Deck 4: Social ethical and Legal Issues in the Digital Firm

Full screen (f)
exit full mode
Question
The Copyright Office began registering software programs in the 1990s.
Use Space or
up arrow
down arrow
to flip the card.
Question
In white-collar fraud,information systems are most typically used as a means to hide financial evidence of crimes.
Question
Despite the passage of several laws defining and addressing computer crime,accessing a computer system without authorization is not yet a federal crime.
Question
The European Parliament has passed a ban on unsolicited commercial messaging.
Question
Data gathered by online behavioral tracking firms is limited to the user's behavior on a single Web site.
Question
Copyright is the legal protection afforded intellectual property,such as a song,book,or video game.
Question
Most Internet businesses do very little to protect the privacy of their customers.
Question
Advances in data storage have made routine violation of individual privacy more difficult.
Question
The most common type of computer-related RSI is CTS.
Question
Any unsolicited e-mail is legally considered spam.
Question
The last step in analyzing an ethical issue should be to identify the stakeholders-people who have a vested interest in the outcome of the decision.
Question
The drawback to copyright protection is that the underlying ideas behind the work are not protected,only their reproduction in a product.
Question
Spyware is software that comes hidden in downloaded applications and can track your online movements.
Question
Even in today's legal climate,there is little incentive for firms to cooperate with prosecutors investigating financial crimes at their firm.
Question
The key concepts in patent law are originality,novelty,and value.
Question
Technostress is a computer-related malady whose symptoms include fatigue.
Question
Most American and European privacy law is based on a set of five principles called COPPA.
Question
According to the courts,in the creation of software,unique concepts,general functional features,and even colors are protectable by copyright law.
Question
Privacy is the right to be left alone when you want to be,without surveillance or interference from other individuals or organizations.
Question
Professionals take on special rights and obligations because of their special claims to knowledge,wisdom,and respect.
Question
All of the following are current key technology trends raising ethical issues except

A) data storage improvements.
B) data analysis advancements.
C) increase in multimedia quality.
D) increase in use of mobile devices.
Question
Responsibility means that you accept the potential costs,duties,and obligations for the decisions you make.
Question
Accepting the potential costs,duties,and obligations for the decisions you make is referred to as

A) responsibility.
B) accountability.
C) liability.
D) due process.
Question
In Europe,privacy protection is much weaker than in North America.
Question
NORA is a

A) profiling technology used by the EU.
B) federal privacy law protecting networked data.
C) data analysis technology that finds hidden connections between data in disparate sources.
D) sentencing guideline adopted in 1987 mandating stiff sentences on business executives.
Question
Canada's privacy legislation meets the standards of the European Directive on Data Protection.
Question
Cookies are small text files deposited on a computer hard drive when a user visits Web sites.
Question
The introduction of new information technology has a

A) dampening effect on the discourse of business ethics.
B) ripple effect raising new ethical, social, and political issues.
C) beneficial effect for society as a whole, while raising dilemmas for consumers.
D) waterfall effect in raising ever more complex ethical issues.
Question
In the information age,the obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within the moral dimension of

A) family and home.
B) property rights and obligations.
C) system quality.
D) quality of life.
Question
Which of the following best describes how new information systems result in legal gray areas?

A) They work with networked, electronic data, which are more difficult to control than information stored manually.
B) They result in new situations that are not covered by old laws.
C) They are implemented by technicians rather than managers.
D) They are created from sets of logical and technological rules rather than social or organizational mores.
Question
Which of the five moral dimensions of the information age do the central business activities of ChoicePoint raise?

A) property rights and obligations
B) system quality
C) accountability and control
D) information rights and obligations
Question
The feature of social institutions that means mechanisms are in place to determine responsibility for an action is called

A) due process.
B) accountability.
C) the courts of appeal.
D) the judicial system.
Question
In the information age,the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of

A) property rights and obligations.
B) system quality.
C) accountability and control.
D) information rights and obligations.
Question
Web sites using cookie technology can directly obtain visitors' names and addresses.
Question
Internet and digital firm technologies make it more difficult than ever to assemble,integrate,and distribute information,unleashing new concerns about the appropriate use of customer information,the protection of personal privacy,and the protection of intellectual property.
Question
The process in law-governed societies in which laws are known and understood and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly is called

A) liability.
B) due process.
C) the courts of appeal.
D) accountability.
Question
Ethics refers to the principles of right and wrong that individuals,acting as free moral agents,use to make choices to guide their behaviours.
Question
In addition,in 2000,Parliament passed the Personal Technology Protection and Electronic Documents Act (PTPEDA),Canada's modern privacy law.
Question
The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called

