Exam 4: Ethical and Social Issues in Information Systems
Exam 1: Business Information Systems in Your Career90 Questions
Exam 2: Global E-Business and Collaboration90 Questions
Exam 3: Achieving Competitive Advantage With Information Systems90 Questions
Exam 4: Ethical and Social Issues in Information Systems90 Questions
Exam 5: It Infrastructure: Hardware and Software90 Questions
Exam 6: Foundations of Business Intelligence: Databases and Information Management90 Questions
Exam 7: Telecommunications, the Internet, and Wireless Technology90 Questions
Exam 8: Securing Information Systems90 Questions
Exam 9: Achieving Operational Excellence and Customer Intimacy: Enterprise Applications90 Questions
Exam 10: E-Commerce: Digital Markets, Digital Goods90 Questions
Exam 11: Improving Decision Making and Managing Knowledge90 Questions
Exam 12: Building Information Systems and Managing Projects90 Questions
Select questions type
Which of the five moral dimensions of the information age does spamming raise?
(Multiple Choice)
4.8/5
(34)
Which U.S. act restricts the information the federal government can collect and regulates what they can do with the information?
(Multiple Choice)
4.7/5
(32)
Which of the following statements does not describe a key difference between software and books?
(Multiple Choice)
4.8/5
(43)
The term "________ divide" refers to large disparities in access to computers and the Internet among different social groups and different locations.
(Multiple Choice)
4.9/5
(37)
Even in today's legal climate, there is little incentive for firms to cooperate with prosecutors investigating financial crimes at their firm.
(True/False)
4.8/5
(36)
A(n)________ model of informed consent permits the collection of personal information until the consumer specifically requests that the data not be collected.
(Multiple Choice)
4.9/5
(34)
Which of the five moral dimensions of the information age do the central business activities of ChoicePoint raise?
(Multiple Choice)
4.7/5
(38)
A classic ethical dilemma is the hypothetical case of a man stealing from a grocery store in order to feed his starving family. If you used the Utilitarian Principle to evaluate this situation, you might argue that stealing the food is:
(Multiple Choice)
4.9/5
(30)
The last step in analyzing an ethical issue should be to identify the stakeholders - people who have a vested interest in the outcome of the decision.
(True/False)
5.0/5
(37)
The commission of acts involving the computer that may not be illegal but are considered unethical is called computer abuse.
(True/False)
4.9/5
(30)
Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials?
(Multiple Choice)
4.8/5
(31)
What legal mechanism protects the owners of intellectual property from having their work copied by others?
(Multiple Choice)
4.8/5
(38)
The feature of social institutions that means mechanisms are in place to determine responsibility for an action is called:
(Multiple Choice)
4.7/5
(41)
Which of the following is not one of the five steps discussed in the chapter as a process for analyzing an ethical issue?
(Multiple Choice)
4.8/5
(37)
Most American and European privacy law is based on a set of five principles called COPPA.
(True/False)
4.9/5
(37)
One of the capabilities of Internet communication is the ability of the individual to appear essentially anonymous by using made-up user names. Is anonymity the same thing as privacy, and should it be a right? What ethical issues are raised by increased anonymity?
(Essay)
4.9/5
(42)
Showing 41 - 60 of 90
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)