C)right to be forgotten
D)right to do not track
E)right to opt-in to data collection
Question
What percent of global Internet users use Google Search and other Google services such as YouTube?

A)Less than 10 percent
B)Around 25 percent
C)About 50 percent
D)Nearly 80 percent
E)Over 90 percent
Question
Which of the following protects the authors of a book from having their work copied by others?

A)Patent protection
B)Due process
C)Copyright law
D)Fair Use Doctrine
E)Trade Secret law
Question
Advertisers use ________ in order to display more relevant ads based on a user's search and browsing history.

A)behavioral targeting
B)Web bugs
C)NORA
D)intelligent agents
E)FIP principles
Question
In the ________ model of informed consent,personal information cannot be collected until the consumer specifically agrees that his or her data can be collected.

A)opt-in
B)opt-out
C)P3P
D)PGP
E)safe harbor
Question
"Look and feel" copyright infringement lawsuits are concerned with:

A)the distinction between tangible and intangible ideas.
B)the distinction between an idea and its expression.
C)using the graphical elements of another product.
D)using the creative elements of another product.
E)violation of a monopoly on the ideas behind a product.
Question
The GDPR created a ________ framework in order to enable U.S.businesses to legally use personal data from EU countries.

A)COPPA
B)P3P
C)PGP
D)FIP
E)safe harbor
Question
All of the following are technical solutions to protecting user privacy except:

A)email encryption.
B)anonymous surfing.
C)anonymous email.
D)preventing client computers from accepting cookies.
E)data use policies.
Question
Which of the following forms of protection of intellectual property requires that the property be the subject of a nondisclosure agreement?

A)Copyright
B)Patent
C)All forms of intellectual property protection
D)Trademark
E)Trade secret
Question
Which of the following statements about cookies is not true?

A)Cookies are installed only at the user's request.
B)Cookies are stored on the user's computer.
C)Cookies cannot be easily detected or deleted.
D)Cookies are used to support the user experience on websites.
E)Cookies can be combined with other website data to develop detailed profiles of customers.
Question
The NAI is an industry association formed to help with which of the following?

A)Copyright protection
B)Online privacy issues
C)Patent protection
D)Trademark protection
E)Trade secret protection
Question
Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials?

A)Digital Millennium Copyright Act
B)Privacy Act
C)Freedom of Information Act
D)Electronic Communications Privacy Act
E)Computer Software Copyright Act
Question
Which of the following is not protected by copyright law?

A)Musical compositions
B)Motion pictures
C)Maps
D)Artwork
E)Machines
Question
Digital media differs from a physical book in all of the following ways except:

A)ease of replication.
B)ease of alteration.
C)ease of transmission.
D)ease of global distribution.
E)ease of establishing uniqueness.
Question
The Network Advertising Initiative is an industry association that:

A)encourages self-regulation to develop a set of privacy guidelines for its members.
B)protects user privacy during interactions with websites.
C)has established technical guidelines for ensuring privacy.
D)regulates the use of customer information by firms.
E)is a safe harbor program established by the U.S.government.
Question
Which of the following is not true about the changes to EU data protection rules enacted in the GDPR?

A)The new rules require Internet companies to obtain explicit consent from consumers for the use of their personal data.
B)The new rules require Internet companies to delete information at the user's request.
C)The new rules require Internet companies to retain information only as long as absolutely necessary.
D)The new rules do not allow consumers to have their data removed from company servers.
E)The new rules strengthen the right to be forgotten.
Question
________ allows an organization to collect personal information without the user's explicit consent.

A)A safe harbor
B)The opt-in model
C)FIP principles
D)P3P
E)The opt-out model
Question
Web beacons are tiny,invisible software programs hidden in email messages and web pages that are used to track and report a user's online behavior.
Question
What are Fair Information Practices (FIP)established by the Federal Trade Commission (FTC)?
Question
Describe how a cookie works.
Question
Software programs were unprotected by copyright law until the early 1990s.
Question
Which of the following were involved in what has been called the patent trial of the century?

