Exam 4: Ethical and Social Issues in Information Systems
Exam 1: Information Systems in Global Business Today90 Questions
Exam 2: Global E-Business and Collaboration90 Questions
Exam 3: Information Systems, Organizations, and Strategy90 Questions
Exam 4: Ethical and Social Issues in Information Systems90 Questions
Exam 5: It Infrastructure and Emerging Technologies90 Questions
Exam 6: Foundations of Business Intelligence: Databases and Information Management90 Questions
Exam 7: Telecommunications, the Internet, and Wireless Technology90 Questions
Exam 8: Securing Information Systems90 Questions
Exam 9: Achieving Operational Excellence and Customer Intimacy:90 Questions
Exam 10: E-Commerce: Digital Markets, Digital Goods90 Questions
Exam 11: Managing Knowledge90 Questions
Exam 12: Enhancing Decision Making90 Questions
Exam 13: Building Information Systems90 Questions
Exam 14: Managing Projects90 Questions
Exam 15: Managing Global Systems90 Questions
Select questions type
Descartes' rule of change, that if an action cannot be taken repeatedly, it is not right to take at all, is also known as the ________ rule.
(Short Answer)
4.8/5
(37)
What are the major issues concerning privacy in the information age? Do you believe the need for homeland security should overrule some of the personal privacy and information rights we have previously taken for granted? Why or why not?
(Essay)
4.9/5
(35)
The drawback to copyright protection is in passing stringent criteria of nonobviousness.
(True/False)
4.8/5
(33)
Which of the five moral dimensions of the information age do the central business activities of ChoicePoint raise?
(Multiple Choice)
5.0/5
(40)
________ can be induced by tens of thousands of repetitions under low-impact loads.
(Multiple Choice)
4.9/5
(34)
The feature of social institutions that means mechanisms are in place to determine responsibility for an action is called
(Multiple Choice)
4.8/5
(39)
Software presents liability problems in terms of legal protections for users because
(Multiple Choice)
4.7/5
(40)
The moral dimension of ________ is concerned with the standards that data and systems should achieve in order to protect individual rights and the safety of society.
(Short Answer)
4.9/5
(42)
When a cookie is created during a Web site visit, it is stored
(Multiple Choice)
4.9/5
(38)
Insofar as software is essentially an intangible good, producers of software cannot be held liable for any damages that their software unintentionally causes.
(True/False)
4.8/5
(39)
The ________ model prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use.
(Short Answer)
4.8/5
(34)
The feature of political systems in which a body of laws is in place that permits individuals to recover the damages done to them by other actors, systems, or organizations is referred to as
(Multiple Choice)
4.8/5
(33)
What do you consider to be the primary ethical, social, and political issues regarding information system quality?
(Essay)
4.7/5
(27)
Which U.S. act restricts the information the federal government can collect and regulates what they can do with the information?
(Multiple Choice)
4.8/5
(38)
What legal mechanism protects the owners of intellectual property from having their work copied by others?
(Multiple Choice)
4.8/5
(39)
Most Internet businesses do very little to protect the privacy of their customers.
(True/False)
4.7/5
(39)
Showing 21 - 40 of 90
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)