Shared Flashcard Set

Details

Information Systems-Chapter 4
Chapter 4
80
Other
Undergraduate 3
02/26/2016

Additional Other Flashcards

 


 

Cards

Term

Advances in data storage have made routine violation of individual privacy more difficult.

(True/False)

Definition
FALSE
Term

The last step in analyzing an ethical issue should be to identify the stakeholders - people who have a vested interest in the outcome of the decision.

(True/False)

Definition
FALSE
Term

 

Professionals take on special rights and obligations because of their special claims to knowledge, wisdom, and respect.

(True/False)

Definition
TRUE
Term

 

Privacy is the right to be left alone when you want to be, without surveillance or interference from other individuals or organizations.

(true/false)

Definition
TRUE
Term

 

Even in today's legal climate, there is little incentive for firms to cooperate with prosecutors investigating financial crimes at their firm.

(true/false)

Definition
FALSE
Term

 

Spyware is software that comes hidden in downloaded applications and can track your online movements.

(true/false)

Definition
TRUE
Term

Most Internet businesses do very little to protect the privacy of their customers

(true/false)

Definition
TRUE
Term

 

The rate of global piracy is approximately 20%.

(true/false)

Definition
FALSE
Term

 

Trade secret law does not protect the actual ideas in a work product.

(true/false)

Definition
FALSE
Term

Copyright is the legal protection afforded intellectual property, such as a song, book, or video game

(true/false)

Definition
TRUE
Term

The Copyright Office began registering software programs in the 1990s.

(true/false)

Definition
FALSE
Term

 

The drawback to copyright protection is that the underlying ideas behind the work are not protected, only their reproduction in a product.

(true/false)

Definition
TRUE
Term

 

According to the courts, the creation of software, unique concepts, general functional features, and even colors are protectable by copyright law.

(true/false)

Definition
FALSE
Term

 

The key concepts in patent law are originality, novelty, and value.

(true/false)

Definition
FALSE
Term

 

Despite the passage of several laws defining and addressing computer crime, accessing a computer system without authorization is not yet a federal crime.

(true/false)

Definition
FALSE
Term

 

Any unsolicited e-mail is legally considered spam.

(true/false)

Definition
FALSE
Term

The European Parliament has passed a ban on unsolicited commercial messaging.

(true/false)

Definition
TRUE
Term

 

The most common type of computer-related RSI is CTS.

(true/false)

Definition
TRUE
Term

Technostress is a computer-related malady whose symptoms include fatigue.

(true/false)

Definition
TRUE
Term

 

Most American and European privacy law is based on a set of five principles called COPPA.

(true/false)

Definition
FALSE
Term

 

Which of the following best describes how new information systems result in legal gray areas?

 

A) They work with networked, electronic data, which are more difficult to control than information stored manually.

 

B) They result in new situations that are not covered by old laws.

 

C) They are implemented by technicians rather than managers.

 

D) They are created from sets of logical and technological rules rather than social or organizational mores.

 

Definition
B) They result in new situations that are not covered by old laws.
Term

 

The introduction of new information technology has a:

 


A) dampening effect on the discourse of business ethics.

 

B) ripple effect, raising new ethical, social, and political issues.

 

C) beneficial effect for society as a whole, while raising dilemmas for consumers.

 

D) waterfall effect in raising ever more complex ethical issues.

 

Definition

 

B) ripple effect, raising new ethical, social, and political issues.

 

Term

 

In the information age, the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of:

 


A) property rights and obligations.

 

B) system quality.

 

C) accountability and control.

 

D) information rights and obligations.

 

Definition
A) property rights and obligations.
Term

 

In the information age, the obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within the moral dimension of:

 


A) family and home.

 

B) property rights and obligations.

 

C) system quality.

 

D) quality of life.

 

Definition
D) quality of life.
Term

 

All of the following are current key technology trends raising ethical issues except:

 

A) data storage improvements.

 

B) data analysis advancements.

 

C) increase in multimedia quality.

 

D) increase in use of mobile devices.

 

Definition

 

C) increase in multimedia quality.

 

Term

 

The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called:

 

A) profiling.

 

B) phishing.

 

C) spamming.

 

D) targeting.

 

Definition
A) profiling.
Term

 

Which of the five moral dimensions of the information age do the central business activities of ChoicePoint raise?

 

A) Property rights and obligations

 

B) System quality

 

C) Accountability and control

 

D) Information rights and obligations

 

Definition
D) Information rights and obligations
Term

 

NORA is a:

 

A) profiling technology used by the EU.

 

B) federal privacy law protecting networked data.

 

C) new data analysis technology that finds hidden connections between data in disparate sources.

 

D) sentencing guideline adopted in 1987 mandating stiff sentences on business executives.