A) profiling.
B) phishing.
C) spamming.
D) targeting.
Question
Informed consent can be defined as consent given without knowledge of all the facts needed to make a rational decision.
Question
When a cookie is created during a Web site visit,it is stored

A) on the Web site computer.
B) on the visitor's computer.
C) on the ISP's computer.
D) in a Web directory.
Question
A colleague of yours frequently takes for his own personal use small amounts of office supplies,noting that the loss to the company is minimal.You counter that if everyone were to take the office supplies,the loss would no longer be minimal.Your rationale expresses which historical ethical principle?

A) Kant's Categorical Imperative
B) the Golden Rule
C) the Risk Aversion Principle
D) the "No free lunch" rule
Question
One of the difficulties of patent protection is

A) that only the underlying ideas are protected.
B) digital media cannot be patented.
C) preventing the ideas from falling into public domain.
D) the years of waiting to receive it.
Question
Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials?

A) Digital Millennium Copyright Act
B) Privacy Act
C) Freedom of Information Act
D) Electronic Communications Privacy Act
Question
What legal mechanism protects the owners of intellectual property from having their work copied by others?

A) patent protection
B) intellectual property law
C) copyright law
D) Fair Use Doctrine
Question
European privacy protection is ________ than in the United States.

A) less far-reaching
B) less liable to laws
C) much less stringent
D) much more strict
Question
Flash cookies are different from ordinary cookies in that they

A) are installed only at the user's request.
B) are not stored on the user's computer.
C) cannot be easily detected or deleted.
D) monitor the user's behavior at a Web site.
Question
According to the ________,you should take the action that produces the least harm.

A) Categorical Imperative
B) Risk Aversion Principle
C) Utilitarian Principle
D) Golden Rule
Question
Which of the following is not one of the five steps discussed in the chapter as a process for analyzing an ethical issue?

A) Assign responsibility.
B) Identify the stakeholders.
C) Identify the options you can reasonably take.
D) Identify and clearly describe the facts.
Question
Intellectual property can best be described as

A) intangible property created by individuals or corporations.
B) unique creative work or ideas.
C) tangible or intangible property created from a unique idea.
D) the expression of an intangible idea.
Question
U.S.businesses are allowed to use personal data from EU countries if they

A) have informed consent.
B) create a safe harbor.
C) develop equivalent privacy protection policies.
D) make their privacy protection policies publicly available.
Question
The strength of patent protection is that it

A) puts the strength of law behind copyright.
B) allows protection from Internet theft of ideas put forth publicly.
C) is easy to define.
D) grants a monopoly on underlying concepts and ideas.
Question
"Look and feel" copyright infringement lawsuits are concerned with

A) the distinction between tangible and intangible ideas.
B) the distinction between an idea and its expression.
C) using the graphical elements of another product.
D) using the creative elements of another product.
Question
A(n)________ model of informed consent permits the collection of personal information until the consumer specifically requests that the data not be collected.

A) opt-in
B) opt-out
C) P3P
D) PGP
Question
Immanuel Kant's Categorical Imperative states that

A) if an action cannot be taken repeatedly, then it is not right to be taken at any time.
B) one should take the action that produces the least harm or incurs the least cost.
C) one can put values in rank order and understand the consequences of various courses of action.
D) if an action is not right for everyone to take, it is not right for anyone to take.
Question
The Online Privacy Alliance

A) encourages self-regulation to develop a set of privacy guidelines for its members.
B) protects user privacy during interactions with Web sites.
C) has established technical guidelines for ensuring privacy.
D) is a government agency regulating the use of customer information.
Question
Which of the following statements about trade secrets is not true?

A) Trade secret protections vary from state to state.
B) Any intellectual product, regardless of its purpose, can be classified as a trade secret.
C) Software that contains unique elements can be claimed as a trade secret.
D) Trade secret law protects the actual ideas in a product.
Question
A classic ethical dilemma is the hypothetical case of a man stealing from a grocery store in order to feed his starving family.If you used the Utilitarian Principle to evaluate this situation,you might argue that stealing the food is

A) acceptable, because the grocer suffers the least harm.
B) acceptable, because the higher value is the survival of the family.
C) wrong, because the man would not want the grocer to steal from him.
D) wrong, because if everyone were to do this, the concept of personal property is defeated.
Question
In general,it is very difficult to hold software producers liable for their software products when those products are considered to be

A) part of a machine.
B) similar to books.
C) services.
D) artistic expressions.
Question
The ethical "no free lunch" rule states that

A) if an action cannot be taken repeatedly, then it is not right to be taken at any time.
B) one should take the action that produces the least harm or incurs the least cost.
C) one can put values in rank order and understand the consequences of various courses of action.
D) everything is owned by someone else, and that the creator wants compensation for this work.
Question
______________________ is the commission of acts involving a computer that may not be illegal but that are considered unethical.

