Exam 4: Ethical and Social Issues in Information Systems
Exam 1: Business Information Systems in Your Career90 Questions
Exam 2: Global E-Business and Collaboration90 Questions
Exam 3: Achieving Competitive Advantage With Information Systems90 Questions
Exam 4: Ethical and Social Issues in Information Systems90 Questions
Exam 5: It Infrastructure: Hardware and Software90 Questions
Exam 6: Foundations of Business Intelligence: Databases and Information Management90 Questions
Exam 7: Telecommunications, the Internet, and Wireless Technology90 Questions
Exam 8: Securing Information Systems90 Questions
Exam 9: Achieving Operational Excellence and Customer Intimacy: Enterprise Applications90 Questions
Exam 10: E-Commerce: Digital Markets, Digital Goods90 Questions
Exam 11: Improving Decision Making and Managing Knowledge90 Questions
Exam 12: Building Information Systems and Managing Projects90 Questions
Select questions type
Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed?
(Multiple Choice)
4.8/5
(37)
Discuss at least three key technology trends that raise ethical issues. Give an example of an ethical or moral impact connected to each one.
(Essay)
4.9/5
(38)
In general, it is very difficult to hold software producers liable for their software products when those products are considered to be:
(Multiple Choice)
4.9/5
(34)
A(n)________ grants the owner an exclusive monopoly on the ideas behind an invention for 20 years.
(Multiple Choice)
4.9/5
(41)
The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called:
(Multiple Choice)
4.7/5
(39)
Flash cookies are different from ordinary cookies in that they:
(Multiple Choice)
4.8/5
(36)
The Utilitarian Principle asks you to put yourself in the place of others, and think of yourself as the object of the decision.
(True/False)
4.8/5
(38)
Despite the passage of several laws defining and addressing computer crime, accessing a computer system without authorization is not yet a federal crime.
(True/False)
4.9/5
(47)
What are the major issues concerning privacy in the information age? Do you believe the need for homeland security should overrule some of the personal privacy and information rights we have previously taken for granted? Why or why not?
(Essay)
5.0/5
(42)
A colleague of yours frequently takes, for his own personal use, small amounts of office supplies noting that the loss to the company is minimal. You counter that if everyone were to take office supplies the loss would no longer be minimal. Your rationale expresses which historical ethical principle?
(Multiple Choice)
4.8/5
(31)
U.S. businesses are allowed to use personal data from EU countries if they:
(Multiple Choice)
4.8/5
(33)
According to the courts, the creation of software, unique concepts, general functional features, and even colors are protectable by copyright law.
(True/False)
4.9/5
(36)
Liability refers to the existence of laws that permit individuals to recover damages done to them by other actors, systems, or organizations.
(True/False)
4.9/5
(40)
Accepting the potential costs, duties, and obligations for the decisions you make is referred to as:
(Multiple Choice)
4.9/5
(40)
The practice in law-governed societies in which laws are known and understood, and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly is called:
(Multiple Choice)
4.9/5
(41)
The European Parliament has passed a ban on unsolicited commercial messaging.
(True/False)
4.8/5
(30)
Showing 21 - 40 of 90
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)