A)Apple and Microsoft
B)Apple and Hewlett-Packard
C)Microsoft and Symantec
D)Microsoft and Facebook
E)Apple and Samsung
Question
European countries do not allow businesses to use personally identifiable information without consumers' prior consent.
Question
Some forms of illegal sharing of music files have declined as legitimate online music stores have expanded.
Question
Any intellectual work product that isn't based on public knowledge can be classed as a trade secret.
Question
Copyright is a legal protection given to creators of certain types of intellectual property.
Question
How does protection of privacy in Europe differ from the United States?
Question
Although online tracking gathers an enormous amount of information on individual users,it is anonymous and can't be tied to a specific person.
Question
Most Internet businesses do very little to protect the privacy of their customers.
Question
One of the key concepts in patent law is novelty.
Question
The European Parliament has banned unsolicited commercial messaging.
Question
Websites are not required to honor web browsers' Do Not Track settings.
Question
A Facebook user's visit to a website can be tracked even if they do not click a Like button.
Question
Which of the following is not a file-sharing service?

A)The Pirate Bay
B)Megaupload
C)Morpheus
D)Pandora
E)Grokster
Question
The DMCA requires ISPs to take down sites of copyright infringers they are hosting when the ISPs are notified of the problem.
Question
COPPA is a set of five principles developed by the FTC that most American and European privacy law is based on.
Question
Malicious software that is installed secretly on your computer by other applications and that tracks your online movements is called spyware.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/101
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 4: Ethical and Social Issues in Information Systems
1
The obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within which of the following moral dimensions of the information age?

A)Family and home
B)Property rights and obligations
C)System quality
D)Accountability and control
E)Quality of life
E
2
Ethics describes the principles of right and wrong that can be used by individuals to make choices to guide their behavior.
True
3
Which of the following is not one of the current key technology trends that raises ethical issues?

A)Data storage improvements
B)Data analysis advancements
C)Increase in data quality
D)Increase in use of mobile devices
E)Advances in networking technology
C
4
A colleague at work takes small amounts of office supplies for her own personal use,saying that this is a tiny loss to the company.You tell her that if everyone were to take office supplies,then the loss would no longer be minimal.Your rationale expresses which of the following ethical principles?

A)Kant's Categorical Imperative
B)The Golden Rule
C)The Risk Aversion Principle
D)The "No free lunch" rule
E)The slippery-slope rule
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following is a data analysis technology that finds hidden connections between data in disparate sources?

A)HIPAA
B)FIP
C)NORA
D)COPPA
E)Spyware
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
6
All of the following are steps in the process for analyzing an ethical issue except:

A)assigning responsibility.
B)identifying the stakeholders.
C)identifying the options you can reasonably take.
D)identifying and clearly describing the facts.
E)identifying the potential consequences of your options.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
7
Identify the five moral dimensions that are involved in political,social,and ethical issues and briefly describe each.Of these,which do you think is the most difficult for society to deal with? Support your opinion.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
8
________ is a feature of law-governed society and involves having laws that are known and understood,along with the ability to appeal to higher authorities to ensure that the laws are applied correctly.

A)Liability
B)Due process
C)Responsibility
D)Accountability
E)The judicial system
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
9
________ means that you accept the potential costs and obligations for the decisions you make.

A)Responsibility
B)Accountability
C)Liability
D)Due process
E)Duty
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following best describes how new information systems can result in legal gray areas?

A)They work with networked,digital data,which are more difficult to control than information stored manually.
B)They result in new situations that are not covered by old laws.
C)They are implemented by technicians rather than managers.
D)They are created from sets of logical and technological rules rather than social or organizational mores.
E)They are little understood by politicians or lawyers.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
11
________ is a feature of social institutions that means mechanisms are in place to determine responsibility for an action.

A)Due process
B)Accountability
C)The courts of appeal
D)The judicial system
E)Liability
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
12
In today's legal environment,managers who are convicted for the illegal use of information systems are still unlikely to be given a prison sentence.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
13
The obligations that individuals and organizations have concerning rights to intellectual property involve which of the following moral dimensions of the information age?

A)Property rights and obligations
B)System quality
C)Accountability and control
D)Information rights and obligations
E)Quality of life
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the five moral dimensions of the information age do the central business activities of DoubleClick involve?