A) Computer misconduct
B) Computer crime
C) Computer abuse
D) Computer violence
Question
It is not feasible for companies to produce error-free software because

A) any programming code is susceptible to error.
B) it is too expensive to create perfect software.
C) errors can be introduced in the maintenance stage of development.
D) any software of any complexity will have errors.
Question
Which of the five moral dimensions of the information age does spamming raise?

A) quality of life
B) system quality
C) accountability and control
D) information rights and obligations
Question
________ are not held liable for the messages they transmit.

A) Regulated common carriers
B) Private individuals
C) Organizations and businesses
D) Elected officials
Question
"Copying data from one location to another and accessing personal data from remote locations are both much easier",this impact is the result of what computing trend?

A) Computing power doubles every 18 months
B) Data storage costs rapidly decline
C) Data analysis advances
D) Networking advances
Question
______________________ is the commission of illegal acts through the use of a computer or against a computer system.

A) Computer misconduct
B) Computer crime
C) Computer abuse
D) Computer violence
Question
______________________ grants the owner an exclusive monopoly on the ideas behind an invention for between 17 and 20 years.

A) The Fair Use Doctrine
B) FOIP
C) A patent
D) A copyright
Question
Several studies,including at least two by Statistics Canada,have found that _____________________in Canada are less likely to have computers or online Internet access.

A) old and minority groups
B) poor and majority groups
C) poor and main stream groups
D) poor and minority groups
Question
"Organizations can easily maintain detailed databases on individuals",this impact is the result of what computing trend?

A) Computing power doubles every 18 months
B) Data storage costs rapidly decline
C) Data analysis advances
D) Networking advances
Question
A tiny software object embedded in a Web page and used by tracking programs to monitor online user behavior is called

A) spyware.
B) a super cookie.
C) a Web beacon.
D) a cookie.
Question
The "do anything anywhere" computing environment can

A) make work environments much more pleasant.
B) create economies of efficiency.
C) centralize power at corporate headquarters.
D) blur the traditional boundaries between work and family time.
Question
________________________ refers to any eyestrain condition related to display screen use in desktop computers,laptops,e-readers,smartphones,and handheld video games.

A) Computer vision syndrome (CVS)
B) Technostress
C) Carpal tunnel syndrome (CTS)
D) Compustress
Question
The most common source of business system failure is

A) software bugs.
B) software errors.
C) hardware or facilities failures.
D) data quality.
Question
The practice of spamming has been growing because

A) telephone solicitation is no longer legal.
B) it is good advertising practice and brings in many new customers.
C) it helps pay for the Internet.
D) it is so inexpensive and can reach so many people.
Question
The newest computer-related malady is _________________________which is stress induced by computer use.Its symptoms include aggravation,hostility toward humans,impatience,and fatigue.

A) Computer vision syndrome (CVS)
B) Technostress
C) Carpal tunnel syndrome (CTS)
D) Compustress
Question
Re-designing and automating business processes can be seen as a double-edged sword because

A) increases in efficiency may be accompanied by job losses.
B) increases in efficiency may be accompanied by poor data quality.
C) support for middle-management decision making may be offset by poor data quality.
D) reliance on technology results in the loss of hands-on knowledge.
Question
"More organizations depend on computer systems for critical operations",this impact is the result of what computing trend?

A) Computing power doubles every 18 months
B) Data storage costs rapidly decline
C) Data analysis advances
D) Networking advances
Question
______________________in Canada is one of the principal means of protecting computer software in Canada.

A) PIPEDA law
B) FOIP law
C) Patent law
D) Copyright law
Question
"Companies can analyze vast quantities of data gathered on individuals to develop detailed profiles of individual behaviour",this impact is the result of what computing trend?

A) Computing power doubles every 18 months
B) Data storage costs rapidly decline
C) Data analysis advances
D) Networking advances
Question
________ can be induced by tens of thousands of repetitions under low-impact loads.

