Deck 4: Social, ethical, and Legal Issues in Information Systems

Full screen (f)
exit full mode
Question
Privacy is the right to be left alone when you want to be,without surveillance or interference from other individuals or organizations.
Use Space or
up arrow
down arrow
to flip the card.
Question
Ethical,social,and legal or political issues are not linked.
Question
The major ethical,social,and political issues raised by information systems include accountability and control.
Question
Ethical issues in information systems have been given new urgency by the rise of the Internet and electronic commerce.
Question
Golden Rule Ethical principle states "Do unto others as you would have them do unto you."
Question
In today's new economic environment,managers who violate the law and are convicted will most likely spend time in prison.
Question
One of the four key technological trends responsible for ethical stresses is that computing power doubles every 18 months.
Question
Software piracy is bad for business.
Question
Advances in data storage have made routine violation of individual privacy more difficult.
Question
The major ethical,social,and political issues raised by information systems include informed consent.
Question
Ethics are principles of right and wrong that can be used by individuals acting as free moral agents to make choices to guide their behaviour.
Question
Descartes' rule of change categorical imperative is a principle that states that if an action is not right for everyone to take,it is not right for anyone.
Question
Liability extends the concept of responsibility further to the area of laws.
Question
One of the four key technological trends responsible for ethical stresses are the use of iPhones.
Question
One of the four key technological trends responsible for ethical stresses is networking advances and the Internet.
Question
The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called spoofing.
Question
Risk aversion principle states that one should take the action that produces the least harm or incurs the least cost.
Question
Responsibility is a very minor element of ethical action.
Question
The major ethical,social,and political issues raised by information systems include property rights and obligations.
Question
Nonobvious relationship awareness (NORA)is technology that can find obscure hidden connections between people or other entities by analyzing information from many different sources to correlate relationships.
Question
Right now Quebec,Ontario,and Alberta are the only provinces with privacy laws for the private sector that meet European Union standards.
Question
In Europe,privacy protection is much more accommodating than in many non-European countries.
Question
Copyright is the legal protection afforded intellectual property,such as a song,book,or video game.
Question
Spam is unsolicited e-mail.
Question
In 2000,Parliament passed the Personal Information Protection and Electronic Documents Act (PIPEDA),Canada's modern privacy law.
Question
The key concepts in patent law's determination of nonobviousness are originality,novelty,and value.
Question
Many companies monitor what their employees are doing on the Internet to prevent them from wasting company resources on nonbusiness activities.
Question
Protection for trade secrets is enforced at the federal level.
Question
A cookie is a small file containing information about you and your Web activities that is deposited on your hard disk by a Web site.
Question
Most Internet businesses do very little to protect the privacy of their customers.
Question
The drawback to copyright protection is that the underlying ideas behind the work are not protected,only their manifestation in a product.
Question
Web sites use "cookies" in order to obtain the names and addresses of their visitors.
Question
Despite the passage of several laws defining and addressing computer crime,accessing a computer system without authorization is not yet a federal crime.
Question
A safe harbour is a private,self-regulating policy and enforcement mechanism that meets the objectives of government regulators and legislation but does not involve government regulation or enforcement.
Question
According to the courts,in the creation of software,unique concepts,general functional features,and even colours are protectable by copyright law.
Question
P3P encrypts or scrambles e-mail or data so that it cannot be read illicitly.
Question
The Copyright Office began registering software programs in the 1990s.
Question
The claim to privacy is protected in the Canadian,U.S.,and German constitutions in a in exactly the same way and in other countries through various statutes.
Question
Spyware is software that comes hidden in downloaded applications and can track your online movements.
Question
The European Parliament has passed a ban on unsolicited commercial messaging.
Question
Of users who text while driving,the more older demographic groups,such as the 38-49 age group,are by far the most frequent texters.
Question
Resources like Wikipedia and Google have helped to organize knowledge and make that knowledge accessible to the world,and they would have been possible without the Internet.
Question
The growth in the power,reach,and scope of behavioural targeting has drawn the attention of privacy groups and the Canadian Office of the Privacy Commissioner.
Question
Hands-free sets were effective in eliminating risk of driving while using a cell phone.
Question
New studies suggest that digital technologies are helping our ability to think clearly and focus.
Question
Google is the largest Web tracker,monitoring thousands of sites.
Question
Your behaviour is being tracked,and you are being targeted on the Web so that you are exposed to certain ads and not others.
Question
RSI is unavoidable for a computer keyboard worker.
Question
In today's new legal environment,managers who violate the law and are convicted will most likely

