Exam 4: Ethical and Social Issues in Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following restricts the information the U.S. federal government can collect and regulates what it can do with the information?

(Multiple Choice)
4.8/5
(38)

The ethical "no free lunch" rule states that:

(Multiple Choice)
4.7/5
(42)

What are the steps in conducting an ethical analysis?

(Essay)
4.9/5
(41)

Discuss at least three key technology trends that raise ethical issues. Give an example of an ethical or moral impact connected to each one.

(Essay)
4.7/5
(42)

Discuss the history of Apple's and Samsung's patent battle against each other.

(Essay)
4.8/5
(34)

List and define the six ethical principles discussed in your text.

(Essay)
4.8/5
(37)

Immanuel Kant's categorical imperative states that:

(Multiple Choice)
4.7/5
(26)

Most Internet businesses do very little to protect the privacy of their customers.

(True/False)
4.7/5
(36)

When a cookie is created during a website visit, it is stored:

(Multiple Choice)
5.0/5
(38)

European countries do not allow businesses to use personally identifiable information without consumers' prior consent.

(True/False)
4.9/5
(48)

According to a Wall Street Journal study, all of the following websites installed tracking files on visitor computers except:

(Multiple Choice)
4.9/5
(42)

The NAI is an industry association formed to help with which of the following?

(Multiple Choice)
5.0/5
(36)

The key concepts in patent law are originality, novelty, and value.

(True/False)
4.8/5
(39)

Despite the passage of several laws defining and addressing computer crime, accessing a computer system without authorization is not yet a federal crime.

(True/False)
5.0/5
(32)

The introduction of new information technology has:

(Multiple Choice)
4.9/5
(39)

The rate of global piracy is approximately 20%.

(True/False)
4.9/5
(33)

How does the use of electronic voting machines act as a "double-edged sword"? What moral dimensions are raised by this use of information technology?

(Essay)
4.8/5
(41)

Most American and European privacy law is based on a set of five principles called COPPA.

(True/False)
4.8/5
(36)

________ are not held liable for the messages they transmit.

(Multiple Choice)
4.9/5
(32)

Computer abuse involves the commission of acts involving the computer that may not be illegal but are considered unethical.

(True/False)
4.9/5
(40)
Showing 41 - 60 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)