 

Definition
C) new data analysis technology that finds hidden connections between data in disparate sources.
Term

 

Accepting the potential costs, duties, and obligations for the decisions you make is referred to as:

 

A) responsibility.

 

B) accountability.

 

C) liability.

 

D) due process.

 

Definition
A) responsibility
Term

 

Which of the following is not one of the practices added in 2010 by the FTC to its framework for privacy?

 

A) Firms should build products and services that protect privacy.

 

B) Firms should increase the transparency of their data collection.

 

C) Firms should require consumer consent and provide clear options to opt out of data collection.

 

D) Firms should limit the length of time that any personal data is stored to six months or less.

 

Definition

Firms should limit the length of time that any personal data is stored to six months or less.

 

Term

 

The feature of social institutions that means mechanisms are in place to determine responsibility for an action is called:

 

A) due process.

 

B) accountability.

 

C) the courts of appeal.

 

D) the judicial system.

 

Definition

 

B) accountability.

 

Term

 

The practice in law-governed societies in which laws are known and understood, and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly is called:

 

A) liability.

 

B) due process.

 

C) the courts of appeal.

 

D) accountability.

 

Definition
B) due process.
Term

 

Which of the following is not one of the five steps discussed in the chapter as a process for analyzing an ethical issue?

 

A) Assign responsibility.

 

B) Identify the stakeholders.

 

C) Identify the options you can reasonably take.

 

D) Identify and clearly describe the facts.

 

Definition
A) Assign responsibility
Term

 

A colleague of yours frequently takes, for his own personal use, small amounts of office supplies noting that the loss to the company is minimal. You counter that if everyone were to take office supplies the loss would no longer be minimal. Your rationale expresses which historical ethical principle?

 

A) Kant's Categorical Imperative

 

B) The Golden Rule

 

C) The Risk Aversion Principle

 

D) The "No free lunch" rule

 

Definition

 

A) Kant's Categorical Imperative

 

Term

 

A classic ethical dilemma is the hypothetical case of a man stealing from a grocery store in order to feed his starving family. If you used the Utilitarian Principle to evaluate this situation, you might argue that stealing the food is:

 

A) acceptable, because the grocer suffers the least harm.

 

B) acceptable, because the higher value is the survival of the family.

 

C) wrong, because the man would not want the grocer to steal from him.

 

D) wrong, because if everyone were to do this, the concept of personal property is defeated.

 

Definition
B) acceptable, because the higher value is the survival of the family
Term

 

Immanuel Kant's Categorical Imperative states that:

 

A) if an action cannot be taken repeatedly, then it is not right to be taken at any time.

 

B) one should take the action that produces the least harm or incurs the least cost.

 

C) one can put values in rank order and understand the consequences of various courses of action.

 

D) if an action is not right for everyone to take, it is not right for anyone to take.

 

Definition

 

D) if an action is not right for everyone to take, it is not right for anyone to take.

 

Term

 

The ethical "no free lunch" rule states that:

 

A) if an action cannot be taken repeatedly, then it is not right to be taken at any time.

 

B) one should take the action that produces the least harm or incurs the least cost.

 

C) one can put values in rank order and understand the consequences of various courses of action.

 

D) everything is owned by someone else, and that the creator wants compensation for this work.

 

Definition

 

D) everything is owned by someone else, and that the creator wants compensation for this work.

 

Term

 

According to the ________, you should take the action that produces the least harm.

 

A) Categorical Imperative

 

B) Risk Aversion Principle

 

C) Utilitarian Principle

 

D) Golden Rule

 

Definition

 

B) Risk Aversion Principle

 

Term

 

Which U.S. act restricts the information the federal government can collect and regulates what they can do with the information?

 

A) Privacy Act of 1974

 

B) Gramm-Leach-Bliley Act of 1999

 

C) Freedom of Information Act

 

D) HIPAA of 1996

 

Definition

 

A) Privacy Act of 1974

 

Term

 

 FIP principles are based on the notion of the:

 

A) accountability of the record holder.

 

B) responsibility of the record holder.

 

C) mutuality of interest between the record holder and the individual.

 

D) privacy of the individual.

 

Definition

 

C) mutuality of interest between the record holder and the individual.

 

Term

 

The Federal Trade Commission FIP principle of Notice/Awareness states that:

 

A) customers must be allowed to choose how their information will be used for secondary purposes other than the supporting transaction.

 

B) data collectors must take responsible steps to assure that consumer information is accurate and secure from unauthorized use.

 

C) there is a mechanism in place to enforce FIP principles.

 

D) Web sites must disclose their information practices before collecting data.

 

Definition

 

D) Web sites must disclose their information practices before collecting data.

 

Term

 

Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed?

 

A) HIPAA

 

B) Gramm-Leach-Bliley Act

 

C) Privacy Protection Act

 

D) Freedom of Information Act

 

Definition

 

A) HIPAA

 

Term

 

European privacy protection is ________ than in the United States.

