Exam 4: Ethical and Social Issues in Information Systems
Identify the five moral dimensions that are involved in political,social,and ethical issues and briefly describe each.Of these,which do you think is the most difficult for society to deal with? Support your opinion.
The five moral dimensions are:
(1)Information rights and obligations.What rights do individuals and organizations have with respect to information pertaining to them?
(2)Property rights and obligations.How can intellectual property rights be protected when it is so easy to copy digital materials?
(3)Accountability and control.Who will be held accountable and liable for the harm done to individual and collective information and property rights?
(4)System quality.What standards of data and system quality should we demand to protect individual rights and the safety of society?
(5)Quality of life.What values should be preserved? What institutions must we protect? What cultural values can be harmed?
Individual answers for determining the most difficult for society to deal with will vary.One answer might be: Quality of life issues will be most difficult for society to deal with in societies that are comprised of many different cultural and ethnic groups,such as the United States.It is difficult to regulate concerns that are based on subjective values.
The ________ framework developed by the U.S.Department of Commerce allows U.S.businesses to legally use personal data from EU countries.
E
The central business activities of ChoicePoint raise which of the five moral dimensions?
E
Web beacons are tiny,invisible software programs hidden in e-mail messages and Web pages that are used to track and report a user's online behavior.
Copyright is the legal protection afforded intellectual property,including drawings,movies,and maps.
Malicious software that is installed secretly on your computer by other applications and that tracks your online movements is called spyware.
________ are not held liable for the messages they transmit.
In today's legal environment,business managers who violate the law through the misuse of information systems are still unlikely to be fully prosecuted.
Which of the following is not one of the current key technology trends that raises ethical issues?
The extreme difference among different social groups regarding their access to computers and the Internet is called the ________ divide.
The routine violation of individual privacy is made more difficult by advances in data storage.
A man steals from a grocery store in order to feed his starving family.Which of the following best expresses the Utilitarian Principle in evaluating this situation?
The problem with Web browsers' Do Not Track options is that Web sites aren't obligated to honor these settings.
________ is a new data analysis technology that finds hidden connections between data in disparate sources.
Computer abuse refers to acts involving the computer that may not be illegal but are considered unethical.
Which of the following ailments is caused by tens of thousands of repetitions under low-impact loads?
In the ________ model of informed consent,personal information can be collected until the consumer specifically requests that his or her data not be collected.
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)