Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Electronic Commerce
Quiz 14: E-Commerce: Regulatory, Ethical, and Social Environments
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 61
Multiple Choice
Methods used for collecting data about people include
Question 62
Multiple Choice
Ethical principles commonly applied to the collection and use of personal information include
Question 63
Multiple Choice
Potential benefits of telecommuting or virtual work for community and society include
Question 64
Multiple Choice
Discovery in civil litigation that deals with information in electronic format best describes
Question 65
Multiple Choice
A major computer crime law to protect computers and other Internet-connected computers best describes
Question 66
Multiple Choice
According to an ExecuNet survey,what percentage of hiring managers now use social media sites to check out job candidates?
Question 67
Multiple Choice
Potential benefits of telecommuting or virtual work for an organization include
Question 68
Multiple Choice
Examples of electronic signatures to help distinguish between legitimate and fraudulent transactions include each of the following
except
Question 69
Multiple Choice
Data pertaining to the enterprise included in the law that can be used for the purpose of implementing or validating compliance best defines
Question 70
Multiple Choice
EC sellers need to protect against fraud and each of the following
except
Question 71
Multiple Choice
Important EC issues include
Question 72
Multiple Choice
The study and practice of eco-friendly computing resources which is now a key concern for businesses in all industries best defines
Question 73
Multiple Choice
All unwanted software programs designed to steal proprietary information or that target data stores containing confidential information best defines
Question 74
Multiple Choice
The gap that has emerged between those who have and those who do not have the ability to use the technology best defines
Question 75
Multiple Choice
Based on Richard Clarke's 2010 definition,which of the following refers to actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or disruption?