A)Property rights and obligations
B)System quality
C)Accountability and control
D)Quality of life
E)Information rights and obligations
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
15
What is NORA and how does it work?
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
16
Describe three technology trends that pose ethical issues,giving an example for each of its ethical or moral impact.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following is not an example of the moral dimensions of the information age identified in the text?

A)Information rights and obligations
B)The emergence of giant tech firms that dominate their markets
C)Accountability and control
D)System quality
E)Quality of life
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
18
The use of computers to assemble data from different sources to create digital dossiers of detailed information about individuals is known as which of the following?

A)Profiling
B)Phishing
C)Spamming
D)Targeting
E)Spyware
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following best describes the effect that new information technology has on society?

A)It has a dampening effect on the discourse of business ethics.
B)It has a ripple effect,raising new ethical,social,and political issues.
C)It is beneficial for society as a whole,while raising dilemmas for consumers.
D)It has a waterfall effect in raising ever more complex ethical issues.
E)It has a magnifying effect,creating increasing numbers of ethical issues.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
20
Routine violations of individual privacy are made easier by advances in data storage.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
21
In 2010,the FTC added all of the following recommendations to its privacy guidelines except:

A)firms should build products and services that protect privacy.
B)firms should increase the transparency of their data collection.
C)firms should require consumer consent and provide clear options to opt out of data collection.
D)firms should limit the length of time that any personal data is stored to six months or less.
E)consumers should be able to review and contest the accuracy and completeness of data.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
22
When a cookie is created during a website visit,it is stored:

A)on the website's server.
B)on the hard drive of the visitor's computer.
C)on the ISP's servers.
D)in the browser's application settings.
E)nowhere,because they are only used during a visit and are discarded once a visitor leaves the website.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
23
Which of the following best describes Immanuel Kant's categorical imperative?

A)If an action cannot be taken repeatedly,then it is not right to be taken at any time.
B)One should take the action that produces the least harm or incurs the least cost.
C)One can put values in rank order and understand the consequences of various courses of action.
D)If an action is not right for everyone to take,it is not right for anyone to take.
E)You should act towards others as you would like them to act towards you.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
24
Which of the following ethical guidelines suggests that you put yourself in the place of others,and think of yourself as the object of the decision?

A)Kant's categorical imperative
B)the risk aversion principle
C)the utilitarian principle
D)the Golden Rule
E)the "no free lunch" rule
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
25
The ethical "no free lunch" rule states that:

A)if an action cannot be taken repeatedly,then it is not right to be taken at any time.
B)one should take the action that produces the least harm or incurs the least cost.
C)one can put values in rank order and understand the consequences of various courses of action.
D)if something someone else has created is useful to you,it has value,and you should assume the creator wants compensation for this work.
E)if an action is not right for everyone to take,it is not right for anyone to take.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
26
According to ________,you should take the action that produces the least harm.

A)Kant's categorical imperative
B)the risk aversion principle
C)the utilitarian principle
D)the Golden Rule
E)the "no free lunch" rule
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
27
Identify and discuss the six ethical principles discussed in the chapter.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
28
Which of the following is not a U.S.federal law affecting private institutions?

A)COPPA
B)HIPAA
C)Gramm-Leach-Bliley Act
D)Video Privacy Protection Act
E)Computer Matching and Privacy Protection Act
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
29
Which of the following U.S.laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed?

A)HIPAA
B)Gramm-Leach-Bliley Act
C)Privacy Protection Act
D)Freedom of Information Act
E)COPPA
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
30
Because of their special claims to knowledge,wisdom,and respect,professionals take on special rights and obligations.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
31
A man steals from a grocery store in order to feed his starving family.Which of the following best expresses the utilitarian principle in evaluating this situation?

A)His action is acceptable,because the grocer suffers the least harm.
B)His action is acceptable,because the higher social value is the survival of the family.
C)His action is wrong,because the man would not want the grocer to steal from him.
D)His action is wrong,because if everyone were to do this,the concept of personal property is defeated.
E)His action is wrong,because the grocery store owner is harmed.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
32
What are the steps in conducting an ethical analysis?
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
33
Define the basic concepts of responsibility,accountability,and liability as applied to ethical decisions.How are these concepts related?
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
34
Liability is a feature of political systems and allows individuals to recover damages done to them by others.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
35
FIP principles are based on a belief in which of the following?

