Exam 4: Ethical and Social Issues in Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

"Look and feel" copyright infringement lawsuits are concerned with:

Free
(Multiple Choice)
4.8/5
(42)
Correct Answer:
Verified

B

European countries do not allow businesses to use personally identifiable information without consumers' prior consent.

Free
(True/False)
4.7/5
(38)
Correct Answer:
Verified

True

According to ________,you should take the action that produces the least harm.

Free
(Multiple Choice)
4.7/5
(35)
Correct Answer:
Verified

B

All of the following laws apply to actions by the federal government except the:

(Multiple Choice)
4.9/5
(31)

Which of the five moral dimensions of the information age does the weakening of boundaries between work and family life involve?

(Multiple Choice)
4.8/5
(31)

Malicious software that is installed secretly on your computer by other applications and that tracks your online movements is called spyware.

(True/False)
5.0/5
(39)

________ means that you accept the potential costs and obligations for the decisions you make.

(Multiple Choice)
4.8/5
(39)

CVS refers to:

(Multiple Choice)
4.7/5
(41)

The obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within which of the following moral dimensions of the information age?

(Multiple Choice)
4.8/5
(39)

________ are not held liable for the messages they transmit.

(Multiple Choice)
4.7/5
(43)

Discuss the history of Apple's and Samsung's patent battle against each other.

(Essay)
4.8/5
(37)

Because of their special claims to knowledge,wisdom,and respect,professionals take on special rights and obligations.

(True/False)
4.8/5
(33)

Identifying the stakeholders-people who have a vested interest in the outcome of the decision-is the last step in analyzing an ethical issue.

(True/False)
4.9/5
(40)

How does protection of privacy in Europe differ from the United States?

(Essay)
4.7/5
(40)

Which of the following were involved in what has been called the patent trial of the century?

(Multiple Choice)
4.8/5
(49)

Gaining unapproved access to a computer is not a federal crime.

(True/False)
4.9/5
(42)

Identify and discuss the six ethical principles discussed in the chapter.

(Essay)
4.9/5
(38)

Which of the following resulted in a Christmas Eve outage for millions of Netflix customers?

(Multiple Choice)
4.9/5
(45)

Routine violations of individual privacy are made easier by advances in data storage.

(True/False)
4.7/5
(49)

All of the following are technical solutions to protecting user privacy except:

(Multiple Choice)
4.9/5
(46)
Showing 1 - 20 of 101
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)