Exam 3: Ethics and Privacy
Exam 1: Introduction to Information Systems68 Questions
Exam 2: Organizational Strategy, Competitive Advantage, and Information Systems68 Questions
Exam 3: Ethics and Privacy66 Questions
Exam 4: Information Security75 Questions
Exam 5: Data and Knowledge Management73 Questions
Exam 6: Telecommunications and Networking74 Questions
Exam 7: E-Business and E-Commerce66 Questions
Exam 8: Wireless, Mobile Computing, and Mobile Commerce75 Questions
Exam 9: Social Computing78 Questions
Exam 10: Information Systems Within the Organization70 Questions
Exam 11: Customer Relationship Management and Supply Chain Management85 Questions
Exam 12: Business Analytics66 Questions
Exam 13: Acquiring Information Systems and Applications68 Questions
Exam 14: Technology Guide 1 : Hardware65 Questions
Exam 15: Technology Guide 2 : Software46 Questions
Exam 16: Technology Guide 3 : Fundamentals of Relational Database Operations70 Questions
Exam 17: Technology Guide 4 : Intelligent Systems68 Questions
Select questions type
This smartphone app sends encrypted notes that self-destruct after a set amount of time.
Free
(Multiple Choice)
4.8/5
(33)
Correct Answer:
A
Determining whether or not corporate computers can be used for private purposes is a(n)_________ issue.
Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
D
_____________________________ issues involve the ownership and value of information.
Free
(Short Answer)
4.9/5
(27)
Correct Answer:
Property
______________ is a privacy tool available to consumers that automatically communicates privacy policies between an electronic commerce web site and the visitors to that site.
(Multiple Choice)
4.8/5
(41)
______________ is the right to determine when, and to what extent, information about you can be gathered and/or communicated to others.
(Multiple Choice)
4.8/5
(39)
The _____________ approach posits that ethical actions treat all human beings equally, or if unequally then fairly, based on some defensible standard.
(Multiple Choice)
4.8/5
(31)
Making sure your customer's information is correct in your information systems is a(n)_________ issue.
(Multiple Choice)
4.9/5
(23)
_____________ issues involve collecting, storing, and disseminating information about individuals.
(Multiple Choice)
4.9/5
(29)
______________ is the right to be left alone and to be free of unreasonable personal intrusions.
(Multiple Choice)
4.8/5
(28)
____________ countries have some form of data protection law.
(Multiple Choice)
4.8/5
(32)
The Sarbanes-Oxley Act in 2002 was passed to try to prevent fiascos like Enron, WorldCom, and Tyco.
(True/False)
4.8/5
(29)
Companies have the right to monitor your web surfing when you are at work.
(True/False)
4.9/5
(36)
Determining whether or not you are allowed to sell your customers' information to a telemarketer is a(n)_________ issue.
(Multiple Choice)
4.9/5
(40)
______________ means that you accept the consequences of your decisions and actions.
(Multiple Choice)
4.9/5
(30)
The _____________ approach highlights the interlocking relationship that underlie all societies.
(Short Answer)
4.8/5
(36)
Edward Snowden leaked numerous classified documents that demonstrated how the ___.
(Multiple Choice)
4.9/5
(36)
Every company needs to think about how to protect their customers' information. Using the five steps in the general framework for ethical decision making, how would you handle the situation if you were the CEO?
(Essay)
4.9/5
(41)
______________ is a privacy policy guideline for Data Collection.
(Multiple Choice)
4.8/5
(34)
Showing 1 - 20 of 66
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)