Flashcards on IS Chapter 8

Unlock all answers in this set

Unlock answers
question
16) Which of the following e-commerce technology dimensions creates greater opportunities for cyberbullying? A) richness B) interactivity C) social technology D) ubiquity
answer
Social Technology
question
17) Which of the following e-commerce technology dimensions has the potential to reduce cultural diversity in products? A) richness B) interactivity C) information density D) global reach
answer
Global Reach
question
18) Which of the following is not one of the four basic principles shared by ethical schools of thought in western culture? A) accountability B) privacy C) due process D) liability
answer
Privacy
question
19) What is the first step in analyzing an ethical dilemma? A) Define the conflict or dilemma and identify the higher-order values involved. B) Identify the potential consequences of your opinions. C) Identify the options you can reasonably take. D) Identify and describe the facts.
answer
Identify and describe the facts
question
20) Which ethical principle states that, when confronted with an ethical dilemma, individuals should take the action that achieves the greater value for all of society? A) the Golden Rule B) Universalism C) the Collective Utilitarian principle D) the Social Contract rule
answer
the Collective Utilitarian principle
question
21) Which ethical principle emphasizes putting oneself into the place of others and thinking of oneself as the object of the decision? A) the Golden Rule B) Universalism C) the Collective Utilitarian principle D) the Social Contract rule
answer
The Golden Rule
question
22) Which ethical principle asks you to assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise? A) the Golden Rule B) the Slippery Slope C) the Social Contract rule D) No Free Lunch
answer
No Free Lunch
question
23) Which ethical principle states that if an action cannot be taken repeatedly, then it is not right to take at all? A) Universalism B) the Slippery Slope C) the Social Contract rule D) the Golden Rule
answer
The Slippery Slope
question
24) Which ethical principle asks you to consider the impact of your decision if the principles underlying your decision became an organizing principle of the entire society? A) the Golden Rule B) Risk Aversion C) the Slippery Slope D) the Social Contract rule
answer
D) the Social Contract rule
question
25) Which ethical principle tells you that it is wise to assume perfect information markets? A) the Golden Rule B) the New York Times test C) the Social Contract rule D) the Collective Utilitarian principle
answer
The New York Times test
question
26) Which ethical principle states that when confronted with an ethical dilemma, an individual should take the action that produces the least harm, or the least potential cost? A) the Slippery Slope B) Risk Aversion C) No Free Lunch D) the Collective Utilitarian principle
answer
Risk Aversion
question
27) Which of the following basic ethical concepts plays an important role in defining privacy? A) responsibility B) accountability C) liability D) due process
answer
Due Process
question
28) ________ is collected data that can be used to identify and locate an individual. A) A personal profile B) P3P C) Anonymous information D) PII
answer
PII
question
29) Which of the following tools can companies use to track user statements and views on newsgroups, chat groups, and other public forums? A) cookies B) digital wallets C) search engines D) shopping carts
answer
Search engines
question
30) Which of the following can be used to record all keyboard activity of a user? A) shopping carts B) trusted computing environments C) spyware D) DRM
answer
Spyware
question
31) Which of the following is not one of the issues complicating the taxation of e-commerce sales? A) Taxes raised are used for different government purposes. B) Sales taxes and policies vary by state and country. C) Retailers legally only have to charge sales tax if they have operations located in the same state as a consumer. D) Small online businesses are unable to manage sales taxes to thousands of different jurisdictions.
answer
A) Taxes raised are used for different government purposes.
question
32) Google's Gmail advertising has raised concerns about which of the following issues? A) privacy B) copyright C) trademark D) patents
answer
Privacy
question
33) Which of the following statements about industry self-regulation regarding privacy is not true? A) OPA members are required to implement the OPA's privacy guidelines. B) The primary focus of industry efforts has been the use of online "seals" that attest to the site's policies. C) Industry efforts have not so far succeeded in reducing American fears of privacy invasion. D) The NAI's privacy policies have established the TRUSTe seal.
answer
D) The NAI's privacy policies have established the TRUSTe seal.
