IS CH 4 – Flashcards

Unlock all answers in this set

Unlock answers
question
False
answer
Advances in data storage have made routine violation of individual privacy more difficult
question
False
answer
The last step in analyzing an ethical issue should be to identify the stakeholders - people who have a vested interest in the outcome of the decision.
question
True
answer
Professionals take on special rights and obligations because of their special claims to knowledge, wisdom, and respect.
question
True
answer
Privacy is the right to be left alone when you want to be, without surveillance or interference from other individuals or organizations.
question
False
answer
Even in today's legal climate, there is little incentive for firms to cooperate with prosecutors investigating financial crimes at their firm
question
True
answer
Spyware is software that comes hidden in downloaded applications and can track your online movements.
question
True
answer
Most Internet businesses do very little to protect the privacy of their customers
question
False
answer
The rate of global piracy is approximately 20%
question
False
answer
Trade secret law does not protect the actual ideas in a work product
question
True
answer
Copyright is the legal protection afforded intellectual property, such as a song, book, or video game.
question
False
answer
The Copyright Office began registering software programs in the 1990s
question
True
answer
The drawback to copyright protection is that the underlying ideas behind the work are not protected, only their reproduction in a product
question
False
answer
According to the courts, the creation of software, unique concepts, general functional features, and even colors are protectable by copyright law
question
False
answer
The key concepts in patent law are originality, novelty, and value
question
False
answer
Despite the passage of several laws defining and addressing computer crime, accessing a computer system without authorization is not yet a federal crime
question
False
answer
Any unsolicited e-mail is legally considered spam
question
True
answer
The European Parliament has passed a ban on unsolicited commercial messaging
question
True
answer
The most common type of computer-related RSI is CTS
question
True
answer
Technostress is a computer-related malady whose symptoms include fatigue
question
False
answer
Most American and European privacy law is based on a set of five principles called COPPA
question
They result in new situations that are not covered by old laws
answer
Which of the following best describes how new information systems result in legal gray areas?
question
ripple effect, raising new ethical, social, and political issues
answer
The introduction of new information technology has a
question
property rights and obligations
answer
In the information age, the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of:
question
quality of life
answer
In the information age, the obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within the moral dimension of:
question
increase in multimedia quality
answer
All of the following are current key technology trends raising ethical issues except
question
profiling
answer
The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called
question
Information rights and obligations
answer
Which of the five moral dimensions of the information age do the central business activities of ChoicePoint raise
question
new data analysis technology that finds hidden connections between data in disparate sources
answer
NORA is a
question
responsibility
answer
Accepting the potential costs, duties, and obligations for the decisions you make is referred to as:
question
Firms should limit the length of time that any personal data is stored to six months or less
answer
Which of the following is not one of the practices added in 2010 by the FTC to its framework for privacy
question
Accountability
answer
The feature of social institutions that means mechanisms are in place to determine responsibility for an action is called:
question
due process
answer
The practice in law-governed societies in which laws are known and understood, and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly is called
question
Assign responsibility
answer
Which of the following is not one of the five steps discussed in the chapter as a process for analyzing an ethical issue
question
Kant's Categorical Imperative
answer
A colleague of yours frequently takes, for his own personal use, small amounts of office supplies noting that the loss to the company is minimal. You counter that if everyone were to take office supplies the loss would no longer be minimal. Your rationale expresses which historical ethical principle?
