Ethics Chapter 5 Test Questions – Flashcards

question
106. The Third Amendment to the U.S. Constitution has to do with a) freedom of speech and religion. b) search warrants. c) the right to bear arms. d) quartering of soldiers in private homes. e) self-incrimination.
answer
d) quartering of soldiers in private homes.
question
107. Who wrote an influential paper in the 1890s urging that privacy rights be enacted into law? a) Benn and Brandeis b) Benn and Thomson c) Levine and Benn d) Thomson and Warren e) Warren and Brandeis
answer
e) Warren and Brandeis
question
108. Who wrote that every violation of a "privacy right" is also a violation of another right? a) Stanley Benn b) Louis Brandeis c) Morton Levine d) Judith Jarvis Thomson e) Samuel Warren
answer
d) Judith Jarvis Thomson
question
109. Most commentators cite the benefits of privacy as a reason why people ought to have some privacy rights. A right that benefits society is called a a) Constitutional right. b) legal right. c) natural right. d) prudential right. e) social right.
answer
d) prudential right.
question
110. A public record contains information about an incident or action reported to a government agency for the purpose of a) enhancing public safety. b) informing the public. c) protecting the innocent. d) regulating the economy. e) upholding the law.
answer
b) informing the public.
question
111. An example of a public record is a) a birth certificate. b) a marriage license. c) a deed to a house. d) a record of a criminal conviction. e) All of the above
answer
e) All of the above
question
112. An RFID is a) a magnetic bar code. b) a microscopic bar code. c) a wireless transmitter. d) a biometric identification device. e) a random field interferometry device.
answer
c) a wireless transmitter.
question
113. The OnStar system allows a) a vehicle owner to initiate a conversation with an OnStar representative. b) the vehicle to automatically send a message to an OnStar representative after an accident. c) an OnStar representative to disable the gas pedal of the vehicle without the driver's permission. d) a and b e) a, b, and c
answer
e) a, b, and c
question
114. Flash cookies are controversial, in part, because a) they are commonly used by identify thieves to steal credit card numbers. b) they consume huge amounts of hard disk space. c) they allow online retailers such as Amazon.com to track online shopping on other Web sites. d) they are not controlled by the privacy controls of most Web browsers. e) All of the above
answer
d) they are not controlled by the privacy controls of most Web browsers.
question
115. The process of searching through many records in one or more databases looking for patterns or relationships is called a) credit reporting. b) data mining. c) information gathering. d) microtargeting. e) pattern matching
answer
b) data mining.
question
116. When information is put to another purpose, that is called a a) backdoor exploit. b) collaborative filter. c) cookie. d) data leveraging opportunity. e) secondary use of the data.
answer
e) secondary use of the data.
question
117. A policy that requires the consumer to explicitly give permission before an organization can share information with another organization is called a) fair use. b) full disclosure. c) nondisclosure. d) opt-in. e) opt-out.
answer
d) opt-in.
question
118. The practice of mailing advertisements only to the most likely prospects is called a) discriminatory mailing. b) focused mailing. c) mail list trimming.. d) predatory mailing. e) targeted direct mail.
answer
e) targeted direct mail.
question
87. In 1890 Harvard-trained lawyers _______________ wrote a highly influential article in the Harvard Law Review stating that people in modern society have a right to privacy and that this right ought to be respected.
answer
Samuel Warren and Louis Brandeis
question
88. _______________ suggested that we do not have to define privacy rights because every "privacy right" violation is a violation of another right as well.
answer
Judith Jarvis Thomson
question
89. A _____________ contains information about an incident or action reported to a government agency for the purpose of informing the public.
answer
public record
question
90. With enhanced 911 service, cell phone providers are able to ________________ of active cell phone users.
answer
determine the location
question
91. Manufacturers are replacing bar codes with ____________ tags because they give more information about the product and are easier to scan.
answer
RFIDs / RFID
question
92. A __________ is a file containing information about your visits to a Web site that is placed on your computer's hard drive by a Web server
answer
cookie
question
93. The process of searching through one or more databases, looking for patterns or relationships, is called ______________.
