Exam 4: Ethical and Social Issues in Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The "do anything anywhere" computing environment can

(Multiple Choice)
4.8/5
(33)

Descartes' rule of change, that if an action cannot be taken repeatedly, it is not right to take at all, is also known as the ________ rule.

(Short Answer)
4.8/5
(37)

What are the major issues concerning privacy in the information age? Do you believe the need for homeland security should overrule some of the personal privacy and information rights we have previously taken for granted? Why or why not?

(Essay)
4.9/5
(35)

The U.S. CAN-SPAM Act of 2003

(Multiple Choice)
4.8/5
(37)

The drawback to copyright protection is in passing stringent criteria of nonobviousness.

(True/False)
4.8/5
(33)

Which of the five moral dimensions of the information age do the central business activities of ChoicePoint raise?

(Multiple Choice)
5.0/5
(40)

________ can be induced by tens of thousands of repetitions under low-impact loads.

(Multiple Choice)
4.9/5
(34)

The feature of social institutions that means mechanisms are in place to determine responsibility for an action is called

(Multiple Choice)
4.8/5
(39)

Software presents liability problems in terms of legal protections for users because

(Multiple Choice)
4.7/5
(40)

The moral dimension of ________ is concerned with the standards that data and systems should achieve in order to protect individual rights and the safety of society.

(Short Answer)
4.9/5
(42)

When a cookie is created during a Web site visit, it is stored

(Multiple Choice)
4.9/5
(38)

Insofar as software is essentially an intangible good, producers of software cannot be held liable for any damages that their software unintentionally causes.

(True/False)
4.8/5
(39)

FIP principles are based on the notion of the

(Multiple Choice)
4.9/5
(45)

The ________ model prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use.

(Short Answer)
4.8/5
(34)

The feature of political systems in which a body of laws is in place that permits individuals to recover the damages done to them by other actors, systems, or organizations is referred to as

(Multiple Choice)
4.8/5
(33)

What do you consider to be the primary ethical, social, and political issues regarding information system quality?

(Essay)
4.7/5
(27)

Which U.S. act restricts the information the federal government can collect and regulates what they can do with the information?

(Multiple Choice)
4.8/5
(38)

The strength of patent protection is that it

(Multiple Choice)
4.8/5
(38)

What legal mechanism protects the owners of intellectual property from having their work copied by others?

(Multiple Choice)
4.8/5
(39)

Most Internet businesses do very little to protect the privacy of their customers.

(True/False)
4.7/5
(39)
Showing 21 - 40 of 90
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)