 

A) less far reaching

 

B) less liable to laws

 

C) much less stringent

 

D) much more stringent

 

Definition

 

D) much more stringent

 

Term

 

 U.S. businesses are allowed to use personal data from EU countries if they:

 

A) have informed consent.

 

B) create a safe harbor.

 

C) develop equivalent privacy protection policies.

 

D) make their privacy protection policies publicly available.

 

Definition

 

C) develop equivalent privacy protection policies.

 

Term

 

When a cookie is created during a Web site visit, it is stored:

 

A) on the Web site computer.

 

B) on the visitor's computer.

 

C) on the ISP's computer.

 

D) in a Web directory.

 

Definition
B) on the visitor's computer
Term

 

The U.S. Department of Commerce developed a ________ framework in order to enable U.S. businesses to legally use personal data from EU countries.

 

A) COPPA

 

B) P3P

 

C) PGP

 

D) safe-harbor

 

Definition

 

D) safe-harbor


 

Term

 

The Online Privacy Alliance:

 

A) encourages self regulation to develop a set of privacy guidelines for its members.

 

B) protects user privacy during interactions with Web sites.

 

C) has established technical guidelines for ensuring privacy.

 

D) is a government agency regulating the use of customer information.

 

Definition

 

A) encourages self regulation to develop a set of privacy guidelines for its members.

 

Term

 

A(n) ________ model of informed consent permits the collection of personal information until the consumer specifically requests that the data not be collected.

 

A) opt-in

 

B) opt-out

 

C) P3P

 

D) PGP

 

Definition
B) opt-out
Term

 

Types of information gathered by Web site tracking tools include all of the following except:

 

A) health concerns.

 

B) birthplace.

 

C) income.

 

D) purchases.

 

Definition

 

B) birthplace.

 

Term

 

Which of the following statements does not describe a key difference between software and books?

 

A) Software contains more information than a book.

 

B) Software is less easily inspected than a book.

 

C) Software products are more easily compared to each other than books.

 

D) Software is understood to be more fallible than a book.

 

Definition

 

C) Software products are more easily compared to each other than books.

 

Term

 

The limitation of trade secret protection for software is that it is difficult to prevent the ideas in the work from falling into the public domain when:

 

A) the courts become involved.

 

B) hackers are able to break into the source code.

 

C) the software is widely distributed.

 

D) a new version of the software is released.

 

Definition

 

C) the software is widely distributed.

 

Term

 

Intellectual property can best be described as:

 

A) intangible property created by individuals or corporations.

 

B) unique creative work or ideas.

 

C) tangible or intangible property created from a unique idea.

 

D) the expression of an intangible idea.

 

Definition

 

A) intangible property created by individuals or corporations.

 

Term

 

What legal mechanism protects the owners of intellectual property from having their work copied by others?

 

A) Patent protection

 

B) Intellectual property law

 

C) Copyright law

 

D) Fair Use Doctrine

 

Definition

 

C) Copyright law

 

Term

 

"Look and feel" copyright infringement lawsuits are concerned with:

 

A) the distinction between tangible and intangible ideas.

 

B) the distinction between an idea and its expression.

 

C) using the graphical elements of another product.

 

D) using the creative elements of another product.

 

Definition
B) the distinction between an idea and its expression
Term

 

The strength of patent protection is that it:

 

A) puts the strength of law behind copyright.

 

B) allows protection from Internet theft of ideas put forth publicly.

 

C) is easy to define.

 

D) grants a monopoly on underlying concepts and ideas.

 

Definition
D) grants a monopoly on underlying concepts and ideas
Term

 

One of the drawbacks of patent protection is:

 

A) that only the underlying ideas are protected.

 

B) digital media cannot be patented.

 

C) preventing the ideas from falling into public domain.

 

D) the years of waiting to receive it.

 

Definition

 

D) the years of waiting to receive it.

 

Term

 

Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials?

 

A) Digital Millennium Copyright Act

 

B) Privacy Act

 

C) Freedom of Information Act

 

D) Electronic Communications Privacy Act

 

Definition

 

A) Digital Millennium Copyright Act

 

Term

 

In general, it is very difficult to hold software producers liable for their software products when those products are considered to be:

 

A) part of a machine.

 

B) similar to books.

 

C) services.

 

D) artistic expressions.

 

Definition

 

B) similar to books.

 

Term

 

________ are not held liable for the messages they transmit.

 

A) Regulated common carriers

 

B) Private individuals

 

C) Organizations and businesses

 

D) Elected officials

 

Definition

 

A) Regulated common carriers

 

Term

 

It is not feasible for companies to produce error-free software because:

 

A) any programming code is susceptible to error.

