Deck 5: Ethical and Legal Issues

Full screen (f)
exit full mode
Question
What is a legal method of protecting children from exposure to inappropriate, obscene, or indecent material online?

A) filtering models
B) censorship of the entire Internet
C) the Computer Decency Act of 1996
D) all of the above
Use Space or
up arrow
down arrow
to flip the card.
Question
Which of the following is an ethical issue currently confronting those who work in electronic environments?

A) intellectual property
B) the role of privacy
C) freedom of expression
D) all of the above
Question
Which of the following is not a possible sanction for fraudulent conduct?

A) forfeiture of property
B) lifetime bans on Internet commerce
C) civil judgments
D) consumer education
Question
Traditionally, the law has used _______ to define ownership and protect intellectual property rights?

A) copyrights
B) patents
C) trademarks
D) all of the above
Question
Which of the following is a ubiquitous application, meaning it is able to function without a user's knowledge or control?

A) Java applet
B) Windows
C) E-mail
D) XML
Question
Critics of opt out presumptions argue which of the following points?

A) average consumers are often confused by many opt out routines
B) consumers prefer targeted advertising
C) the ability of consumers to opt-out cuts down on the effectiveness of marketing efforts
D) opt out policies keep marketers from learning anything about consumers
Question
Which of the following is not true in relation to law?

A) law is directed toward the behavior of individuals or small groups, as opposed to entire populations
B) law attempts to be consistent in time and place
C) making law is often slow and complex
D) law is an expression of values
Question
The general attributes of privacy fall into each of the following categories except the ________.

A) seclusion theory
B) autonomy model
C) access-control viewpoint
D) vacuum model
Question
All of the following can be defined as trade secrets except ________.

A) formulas
B) facts
C) market data
D) algorithms
Question
The concept of privacy encompasses ________.

A) ethical aspects
B) legal aspects
C) both of the above
D) neither of the above
Question
________ allow a buyer to use a company's product, but with restrictions on the ability to duplicate or distribute it.

A) Copyrights
B) Patents
C) Trademarks
D) Licenses
Question
The central focus of ________ is the analysis and description of what is right and wrong and how we judge the difference.

A) law
B) ethics
C) self-regulation
D) privacy
Question
What purposes) do digital cookies serve?

A) recalling stored sales information
B) collecting user data, such as name, addresses and phone numbers
C) creating/updating features such as virtual shopping baskets
D) all of the above
Question
Which of the following companies have been subject to criticism regarding their possible misuse of users' private information?

A) DoubleClick
B) America Online
C) Facebook
D) All of the above
Question
Which of the following issues can be addressed by current conventional criminal statutes?

A) workers are extended an expectation of privacy from their employers
B) privacy of all American citizens is assured by federal law
C) sanctions against the misuse of consumer data
D) right of users to opt-out of data submission
Question
According to trademark law, a certain redundancy is permitted as long as there is enough dissimilarity in which of the following factors?

A) type of business
B) product name
C) language in brand promotions
D) all of the above
Question
Jurisdiction ________.

A) is a legal term that describes the authority of a court over individuals, groups, or firms
B) has traditionally been based upon physical presence/location
C) is unlikely to be exercised within the geographic boundaries of other nations or states
D) all of the above
Question
Favor for the model of self-regulation is supported by all of the following points except ________.

A) the private sector's speed in resolving problems within its area of expertise
B) the often contradictory and confusing nature of law
C) the motivation to voluntary compliance is compelled by greater consumer confidence
D) the insufficiently compelling incentives
Question
Thus far, ________ have been established as the primary means of protecting most of content on the Internet.

A) copyrights
B) patents
C) trademarks
D) licenses
Question
Which of the following is not a widely held criticism of spam?