question
34) The sharing of a user's stored cookie information between Web sites and without the user's knowledge is: A) legal in the United States but illegal in Europe. B) illegal in the United States but legal in Europe. C) legal in both the United States and Europe. D) illegal in both the United States and Europe.
answer
legal in the United States but illegal in Europe.
question
35) Which of the following requires financial institutions to inform consumers of their privacy policies and permits consumers some control over their records? A) Freedom of Information Act B) Gramm-Leach-Bliley Act C) COPPA D) HIPAA
answer
Gramm-Leach-Bliley Act
question
36) A social consequence of the richness of Internet information is: A) an increase in shallowness. B) an increase in the ease of creating misleading information. C) very persuasive messages might reduce the need for multiple independent sources of information. D) an increase in vulnerability to hacking attacks.
answer
very persuasive messages might reduce the need
question
37) Which of the following is a core Fair Information Practices (FIP) principle? A) Choice/Consent B) Access/Participation C) Security D) Enforcement
answer
Choice/Consent
question
38) Which of the FTC's Fair Information Practices (FIP) principles requires identification of the collector of data? A) Notice/Awareness B) Choice/Consent C) Access/Participation D) Security
answer
Notice/Awareness
question
39) Which of the FTC's Fair Information Practices (FIP) principles requires opt-in or opt-out policies to be in place? A) Notice/Awareness B) Choice/Consent C) Access/Participation D) Security
answer
Choice/Consent
question
40) What is the FTC recommendation regarding choice as it relates to personally identifiable information (PII)? A) Require firms to have consumers affirmatively opt-in before PII is collected. B) Require firms to allow consumers to opt-out before PII is collected. C) Make collection of PII illegal. D) Require robust notice only before PII is collected.
answer
Require firms to have consumers affirmatively opt-in before PII is collected.
question
41) "Do Not Track" falls under which of the following principles in the FTC's new privacy framework? A) Privacy by Design B) Simplified Choice C) Greater Transparency D) Scope
answer
Simplified Choice
question
42) Which of the following technologies allows you to send e-mail without a trace? A) anonymous surfing B) P3P C) anonymous remailers D) public key encryption
answer
anonymous remailers
question
43) Which pricing plan charges fees to e-commerce firms based on the amount of traffic they generate? A) highway pricing B) cap pricing C) usage-based billing D) congestion pricing
answer
Highway Pricing
question
44) What is the major reason that the Internet has such potential for destroying traditional conceptions and implementations of intellectual property law? A) the ability to make perfect copies of digital works at little cost B) the anonymous nature of the Internet C) the support for instant peer-to-peer communication D) the use of standards for file formats
answer
the ability to make perfect copies of digital works at little cost
question
45) Which of the following protects original forms of expression in a tangible medium? A) trade secret law B) copyright law C) patent law D) trademark law
answer
Copyright law
question
46) How long does copyright protection extend for corporate-owned works? A) 25 years B) 50 years C) 75 years D) 95 years
answer
95 years
question
47) Which of the following situations would not qualify for the fair use exception to U.S. copyright law? A) A professor clips a newspaper article just before class and distributes copies of it to his class. B) A journalist quotes a paragraph from a book in a review of the book. C) A student copies a photograph of his favorite band from a Web site created by the band's record label and places it on the student's personal Web site. D) Google posts thumbnail images of books in the Google Book Search Project.
answer
C) A student copies a photograph of his favorite band from a Web site created by the band's record label and places it on the student's personal Web site.
question
48) All of the following are factors that will be considered in determining whether use of copyrighted material is "fair use" except the: A) nature of the work used. B) amount of the work used. C) market effect of the use. D) free availability of the work on the Web
answer
D) free availability of the work on the Web
question
49) Downloading music tracks owned by record companies without paying for them is an example of a violation of: A) patent law. B) copyright law. C) trademark law. D) privacy law.
answer
B) copyright law.
question
50) All of the following are possible penalties for violating the Digital Millennium Copyright Act (DMCA) except: A) up to ten years imprisonment for a first offense. B) fines up to $500,000 for a first offense. C) fines up to $1 million for a repeat offense. D) restitution to the injured parties for any losses due to infringement.