A)get probation.
B)spend time in prison.
C)pay a fine.
D)pay a fine and get probation.
Question
Information systems

A)pose traditional ethical situations in new manners.
B)raise new ethical questions.
C)raise the same ethical questions created by the industrial revolution.
D)raise ethical questions primarily related to information rights and obligations.
Question
In terms of management productivity,studies of Internet use in the workplace suggest that Web 2.0 social technologies offer managers new opportunities to utilize time and focus on their responsibilities.
Question
Radiation from computer display screens has been proved to be a factor in CVS.
Question
Food Inc.operates a Web site for their firm.They ask visitors to the Web site to give information such as name,e-mail,address,DOB,etc.Food Inc.has found that they can sell this information to outside marketing groups for a lot of money.They are in the process of deciding if they should sell their customers information.The moral dimension best described by this scenario is

A)information rights and obligations.
B)property rights and obligations.
C)accountability and control.
D)quality of life
Question
Talking on the cell phone while driving is equivalent to a 10-point reduction in IQ and a .08 blood alcohol level,which law enforcement considers intoxicated.
Question
Mary telecommutes with her head office in downtown Toronto.She finds that she is working longer hours at home than she did at the office.Her work day starts as soon as she gets out of bed as she checks her e-mail and responds to it.She is also finding that she stays on the computer long after supper in the evening as she ties up loose ends from the previous day's work.The moral dimension best described by this scenario is

A)information rights and obligations.
B)property rights and obligations.
C)accountability and control.
D)quality of life
Question
Mary has found a way to get access to her school's grading database.She determines that she can change her own grades to a higher level without getting caught.She decides not to because she feels she wouldn't want someone to access her information and change things without permission so she won't do that to others.The ethical principle best described by this scenario is

A)the golden rule.
B)the Immanuel Kant's categorical imperative.
C)the utilitarian principle.
D)the risk aversion principle
Question
Doors Inc.has just developed a new software that helps put in state of the art manufacturing techniques into plants.A quick search of the Internet reveals that another company in China already has a copy of their software that has not yet been put on the market.The moral dimension best described by this scenario is

A)information rights and obligations.
B)property rights and obligations.
C)accountability and control.
D)quality of life
Question
Technostress is a computer-related malady whose symptoms include fatigue.
Question
"Free is Me" is a software company that sells file-sharing software.Once customers have downloaded the software,they can download movies,music,and software programs for free.If these goods were purchased at a store,they would cost anywhere from ten dollars to several hundred dollars.This is a great way to get all this stuff for free.The moral dimension best described by this scenario is

A)information rights and obligations.
B)property rights and obligations.
C)accountability and control.
D)quality of life
Question
The technology used to implement online tracking is a combination of cookies,Flash cookies,and Web beacons (also called "Web bugs").
Question
The feature of social institutions that means mechanisms are in place to determine responsibility for an action is called

A)due process.
B)accountability.
C)the courts of appeal.
D)the judicial system.
Question
Orange Computers sell software on their Web site.They have a policy of putting secret software on their clients computers when they install the actual software which they purchase from Orange Computers.This secret software calls out to other Web sites to send banner ads and other unsolicited material to the user.This secret software is ________.

A)a Web bug
B)a cookie
C)spyware
D)illegal
Question
The feature of political systems in which a body of laws is in place that permits individuals to recover the damages done to them by other actors,systems,or organizations is referred to as

A)accountability.
B)responsibility.
C)due process.
D)liability.
Question
The four key technical trends responsible for current ethical stresses related to information technology are (1)doubling of computer power every 18 months,(2)data analysis advances,(3)declining data storage costs,and (4)________.