A)Accountability of the record holder
B)Responsibility of the record holder
C)Mutuality of interest between the record holder and the individual
D)Privacy of the individual
E)Difference between the interests of the individual and commercial organizations
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
36
The FIP principle of Notice/Awareness states that:

A)customers must be allowed to choose how their information will be used for secondary purposes other than the supporting transaction.
B)data collectors must take responsible steps to assure that consumer information is accurate and secure from unauthorized use.
C)there must be a mechanism in place to enforce FIP principles.
D)consumers should be able to review the data collected about them.
E)websites must disclose their information practices before collecting data.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
37
Identifying the stakeholders-people who have a vested interest in the outcome of the decision-is the last step in analyzing an ethical issue.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
38
All of the following laws apply to actions by the federal government except the:

A)Freedom of Information Act.
B)Privacy Act.
C)Computer Security Act.
D)Children's Online Privacy Protection Act.
E)E-Government Act.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
39
Which ethical rule states that if an action cannot be taken repeatedly,it is not right to take at all?

A)Slippery-slope rule
B)Lemming rule
C)High-failure cost rule
D)Utilitarian principle
E)Golden Rule
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
40
Which of the following restricts the information that the U.S.federal government can collect about an individual and regulates what it can do with the information?

A)The Privacy Act
B)The Gramm-Leach-Bliley Act
C)The Freedom of Information Act
D)COPPA
E)HIPPA
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
41
________ grants the owner exclusive ownership of the ideas behind an invention for 20 years.

A)Copyright law
B)Trademark law
C)Patent law
D)Trade secret protection
E)Privacy law
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
42
Which of the following is not a difficulty in establishing patent protection?

A)Length of time required to receive protection
B)The requirement that the work reflect some special understanding and contribution
C)The requirement that the work must be original
D)The requirement that the work must be novel
E)The requirement that the work must be a secret
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
43
What is not a feature of the General Data Protection Regulation (GDPR)?

A)It applies to all firms doing business in the EU.
B)It requires unambiguous consent for using personal data to construct profiles.
C)It imposes fines on companies for violating the regulation up to 4 percent of a firm's global revenue.
D)It creates a single EU privacy policy.
E)It prevents firms from using cookies.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
44
The ________ is a feature of the GDPR that allows individuals to have their personal information removed from social network and search sites.

A)right to opt-out of data collection
B)right to a safe harbor
C)right to be forgotten
D)right to do not track
E)right to opt-in to data collection
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
45
What percent of global Internet users use Google Search and other Google services such as YouTube?

A)Less than 10 percent
B)Around 25 percent
C)About 50 percent
D)Nearly 80 percent
E)Over 90 percent
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
46
Which of the following protects the authors of a book from having their work copied by others?

A)Patent protection
B)Due process
C)Copyright law
D)Fair Use Doctrine
E)Trade Secret law
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
47
Advertisers use ________ in order to display more relevant ads based on a user's search and browsing history.

A)behavioral targeting
B)Web bugs
C)NORA
D)intelligent agents
E)FIP principles
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
48
In the ________ model of informed consent,personal information cannot be collected until the consumer specifically agrees that his or her data can be collected.

A)opt-in
B)opt-out
C)P3P
D)PGP
E)safe harbor
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
49
"Look and feel" copyright infringement lawsuits are concerned with:

A)the distinction between tangible and intangible ideas.
B)the distinction between an idea and its expression.
C)using the graphical elements of another product.
D)using the creative elements of another product.
E)violation of a monopoly on the ideas behind a product.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
50
The GDPR created a ________ framework in order to enable U.S.businesses to legally use personal data from EU countries.

A)COPPA
B)P3P
C)PGP
D)FIP
E)safe harbor
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
51
All of the following are technical solutions to protecting user privacy except:

A)email encryption.
B)anonymous surfing.
C)anonymous email.
D)preventing client computers from accepting cookies.
E)data use policies.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
52
Which of the following forms of protection of intellectual property requires that the property be the subject of a nondisclosure agreement?

