Exam 4: Ethical and Social Issues in Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A man steals from a grocery store in order to feed his starving family.Which of the following best expresses the utilitarian principle in evaluating this situation?

(Multiple Choice)
4.8/5
(38)

FIP principles are based on a belief in which of the following?

(Multiple Choice)
4.9/5
(46)

One of the key concepts in patent law is novelty.

(True/False)
4.9/5
(41)

A colleague at work takes small amounts of office supplies for her own personal use,saying that this is a tiny loss to the company.You tell her that if everyone were to take office supplies,then the loss would no longer be minimal.Your rationale expresses which of the following ethical principles?

(Multiple Choice)
5.0/5
(40)

Which of the following is not protected by copyright law?

(Multiple Choice)
4.8/5
(44)

Which of the following restricts the information that the U.S.federal government can collect about an individual and regulates what it can do with the information?

(Multiple Choice)
4.8/5
(31)

The obligations that individuals and organizations have concerning rights to intellectual property involve which of the following moral dimensions of the information age?

(Multiple Choice)
4.8/5
(38)

Which of the following best describes the effect that new information technology has on society?

(Multiple Choice)
4.8/5
(26)

Which of the following is a data analysis technology that finds hidden connections between data in disparate sources?

(Multiple Choice)
4.8/5
(44)

The Network Advertising Initiative is an industry association that:

(Multiple Choice)
5.0/5
(32)

A Facebook user's visit to a website can be tracked even if they do not click a Like button.

(True/False)
4.7/5
(35)

Redesigning and automating business processes can be seen as a double-edged sword because:

(Multiple Choice)
4.8/5
(40)

Which of the following protects the authors of a book from having their work copied by others?

(Multiple Choice)
4.8/5
(38)

Software programs were unprotected by copyright law until the early 1990s.

(True/False)
4.9/5
(37)

How does the use of electronic voting machines act as a "double-edged sword?" What moral dimensions are raised by this use of information technology?

(Essay)
4.9/5
(43)

What are some of the potential health risks associated with use of computers?

(Essay)
4.8/5
(38)

In today's legal environment,managers who are convicted for the illegal use of information systems are still unlikely to be given a prison sentence.

(True/False)
4.8/5
(43)

Which of the five moral dimensions of the information age do the central business activities of DoubleClick involve?

(Multiple Choice)
4.9/5
(45)

All of the following are steps in the process for analyzing an ethical issue except:

(Multiple Choice)
4.8/5
(40)

In the ________ model of informed consent,personal information cannot be collected until the consumer specifically agrees that his or her data can be collected.

(Multiple Choice)
4.8/5
(27)
Showing 21 - 40 of 101
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)