Upgrade to remove ads
MIS Chapter 4 Quiz
Terms in this set (42)
Routine violations of individual privacy are made more difficult by advances in data storage.
Some experts believe that exposure to computers reduces intelligence and makes people dumb.
Some forms of illegal sharing of music files have declined as legitimate online music stores have expanded.
Spam is legally defined as any e-mail that is unsolicited.
Identifying the stakeholders—people who have a vested interest in the outcome of the decision—is the last step in analyzing an ethical issue.
________ prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use.
The opt-in model
Ethics describes the principles of right and wrong that can be used by individuals to make choices to guide their behavior.
Which of the following statements about spam is not true?
Spamming is more tightly regulated in Europe than in the United States.
________ are not held liable for the messages they transmit.
Regulated common carriers
European countries do not allow businesses to use personally identifiable information without consumers' prior consent.
Digital media differs from a physical book in all of the following ways except:
ease of establishing uniqueness.
TRUSTe is an example of which of the following?
Online seal program
A man steals from a grocery store in order to feed his starving family. Which of the following best expresses the utilitarian principle in evaluating this situation?
His action is acceptable, because the higher social value is the survival of the family.
Copyright is a legal protection given to creators of certain types of intellectual property.
According to ________, you should take the action that produces the least harm.
the risk aversion principle
A colleague at work takes small amounts of office supplies for her own personal use, saying that this is a tiny loss to the company. You tell her that if everyone were to take office supplies, then the loss would no longer be minimal. Your rationale expresses which of the following ethical principles?
Kant's Categorical Imperative
________ means that you accept the potential costs and obligations for the decisions you make.
Which of the following is not a U.S. federal law affecting private institutions?
Computer Matching and Privacy Protection Act
________ grants the owner exclusive ownership of the ideas behind an invention for 20 years.
Which of the following protects the authors of a book from having their work copied by others?
Computer abuse refers to acts involving a computer that may not be illegal but are considered unethical.
Which of the five moral dimensions of the information age do the central business activities of DoubleClick involve?
Information rights and obligations
Advertisers use ________ in order to display more relevant ads based on a user's search and browsing history.
Which of the following is not one of the current key technology trends that raises ethical issues?
Increase in data quality
Which of the following is not an example of the potential dark side of big data?
Analyzing data from sensors installed in local parks to monitor soil moisture.
The use of computers to assemble data from different sources to create digital dossiers of detailed information about individuals is known as which of the following?
Gaining unapproved access to a computer is not a federal crime.
"Look and feel" copyright infringement lawsuits are concerned with:
the distinction between an idea and its expression.
The U.S. Department of Commerce developed a ________ framework in order to enable U.S. businesses to legally use personal data from EU countries.
Malicious software that is installed secretly on your computer by other applications and that tracks your online movements is called spyware.
Although online tracking gathers an enormous amount of information on individual users, it is anonymous and can't be tied to a specific person.
Which of the following is not protected by copyright law?
In the ________ model of informed consent, personal information can be collected until the consumer specifically requests that his or her data not be collected.
Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed?
All of the following laws apply to actions by the federal government except the:
Children's Online Privacy Protection Act
Which of the following restricts the information that the U.S. federal government can collect about an individual and regulates what it can do with the information?
The Privacy Act
In today's legal environment, managers who are convicted for the misuse of information systems are still unlikely to be given a prison sentence.
All of the following are technical solutions to protecting user privacy except:
data use policies.
All of the following are steps in the process for analyzing an ethical issue except:
Any intellectual work product that isn't based on public knowledge can be classed as a trade secret.
In 2010, the FTC added all of the following recommendations to its privacy guidelines except:
firms should limit the length of time that any personal data is stored to six months or less.
When a cookie is created during a website visit, it is stored:
on the hard drive of the visitor's computer.
THIS SET IS OFTEN IN FOLDERS WITH...
MIS Chapter 3 Quiz
MIS Chapter 1 Quiz
MIS Chapter 2 Quiz
MIS Chapter 9 Quiz
YOU MIGHT ALSO LIKE...
MIS Chapter 4
Quiz 4: Ethical and Social Issues in Information S…
Quiz 4: Ethical and Social Issues in Information S…
OTHER SETS BY THIS CREATOR
MIS Chapter 11 & 12 Quiz
MIS Chapter 10 Quiz
MIS Chapter 8 Quiz
MIS Chapter 7 Quiz