A)Copyright
B)Patent
C)All forms of intellectual property protection
D)Trademark
E)Trade secret
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
53
Which of the following statements about cookies is not true?

A)Cookies are installed only at the user's request.
B)Cookies are stored on the user's computer.
C)Cookies cannot be easily detected or deleted.
D)Cookies are used to support the user experience on websites.
E)Cookies can be combined with other website data to develop detailed profiles of customers.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
54
The NAI is an industry association formed to help with which of the following?

A)Copyright protection
B)Online privacy issues
C)Patent protection
D)Trademark protection
E)Trade secret protection
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
55
Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials?

A)Digital Millennium Copyright Act
B)Privacy Act
C)Freedom of Information Act
D)Electronic Communications Privacy Act
E)Computer Software Copyright Act
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
56
Which of the following is not protected by copyright law?

A)Musical compositions
B)Motion pictures
C)Maps
D)Artwork
E)Machines
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
57
Digital media differs from a physical book in all of the following ways except:

A)ease of replication.
B)ease of alteration.
C)ease of transmission.
D)ease of global distribution.
E)ease of establishing uniqueness.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
58
The Network Advertising Initiative is an industry association that:

A)encourages self-regulation to develop a set of privacy guidelines for its members.
B)protects user privacy during interactions with websites.
C)has established technical guidelines for ensuring privacy.
D)regulates the use of customer information by firms.
E)is a safe harbor program established by the U.S.government.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
59
Which of the following is not true about the changes to EU data protection rules enacted in the GDPR?

A)The new rules require Internet companies to obtain explicit consent from consumers for the use of their personal data.
B)The new rules require Internet companies to delete information at the user's request.
C)The new rules require Internet companies to retain information only as long as absolutely necessary.
D)The new rules do not allow consumers to have their data removed from company servers.
E)The new rules strengthen the right to be forgotten.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
60
________ allows an organization to collect personal information without the user's explicit consent.

A)A safe harbor
B)The opt-in model
C)FIP principles
D)P3P
E)The opt-out model
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
61
Web beacons are tiny,invisible software programs hidden in email messages and web pages that are used to track and report a user's online behavior.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
62
What are Fair Information Practices (FIP)established by the Federal Trade Commission (FTC)?
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
63
Describe how a cookie works.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
64
Software programs were unprotected by copyright law until the early 1990s.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
65
Which of the following were involved in what has been called the patent trial of the century?

A)Apple and Microsoft
B)Apple and Hewlett-Packard
C)Microsoft and Symantec
D)Microsoft and Facebook
E)Apple and Samsung
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
66
European countries do not allow businesses to use personally identifiable information without consumers' prior consent.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
67
Some forms of illegal sharing of music files have declined as legitimate online music stores have expanded.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
68
Any intellectual work product that isn't based on public knowledge can be classed as a trade secret.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
69
Copyright is a legal protection given to creators of certain types of intellectual property.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
70
How does protection of privacy in Europe differ from the United States?
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
71
Although online tracking gathers an enormous amount of information on individual users,it is anonymous and can't be tied to a specific person.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
72
Most Internet businesses do very little to protect the privacy of their customers.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
73
One of the key concepts in patent law is novelty.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
74
The European Parliament has banned unsolicited commercial messaging.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
75
Websites are not required to honor web browsers' Do Not Track settings.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
76
A Facebook user's visit to a website can be tracked even if they do not click a Like button.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
77
Which of the following is not a file-sharing service?

A)The Pirate Bay
B)Megaupload
C)Morpheus
D)Pandora
E)Grokster
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
78
The DMCA requires ISPs to take down sites of copyright infringers they are hosting when the ISPs are notified of the problem.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
79
COPPA is a set of five principles developed by the FTC that most American and European privacy law is based on.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
80
Malicious software that is installed secretly on your computer by other applications and that tracks your online movements is called spyware.
Unlock Deck
Unlock for access to all 101 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 101 flashcards in this deck.