A)advances in wireless networking
B)international standards for data protection
C)networking advances and the Internet
D)increased ease in file sharing and copying
Question
Fred has found a way to get access to his school's grading database.He determines that he can change his own grades to a higher level but there is a chance he might get caught.He decides not to change his grade because if he gets caught he will get kicked out of school and not be able to go to college.The ethical principle best described by this scenario is

A)the golden rule.
B)the Immanuel Kant's categorical imperative.
C)the utilitarian principle.
D)the risk aversion principle
Question
In the information age,the obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within the moral dimension of

A)family and home.
B)property rights and obligations.
C)system quality.
D)quality of life.
Question
The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called

A)profiling.
B)phishing.
C)spamming.
D)targeting.
Question
Books Inc.sell books on their Web site.They have a policy toward their customer privacy of self-regulating.Their policy meets all the government regulation and legislation but does not involve government regulation or enforcement.The principle best described by this scenario is

A)liability
B)due process
C)safe harbour
D)informed consent
Question
NORA is a

A)profiling technology used by the EU.
B)federal privacy law protecting networked data
C)new data analysis technology that finds hidden connections between data in disparate sources.
D)sentencing guideline adopted in 1987 mandating stiff sentences on business executives.
Question
The introduction of new information technology has a

A)dampening effect on the discourse of business ethics.
B)ripple effect raising new ethical,social,and political issues.
C)beneficial effect for society as a whole,while raising dilemmas for consumers.
D)waterfall effect in raising ever more complex ethical issues.
Question
Accepting the potential costs,duties,and obligations for the decisions you make is referred to as

A)responsibility.
B)accountability.
C)liability.
D)due process.
Question
Advances in data storage techniques and rapidly declining storage costs have

A)been accompanied by relevant federal statutes protecting personal data.
B)made universal access possible.
C)doubled every 18 months.
D)made routine violations of privacy cheap and effective.
Question
Barb is buying a book online.They are asking her to give them a large amount of personal information before she is able to buy the book.The book site describes what will happen with the information and they also provide a way for Barb to ask them to collect no more data on her.The principle best described by this scenario is

A)liability
B)due process
C)safe harbor
D)informed consent
Question
Books Inc.sell books at their Web site.They have a policy of putting tiny files on their clients computers to track visits to their site.This tiny program can customize the clients next visit to Books Inc.site.This tiny files is a ________.

A)Web bug
B)cracker
C)cookie
D)biscuit
Question
In the information age,the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of

A)property rights and obligations.
B)system quality.
C)accountability and control.
D)information rights and obligations.
Question
Ben has found a way to get access to his school's grading database.He determines that he can change his own grades to a higher level without getting caught.He decides not to because he feels he needs to choose between earning a grades or a lesser value choice of stealing a grade or getting something for nothing.He will choose the higher value choice and not changing the grade.The ethical principle best described by this scenario is

A)the golden rule.
B)the Immanuel Kant's categorical imperative.
C)the utilitarian principle.
D)the risk aversion principle
Question
Software is protected from being stolen,replicated,and sold by anyone but the owner of the software or those given his permission by what law?

A)Canadian property law
B)Canadian patent law
C)Canadian copyright law
D)There is no legal protection.
Question
Right now ________ is the only province with privacy laws for the private sector that meet European Union standards.

A)Alberta
B)Ontario
C)Nova Scotia
D)Quebec
Question
John has found a way to get access to his school's grading database.He determines that he can change his own grades to a higher level without getting caught.He decides not to because he feels this would not be right if everyone did this so it is not right that he alone should do it.The ethical principle best described by this scenario is

A)the golden rule.
B)the Immanuel Kant's categorical imperative.
C)the utilitarian principle.
D)the risk aversion principle
Question
Which of the five moral dimensions of the information age do the central business activities of ChoicePoint raise?

