Exam 4: Ethical and Social Issues in Information Systems
Exam 1: Information Systems in Global Business Today90 Questions
Exam 2: Global E-Business and Collaboration90 Questions
Exam 3: Information Systems, Organizations, and Strategy90 Questions
Exam 4: Ethical and Social Issues in Information Systems90 Questions
Exam 5: IT Infrastructure and Emerging Technologies90 Questions
Exam 6: Foundations of Business Intelligence: Databases and Information Management90 Questions
Exam 7: Telecommunications, the Internet, and Wireless Technology90 Questions
Exam 8: Securing Information Systems90 Questions
Exam 9: Achieving Operational Excellence and Customer Intimacy: Enterprise Applications90 Questions
Exam 10: E-Commerce: Digital Markets, Digital Goods90 Questions
Exam 11: Managing Knowledge90 Questions
Exam 12: Enhancing Decision Making89 Questions
Exam 13: Building Information Systems90 Questions
Exam 14: Managing Projects90 Questions
Exam 15: Managing Global Systems90 Questions
Select questions type
It is not feasible for companies to produce error-free software because
(Multiple Choice)
4.8/5
(41)
Technostress is a computer-related malady whose symptoms include fatigue.
(True/False)
4.9/5
(28)
Privacy is the right to be left alone when you want to be, without surveillance or interference from other individuals or organizations.
(True/False)
4.8/5
(28)
The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called
(Multiple Choice)
4.9/5
(34)
A(n) ________ model of informed consent permits the collection of personal information until the consumer specifically requests that the data not be collected.
(Multiple Choice)
4.8/5
(42)
The feature of social institutions that means mechanisms are in place to determine responsibility for an action is called
(Multiple Choice)
4.8/5
(29)
The Federal Trade Commission FIP principle of Notice/Awareness states that
(Multiple Choice)
4.9/5
(40)
The ________ model prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use.
(Short Answer)
4.7/5
(36)
Which of the five moral dimensions of the information age does spamming raise?
(Multiple Choice)
4.8/5
(34)
Copyright is the legal protection afforded intellectual property, such as a song, book, or video game.
(True/False)
4.9/5
(37)
Professionals take on special rights and obligations because of their special claims to knowledge, wisdom, and respect.
(True/False)
4.8/5
(33)
The 2012 FTC report on industry-best practices for protecting individuals' privacy focused on each of the following topics except
(Multiple Choice)
4.8/5
(30)
Which of the following statements about trade secrets is not true?
(Multiple Choice)
5.0/5
(37)
Despite the passage of several laws defining and addressing computer crime, accessing a computer system without authorization is not yet a federal crime.
(True/False)
4.9/5
(30)
The U.S. Department of Commerce developed a ________ framework in order to enable U.S. businesses to legally use personal data from EU countries.
(Multiple Choice)
4.9/5
(33)
A colleague of yours frequently takes for his own personal use small amounts of office supplies, noting that the loss to the company is minimal. You counter that if everyone were to take the office supplies, the loss would no longer be minimal. Your rationale expresses which historical ethical principle?
(Multiple Choice)
4.9/5
(38)
Flash cookies are different from ordinary cookies in that they
(Multiple Choice)
4.9/5
(38)
Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials?
(Multiple Choice)
4.7/5
(44)
A wide disparity in the ability of different social groups to access computers and the Internet is referred to as ________.
(Short Answer)
4.7/5
(31)
Showing 21 - 40 of 90
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)