Exam 4: Ethical and Social Issues in Information Systems
Exam 1: Business Information Systems in Your Career100 Questions
Exam 2: Global E-Business and Collaboration100 Questions
Exam 3: Achieving Competitive Advantage With Information Systems100 Questions
Exam 4: Ethical and Social Issues in Information Systems100 Questions
Exam 5: It Infrastructure: Hardware and Software100 Questions
Exam 6: Foundations of Business Intelligence: Databases and100 Questions
Exam 7: Telecommunications, the Internet, and Wireless Technology100 Questions
Exam 8: Securing Information Systems100 Questions
Exam 9: Achieving Operational Excellence and Customer Intimacy:100 Questions
Exam 10: E-Commerce: Digital Markets, Digital Goods100 Questions
Exam 11: Improving Decision Making and Managing Knowledge100 Questions
Exam 12: Building Information Systems and Managing Projects100 Questions
Select questions type
Which of the following restricts the information the U.S. federal government can collect and regulates what it can do with the information?
(Multiple Choice)
4.8/5
(38)
Discuss at least three key technology trends that raise ethical issues. Give an example of an ethical or moral impact connected to each one.
(Essay)
4.7/5
(42)
Discuss the history of Apple's and Samsung's patent battle against each other.
(Essay)
4.8/5
(34)
Most Internet businesses do very little to protect the privacy of their customers.
(True/False)
4.7/5
(36)
When a cookie is created during a website visit, it is stored:
(Multiple Choice)
5.0/5
(38)
European countries do not allow businesses to use personally identifiable information without consumers' prior consent.
(True/False)
4.9/5
(48)
According to a Wall Street Journal study, all of the following websites installed tracking files on visitor computers except:
(Multiple Choice)
4.9/5
(42)
The NAI is an industry association formed to help with which of the following?
(Multiple Choice)
5.0/5
(36)
The key concepts in patent law are originality, novelty, and value.
(True/False)
4.8/5
(39)
Despite the passage of several laws defining and addressing computer crime, accessing a computer system without authorization is not yet a federal crime.
(True/False)
5.0/5
(32)
How does the use of electronic voting machines act as a "double-edged sword"? What moral dimensions are raised by this use of information technology?
(Essay)
4.8/5
(41)
Most American and European privacy law is based on a set of five principles called COPPA.
(True/False)
4.8/5
(36)
________ are not held liable for the messages they transmit.
(Multiple Choice)
4.9/5
(32)
Computer abuse involves the commission of acts involving the computer that may not be illegal but are considered unethical.
(True/False)
4.9/5
(40)
Showing 41 - 60 of 100
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)