A)property rights and obligations
B)system quality
C)accountability and control
D)information rights and obligations
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/198
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 4: Social, ethical, and Legal Issues in Information Systems
1
Privacy is the right to be left alone when you want to be,without surveillance or interference from other individuals or organizations.
True
2
Ethical,social,and legal or political issues are not linked.
False
3
The major ethical,social,and political issues raised by information systems include accountability and control.
True
4
Ethical issues in information systems have been given new urgency by the rise of the Internet and electronic commerce.
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
5
Golden Rule Ethical principle states "Do unto others as you would have them do unto you."
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
6
In today's new economic environment,managers who violate the law and are convicted will most likely spend time in prison.
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
7
One of the four key technological trends responsible for ethical stresses is that computing power doubles every 18 months.
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
8
Software piracy is bad for business.
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
9
Advances in data storage have made routine violation of individual privacy more difficult.
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
10
The major ethical,social,and political issues raised by information systems include informed consent.
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
11
Ethics are principles of right and wrong that can be used by individuals acting as free moral agents to make choices to guide their behaviour.
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
12
Descartes' rule of change categorical imperative is a principle that states that if an action is not right for everyone to take,it is not right for anyone.
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
13
Liability extends the concept of responsibility further to the area of laws.
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
14
One of the four key technological trends responsible for ethical stresses are the use of iPhones.
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
15
One of the four key technological trends responsible for ethical stresses is networking advances and the Internet.
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
16
The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called spoofing.
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
17
Risk aversion principle states that one should take the action that produces the least harm or incurs the least cost.
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
18
Responsibility is a very minor element of ethical action.
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
19
The major ethical,social,and political issues raised by information systems include property rights and obligations.
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
20
Nonobvious relationship awareness (NORA)is technology that can find obscure hidden connections between people or other entities by analyzing information from many different sources to correlate relationships.
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
21
Right now Quebec,Ontario,and Alberta are the only provinces with privacy laws for the private sector that meet European Union standards.
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
22
In Europe,privacy protection is much more accommodating than in many non-European countries.
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
23
Copyright is the legal protection afforded intellectual property,such as a song,book,or video game.
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
24
Spam is unsolicited e-mail.
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
25
In 2000,Parliament passed the Personal Information Protection and Electronic Documents Act (PIPEDA),Canada's modern privacy law.
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
26
The key concepts in patent law's determination of nonobviousness are originality,novelty,and value.
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
27
Many companies monitor what their employees are doing on the Internet to prevent them from wasting company resources on nonbusiness activities.
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
28
Protection for trade secrets is enforced at the federal level.
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
29
A cookie is a small file containing information about you and your Web activities that is deposited on your hard disk by a Web site.
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
30
Most Internet businesses do very little to protect the privacy of their customers.
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
31
The drawback to copyright protection is that the underlying ideas behind the work are not protected,only their manifestation in a product.
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
32
Web sites use "cookies" in order to obtain the names and addresses of their visitors.
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
33
Despite the passage of several laws defining and addressing computer crime,accessing a computer system without authorization is not yet a federal crime.
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
34
A safe harbour is a private,self-regulating policy and enforcement mechanism that meets the objectives of government regulators and legislation but does not involve government regulation or enforcement.
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
35
According to the courts,in the creation of software,unique concepts,general functional features,and even colours are protectable by copyright law.
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
36
P3P encrypts or scrambles e-mail or data so that it cannot be read illicitly.
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
37
The Copyright Office began registering software programs in the 1990s.
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
38
The claim to privacy is protected in the Canadian,U.S.,and German constitutions in a in exactly the same way and in other countries through various statutes.
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
39
Spyware is software that comes hidden in downloaded applications and can track your online movements.
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
40
The European Parliament has passed a ban on unsolicited commercial messaging.
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
41
Of users who text while driving,the more older demographic groups,such as the 38-49 age group,are by far the most frequent texters.
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
42
Resources like Wikipedia and Google have helped to organize knowledge and make that knowledge accessible to the world,and they would have been possible without the Internet.
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
43
The growth in the power,reach,and scope of behavioural targeting has drawn the attention of privacy groups and the Canadian Office of the Privacy Commissioner.
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
44
Hands-free sets were effective in eliminating risk of driving while using a cell phone.
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
45
New studies suggest that digital technologies are helping our ability to think clearly and focus.
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
46
Google is the largest Web tracker,monitoring thousands of sites.
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
47
Your behaviour is being tracked,and you are being targeted on the Web so that you are exposed to certain ads and not others.
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
48
RSI is unavoidable for a computer keyboard worker.
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
49
In today's new legal environment,managers who violate the law and are convicted will most likely

