MANG 420 1 – Flashcards

question
Professionals take on special rights and obligations because of their special claims to knowledge, wisdom and respect.
answer
-True
question
Privacy is the right to be left alone when you want to be, without surveillance or interference from other individuals or organizations.
answer
-True
question
Spyware is software that comes hidden in downloaded applications and can track your online movements.
answer
-True
question
Most Internet businesses do very little to protect the privacy of their customers.
answer
-True
question
Copyright is the legal protection afforded intellectual property, such as a song, book, or video game.
answer
-True
question
In white-collar fraud, information systems are most typically used as a means to hide financial evidence of crimes.
answer
-True
question
The drawback to copyright protection is that the underlying ideas behind the work are not protected, only their reproduction in a product.
answer
-True
question
The European Parliament has passed a ban on unsolicited commercial messaging.
answer
-True
question
The most common type of computer-related RSI is CTS.
answer
-True
question
Technostres is computer-related malady whose symptoms include fatigue.
answer
-True
question
Even in today's legal climate, there is little incentive for firms to cooperate with prosecutors investigating financial crimes at their firm.
answer
-False
question
Advances in data storage have made routine violations of individual privacy more difficult.
answer
-False
question
The last step in analyzing an ethical issue should be to identify the stakeholders-people who have a vested interest in the outcome of the decision.
answer
-False
question
Most American and European privacy law is based on a set of five principles called COPPA.
answer
-False
question
Data gathered by online behavioral tracking firms is limited to the user's behavior on a single web site.
answer
-False
question
The copyright office began registering software programs in the 1990s
answer
-False
question
According to the courts, in the creation of software, unique concepts, general functional features, and even colors are protectable by copyright law.
answer
-False
question
The key concepts in patent law are originality, novelty, and value.
answer
-False
question
Despite the passage of several laws defining and addressing computer crime, accessing a computer system without authorizations is not yet a federal crime.
answer
-False
question
Any unsolicited e-mail is legally considered spam.
answer
-False
question
The 2012 FTC report on industry-best practices for protecting individuals' privacy focused on each of the following topics except
answer
-phasing out of self-regulatory codes
question
Which of the following best describes how new information systems result in legal gray areas?
answer
-they result in new situations that are not covered by old laws
question
The introduction of new technology has a
answer
-ripple effect raising new ethical, social, and political issues
question
In the information age, the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of
answer
-Property rights and obligations
question
In the information age, the obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within the moral dimension of
answer
-quality of life
question
All of the following are current key technology trends raising ethical issues except
answer
- increase in multimedia quality
question
The use of computer to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called
answer
-Profiling
question
Which of the five moral dimensions of the information age do the central business activities of ChoicePoint raise?
answer
-Information rights and obligations
question
NORA is a
answer
-data analysis technology that finds hidden connections between data in disparate sources.
question
Accepting the potential costs, duties, and obligations for the decisions you make is referred to as
answer
-responsibility
question
The process in law-governed societies in which laws are known and understood and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly is called
answer
-due process
question
The feature of social institutions that mean mechanisms are in place to determine responsibility for an action is called.
answer
-Accountability
question
Which of the following is not one of the five steps discussed in the chapter as a process for analyzing an ethical issue?
answer
-assign responsibility
question
A colleague of yours frequently takes for his own personal use small amounts of office supplies, noting that the loss to the company is minimal. You counter that if everyone were to take the office supplies, the loss would no longer be minimal. Your rationale expresses which historical ethical principle?
answer
-Kant's Categorical Imperative
question
Immanuel Kant's Categorical Imperative states that
answer
-if an action is not right for everyone to take, it is not right for anyone to take
question
A classic ethical dilemma is the hypothetical case of a man stealing from a grocery store in order to feed his starving family. If you used the Utilitarian Principle to evaluate this situation, you might argue that stealing the food is
answer
-acceptable, because the higher value is the survial of the family
question
The ethical "no free lunch" rule states that
answer
-everything is owned by someone else, and that the creator wants compensations for this work
question
According to the ______, you should take the action that produces the least harm.
answer
-Risk Aversion Principle
question
Which US act restricts the information the federal government can collect and regulates what they can do with the information?
answer
-Privacy Act of 1974
question
FIP principles are based on the notion of the
answer
-Mutuality of interest between the record holder and the individual
question
The Federal Trade Commission FIP principle of Notice/Awareness states that
answer
-Web sites must disclose their information practices before collecting data
question
Which of the following is not one of the practice added in 2010 by the FTP to its framework for privacy?
answer
-Firms should limit the length of time that a any personal data is stored to six months or less.
question
Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed?
answer
-HIPAA
question
European privacy protection is_____then in the United States.
answer
-much more strict
question
U.S. businesses are allowed to use personal data from EU countries if they
answer
-develop equivalent privacy protection policies
question
The U.S Department of Commerce developed a_______ framework in order to enable U.S. businesses to legally use personal data from EU countries.
