Exam 4: Ethical and Social Issues in Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the five moral dimensions of the information age does spamming raise?

(Multiple Choice)
4.8/5
(34)

Which U.S. act restricts the information the federal government can collect and regulates what they can do with the information?

(Multiple Choice)
4.7/5
(32)

Which of the following statements does not describe a key difference between software and books?

(Multiple Choice)
4.8/5
(43)

The term "________ divide" refers to large disparities in access to computers and the Internet among different social groups and different locations.

(Multiple Choice)
4.9/5
(37)

Even in today's legal climate, there is little incentive for firms to cooperate with prosecutors investigating financial crimes at their firm.

(True/False)
4.8/5
(36)

A(n)________ model of informed consent permits the collection of personal information until the consumer specifically requests that the data not be collected.

(Multiple Choice)
4.9/5
(34)

The strength of patent protection is that it:

(Multiple Choice)
4.8/5
(36)

Which of the five moral dimensions of the information age do the central business activities of ChoicePoint raise?

(Multiple Choice)
4.7/5
(38)

A classic ethical dilemma is the hypothetical case of a man stealing from a grocery store in order to feed his starving family. If you used the Utilitarian Principle to evaluate this situation, you might argue that stealing the food is:

(Multiple Choice)
4.9/5
(30)

The last step in analyzing an ethical issue should be to identify the stakeholders - people who have a vested interest in the outcome of the decision.

(True/False)
5.0/5
(37)

The commission of acts involving the computer that may not be illegal but are considered unethical is called computer abuse.

(True/False)
4.9/5
(30)

Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials?

(Multiple Choice)
4.8/5
(31)

What legal mechanism protects the owners of intellectual property from having their work copied by others?

(Multiple Choice)
4.8/5
(38)

The feature of social institutions that means mechanisms are in place to determine responsibility for an action is called:

(Multiple Choice)
4.7/5
(41)

Which of the following is not one of the five steps discussed in the chapter as a process for analyzing an ethical issue?

(Multiple Choice)
4.8/5
(37)

Most American and European privacy law is based on a set of five principles called COPPA.

(True/False)
4.9/5
(37)

The Online Privacy Alliance:

(Multiple Choice)
4.9/5
(31)

How does a cookie work?

(Essay)
4.9/5
(39)

NORA is a:

(Multiple Choice)
4.8/5
(39)

One of the capabilities of Internet communication is the ability of the individual to appear essentially anonymous by using made-up user names. Is anonymity the same thing as privacy, and should it be a right? What ethical issues are raised by increased anonymity?

(Essay)
4.9/5
(42)
Showing 41 - 60 of 90
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)