Exam 4: Personal,Legal,Ethical,and Organizational Issues of Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

To minimize the invasion of privacy,organizations should:

Free
(Multiple Choice)
4.8/5
(35)
Correct Answer:
Verified

C

To minimize the invasion of privacy,_____.

Free
(Multiple Choice)
4.8/5
(37)
Correct Answer:
Verified

B

Describe in brief the intellectual property that copyright laws protect and the exceptions.

Free
(Essay)
4.8/5
(37)
Correct Answer:
Verified

Answers will vary.Generally,copyright laws protect tangible material,such as books,drawings,and so forth.However,they also cover online materials,including Web pages,HTML code,and computer graphics,as long as the content can be printed or saved on a storage device.Copyright laws give only the creator exclusive rights,meaning no one else can reproduce,distribute,or perform the work without permission.
Copyright laws do have some exceptions,however,usually under the Fair Use Doctrine.This exception means one can use copyrighted material for certain purposes,such as quoting passages of a book in literary reviews.

In the context of Web and network privacy,_____ is a method for binding all the parties to a contract.

(Multiple Choice)
4.8/5
(28)

Aaron bought a photo-editing software package for personal use.He makes two copies of the software,in case the original software fails and he needs a backup.In this scenario,Aaron's action is considered _____.

(Multiple Choice)
4.8/5
(36)

In general,_____ last the author's lifetime plus 70 years and do not need to be renewed.

(Multiple Choice)
4.7/5
(37)

_____ is a legal umbrella covering protections that involve copyrights,trademarks,trade secrets,and patents for "creations of the mind" developed by people or businesses.

(Multiple Choice)
4.8/5
(34)

What information can be censored if the content is deemed offensive to a political,religious,or cultural group?

(Multiple Choice)
4.9/5
(28)

_____,also known as virtual work,has enabled some people to perform their jobs from home.

(Multiple Choice)
5.0/5
(34)

E-wallets and smart cards increase the risks of exposing consumers' information on the Web.

(True/False)
4.8/5
(39)

A potential benefit of telecommuting is that it _____.

(Multiple Choice)
4.9/5
(37)

Which is a commonly used technology for data collection?

(Multiple Choice)
4.8/5
(39)

Because sending spam is expensive,a small response-a fraction of a percent,for example-is an inadequate return on the investment.

(True/False)
4.8/5
(41)

In the context of Web and network privacy,an acceptable use policy is a:

(Multiple Choice)
4.9/5
(41)

Information technologies have decreased the ease of access to information for hackers as well as for legitimate organizations.

(True/False)
5.0/5
(34)

Explain telecommuting.

(Essay)
4.9/5
(35)

In the context of information privacy,which of the following is true of spam?

(Multiple Choice)
4.9/5
(32)

In the context of information privacy,which is true of cookies?

(Multiple Choice)
4.7/5
(41)

Which principle states that Internet service providers (ISPs)and government agencies should treat all data on the Internet equally?

(Multiple Choice)
4.9/5
(27)

Which is included in the goal of the Health Insurance Portability and Accountability Act (HIPAA)?

(Multiple Choice)
4.8/5
(28)
Showing 1 - 20 of 105
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)