question
acceptable, because the higher value is the survival of the family
answer
A classic ethical dilemma is the hypothetical case of a man stealing from a grocery store in order to feed his starving family. If you used the Utilitarian Principle to evaluate this situation, you might argue that stealing the food is
question
if an action is not right for everyone to take, it is not right for anyone to take
answer
Immanuel Kant's Categorical Imperative states that
question
everything is owned by someone else, and that the creator wants compensation for this work
answer
The ethical "no free lunch" rule states that
question
Risk Aversion Principle
answer
According to the ________, you should take the action that produces the least harm
question
Privacy Act of 1974
answer
Which U.S. act restricts the information the federal government can collect and regulates what they can do with the information
question
mutuality of interest between the record holder and the individual
answer
FIP principles are based on the notion of the
question
Web sites must disclose their information practices before collecting data
answer
The Federal Trade Commission FIP principle of Notice/Awareness states that:
question
HIPAA
answer
Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed
question
much more stringent
answer
European privacy protection is ________ than in the United States
question
develop equivalent privacy protection policies
answer
U.S. businesses are allowed to use personal data from EU countries if they
question
on the visitor's computer
answer
When a cookie is created during a Web site visit, it is stored
question
safe-harbour
answer
the U.S. Department of Commerce developed a ________ framework in order to enable U.S. businesses to legally use personal data from EU countries.
question
encourages self regulation to develop a set of privacy guidelines for its members
answer
The Online Privacy Alliance
question
opt-out
answer
A(n) ________ model of informed consent permits the collection of personal information until the consumer specifically requests that the data not be collected.
question
birthplace
answer
Types of information gathered by Web site tracking tools include all of the following except
question
Software products are more easily compared to each other than books.
answer
Which of the following statements does not describe a key difference between software and books?
question
the software is widely distributed
answer
The limitation of trade secret protection for software is that it is difficult to prevent the ideas in the work from falling into the public domain when:
question
intangible property created by individuals or corporations
answer
Intellectual property can best be described as
question
Copyright law
answer
What legal mechanism protects the owners of intellectual property from having their work copied by others
question
the distinction between an idea and its expression
answer
"Look and feel" copyright infringement lawsuits are concerned with:
question
grants a monopoly on underlying concepts and ideas
answer
The strength of patent protection is that it
question
the years of waiting to receive it
answer
One of the drawbacks of patent protection is
question
Digital Millennium Copyright Act
answer
Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials
question
similar to books
answer
In general, it is very difficult to hold software producers liable for their software products when those products are considered to be
question
Regulated common carriers
answer
________ are not held liable for the messages they transmit
question
it is too expensive to create perfect software
answer
It is not feasible for companies to produce error-free software because
question
data quality
answer
The most common source of business system failure is
question
cannot be easily detected or deleted
answer
Flash cookies are different from ordinary cookies in that they
question
blur the traditional boundaries between work and family time
answer
The "do anything anywhere" computing environment can
question
it is so inexpensive and can reach so many people
answer
The practice of spamming has been growing because
question
requires spammers to identify themselves
answer
The U.S. CAN-SPAM Act of 2003
question
Quality of life
answer
Which of the five moral dimensions of the information age does spamming raise?
question
increases in efficiency may be accompanied by job losses
answer
Re-designing and automating business processes can be seen as a double-edged sword
question
digital
answer
The term "________ divide" refers to large disparities in access to computers and the Internet among different social groups and different locations
question
yestrain related to computer display screen use
answer
CVS refers to:
question
RSI
answer
________ can be induced by tens of thousands of repetitions under low-impact loads.
question
False
answer
The principles of right and wrong that can be used by individuals to make choices to guide their behavior are called morals
question
behavioral targeting
answer
Advertisers use ________ in order to display more relevant ads based on user's search and browsing history.
question
the slippery-slope rule
answer
Descartes' rule of change, that if an action cannot be taken repeatedly, it is not right to take at all, is also known as:
question
True
answer
Liability refers to the existence of laws that permit individuals to recover damages done to them by other actors, systems, or organizations
question
False
answer
The Utilitarian Principle asks you to put yourself in the place of others, and think of yourself as the object of the decision
question
False
answer
Safe harbor is informal permission to reuse data, given with knowledge of all the facts needed to make a rational decision
question
True
answer
A Web beacon is a tiny object embedded in e-mail messages and Web pages that is designed to monitor online Internet user behavior
question
opt-in
answer
The ________ model prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use.
question
patent
answer
A(n) ________ grants the owner an exclusive monopoly on the ideas behind an invention for 20 years.
question
true
answer
The commission of acts involving the computer that may not be illegal but are considered unethical is called computer abuse.
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New