Exam 4: Ethical and Social Issues in Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

How does the use of electronic voting machines act as a "double-edged sword?" What moral dimensions are raised by this use of information technology?

Free
(Essay)
4.8/5
(36)
Correct Answer:
Verified

Electronic voting machines can be seen as beneficial by making voting easy to accomplish and tabulate.However,it may be easier to tamper with electronic voting machines than with countable paper ballots.In terms of information rights,it seems possible that methods could be set up to determine how an individual has voted and to store and disseminate this knowledge.Manufacturers of voting machines claim property rights to the voting software,which means that if the software is protected from inspection,there is no regulation in how the software operates or how accurate it is.In terms of accountability and control,if an electronic voting system malfunctions,will it be the responsibility of the government,of the company manufacturing the machines or software,or the programmers who programmed the software? The dimension of system quality raises questions of how the level of accuracy of the machines is to be judged and what level is acceptable? In terms of quality of life,while it may make voting easier and quicker,does the vulnerability to abuse of these systems pose a threat to the democratic principle of one person,one vote?

According to ________,you should take the action that produces the least harm.

Free
(Multiple Choice)
4.8/5
(40)
Correct Answer:
Verified

B

Digital media differs from a physical book in all of the following ways except:

Free
(Multiple Choice)
4.8/5
(46)
Correct Answer:
Verified

E

FIP principles are based on a belief in which of the following?

(Multiple Choice)
5.0/5
(43)

What percent of global Internet users use Google Search and other Google services?

(Multiple Choice)
4.9/5
(31)

The Online Privacy Alliance:

(Multiple Choice)
4.9/5
(45)

Which of the following occurs when muscle groups are forced through tens of thousands of repetitions under low-impact loads?

(Multiple Choice)
4.9/5
(38)

What are some of the potential health risks associated with use of computers?

(Essay)
4.8/5
(37)

All of the following laws apply to actions by the federal government except the:

(Multiple Choice)
4.9/5
(39)

The problem with web browsers' Do Not Track options is that websites aren't obligated to honor these settings.

(True/False)
4.9/5
(39)

Although online tracking gathers an enormous amount of information on individual users,it is anonymous and can't be tied to a specific person.

(True/False)
4.7/5
(37)

Which of the five moral dimensions of the information age does spamming involve?

(Multiple Choice)
4.8/5
(36)

Redesigning and automating business processes can be seen as a double-edged sword because:

(Multiple Choice)
4.7/5
(37)

What are the major issues concerning privacy in the information age? Do you believe the need for homeland security should overrule some of the personal privacy and information rights we have previously taken for granted? Why or why not?

(Essay)
4.9/5
(36)

Gaining unapproved access to a computer is not a federal crime.

(True/False)
4.8/5
(37)

Which of the following is not a U.S.federal law affecting private institutions?

(Multiple Choice)
4.8/5
(34)

Which of the following U.S.laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed?

(Multiple Choice)
4.9/5
(37)

In the ________ model of informed consent,personal information can be collected until the consumer specifically requests that his or her data not be collected.

(Multiple Choice)
4.9/5
(36)

One of the key concepts in patent law is novelty.

(True/False)
4.9/5
(35)

What is the digital divide and how does it impact society?

(Essay)
4.7/5
(36)
Showing 1 - 20 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)