30 terms

Chapter 4

In the information age, the obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within the moral dimension of

1) Family and Home

2) Property rights and obligations

3) system quality

4) Quality of life
4) Quality of Life
The Federal Trade Commission FIP principle of Notice/Awareness states that

1) customers must be allowed to choose how their information will be used for secondary purposes other than the supporting transaction.

2) data collectors must take responsible steps to assure that consumer information is accurate and secure from unauthorized use.

3) there is a mechanism in place to enforce FIP principles.

4) Web sites must disclose their information practices before collecting data.
4) Websites must disclose their information practices before collecting data.
Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed?


2) Gramm-Leach_Bililey Act

3) Privacy Protection Act

4) Freedom of Information Act
NORA is a

1) profiling technology used by the E.U

2) federal privacy law protecting networked data

3) new data analysis technology that finds hidden connections between data in disparate sources.

4) sentencing guideline adopted in 1987 mandating stiff sentences on business executives.
3) new data analysis technology that finds hidden connections between data in disparate sources.
Which of the following is not one of the three principal sources of poor system performance?

1) software bugs and errors

2) hardware of facility failures caused by natural or other causes.

3) insufficient integration with external systems.

4) poor input data quality
3) insufficient integration with external systems
The Online Privacy Alliance

1) encourages self-regulation to develop a set of privacy guidelines for its members

2) protects user privacy during interaction with web sites

3) has established technical guidelines for ensuring privacy

4)is a government agency regulating the use of customer information
1) encourages self-regulation to develop a set of privacy guidelines for its members.
The feature of social institutions that means mechanisms are in place to determine responsibility for an action is called

1) due process.

2) accountability

3) the courts of appeal

4) the judicial system
2) accountability
the most common source of business system failure is

1) software bugs

2) software errors

3) hardware or facilities failures

4) data quality
4) data quality
U.S. businesses are allowed to use personal data from EU countries if they

1) have informed consent

2) create a safe harbor

3) develop equivalent privacy protection policies

4) make their privacy protection policies publicly available
3 Develop equivalent privacy protection policies
The four key technical trends responsible for current ethical stresses related to information technology are (1) doubling of computer power every 18 months, (2) data analysis advances, (3) declining data storage costs, and (4) _________

1) advances in wireless networking

2) international standards for data protection

3) networking advances and the internet

4) increased ease in file sharing and copying
Networking advances and the internet
Radiation from computer display screens has been proved to be a factor in CVS

1) True

___________ are not held liable for the messages they transmit

1) Regulated common carriers

2) Private individuals

3) Organizations and businesses

4) Elected officials
Regulated common carriers
The ethical rules discussed in the textbook

1) are based on political philosophies

2) cannot be guides to actions.

3) cannot be applied to many e-commerce situations

4) do not allow for competing values
cannot be guides to actions
FIP principles are based on the notion of the

1) accountability of the record holder.

2) responsibility of the record holder

3) mutuality of interest between the record holder and the individual

4) privacy of the individual
mutuality of interest between the record holder and the individual
Web sites use "cookies" in order to obtain the names and addresses of their visitors

1) true

2) false
A colleague of yours frequently takes for his own personal use small amounts of office supplies, noting that the loss to the company is minimal. You counter that if everyone were to take the office supplies, the loss would no longer be minimal. Your rationale expresses which historical ethical principle?

1) Kant's Categorical Imperative

2) the golden rule

3) the risk aversion principle

4) the no free lunch rule
Kant's Categorical Imperative
P3P stands for

1) Privacy for personal protection

2) Platform for Privacy Preferences.

3) Personal Privacy Policy

4) Personal Privacy Protection
Platform for Privacy Preferences
Professionals take on special rights and obligations because of their special claims to knowledge, wisdom, and respect.

1) true

2) false
RSI is unavoidable for a computer keyboard worker.

1) true

2) false
Spyware is software that comes hidden in downloaded applications and can track your online movements.

1) true

2) false
The drawback to copyright protection is that the underlying ideas behind the work are not protected, only their manifestation in a product.

1) True

2) false
Which of the five moral dimensions of the information age do the central business activities of ChoicePoint raise?

1) property rights and obligations

2) system quality

3) accountability and control

4) information rights and obligations
information rights and obligations
CVS refers to

1) eyestrain related to computer display screen use

2) carpal vision syndrome

3) wrist injuries brought about by incorrect hand position when using a keyboard

4) stress induced by technology
eyestrain related to computer display screen use
Information systems

1) pose traditional ethical situations in new manners

2) raise new ethical questions

3) raise the same ethical questions created by the industrial revolution

4) raise ethical questions primarily related to information rights and obligations
raise new ethical questions
European privacy protection is ________ than in the United States

1) less far-reaching

2 less liable to laws

3) much less stringent

4) much more stringent
much more stringent
Which U.S. act restricts the information the federal government can collect and regulates what they can do with the information?

1) privacy act of 1974

2) Gramm-Leach_Bliley Act of 1999

3) Freedom of Information Act

4) HIPAA of 1996
Privacy Act of 1974
Spam is unsolicited e-mail

1) true

2) false
The Copyright Office began registering software programs in the 1990s

1) true

2) false
Copyright is the legal protection afforded intellectual property, such as a song, book, or video game.

1) true

2) false
When a cookie is created during a Web site visit, it is stored

1) on the web site computer

2) on the visitor's computer

3) on the ISP's computer

4) in a web directory
on the visitor's computer