Exam 4: Ethical and Social Issues in Information Systems
Exam 1: Information Systems in Global Business Today90 Questions
Exam 2: Global E-Business and Collaboration90 Questions
Exam 3: Information Systems, Organizations, and Strategy90 Questions
Exam 4: Ethical and Social Issues in Information Systems90 Questions
Exam 5: IT Infrastructure and Emerging Technologies90 Questions
Exam 6: Foundations of Business Intelligence: Databases and Information Management90 Questions
Exam 7: Telecommunications, the Internet, and Wireless Technology90 Questions
Exam 8: Securing Information Systems90 Questions
Exam 9: Achieving Operational Excellence and Customer Intimacy: Enterprise Applications90 Questions
Exam 10: E-Commerce: Digital Markets, Digital Goods90 Questions
Exam 11: Managing Knowledge90 Questions
Exam 12: Enhancing Decision Making89 Questions
Exam 13: Building Information Systems90 Questions
Exam 14: Managing Projects90 Questions
Exam 15: Managing Global Systems90 Questions
Select questions type
Which of the following is not one of the five steps discussed in the chapter as a process for analyzing an ethical issue?
Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
A
What are the major issues concerning privacy in the information age? Do you believe the need for homeland security should overrule some of the personal privacy and information rights we have previously taken for granted? Why or why not?
Free
(Essay)
4.9/5
(38)
Correct Answer:
One answer might be that we should depend upon the Federal Trade Commission Fair Information Practice Principles and that as long as these principles are not ignored or overset, personal privacy does not conflict with homeland security. This is a weak argument. Other issues involve online privacy, employee monitoring, tradeoffs between security and privacy and good business results versus privacy.
Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed?
Free
(Multiple Choice)
4.7/5
(35)
Correct Answer:
A
________ can be induced by tens of thousands of repetitions under low-impact loads.
(Multiple Choice)
4.7/5
(30)
The principles of right and wrong that can be used by individuals acting as free moral agents to make choices to guide their behavior are called ________.
(Short Answer)
4.7/5
(38)
The key concepts in patent law are originality, novelty, and value.
(True/False)
4.9/5
(43)
In white-collar fraud, information systems are most typically used as a means to hide financial evidence of crimes.
(True/False)
4.8/5
(43)
Descartes' rule of change, that if an action cannot be taken repeatedly, it is not right to take at all, is also known as the ________ rule.
(Short Answer)
4.9/5
(38)
Most American and European privacy law is based on a set of five principles called COPPA.
(True/False)
5.0/5
(38)
The commission of acts involving the use of a computer that may not be illegal but are considered unethical is called computer ________.
(Short Answer)
4.9/5
(36)
The Copyright Office began registering software programs in the 1990s.
(True/False)
4.8/5
(37)
"Look and feel" copyright infringement lawsuits are concerned with
(Multiple Choice)
4.8/5
(39)
Which of the following is not one of the practices added in 2010 by the FTP to its framework for privacy?
(Multiple Choice)
4.8/5
(35)
U.S. businesses are allowed to use personal data from EU countries if they
(Multiple Choice)
4.9/5
(40)
Showing 1 - 20 of 90
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)