Filters
Question type

Study Flashcards

What are the major issues concerning privacy in the information age? Do you believe the need for homeland security should overrule some of the personal privacy and information rights we have previously taken for granted? Why or why not?

Correct Answer

verifed

verified

One answer might be that we should depen...

View Answer

Key differences between software and books include all of the following except


A) software contains more information than a book.
B) software is less easily inspected than a book.
C) software products are more easily compared to each other than books.
D) software is understood to be more fallible than a book.
E) it is more difficult to inspect software for flaws.

Correct Answer

verifed

verified

Which of the following best describes the effect that new information technology has on society?


A) It has a dampening effect on the discourse of business ethics.
B) It has a ripple effect, raising new ethical, social, and political issues.
C) It is beneficial for society as a whole, while raising dilemmas for consumers.
D) It has a waterfall effect in raising ever more complex ethical issues.
E) It has a magnifying effect, creating increasing numbers of ethical issues.

Correct Answer

verifed

verified

The U.S. CAN-SPAM Act of 2003


A) makes spamming illegal.
B) requires spammers to identify themselves.
C) has dramatically cut down spamming.
D) does not override state anti-spamming laws.
E) does not outlaw the use of fake return addresses.

Correct Answer

verifed

verified

B

The moral dimension of ________ can be described as the obligations that individuals and organizations have concerning rights to intellectual property.


A) property rights and obligations
B) system quality
C) accountability and control
D) information rights and obligations
E) quality of life

Correct Answer

verifed

verified

A

Which of the following best describes intellectual property?


A) intangible property created by individuals or corporations
B) unique creative work or ideas
C) tangible or intangible property created from a unique idea
D) the expression of an intangible idea
E) any tangible or intangible property within the creative arts

Correct Answer

verifed

verified

Privacy protection in the United States is ________ in Europe.


A) more far reaching than
B) more liable to laws than
C) much more stringent than
D) much less stringent than
E) at about the same level of strictness as

Correct Answer

verifed

verified

COPPA is a set of five principles developed by the FTC that most American and European privacy law is based on.

Correct Answer

verifed

verified

Most Internet businesses do very little to protect the privacy of their customers.

Correct Answer

verifed

verified

Which of the following best describes how new information systems result in legal gray areas?


A) They work with networked, electronic data, which are more difficult to control than information stored manually.
B) They result in new situations that are not covered by old laws.
C) They are implemented by technicians rather than managers.
D) They are created from sets of logical and technological rules rather than social or organizational mores.
E) They are little understood by politicians or lawyers.

Correct Answer

verifed

verified

Cookies created during Web site visits are stored


A) on the Web site's server.
B) on the user's computer.
C) on servers owned by advertising networks.
D) in the browser's application settings.
E) nowhere, because they are only used during a visit and are discarded once a visitor leaves the Web site.

Correct Answer

verifed

verified

Which of the following best describes the basis for the FIP principles?


A) the accountability of the record holder
B) the responsibility of the record holder
C) the mutuality of interest between the record holder and the individual
D) the privacy of the individual
E) the difference between the interests of the individual and commercial organizations

Correct Answer

verifed

verified

Which of the following describes Immanuel Kant's Categorical Imperative?


A) If an action cannot be taken repeatedly, then it is not right to be taken at any time.
B) One should take the action that produces the least harm or incurs the least cost.
C) One can put values in rank order and understand the consequences of various courses of action.
D) If an action is not right for everyone to take, it is not right for anyone to take.
E) You should act towards others as you would like them to act towards you.

Correct Answer

verifed

verified

The symptoms of technostress include aggravation and hostility toward humans.

Correct Answer

verifed

verified

One of the capabilities of Internet communication is the ability of the individual to appear essentially anonymous by using made-up user names. Is anonymity the same thing as privacy, and should it be a right? What ethical issues are raised by increased anonymity?

Correct Answer

verifed

verified

Student answers will vary, but should in...

View Answer

As per the ________, if an action cannot be taken repeatedly, it is not right to take at all.


A) slippery-slope rule
B) lemming rule
C) high-failure cost rule
D) utilitarian principle
E) Golden Rule

Correct Answer

verifed

verified

Spamming raises the moral dimension of


A) quality of life.
B) system quality.
C) accountability and control.
D) information rights and obligations.
E) property rights and obligations.

Correct Answer

verifed

verified

Describe three technology trends that pose ethical issues, giving an example for each of its ethical or moral impact.

Correct Answer

verifed

verified

Key technology trends include the following: (1) Computer power doubling every 18 months: ethical impact-because more organizations depend on computer systems for critical operations, these systems are vulnerable to computer crime and computer abuse; (2) Data storage costs are rapidly declining: ethical impact-it is easy to maintain detailed databases on individuals-who has access to and control of these databases?; (3) Data analysis advances: ethical impact-vast databases full of individual information may be used to develop detailed profiles of individual behavior; and (4) Networking advances and the Internet: ethical impact-it is easy to copy data from one location to another. Who owns data? How can ownership be protected?; (5) Mobile device growth impact: ethical impact-individual cell phones may be tracked without user consent or knowledge.

________ prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use.


A) A legal safe harbor
B) The opt-in model
C) The FIP set of guidelines
D) P3P

Correct Answer

verifed

verified

Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed?


A) HIPAA
B) Gramm-Leach-Bliley Act
C) Privacy Protection Act
D) Freedom of Information Act
E) COPPA

Correct Answer

verifed

verified

Showing 1 - 20 of 90

Related Exams

Show Answer