A) CTS
B) CVS
C) RSI
D) Technostress
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/105
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 4: Social ethical and Legal Issues in the Digital Firm
1
The Copyright Office began registering software programs in the 1990s.
False
2
In white-collar fraud,information systems are most typically used as a means to hide financial evidence of crimes.
True
3
Despite the passage of several laws defining and addressing computer crime,accessing a computer system without authorization is not yet a federal crime.
False
4
The European Parliament has passed a ban on unsolicited commercial messaging.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
5
Data gathered by online behavioral tracking firms is limited to the user's behavior on a single Web site.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
6
Copyright is the legal protection afforded intellectual property,such as a song,book,or video game.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
7
Most Internet businesses do very little to protect the privacy of their customers.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
8
Advances in data storage have made routine violation of individual privacy more difficult.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
9
The most common type of computer-related RSI is CTS.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
10
Any unsolicited e-mail is legally considered spam.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
11
The last step in analyzing an ethical issue should be to identify the stakeholders-people who have a vested interest in the outcome of the decision.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
12
The drawback to copyright protection is that the underlying ideas behind the work are not protected,only their reproduction in a product.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
13
Spyware is software that comes hidden in downloaded applications and can track your online movements.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
14
Even in today's legal climate,there is little incentive for firms to cooperate with prosecutors investigating financial crimes at their firm.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
15
The key concepts in patent law are originality,novelty,and value.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
16
Technostress is a computer-related malady whose symptoms include fatigue.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
17
Most American and European privacy law is based on a set of five principles called COPPA.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
18
According to the courts,in the creation of software,unique concepts,general functional features,and even colors are protectable by copyright law.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
19
Privacy is the right to be left alone when you want to be,without surveillance or interference from other individuals or organizations.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
20
Professionals take on special rights and obligations because of their special claims to knowledge,wisdom,and respect.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
21
All of the following are current key technology trends raising ethical issues except

A) data storage improvements.
B) data analysis advancements.
C) increase in multimedia quality.
D) increase in use of mobile devices.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
22
Responsibility means that you accept the potential costs,duties,and obligations for the decisions you make.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
23
Accepting the potential costs,duties,and obligations for the decisions you make is referred to as

A) responsibility.
B) accountability.
C) liability.
D) due process.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
24
In Europe,privacy protection is much weaker than in North America.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
25
NORA is a

A) profiling technology used by the EU.
B) federal privacy law protecting networked data.
C) data analysis technology that finds hidden connections between data in disparate sources.
D) sentencing guideline adopted in 1987 mandating stiff sentences on business executives.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
26
Canada's privacy legislation meets the standards of the European Directive on Data Protection.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
27
Cookies are small text files deposited on a computer hard drive when a user visits Web sites.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
28
The introduction of new information technology has a

A) dampening effect on the discourse of business ethics.
B) ripple effect raising new ethical, social, and political issues.
C) beneficial effect for society as a whole, while raising dilemmas for consumers.
D) waterfall effect in raising ever more complex ethical issues.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
29
In the information age,the obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within the moral dimension of

A) family and home.
B) property rights and obligations.
C) system quality.
D) quality of life.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
30
Which of the following best describes how new information systems result in legal gray areas?

A) They work with networked, electronic data, which are more difficult to control than information stored manually.
B) They result in new situations that are not covered by old laws.
C) They are implemented by technicians rather than managers.
D) They are created from sets of logical and technological rules rather than social or organizational mores.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
31
Which of the five moral dimensions of the information age do the central business activities of ChoicePoint raise?

A) property rights and obligations
B) system quality
C) accountability and control
D) information rights and obligations
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
32
The feature of social institutions that means mechanisms are in place to determine responsibility for an action is called

A) due process.
B) accountability.
C) the courts of appeal.
D) the judicial system.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
33
In the information age,the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of

A) property rights and obligations.
B) system quality.
C) accountability and control.
D) information rights and obligations.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
34
Web sites using cookie technology can directly obtain visitors' names and addresses.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
35
Internet and digital firm technologies make it more difficult than ever to assemble,integrate,and distribute information,unleashing new concerns about the appropriate use of customer information,the protection of personal privacy,and the protection of intellectual property.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
36
The process in law-governed societies in which laws are known and understood and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly is called

A) liability.
B) due process.
C) the courts of appeal.
D) accountability.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
37
Ethics refers to the principles of right and wrong that individuals,acting as free moral agents,use to make choices to guide their behaviours.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
38
In addition,in 2000,Parliament passed the Personal Technology Protection and Electronic Documents Act (PTPEDA),Canada's modern privacy law.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
39
The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called

A) profiling.
B) phishing.
C) spamming.
D) targeting.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
40
Informed consent can be defined as consent given without knowledge of all the facts needed to make a rational decision.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
41
When a cookie is created during a Web site visit,it is stored

A) on the Web site computer.
B) on the visitor's computer.
C) on the ISP's computer.
D) in a Web directory.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
42
A colleague of yours frequently takes for his own personal use small amounts of office supplies,noting that the loss to the company is minimal.You counter that if everyone were to take the office supplies,the loss would no longer be minimal.Your rationale expresses which historical ethical principle?

