Exam 4: Ethical and Social Issues in Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Most American and European privacy law is based on a set of five principles called COPPA.

(True/False)
4.8/5
(32)

The key concepts in patent law are originality, novelty, and value.

(True/False)
5.0/5
(39)

The commission of acts involving the computer that may not be illegal but are considered unethical is called ________.

(Short Answer)
4.7/5
(41)

One of the difficulties of patent protection is

(Multiple Choice)
4.9/5
(36)

The Federal Trade Commission FIP principle of Notice/Awareness states that

(Multiple Choice)
4.9/5
(45)

Which of the following best describes how new information systems result in legal gray areas?

(Multiple Choice)
4.8/5
(45)

Privacy is the right to be left alone when you want to be, without surveillance or interference from other individuals or organizations.

(True/False)
4.9/5
(41)

A limitation of trade secret protection for software is that

(Multiple Choice)
4.8/5
(39)

Intellectual property can best be described as

(Multiple Choice)
4.8/5
(42)

A(n) ________ model of informed consent permits the collection of personal information until the consumer specifically requests that the data not be collected.

(Multiple Choice)
4.8/5
(29)

Accepting the potential costs, duties, and obligations for the decisions you make is referred to as

(Multiple Choice)
4.9/5
(36)

The most common source of business system failure is

(Multiple Choice)
4.8/5
(43)

What are the steps in conducting an ethical analysis?

(Essay)
4.8/5
(42)

It is not feasible for companies to produce error-free software because

(Multiple Choice)
4.8/5
(36)

List and define the six ethical principles discussed in your text.

(Essay)
4.9/5
(38)

The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called

(Multiple Choice)
4.8/5
(35)

The last step in analyzing an ethical issue should be to identify the stakeholders people who have a vested interest in the outcome of the decision.

(True/False)
4.8/5
(29)

P3P encrypts or scrambles e-mail or data so that it cannot be read illicitly.

(True/False)
5.0/5
(34)

________ is permission given with knowledge of all the facts needed to make a rational decision.

(Short Answer)
4.7/5
(33)

Re-designing and automating business processes can be seen as a double-edged sword because

(Multiple Choice)
4.7/5
(33)
Showing 41 - 60 of 90
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)