answer
-safe-harbor
question
When a cookie is create during a Web site visit, it is stored
answer
-on the visitor's computer
question
Flash cookies are different from ordinary cookies in that they
answer
-cannot be easily detected or deleted.
question
The Online Privacy Alliance
answer
-encourages self-regualtion to develop a set of privacy guidelines for its members
question
A(n)____ model of informed consent permits the collection of personal information until customer specifically requests that the data not be collected.
answer
-opt-out
question
In the US, the claim to privacy is protected primarily by each of the following except
answer
-COPPA
question
Which of the following statements about trade secrets is not true?
answer
-Any intellectual product, regardless of its purpose, can be classified as a trade secret
question
Intellectual property can best be described as
answer
-intangible property created by individuals or corporations
question
What legal mechanism protects the owners of intellectual property from having their work copied by others?
answer
-copyright law
question
"Look and feel" copyright infringement lawsuits are concerned with
answer
-the distinction between an idea and its expression
question
The strength of patent protection is that is
answer
-Grants a monopoly on underlying concepts and ideas
question
One of the difficulties of patent protection is
answer
-the years of waiting to receive it
question
Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials?
answer
-Digital Millennium Copyrigth Act
question
In general, it is very difficult to hold software producers liable for their software products when those products are considered to be
answer
-Similar to book
question
______are not held liable for the message they transmit.
answer
-Regulated common carriers
question
It is not feasible for companies to produce error-free software because
answer
-it is too expensive to create perfect software
question
The most common source of business system failure is
answer
-data quality
question
The "do anything anywhere" computing environment can
answer
-blur the traditional boundaries between work and family time
question
The practice of spamming has been growing because
answer
-it is so inexpensive and can reach so many people
question
Which of the five moral dimensions of the information age does spamming raise?
answer
-quality of life
question
The Do-Not-Track Act of 2011
answer
-requires firms to notify customers that they are being tracked
question
Re-desiging and automating business processes can be seen as a double edge sword because
answer
-increase in efficiency may be accompanied by job losses
question
A tiny software object embedded in a Web page and used by tracking programs to monitor online user behavior is called
answer
- a Web beacon
question
Which of the following issues are privacy advocates and advertising industry most in conflict over?
answer
-an opt-in policy required at all sites -a national Do-Not-Track list
question
______can be induced by ten of thousands of repetitions under low-impact loads.
answer
-RSI
1 of

Unlock all answers in this set

Unlock answers
question
Professionals take on special rights and obligations because of their special claims to knowledge, wisdom and respect.
answer
-True
question
Privacy is the right to be left alone when you want to be, without surveillance or interference from other individuals or organizations.
answer
-True
question
Spyware is software that comes hidden in downloaded applications and can track your online movements.
answer
-True
question
Most Internet businesses do very little to protect the privacy of their customers.
answer
-True
question
Copyright is the legal protection afforded intellectual property, such as a song, book, or video game.
answer
-True
question
In white-collar fraud, information systems are most typically used as a means to hide financial evidence of crimes.
answer
-True
question
The drawback to copyright protection is that the underlying ideas behind the work are not protected, only their reproduction in a product.
answer
-True
question
The European Parliament has passed a ban on unsolicited commercial messaging.
answer
-True
question
The most common type of computer-related RSI is CTS.
answer
-True
question
Technostres is computer-related malady whose symptoms include fatigue.
answer
-True
question
Even in today's legal climate, there is little incentive for firms to cooperate with prosecutors investigating financial crimes at their firm.
answer
-False
question
Advances in data storage have made routine violations of individual privacy more difficult.
answer
-False
question
The last step in analyzing an ethical issue should be to identify the stakeholders-people who have a vested interest in the outcome of the decision.
answer
-False
question
Most American and European privacy law is based on a set of five principles called COPPA.
answer
-False
question
Data gathered by online behavioral tracking firms is limited to the user's behavior on a single web site.
answer
-False
question
The copyright office began registering software programs in the 1990s
answer
-False
question
According to the courts, in the creation of software, unique concepts, general functional features, and even colors are protectable by copyright law.
answer
-False
question
The key concepts in patent law are originality, novelty, and value.
answer
-False
question
Despite the passage of several laws defining and addressing computer crime, accessing a computer system without authorizations is not yet a federal crime.
answer
-False
question
Any unsolicited e-mail is legally considered spam.
answer
-False
question
The 2012 FTC report on industry-best practices for protecting individuals' privacy focused on each of the following topics except
answer
-phasing out of self-regulatory codes
question
Which of the following best describes how new information systems result in legal gray areas?