A) Kant's Categorical Imperative
B) the Golden Rule
C) the Risk Aversion Principle
D) the "No free lunch" rule
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
43
One of the difficulties of patent protection is

A) that only the underlying ideas are protected.
B) digital media cannot be patented.
C) preventing the ideas from falling into public domain.
D) the years of waiting to receive it.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
44
Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials?

A) Digital Millennium Copyright Act
B) Privacy Act
C) Freedom of Information Act
D) Electronic Communications Privacy Act
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
45
What legal mechanism protects the owners of intellectual property from having their work copied by others?

A) patent protection
B) intellectual property law
C) copyright law
D) Fair Use Doctrine
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
46
European privacy protection is ________ than in the United States.

A) less far-reaching
B) less liable to laws
C) much less stringent
D) much more strict
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
47
Flash cookies are different from ordinary cookies in that they

A) are installed only at the user's request.
B) are not stored on the user's computer.
C) cannot be easily detected or deleted.
D) monitor the user's behavior at a Web site.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
48
According to the ________,you should take the action that produces the least harm.

A) Categorical Imperative
B) Risk Aversion Principle
C) Utilitarian Principle
D) Golden Rule
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
49
Which of the following is not one of the five steps discussed in the chapter as a process for analyzing an ethical issue?

A) Assign responsibility.
B) Identify the stakeholders.
C) Identify the options you can reasonably take.
D) Identify and clearly describe the facts.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
50
Intellectual property can best be described as

A) intangible property created by individuals or corporations.
B) unique creative work or ideas.
C) tangible or intangible property created from a unique idea.
D) the expression of an intangible idea.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
51
U.S.businesses are allowed to use personal data from EU countries if they

A) have informed consent.
B) create a safe harbor.
C) develop equivalent privacy protection policies.
D) make their privacy protection policies publicly available.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
52
The strength of patent protection is that it

A) puts the strength of law behind copyright.
B) allows protection from Internet theft of ideas put forth publicly.
C) is easy to define.
D) grants a monopoly on underlying concepts and ideas.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
53
"Look and feel" copyright infringement lawsuits are concerned with

A) the distinction between tangible and intangible ideas.
B) the distinction between an idea and its expression.
C) using the graphical elements of another product.
D) using the creative elements of another product.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
54
A(n)________ model of informed consent permits the collection of personal information until the consumer specifically requests that the data not be collected.

A) opt-in
B) opt-out
C) P3P
D) PGP
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
55
Immanuel Kant's Categorical Imperative states that

A) if an action cannot be taken repeatedly, then it is not right to be taken at any time.
B) one should take the action that produces the least harm or incurs the least cost.
C) one can put values in rank order and understand the consequences of various courses of action.
D) if an action is not right for everyone to take, it is not right for anyone to take.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
56
The Online Privacy Alliance

A) encourages self-regulation to develop a set of privacy guidelines for its members.
B) protects user privacy during interactions with Web sites.
C) has established technical guidelines for ensuring privacy.
D) is a government agency regulating the use of customer information.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
57
Which of the following statements about trade secrets is not true?

A) Trade secret protections vary from state to state.
B) Any intellectual product, regardless of its purpose, can be classified as a trade secret.
C) Software that contains unique elements can be claimed as a trade secret.
D) Trade secret law protects the actual ideas in a product.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
58
A classic ethical dilemma is the hypothetical case of a man stealing from a grocery store in order to feed his starving family.If you used the Utilitarian Principle to evaluate this situation,you might argue that stealing the food is

A) acceptable, because the grocer suffers the least harm.
B) acceptable, because the higher value is the survival of the family.
C) wrong, because the man would not want the grocer to steal from him.
D) wrong, because if everyone were to do this, the concept of personal property is defeated.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
59
In general,it is very difficult to hold software producers liable for their software products when those products are considered to be

A) part of a machine.
B) similar to books.
C) services.
D) artistic expressions.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
60
The ethical "no free lunch" rule states that

A) if an action cannot be taken repeatedly, then it is not right to be taken at any time.
B) one should take the action that produces the least harm or incurs the least cost.
C) one can put values in rank order and understand the consequences of various courses of action.
D) everything is owned by someone else, and that the creator wants compensation for this work.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
61
______________________ is the commission of acts involving a computer that may not be illegal but that are considered unethical.

