Exam 4: Ethical and Social Issues in Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is not one of the five steps discussed in the chapter as a process for analyzing an ethical issue?

Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
Verified

A

What are the major issues concerning privacy in the information age? Do you believe the need for homeland security should overrule some of the personal privacy and information rights we have previously taken for granted? Why or why not?

Free
(Essay)
4.9/5
(38)
Correct Answer:
Verified

One answer might be that we should depend upon the Federal Trade Commission Fair Information Practice Principles and that as long as these principles are not ignored or overset, personal privacy does not conflict with homeland security. This is a weak argument. Other issues involve online privacy, employee monitoring, tradeoffs between security and privacy and good business results versus privacy.

Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed?

Free
(Multiple Choice)
4.7/5
(35)
Correct Answer:
Verified

A

________ can be induced by tens of thousands of repetitions under low-impact loads.

(Multiple Choice)
4.7/5
(30)

NORA is a

(Multiple Choice)
4.8/5
(36)

The principles of right and wrong that can be used by individuals acting as free moral agents to make choices to guide their behavior are called ________.

(Short Answer)
4.7/5
(38)

The introduction of new information technology has a

(Multiple Choice)
4.8/5
(32)

The key concepts in patent law are originality, novelty, and value.

(True/False)
4.9/5
(43)

In white-collar fraud, information systems are most typically used as a means to hide financial evidence of crimes.

(True/False)
4.8/5
(43)

Descartes' rule of change, that if an action cannot be taken repeatedly, it is not right to take at all, is also known as the ________ rule.

(Short Answer)
4.9/5
(38)

The Do-Not-Track Act of 2011

(Multiple Choice)
4.8/5
(35)

Most American and European privacy law is based on a set of five principles called COPPA.

(True/False)
5.0/5
(38)

The commission of acts involving the use of a computer that may not be illegal but are considered unethical is called computer ________.

(Short Answer)
4.9/5
(36)

The Copyright Office began registering software programs in the 1990s.

(True/False)
4.8/5
(37)

One of the difficulties of patent protection is

(Multiple Choice)
4.7/5
(42)

"Look and feel" copyright infringement lawsuits are concerned with

(Multiple Choice)
4.8/5
(39)

Any unsolicited e-mail is legally considered spam.

(True/False)
4.8/5
(42)

Which of the following is not one of the practices added in 2010 by the FTP to its framework for privacy?

(Multiple Choice)
4.8/5
(35)

U.S. businesses are allowed to use personal data from EU countries if they

(Multiple Choice)
4.9/5
(40)

What are the steps in conducting an ethical analysis?

(Essay)
4.9/5
(34)
Showing 1 - 20 of 90
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)