A) it places burdens on network resources
B) it reduces the costs of marketing to target consumers
C) it is an unwanted intrusion for receivers
D) it is often derived from mailing lists not intended to be used for mass solicitation
Question
The issue of data collection is the only problem within the context of online privacy.
Question
There is currently no law regulating consumers' right to opt-out of unwanted data collection.
Question
The mass distribution of unsolicited electronic mail is often referred to as spam.
Question
Shrinkwrap, clickwrap, and break-the-seal represent methods of corporate attempts to communicate software licensing obligations to consumers.
Question
The Federal Economic Espionage Act of 1996 was enacted, in part, to prevent and prosecute against foreign distribution of corporate trade secrets.
Question
What are the arguments for and against the mass distribution of unsolicited email? Support one of these viewpoints using evidence from your own use of email.
Question
What is the distinction between law and ethics?
Question
What are some ways for consumers to protect themselves from fraud? Your answer should include a definition of fraud and a specific Web site useful in protecting consumers.
(bullet)Fraud - use of deception and false claims to obtain money
(bullet)Protection includes consumer education
(bullet)References from professional organizations
(bullet)Use of intermediaries
(bullet)Using organizations that belong to anti-fraud groups such as the Better Business Bureau HYPERLINK "http://www.bbb.org" www.bbb.org, or posting reviews onlinee.g., yelp.com, citysearch.com)
Question
What are the arguments for and against self-regulation? Which position holds more validity in your opinion?
Question
The use of email or Web sites to impersonate individuals or corporations is known as spidering.
Question
According to the text, privacy issues have been a subject of close international attention.
Question
The study of ethics has been in existence for over 2,500 years.
Question
Metatags can be used to protect against one's own or cyber squat against another's intellectual property, product, or trade name.
Question
Only registered trademarks are protected under the rules outlined in the US Lanham Act.
Question
The issue of privacy can be broken down into three general areas. Identify and define these areas.
Question
Cyber squatting refers to practices whereby one party registers domain names belonging to or resembling the trade names of others.
Question
If individuals copy, share, or distribute computer software without having purchased it under a licensed, then they may be supporting software piracy.
Question
What are the norms used by the FTC that represent the minimum requirements essential to the ethical use of consumer information?
Question
What are some examples of trade secrets that could be distributed illegally according to the US Economic Espionage Act of 1996?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/39
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 5: Ethical and Legal Issues
1
What is a legal method of protecting children from exposure to inappropriate, obscene, or indecent material online?

A) filtering models
B) censorship of the entire Internet
C) the Computer Decency Act of 1996
D) all of the above
A
2
Which of the following is an ethical issue currently confronting those who work in electronic environments?

A) intellectual property
B) the role of privacy
C) freedom of expression
D) all of the above
D
3
Which of the following is not a possible sanction for fraudulent conduct?

A) forfeiture of property
B) lifetime bans on Internet commerce
C) civil judgments
D) consumer education
D
4
Traditionally, the law has used _______ to define ownership and protect intellectual property rights?

A) copyrights
B) patents
C) trademarks
D) all of the above
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following is a ubiquitous application, meaning it is able to function without a user's knowledge or control?

A) Java applet
B) Windows
C) E-mail
D) XML
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
6
Critics of opt out presumptions argue which of the following points?

A) average consumers are often confused by many opt out routines
B) consumers prefer targeted advertising
C) the ability of consumers to opt-out cuts down on the effectiveness of marketing efforts
D) opt out policies keep marketers from learning anything about consumers
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following is not true in relation to law?

A) law is directed toward the behavior of individuals or small groups, as opposed to entire populations
B) law attempts to be consistent in time and place
C) making law is often slow and complex
D) law is an expression of values
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
8
The general attributes of privacy fall into each of the following categories except the ________.

A) seclusion theory
B) autonomy model
C) access-control viewpoint
D) vacuum model
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
9
All of the following can be defined as trade secrets except ________.

A) formulas
B) facts
C) market data
D) algorithms
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
10
The concept of privacy encompasses ________.

A) ethical aspects
B) legal aspects
C) both of the above
D) neither of the above
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
11
________ allow a buyer to use a company's product, but with restrictions on the ability to duplicate or distribute it.

