Exam 8: Ethical, Social, and Political Issues in E-Commerce

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

All of the following are factors that will be considered in determining whether use of copyrighted material is "fair use" except the:

(Multiple Choice)
4.8/5
(31)

Deep packet inspection uses software installed on client computers to collect and analyze detailed information on page content viewed by users.

(True/False)
4.8/5
(35)

The Children's Internet Protection Act (CIPA) requires schools and libraries in the United States to install technology protection measures in an effort to shield children from pornography.

(True/False)
4.8/5
(38)

Copyright protection protects against others copying the underlying ideas in a work.

(True/False)
5.0/5
(30)

Which of the FTC's Fair Information Practices (FIP) principles requires identification of the collector of data?

(Multiple Choice)
4.8/5
(33)

All of the following are types of tiered, or differential, pricing plans except:

(Multiple Choice)
4.9/5
(35)

Which ethical principle asks you to assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise?

(Multiple Choice)
5.0/5
(42)

Which of the following authorizes the creation of a second-level domain on the Internet where all Web sites have to declare they contain no material harmful to children?

(Multiple Choice)
4.8/5
(32)

________ involves the creation of digital images that characterize online individual and group behavior.

(Short Answer)
4.7/5
(35)

________ is collected data that can be used to identify and locate an individual.

(Multiple Choice)
4.9/5
(36)

The opt-in model for informed consent requires an affirmative action by the consumer before a company can collect and use information.

(True/False)
4.8/5
(38)

Which of the following e-commerce technology dimensions creates greater opportunities for cyberbullying?

(Multiple Choice)
4.8/5
(34)

Describe and evaluate the different methods that are being used to protect online privacy. Which of these methods do you think is or could be the most effective?

(Essay)
5.0/5
(39)

Critics have pointed out that the Chrome browser's Suggest button, which suggests queries based on search terms entered by the user, is in fact, a type of:

(Multiple Choice)
4.7/5
(35)

Which case was instrumental in paving the way for Internet business methods patents?

(Multiple Choice)
4.8/5
(40)

Which of the following technologies allows you to send e-mail without a trace?

(Multiple Choice)
4.8/5
(38)

Google's Gmail advertising has raised concerns about which of the following issues?

(Multiple Choice)
4.8/5
(31)

Companies that buy up broadly worded patents on a speculative basis and then use them to threaten companies that are purportedly violating the patent are often referred to as patent ________.

(Short Answer)
4.9/5
(35)

The ethical principle of Universalism states that if an action is not right for all situations, then it is not right for any situation.

(True/False)
4.7/5
(28)

Net neutrality refers to Internet backbone owners treating all Internet traffic equally.

(True/False)
4.8/5
(39)
Showing 41 - 60 of 86
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)