Exam 8: Ethical, Social, and Political Issues in E-Commerce
Exam 1: The Revolution Is Just Beginning86 Questions
Exam 2: E-Commerce Business Models and Concepts86 Questions
Exam 3: E-Commerce Infrastructure: the Internet, Web, and Mobile Platform86 Questions
Exam 4: Building an E-Commerce Presence: Web Sites, Mobile Sites, and Apps86 Questions
Exam 5: E-Commerce Security and Payment Systems86 Questions
Exam 6: E-Commerce Marketing Concepts: Social, Mobile, Local86 Questions
Exam 7: E-Commerce Marketing Communications86 Questions
Exam 8: Ethical, Social, and Political Issues in E-Commerce86 Questions
Exam 9: Online Retail and Services86 Questions
Exam 10: Online Content and Media86 Questions
Exam 11: Social Networks, Auctions, and Portals86 Questions
Exam 12: B2B E-Commerce: Supply Chain Management and Collaborative Commerce86 Questions
Select questions type
All of the following are factors that will be considered in determining whether use of copyrighted material is "fair use" except the:
(Multiple Choice)
4.8/5
(31)
Deep packet inspection uses software installed on client computers to collect and analyze detailed information on page content viewed by users.
(True/False)
4.8/5
(35)
The Children's Internet Protection Act (CIPA) requires schools and libraries in the United States to install technology protection measures in an effort to shield children from pornography.
(True/False)
4.8/5
(38)
Copyright protection protects against others copying the underlying ideas in a work.
(True/False)
5.0/5
(30)
Which of the FTC's Fair Information Practices (FIP) principles requires identification of the collector of data?
(Multiple Choice)
4.8/5
(33)
All of the following are types of tiered, or differential, pricing plans except:
(Multiple Choice)
4.9/5
(35)
Which ethical principle asks you to assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise?
(Multiple Choice)
5.0/5
(42)
Which of the following authorizes the creation of a second-level domain on the Internet where all Web sites have to declare they contain no material harmful to children?
(Multiple Choice)
4.8/5
(32)
________ involves the creation of digital images that characterize online individual and group behavior.
(Short Answer)
4.7/5
(35)
________ is collected data that can be used to identify and locate an individual.
(Multiple Choice)
4.9/5
(36)
The opt-in model for informed consent requires an affirmative action by the consumer before a company can collect and use information.
(True/False)
4.8/5
(38)
Which of the following e-commerce technology dimensions creates greater opportunities for cyberbullying?
(Multiple Choice)
4.8/5
(34)
Describe and evaluate the different methods that are being used to protect online privacy. Which of these methods do you think is or could be the most effective?
(Essay)
5.0/5
(39)
Critics have pointed out that the Chrome browser's Suggest button, which suggests queries based on search terms entered by the user, is in fact, a type of:
(Multiple Choice)
4.7/5
(35)
Which case was instrumental in paving the way for Internet business methods patents?
(Multiple Choice)
4.8/5
(40)
Which of the following technologies allows you to send e-mail without a trace?
(Multiple Choice)
4.8/5
(38)
Google's Gmail advertising has raised concerns about which of the following issues?
(Multiple Choice)
4.8/5
(31)
Companies that buy up broadly worded patents on a speculative basis and then use them to threaten companies that are purportedly violating the patent are often referred to as patent ________.
(Short Answer)
4.9/5
(35)
The ethical principle of Universalism states that if an action is not right for all situations, then it is not right for any situation.
(True/False)
4.7/5
(28)
Net neutrality refers to Internet backbone owners treating all Internet traffic equally.
(True/False)
4.8/5
(39)
Showing 41 - 60 of 86
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)