A) Computer misconduct
B) Computer crime
C) Computer abuse
D) Computer violence
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
62
It is not feasible for companies to produce error-free software because

A) any programming code is susceptible to error.
B) it is too expensive to create perfect software.
C) errors can be introduced in the maintenance stage of development.
D) any software of any complexity will have errors.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
63
Which of the five moral dimensions of the information age does spamming raise?

A) quality of life
B) system quality
C) accountability and control
D) information rights and obligations
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
64
________ are not held liable for the messages they transmit.

A) Regulated common carriers
B) Private individuals
C) Organizations and businesses
D) Elected officials
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
65
"Copying data from one location to another and accessing personal data from remote locations are both much easier",this impact is the result of what computing trend?

A) Computing power doubles every 18 months
B) Data storage costs rapidly decline
C) Data analysis advances
D) Networking advances
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
66
______________________ is the commission of illegal acts through the use of a computer or against a computer system.

A) Computer misconduct
B) Computer crime
C) Computer abuse
D) Computer violence
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
67
______________________ grants the owner an exclusive monopoly on the ideas behind an invention for between 17 and 20 years.

A) The Fair Use Doctrine
B) FOIP
C) A patent
D) A copyright
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
68
Several studies,including at least two by Statistics Canada,have found that _____________________in Canada are less likely to have computers or online Internet access.

A) old and minority groups
B) poor and majority groups
C) poor and main stream groups
D) poor and minority groups
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
69
"Organizations can easily maintain detailed databases on individuals",this impact is the result of what computing trend?

A) Computing power doubles every 18 months
B) Data storage costs rapidly decline
C) Data analysis advances
D) Networking advances
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
70
A tiny software object embedded in a Web page and used by tracking programs to monitor online user behavior is called

A) spyware.
B) a super cookie.
C) a Web beacon.
D) a cookie.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
71
The "do anything anywhere" computing environment can

A) make work environments much more pleasant.
B) create economies of efficiency.
C) centralize power at corporate headquarters.
D) blur the traditional boundaries between work and family time.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
72
________________________ refers to any eyestrain condition related to display screen use in desktop computers,laptops,e-readers,smartphones,and handheld video games.

A) Computer vision syndrome (CVS)
B) Technostress
C) Carpal tunnel syndrome (CTS)
D) Compustress
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
73
The most common source of business system failure is

A) software bugs.
B) software errors.
C) hardware or facilities failures.
D) data quality.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
74
The practice of spamming has been growing because

A) telephone solicitation is no longer legal.
B) it is good advertising practice and brings in many new customers.
C) it helps pay for the Internet.
D) it is so inexpensive and can reach so many people.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
75
The newest computer-related malady is _________________________which is stress induced by computer use.Its symptoms include aggravation,hostility toward humans,impatience,and fatigue.

A) Computer vision syndrome (CVS)
B) Technostress
C) Carpal tunnel syndrome (CTS)
D) Compustress
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
76
Re-designing and automating business processes can be seen as a double-edged sword because

A) increases in efficiency may be accompanied by job losses.
B) increases in efficiency may be accompanied by poor data quality.
C) support for middle-management decision making may be offset by poor data quality.
D) reliance on technology results in the loss of hands-on knowledge.
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
77
"More organizations depend on computer systems for critical operations",this impact is the result of what computing trend?

A) Computing power doubles every 18 months
B) Data storage costs rapidly decline
C) Data analysis advances
D) Networking advances
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
78
______________________in Canada is one of the principal means of protecting computer software in Canada.

A) PIPEDA law
B) FOIP law
C) Patent law
D) Copyright law
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
79
"Companies can analyze vast quantities of data gathered on individuals to develop detailed profiles of individual behaviour",this impact is the result of what computing trend?

A) Computing power doubles every 18 months
B) Data storage costs rapidly decline
C) Data analysis advances
D) Networking advances
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
80
________ can be induced by tens of thousands of repetitions under low-impact loads.

A) CTS
B) CVS
C) RSI
D) Technostress
Unlock Deck
Unlock for access to all 105 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 105 flashcards in this deck.