Exam 4: Ethical and Social Issues in Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

_________ prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use.

(Multiple Choice)
4.9/5
(43)

Which of the following gives patients access to personal medical records and the right to authorize how this information can be used or disclosed?

(Multiple Choice)
4.9/5
(39)

The Online Privacy Alliance:

(Multiple Choice)
4.8/5
(34)

The most common type of computer-related RSI is CTS.

(True/False)
4.9/5
(45)

Accepting the potential costs, duties, and obligations for the decisions you make is referred to as:

(Multiple Choice)
4.7/5
(42)

The utilitarian principle asks you to put yourself in the place of others, and think of yourself as the object of the decision.

(True/False)
4.9/5
(25)

According to the ________, you should take the action that produces the least harm.

(Multiple Choice)
4.8/5
(31)

Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials?

(Multiple Choice)
4.7/5
(32)

Which of the following is not protected by copyright law?

(Multiple Choice)
4.9/5
(34)

Copyright is the legal protection afforded intellectual property such as a song, book, or video game.

(True/False)
4.9/5
(36)

Which of the following is not true about the changes to EU data protection rules proposed in 2012?

(Multiple Choice)
4.9/5
(33)

Redesigning and automating business processes can be seen as a double-edged sword because:

(Multiple Choice)
4.8/5
(43)

Which of the following is not one of the five steps discussed in the chapter as a process for analyzing an ethical issue?

(Multiple Choice)
4.9/5
(41)

The feature of social institutions that means mechanisms are in place to determine responsibility for an action is called:

(Multiple Choice)
4.9/5
(35)

Spyware is software that comes hidden in downloaded applications and can track your online movements.

(True/False)
4.8/5
(30)

Which of the following protects the authors of a book from having their work copied by others?

(Multiple Choice)
4.9/5
(46)

Any unsolicited email is legally considered spam.

(True/False)
4.8/5
(34)

Which of the following resulted in an outage for Netflix customers on Christmas Eve 2012?

(Multiple Choice)
4.8/5
(37)

Which of the following is not one of the practices added in 2010 by the FTC to its framework for privacy?

(Multiple Choice)
4.8/5
(36)

Ethics refers to the principles of right and wrong that can be used by individuals to make choices to guide their behavior.

(True/False)
4.9/5
(41)
Showing 61 - 80 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)