Exam 4: Ethical and Social Issues in Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

One of the drawbacks of patent protection is

(Multiple Choice)
5.0/5
(33)

In 2010,the FTC added all of the following recommendations to its privacy guidelines except

(Multiple Choice)
4.9/5
(39)

Identify and discuss the six ethical principles discussed in the Chapter .

(Essay)
4.7/5
(44)

Although online tracking gathers an enormous amount of information on individual users,it is anonymous and can't be tied to a specific person.

(True/False)
4.7/5
(32)

A Facebook users' visit to a Web site can be tracked even if they do not click a Like button.

(True/False)
4.9/5
(39)

The moral dimension of ________ can be described as the obligations that individuals and organizations have concerning rights to intellectual property.

(Multiple Choice)
4.8/5
(42)

________ is a societal practice of having laws that are known and understood,along with the ability to appeal to higher authorities to ensure that the laws are applied correctly.

(Multiple Choice)
4.9/5
(32)

________ is a feature of social institutions that means mechanisms are in place to determine responsibility for an action.

(Multiple Choice)
4.9/5
(35)

Companies can't realistically create error-free software because

(Multiple Choice)
5.0/5
(35)

Taking the action that produces the least harm best describes the

(Multiple Choice)
4.9/5
(39)

The symptoms of technostress include aggravation and hostility toward humans.

(True/False)
4.7/5
(35)

A peer at work takes small amounts of office supplies for her own use at home,saying that this is a tiny loss to the company.You tell her that if everyone were to take office supplies,then the loss would no longer be minimal.Your rationale expresses which historical ethical principle?

(Multiple Choice)
4.7/5
(47)

Any intellectual work product that isn't based on public knowledge can be classed as a trade secret.

(True/False)
4.8/5
(35)

Describe how a cookie works.

(Essay)
4.8/5
(36)

Spam is legally defined as any e-mail that is unsolicited.

(True/False)
4.8/5
(39)

Software programs were unprotected by copyright law until the early 1990s.

(True/False)
4.8/5
(41)

Which of the following best describes the effect that new information technology has on society?

(Multiple Choice)
4.7/5
(33)

The ethical "no free lunch" rule states that

(Multiple Choice)
4.9/5
(47)

Liability is a feature of political systems and allows individuals to recover damages done to them by others.

(True/False)
4.9/5
(32)

________ protects the creators of intellectual property from having their work copied by others.

(Multiple Choice)
4.8/5
(36)
Showing 41 - 60 of 90
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)