A) Copyrights
B) Patents
C) Trademarks
D) Licenses
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
12
The central focus of ________ is the analysis and description of what is right and wrong and how we judge the difference.

A) law
B) ethics
C) self-regulation
D) privacy
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
13
What purposes) do digital cookies serve?

A) recalling stored sales information
B) collecting user data, such as name, addresses and phone numbers
C) creating/updating features such as virtual shopping baskets
D) all of the above
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following companies have been subject to criticism regarding their possible misuse of users' private information?

A) DoubleClick
B) America Online
C) Facebook
D) All of the above
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following issues can be addressed by current conventional criminal statutes?

A) workers are extended an expectation of privacy from their employers
B) privacy of all American citizens is assured by federal law
C) sanctions against the misuse of consumer data
D) right of users to opt-out of data submission
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
16
According to trademark law, a certain redundancy is permitted as long as there is enough dissimilarity in which of the following factors?

A) type of business
B) product name
C) language in brand promotions
D) all of the above
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
17
Jurisdiction ________.

A) is a legal term that describes the authority of a court over individuals, groups, or firms
B) has traditionally been based upon physical presence/location
C) is unlikely to be exercised within the geographic boundaries of other nations or states
D) all of the above
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
18
Favor for the model of self-regulation is supported by all of the following points except ________.

A) the private sector's speed in resolving problems within its area of expertise
B) the often contradictory and confusing nature of law
C) the motivation to voluntary compliance is compelled by greater consumer confidence
D) the insufficiently compelling incentives
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
19
Thus far, ________ have been established as the primary means of protecting most of content on the Internet.

A) copyrights
B) patents
C) trademarks
D) licenses
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following is not a widely held criticism of spam?

A) it places burdens on network resources
B) it reduces the costs of marketing to target consumers
C) it is an unwanted intrusion for receivers
D) it is often derived from mailing lists not intended to be used for mass solicitation
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
21
The issue of data collection is the only problem within the context of online privacy.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
22
There is currently no law regulating consumers' right to opt-out of unwanted data collection.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
23
The mass distribution of unsolicited electronic mail is often referred to as spam.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
24
Shrinkwrap, clickwrap, and break-the-seal represent methods of corporate attempts to communicate software licensing obligations to consumers.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
25
The Federal Economic Espionage Act of 1996 was enacted, in part, to prevent and prosecute against foreign distribution of corporate trade secrets.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
26
What are the arguments for and against the mass distribution of unsolicited email? Support one of these viewpoints using evidence from your own use of email.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
27
What is the distinction between law and ethics?
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
28
What are some ways for consumers to protect themselves from fraud? Your answer should include a definition of fraud and a specific Web site useful in protecting consumers.
(bullet)Fraud - use of deception and false claims to obtain money
(bullet)Protection includes consumer education
(bullet)References from professional organizations
(bullet)Use of intermediaries
(bullet)Using organizations that belong to anti-fraud groups such as the Better Business Bureau HYPERLINK "http://www.bbb.org" www.bbb.org, or posting reviews onlinee.g., yelp.com, citysearch.com)
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
29
What are the arguments for and against self-regulation? Which position holds more validity in your opinion?
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
30
The use of email or Web sites to impersonate individuals or corporations is known as spidering.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
31
According to the text, privacy issues have been a subject of close international attention.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
32
The study of ethics has been in existence for over 2,500 years.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
33
Metatags can be used to protect against one's own or cyber squat against another's intellectual property, product, or trade name.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
34
Only registered trademarks are protected under the rules outlined in the US Lanham Act.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
35
The issue of privacy can be broken down into three general areas. Identify and define these areas.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
36
Cyber squatting refers to practices whereby one party registers domain names belonging to or resembling the trade names of others.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
37
If individuals copy, share, or distribute computer software without having purchased it under a licensed, then they may be supporting software piracy.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
38
What are the norms used by the FTC that represent the minimum requirements essential to the ethical use of consumer information?
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
39
What are some examples of trade secrets that could be distributed illegally according to the US Economic Espionage Act of 1996?
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 39 flashcards in this deck.