answer
data mining.
question
94. When information collected for one purpose is put to another purpose, that is called a _____________ of the data.
answer
secondary use
question
95. Thanks to ___________________, you can get a credit card from a bank or store with which you have never done business.
answer
the national credit bureau system / credit reports
question
96. Privacy advocates have criticized Path, Twitter, Foursquare, and Instagram for producing apps that __________________________.
answer
gathered information from address books without asking for permission
question
36. One of the provisions of the Fifth Amendment to the United States Constitution is that no person "shall be compelled in any criminal case to be a witness against himself." Relate this provision to the definition of privacy elaborated in the book.
answer
BS
question
37. Do you agree with Judith Jarvis Thomson that every "privacy right" violation is a violation of another right? Explain your position.
answer
Violations of privacy always come with a secondary consequence.
question
38. Name several ways that a typical unmarried 20-year-old may have more privacy now than an unmarried 20-year-old would have had 200 years ago.
answer
BS
question
39. Describe three modern information technology devices and how they may be used to decrease privacy.
answer
BS
question
40. Modern information technology allows a great deal of information to be collected, stored, searched, and rapidly retrieved. Give an example of how this capability benefits society.
answer
Yelp
question
41. Describe the Facebook Beacon service and explain why it raised privacy complaints after it was introduced
answer
Beacon was an opt-out service that broadcasted a facebook user's purchases to his friends, violating the privacy of the user.
question
42. What was the Netflix prize? Why did Netflix's actions raise privacy concern?
answer
$1,000,000 prize to the group that could come up with an algorithm that was at least 10% better tgan Netflix's own algorith at predicting user ratings for movies. Privacy concerns were raised when 100 million ratings were released from nearly 500,000 customers, making the records no longer anonymous.
question
43. Give two examples of how organizations are applying the techniques of data mining to information contained in social networks.
answer
Targeted emails and advertisements.
question
44. Some online retailers are using information gathered about their customers to offer different prices to different people. What is your position on the morality of this strategy? Justify your answer.
answer
BS
1 of

Unlock all answers in this set

Unlock answers
question
106. The Third Amendment to the U.S. Constitution has to do with a) freedom of speech and religion. b) search warrants. c) the right to bear arms. d) quartering of soldiers in private homes. e) self-incrimination.
answer
d) quartering of soldiers in private homes.
question
107. Who wrote an influential paper in the 1890s urging that privacy rights be enacted into law? a) Benn and Brandeis b) Benn and Thomson c) Levine and Benn d) Thomson and Warren e) Warren and Brandeis
answer
e) Warren and Brandeis
question
108. Who wrote that every violation of a "privacy right" is also a violation of another right? a) Stanley Benn b) Louis Brandeis c) Morton Levine d) Judith Jarvis Thomson e) Samuel Warren
answer
d) Judith Jarvis Thomson
question
109. Most commentators cite the benefits of privacy as a reason why people ought to have some privacy rights. A right that benefits society is called a a) Constitutional right. b) legal right. c) natural right. d) prudential right. e) social right.
answer
d) prudential right.
question
110. A public record contains information about an incident or action reported to a government agency for the purpose of a) enhancing public safety. b) informing the public. c) protecting the innocent. d) regulating the economy. e) upholding the law.
answer
b) informing the public.
question
111. An example of a public record is a) a birth certificate. b) a marriage license. c) a deed to a house. d) a record of a criminal conviction. e) All of the above
answer
e) All of the above
question
112. An RFID is a) a magnetic bar code. b) a microscopic bar code. c) a wireless transmitter. d) a biometric identification device. e) a random field interferometry device.
answer
c) a wireless transmitter.
question
113. The OnStar system allows a) a vehicle owner to initiate a conversation with an OnStar representative. b) the vehicle to automatically send a message to an OnStar representative after an accident. c) an OnStar representative to disable the gas pedal of the vehicle without the driver's permission. d) a and b e) a, b, and c
answer
e) a, b, and c
question
114. Flash cookies are controversial, in part, because a) they are commonly used by identify thieves to steal credit card numbers. b) they consume huge amounts of hard disk space. c) they allow online retailers such as Amazon.com to track online shopping on other Web sites. d) they are not controlled by the privacy controls of most Web browsers. e) All of the above
answer
d) they are not controlled by the privacy controls of most Web browsers.