A)get probation.
B)spend time in prison.
C)pay a fine.
D)pay a fine and get probation.
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
50
Information systems

A)pose traditional ethical situations in new manners.
B)raise new ethical questions.
C)raise the same ethical questions created by the industrial revolution.
D)raise ethical questions primarily related to information rights and obligations.
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
51
In terms of management productivity,studies of Internet use in the workplace suggest that Web 2.0 social technologies offer managers new opportunities to utilize time and focus on their responsibilities.
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
52
Radiation from computer display screens has been proved to be a factor in CVS.
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
53
Food Inc.operates a Web site for their firm.They ask visitors to the Web site to give information such as name,e-mail,address,DOB,etc.Food Inc.has found that they can sell this information to outside marketing groups for a lot of money.They are in the process of deciding if they should sell their customers information.The moral dimension best described by this scenario is

A)information rights and obligations.
B)property rights and obligations.
C)accountability and control.
D)quality of life
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
54
Talking on the cell phone while driving is equivalent to a 10-point reduction in IQ and a .08 blood alcohol level,which law enforcement considers intoxicated.
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
55
Mary telecommutes with her head office in downtown Toronto.She finds that she is working longer hours at home than she did at the office.Her work day starts as soon as she gets out of bed as she checks her e-mail and responds to it.She is also finding that she stays on the computer long after supper in the evening as she ties up loose ends from the previous day's work.The moral dimension best described by this scenario is

A)information rights and obligations.
B)property rights and obligations.
C)accountability and control.
D)quality of life
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
56
Mary has found a way to get access to her school's grading database.She determines that she can change her own grades to a higher level without getting caught.She decides not to because she feels she wouldn't want someone to access her information and change things without permission so she won't do that to others.The ethical principle best described by this scenario is

A)the golden rule.
B)the Immanuel Kant's categorical imperative.
C)the utilitarian principle.
D)the risk aversion principle
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
57
Doors Inc.has just developed a new software that helps put in state of the art manufacturing techniques into plants.A quick search of the Internet reveals that another company in China already has a copy of their software that has not yet been put on the market.The moral dimension best described by this scenario is

A)information rights and obligations.
B)property rights and obligations.
C)accountability and control.
D)quality of life
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
58
Technostress is a computer-related malady whose symptoms include fatigue.
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
59
"Free is Me" is a software company that sells file-sharing software.Once customers have downloaded the software,they can download movies,music,and software programs for free.If these goods were purchased at a store,they would cost anywhere from ten dollars to several hundred dollars.This is a great way to get all this stuff for free.The moral dimension best described by this scenario is

A)information rights and obligations.
B)property rights and obligations.
C)accountability and control.
D)quality of life
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
60
The technology used to implement online tracking is a combination of cookies,Flash cookies,and Web beacons (also called "Web bugs").
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
61
The feature of social institutions that means mechanisms are in place to determine responsibility for an action is called

A)due process.
B)accountability.
C)the courts of appeal.
D)the judicial system.
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
62
Orange Computers sell software on their Web site.They have a policy of putting secret software on their clients computers when they install the actual software which they purchase from Orange Computers.This secret software calls out to other Web sites to send banner ads and other unsolicited material to the user.This secret software is ________.

A)a Web bug
B)a cookie
C)spyware
D)illegal
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
63
The feature of political systems in which a body of laws is in place that permits individuals to recover the damages done to them by other actors,systems,or organizations is referred to as

A)accountability.
B)responsibility.
C)due process.
D)liability.
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
64
The four key technical trends responsible for current ethical stresses related to information technology are (1)doubling of computer power every 18 months,(2)data analysis advances,(3)declining data storage costs,and (4)________.

