Exam 4: Ethical and Social Issues in Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

It is not feasible for companies to produce error-free software because

(Multiple Choice)
4.8/5
(41)

Technostress is a computer-related malady whose symptoms include fatigue.

(True/False)
4.9/5
(28)

Privacy is the right to be left alone when you want to be, without surveillance or interference from other individuals or organizations.

(True/False)
4.8/5
(28)

The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called

(Multiple Choice)
4.9/5
(34)

A(n) ________ model of informed consent permits the collection of personal information until the consumer specifically requests that the data not be collected.

(Multiple Choice)
4.8/5
(42)

The feature of social institutions that means mechanisms are in place to determine responsibility for an action is called

(Multiple Choice)
4.8/5
(29)

The Federal Trade Commission FIP principle of Notice/Awareness states that

(Multiple Choice)
4.9/5
(40)

The ________ model prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use.

(Short Answer)
4.7/5
(36)

Which of the five moral dimensions of the information age does spamming raise?

(Multiple Choice)
4.8/5
(34)

Copyright is the legal protection afforded intellectual property, such as a song, book, or video game.

(True/False)
4.9/5
(37)

Professionals take on special rights and obligations because of their special claims to knowledge, wisdom, and respect.

(True/False)
4.8/5
(33)

The 2012 FTC report on industry-best practices for protecting individuals' privacy focused on each of the following topics except

(Multiple Choice)
4.8/5
(30)

The practice of spamming has been growing because

(Multiple Choice)
4.9/5
(47)

Which of the following statements about trade secrets is not true?

(Multiple Choice)
5.0/5
(37)

Despite the passage of several laws defining and addressing computer crime, accessing a computer system without authorization is not yet a federal crime.

(True/False)
4.9/5
(30)

The U.S. Department of Commerce developed a ________ framework in order to enable U.S. businesses to legally use personal data from EU countries.

(Multiple Choice)
4.9/5
(33)

A colleague of yours frequently takes for his own personal use small amounts of office supplies, noting that the loss to the company is minimal. You counter that if everyone were to take the office supplies, the loss would no longer be minimal. Your rationale expresses which historical ethical principle?

(Multiple Choice)
4.9/5
(38)

Flash cookies are different from ordinary cookies in that they

(Multiple Choice)
4.9/5
(38)

Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials?

(Multiple Choice)
4.7/5
(44)

A wide disparity in the ability of different social groups to access computers and the Internet is referred to as ________.

(Short Answer)
4.7/5
(31)
Showing 21 - 40 of 90
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)