question
115. The process of searching through many records in one or more databases looking for patterns or relationships is called a) credit reporting. b) data mining. c) information gathering. d) microtargeting. e) pattern matching
answer
b) data mining.
question
116. When information is put to another purpose, that is called a a) backdoor exploit. b) collaborative filter. c) cookie. d) data leveraging opportunity. e) secondary use of the data.
answer
e) secondary use of the data.
question
117. A policy that requires the consumer to explicitly give permission before an organization can share information with another organization is called a) fair use. b) full disclosure. c) nondisclosure. d) opt-in. e) opt-out.
answer
d) opt-in.
question
118. The practice of mailing advertisements only to the most likely prospects is called a) discriminatory mailing. b) focused mailing. c) mail list trimming.. d) predatory mailing. e) targeted direct mail.
answer
e) targeted direct mail.
question
87. In 1890 Harvard-trained lawyers _______________ wrote a highly influential article in the Harvard Law Review stating that people in modern society have a right to privacy and that this right ought to be respected.
answer
Samuel Warren and Louis Brandeis
question
88. _______________ suggested that we do not have to define privacy rights because every "privacy right" violation is a violation of another right as well.
answer
Judith Jarvis Thomson
question
89. A _____________ contains information about an incident or action reported to a government agency for the purpose of informing the public.
answer
public record
question
90. With enhanced 911 service, cell phone providers are able to ________________ of active cell phone users.
answer
determine the location
question
91. Manufacturers are replacing bar codes with ____________ tags because they give more information about the product and are easier to scan.
answer
RFIDs / RFID
question
92. A __________ is a file containing information about your visits to a Web site that is placed on your computer's hard drive by a Web server
answer
cookie
question
93. The process of searching through one or more databases, looking for patterns or relationships, is called ______________.
answer
data mining.
question
94. When information collected for one purpose is put to another purpose, that is called a _____________ of the data.
answer
secondary use
question
95. Thanks to ___________________, you can get a credit card from a bank or store with which you have never done business.
answer
the national credit bureau system / credit reports
question
96. Privacy advocates have criticized Path, Twitter, Foursquare, and Instagram for producing apps that __________________________.
answer
gathered information from address books without asking for permission
question
36. One of the provisions of the Fifth Amendment to the United States Constitution is that no person "shall be compelled in any criminal case to be a witness against himself." Relate this provision to the definition of privacy elaborated in the book.
answer
BS
question
37. Do you agree with Judith Jarvis Thomson that every "privacy right" violation is a violation of another right? Explain your position.
answer
Violations of privacy always come with a secondary consequence.
question
38. Name several ways that a typical unmarried 20-year-old may have more privacy now than an unmarried 20-year-old would have had 200 years ago.
answer
BS
question
39. Describe three modern information technology devices and how they may be used to decrease privacy.
answer
BS
question
40. Modern information technology allows a great deal of information to be collected, stored, searched, and rapidly retrieved. Give an example of how this capability benefits society.
answer
Yelp
question
41. Describe the Facebook Beacon service and explain why it raised privacy complaints after it was introduced
answer
Beacon was an opt-out service that broadcasted a facebook user's purchases to his friends, violating the privacy of the user.
question
42. What was the Netflix prize? Why did Netflix's actions raise privacy concern?
answer
$1,000,000 prize to the group that could come up with an algorithm that was at least 10% better tgan Netflix's own algorith at predicting user ratings for movies. Privacy concerns were raised when 100 million ratings were released from nearly 500,000 customers, making the records no longer anonymous.
question
43. Give two examples of how organizations are applying the techniques of data mining to information contained in social networks.
answer
Targeted emails and advertisements.
question
44. Some online retailers are using information gathered about their customers to offer different prices to different people. What is your position on the morality of this strategy? Justify your answer.
answer
BS
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New