A)advances in wireless networking
B)international standards for data protection
C)networking advances and the Internet
D)increased ease in file sharing and copying
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
65
Fred has found a way to get access to his school's grading database.He determines that he can change his own grades to a higher level but there is a chance he might get caught.He decides not to change his grade because if he gets caught he will get kicked out of school and not be able to go to college.The ethical principle best described by this scenario is

A)the golden rule.
B)the Immanuel Kant's categorical imperative.
C)the utilitarian principle.
D)the risk aversion principle
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
66
In the information age,the obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within the moral dimension of

A)family and home.
B)property rights and obligations.
C)system quality.
D)quality of life.
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
67
The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called

A)profiling.
B)phishing.
C)spamming.
D)targeting.
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
68
Books Inc.sell books on their Web site.They have a policy toward their customer privacy of self-regulating.Their policy meets all the government regulation and legislation but does not involve government regulation or enforcement.The principle best described by this scenario is

A)liability
B)due process
C)safe harbour
D)informed consent
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
69
NORA is a

A)profiling technology used by the EU.
B)federal privacy law protecting networked data
C)new data analysis technology that finds hidden connections between data in disparate sources.
D)sentencing guideline adopted in 1987 mandating stiff sentences on business executives.
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
70
The introduction of new information technology has a

A)dampening effect on the discourse of business ethics.
B)ripple effect raising new ethical,social,and political issues.
C)beneficial effect for society as a whole,while raising dilemmas for consumers.
D)waterfall effect in raising ever more complex ethical issues.
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
71
Accepting the potential costs,duties,and obligations for the decisions you make is referred to as

A)responsibility.
B)accountability.
C)liability.
D)due process.
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
72
Advances in data storage techniques and rapidly declining storage costs have

A)been accompanied by relevant federal statutes protecting personal data.
B)made universal access possible.
C)doubled every 18 months.
D)made routine violations of privacy cheap and effective.
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
73
Barb is buying a book online.They are asking her to give them a large amount of personal information before she is able to buy the book.The book site describes what will happen with the information and they also provide a way for Barb to ask them to collect no more data on her.The principle best described by this scenario is

A)liability
B)due process
C)safe harbor
D)informed consent
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
74
Books Inc.sell books at their Web site.They have a policy of putting tiny files on their clients computers to track visits to their site.This tiny program can customize the clients next visit to Books Inc.site.This tiny files is a ________.

A)Web bug
B)cracker
C)cookie
D)biscuit
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
75
In the information age,the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of

A)property rights and obligations.
B)system quality.
C)accountability and control.
D)information rights and obligations.
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
76
Ben has found a way to get access to his school's grading database.He determines that he can change his own grades to a higher level without getting caught.He decides not to because he feels he needs to choose between earning a grades or a lesser value choice of stealing a grade or getting something for nothing.He will choose the higher value choice and not changing the grade.The ethical principle best described by this scenario is

A)the golden rule.
B)the Immanuel Kant's categorical imperative.
C)the utilitarian principle.
D)the risk aversion principle
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
77
Software is protected from being stolen,replicated,and sold by anyone but the owner of the software or those given his permission by what law?

A)Canadian property law
B)Canadian patent law
C)Canadian copyright law
D)There is no legal protection.
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
78
Right now ________ is the only province with privacy laws for the private sector that meet European Union standards.

A)Alberta
B)Ontario
C)Nova Scotia
D)Quebec
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
79
John has found a way to get access to his school's grading database.He determines that he can change his own grades to a higher level without getting caught.He decides not to because he feels this would not be right if everyone did this so it is not right that he alone should do it.The ethical principle best described by this scenario is

A)the golden rule.
B)the Immanuel Kant's categorical imperative.
C)the utilitarian principle.
D)the risk aversion principle
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
80
Which of the five moral dimensions of the information age do the central business activities of ChoicePoint raise?

A)property rights and obligations
B)system quality
C)accountability and control
D)information rights and obligations
Unlock Deck
Unlock for access to all 198 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 198 flashcards in this deck.