answer
-they result in new situations that are not covered by old laws
question
The introduction of new technology has a
answer
-ripple effect raising new ethical, social, and political issues
question
In the information age, the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of
answer
-Property rights and obligations
question
In the information age, the obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within the moral dimension of
answer
-quality of life
question
All of the following are current key technology trends raising ethical issues except
answer
- increase in multimedia quality
question
The use of computer to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called
answer
-Profiling
question
Which of the five moral dimensions of the information age do the central business activities of ChoicePoint raise?
answer
-Information rights and obligations
question
NORA is a
answer
-data analysis technology that finds hidden connections between data in disparate sources.
question
Accepting the potential costs, duties, and obligations for the decisions you make is referred to as
answer
-responsibility
question
The process in law-governed societies in which laws are known and understood and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly is called
answer
-due process
question
The feature of social institutions that mean mechanisms are in place to determine responsibility for an action is called.
answer
-Accountability
question
Which of the following is not one of the five steps discussed in the chapter as a process for analyzing an ethical issue?
answer
-assign responsibility
question
A colleague of yours frequently takes for his own personal use small amounts of office supplies, noting that the loss to the company is minimal. You counter that if everyone were to take the office supplies, the loss would no longer be minimal. Your rationale expresses which historical ethical principle?
answer
-Kant's Categorical Imperative
question
Immanuel Kant's Categorical Imperative states that
answer
-if an action is not right for everyone to take, it is not right for anyone to take
question
A classic ethical dilemma is the hypothetical case of a man stealing from a grocery store in order to feed his starving family. If you used the Utilitarian Principle to evaluate this situation, you might argue that stealing the food is
answer
-acceptable, because the higher value is the survial of the family
question
The ethical "no free lunch" rule states that
answer
-everything is owned by someone else, and that the creator wants compensations for this work
question
According to the ______, you should take the action that produces the least harm.
answer
-Risk Aversion Principle
question
Which US act restricts the information the federal government can collect and regulates what they can do with the information?
answer
-Privacy Act of 1974
question
FIP principles are based on the notion of the
answer
-Mutuality of interest between the record holder and the individual
question
The Federal Trade Commission FIP principle of Notice/Awareness states that
answer
-Web sites must disclose their information practices before collecting data
question
Which of the following is not one of the practice added in 2010 by the FTP to its framework for privacy?
answer
-Firms should limit the length of time that a any personal data is stored to six months or less.
question
Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed?
answer
-HIPAA
question
European privacy protection is_____then in the United States.
answer
-much more strict
question
U.S. businesses are allowed to use personal data from EU countries if they
answer
-develop equivalent privacy protection policies
question
The U.S Department of Commerce developed a_______ framework in order to enable U.S. businesses to legally use personal data from EU countries.
answer
-safe-harbor
question
When a cookie is create during a Web site visit, it is stored
answer
-on the visitor's computer
question
Flash cookies are different from ordinary cookies in that they
answer
-cannot be easily detected or deleted.
question
The Online Privacy Alliance
answer
-encourages self-regualtion to develop a set of privacy guidelines for its members
question
A(n)____ model of informed consent permits the collection of personal information until customer specifically requests that the data not be collected.
answer
-opt-out
question
In the US, the claim to privacy is protected primarily by each of the following except
answer
-COPPA
question
Which of the following statements about trade secrets is not true?
answer
-Any intellectual product, regardless of its purpose, can be classified as a trade secret
question
Intellectual property can best be described as
answer
-intangible property created by individuals or corporations
question
What legal mechanism protects the owners of intellectual property from having their work copied by others?
answer
-copyright law
question
"Look and feel" copyright infringement lawsuits are concerned with
answer
-the distinction between an idea and its expression
question
The strength of patent protection is that is
answer
-Grants a monopoly on underlying concepts and ideas
question
One of the difficulties of patent protection is
answer
-the years of waiting to receive it
question
Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials?
answer
-Digital Millennium Copyrigth Act
question
In general, it is very difficult to hold software producers liable for their software products when those products are considered to be
answer
-Similar to book
question
______are not held liable for the message they transmit.
answer
-Regulated common carriers
question
It is not feasible for companies to produce error-free software because
answer
-it is too expensive to create perfect software
question
The most common source of business system failure is
answer
-data quality
question
The "do anything anywhere" computing environment can
answer
-blur the traditional boundaries between work and family time
question
The practice of spamming has been growing because
answer
-it is so inexpensive and can reach so many people
question
Which of the five moral dimensions of the information age does spamming raise?
answer
-quality of life
question
The Do-Not-Track Act of 2011
answer
-requires firms to notify customers that they are being tracked
question
Re-desiging and automating business processes can be seen as a double edge sword because
answer
-increase in efficiency may be accompanied by job losses
question
A tiny software object embedded in a Web page and used by tracking programs to monitor online user behavior is called
answer
- a Web beacon
question
Which of the following issues are privacy advocates and advertising industry most in conflict over?
answer
-an opt-in policy required at all sites -a national Do-Not-Track list
question
______can be induced by ten of thousands of repetitions under low-impact loads.
answer
-RSI
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New