Exam 4: Ethical and Social Issues in Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The routine violation of individual privacy is made more difficult by advances in data storage.

(True/False)
4.9/5
(37)

________ protects the creators of intellectual property from having their work copied by others.

(Multiple Choice)
4.7/5
(34)

Liability is a feature of political systems and allows individuals to recover damages done to them by others.

(True/False)
4.9/5
(36)

Which of the following ailments is caused by tens of thousands of repetitions under low-impact loads?

(Multiple Choice)
4.9/5
(30)

Define the basic concepts of responsibility, accountability, and liability as applied to ethical decisions. How are these concepts related?

(Essay)
4.9/5
(39)

Web beacons are tiny, invisible software programs hidden in e-mail messages and Web pages that are used to track and report a user's online behavior.

(True/False)
4.8/5
(38)

Identify the five moral dimensions that are involved in political, social, and ethical issues and briefly describe each. Of these, which do you think is the most difficult for society to deal with? Support your opinion.

(Essay)
4.9/5
(41)

Which of the following is not one of the current key technology trends that raises ethical issues?

(Multiple Choice)
4.9/5
(33)

________ enables advertisers to display more relevant ads based on user's search and browsing history.

(Multiple Choice)
4.7/5
(42)

The extreme difference among different social groups regarding their access to computers and the Internet is called the ________ divide.

(Multiple Choice)
4.9/5
(36)

A man steals from a grocery store in order to feed his starving family. Which of the following best expresses the Utilitarian Principle in evaluating this situation?

(Multiple Choice)
4.8/5
(33)

________ is the use of computers to assemble data from different sources to create electronic dossiers of detailed information about individuals.

(Multiple Choice)
4.9/5
(37)

________ is a societal practice of having laws that are known and understood, along with the ability to appeal to higher authorities to ensure that the laws are applied correctly.

(Multiple Choice)
4.9/5
(29)

A peer at work takes small amounts of office supplies for her own use at home, saying that this is a tiny loss to the company. You tell her that if everyone were to take office supplies, then the loss would no longer be minimal. Your rationale expresses which historical ethical principle?

(Multiple Choice)
4.8/5
(44)

According to several court findings, the general functional features of software are protected by copyright law.

(True/False)
4.8/5
(39)

Taking the action that produces the least harm best describes the

(Multiple Choice)
4.8/5
(37)

The Federal Trade Commission FIP principle of Notice/Awareness states that

(Multiple Choice)
4.8/5
(36)

What are the steps in conducting an ethical analysis?

(Essay)
4.8/5
(34)

The limitation of trade secret protection for software is that it is difficult to prevent the ideas in the work from falling into the public domain when

(Multiple Choice)
4.8/5
(41)

________ restricts the information that the U.S. federal government can collect about an individual and regulates what it can do with the information.

(Multiple Choice)
4.7/5
(48)
Showing 21 - 40 of 90
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)