 

B) it is too expensive to create perfect software.

 

C) errors can be introduced in the maintenance stage of development.

 

D) any software of any complexity will have errors.

 

Definition
B) it is too expensive to create perfect software
Term

 

The most common source of business system failure is:

 

A) software bugs.

 

B) software errors.

 

C) hardware or facilities failures.

 

D) data quality.

 

Definition
D) data quality
Term

 

Flash cookies are different from ordinary cookies in that they:

 

A) are installed only at the user's request.

 

B) are not stored on the user's computer.

 

C) cannot be easily detected or deleted.

 

D) monitor the user's behavior at a web site.

 

Definition

 

C) cannot be easily detected or deleted.

 

Term

 

 

 

The "do anything anywhere" computing environment can:

 

A) make work environments much more pleasant.

 

B) create economies of efficiency.

 

C) centralize power at corporate headquarters.

 

D) blur the traditional boundaries between work and family time.

 

Definition

 

D) blur the traditional boundaries between work and family time.

 

Term

 

The practice of spamming has been growing because:

 

A) telephone solicitation is no longer legal.

 

B) it is good advertising practice and brings in many new customers.

 

C) it helps pay for the Internet.

 

D) it is so inexpensive and can reach so many people.

 

Definition

 

D) it is so inexpensive and can reach so many people.

 

Term

 

The U.S. CAN-SPAM Act of 2003:

 

A) makes spamming illegal.

 

B) requires spammers to identify themselves.

 

C) has dramatically cut down spamming.

 

D) does not override state anti-spamming laws.

 

Definition

 

B) requires spammers to identify themselves.

 

Term

 

Which of the five moral dimensions of the information age does spamming raise?

 

A) Quality of life

 

B) System quality

 

C) Accountability and control

 

D) Information rights and obligations

 

Definition

 

A) Quality of life

 

Term

 

Re-designing and automating business processes can be seen as a double-edged sword because:

 

A) increases in efficiency may be accompanied by job losses.

 

B) increases in efficiency may be accompanied by poor data quality.

 

C) support for middle-management decision making may be offset by poor data quality.

 

D) reliance on technology results in the loss of hands-on knowledge.

 

Definition

 

A) increases in efficiency may be accompanied by job losses.

 

Term

 

The term "________ divide" refers to large disparities in access to computers and the Internet among different social groups and different locations.

 

A) computer

 

B) technology

 

C) digital

 

D) electronic

 

Definition

 

C) digital

 

Term

 

CVS refers to:

 

A) eyestrain related to computer display screen use.

 

B) carpal vision syndrome.

 

C) wrist injuries brought about by incorrect hand position when using a keyboard.

 

D) stress induced by technology.

 

Definition

 

A) eyestrain related to computer display screen use.

 

Term

 

) ________ can be induced by tens of thousands of repetitions under low-impact loads.

 

A) CTS

 

B) CVS

 

C) RSI

 

D) Technostress

 

Definition

 

C) RSI

 

Term

The principles of right and wrong that can be used by individuals to make choices to guide their behavior are called morals

(True/False)

Definition
FALSE
Term

 

Advertisers use ________ in order to display more relevant ads based on user's search and browsing history.

 

A) behavioral targeting

 

B) web bugs

 

C) NORA

 

D) intelligent agents

 

Definition

 

A) behavioral targeting

 

Term

 

Descartes' rule of change, that if an action cannot be taken repeatedly, it is not right to take at all, is also known as:

 

A) the slippery-slope rule.

 

B) the lemming rule.

 

C) high-failure cost rule.

 

D) the utilitarian principle.

 

Definition

 

A) the slippery-slope rule.

 

Term

 

Liability refers to the existence of laws that permit individuals to recover damages done to them by other actors, systems, or organizations.

(True/False)

Definition
TRUE
Term

 

The Utilitarian Principle asks you to put yourself in the place of others, and think of yourself as the object of the decision.

(True/false)

Definition
FALSE
Term

Safe harbor is informal permission to reuse data, given with knowledge of all the facts needed to make a rational decision.

(True/false)

Definition
false
Term

 

A Web beacon is a tiny object embedded in e-mail messages and Web pages that is designed to monitor online Internet user behavior.

(true/false)

Definition
TRUE
Term

 

The ________ model prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use.

 

A) safe harbor

 

B) opt-in

 

C) FIP

 

D) P3P

 

Definition
B) opt-in
Term

 

A(n) ________ grants the owner an exclusive monopoly on the ideas behind an invention for 20 years.

 

A) copyright

 

B) trademark

 

C) patent

 

D) trade secret

 

Definition

 

C) patent

 

Term

 

The commission of acts involving the computer that may not be illegal but are considered unethical is called computer abuse.

(true/false)

Definition
TRUE
Supporting users have an ad free experience!