answer
up to ten years imprisonment for a first offense.
question
51) All of the following statements about the Digital Millennium Copyright Act (DMCA) are true except: A) the DMCA makes it illegal to circumvent technological measures to protect works. B) the DMCA makes Internet Service Providers (ISPs) responsible and accountable for hosting Web sites or providing services to infringers regardless of whether the ISP is aware of infringement. C) the DMCA requires search engines to block access to infringing sites. D) the DMCA allows libraries to make digital copies of works for internal use only.
answer
B) the DMCA makes Internet Service Providers (ISPs) responsible and accountable for hosting Web sites or providing services to infringers regardless of whether the ISP is aware of infringement.
question
52) Which of the following allows someone to obtain an exclusive monopoly on the ideas behind an invention for 20 years? A) copyright law B) trade secret law C) patent law D) trademark law
answer
Patent Law
question
53) All of the following statements about patents are true except: A) it is more difficult to obtain a copyright than it is to obtain a patent. B) the four types of inventions protected by patent law are machines, manmade products, compositions of matter, and processing methods. C) computer programs can be patented. D) in order to be patented, an invention must be nonobvious.
answer
A) it is more difficult to obtain a copyright than it is to obtain a patent.
question
54) Which case was instrumental in paving the way for Internet business methods patents? A) Brown Bag v. Symantec B) State Street Bank & Trust Co. v. Signature Financial Group, Inc. C) Ford Motor Co. v. Lapertosa D) Ticketmaster Corp. v. Tickets.com
answer
B) State Street Bank & Trust Co. v. Signature Financial Group, Inc.
question
55) Amazon has a patent on: A) download-based sales. B) display of third-party advertisements in floating windows. C) one-click purchasing. D) hyperlinks.
answer
C) one-click purchasing.
question
56) Disputes over federal trademarks involve establishing: A) underlying ideas. B) intent. C) piracy. D) infringement.
answer
infringement
question
57) Registering a domain name similar or identical to trademarks of others to extort profits from legitimate holders is an example of: A) cybersquatting. B) cyberpiracy. C) framing. D) metatagging.
answer
Cybersquatting
question
58) All of the following are data elements that are often gathered by e-commerce sites except: A) family member identities. B) photograph. C) location. D) address.
answer
family member identities.
question
59) Registering a domain name similar or identical to trademarks of others to divert Web traffic to their own sites is an example of: A) cybersquatting. B) cyberpiracy. C) framing. D) metatagging.
answer
Cyberpiracy
question
60) Registering the domain name goggle.com with the intent to divert Web traffic from people misspelling google.com is an example of: A) cybersquatting. B) typosquatting. C) metatagging. D) linking.
answer
Typosquatting
question
61) Critics have pointed out that the Chrome browser's Suggest button, which suggests queries based on search terms entered by the user, is in fact, a type of: A) worm. B) PUP. C) key logger. D) malware.
answer
Key logger
question
62) The display of a third-party's Web site or page within your own Web site is called: A) cybersquatting. B) metatagging. C) framing. D) deep linking.
answer
Framing
question
63) Which of the following statements about e-commerce surveillance is not true? A) Government agencies are one of the largest users of personal data gathered by commercial data brokers. B) Google discards search information after 12 months. C) The largest private-sector commercial data broker is Acxiom. D) Commercial brokers of personal data combine personal identifying records with legal records such as driving records and clickstream behavior.
answer
B) Google discards search information after 12 months.
question
64) Which of the following is not one of the four stages of e-commerce governance? A) government regulation B) self-regulation C) privatization D) deregulation
answer
deregulation
question
65) Which of the following statements about social, local, and mobile privacy is not true? A) A single Facebook photograph can be used to identify the subject's social security number with the use of facial recognition software. B) iOS and Android apps funnel personal location information, photos, and address books to mobile advertisers. C) Google and Apple track and record how users interact with the apps on users' smartphones. D) To date, there is no legal prohibition of the collection and sharing of personal data sent through mobile phones.
answer
C) Google and Apple track and record how users interact with the apps on users' smartphones
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New