Exam 4: Ethical and Social Issues in Information Systems
Exam 1: Business Information Systems in Your Career100 Questions
Exam 2: Global E-Business and Collaboration100 Questions
Exam 3: Achieving Competitive Advantage With Information Systems100 Questions
Exam 4: Ethical and Social Issues in Information Systems100 Questions
Exam 5: It Infrastructure: Hardware and Software100 Questions
Exam 6: Foundations of Business Intelligence: Databases and Information Management100 Questions
Exam 7: Telecommunications, the Internet, and Wireless Technology100 Questions
Exam 8: Securing Information Systems100 Questions
Exam 9: Achieving Operational Excellence and Customer Intimacy: Enterprise Applications100 Questions
Exam 10: E-Commerce: Digital Markets, Digital Goods100 Questions
Exam 11: Improving Decision Making and Managing Knowledge100 Questions
Exam 12: Building Information Systems and Managing Projects100 Questions
Select questions type
Any intellectual work product that isn't based on public knowledge can be classed as a trade secret.
(True/False)
4.9/5
(43)
Which of the following is not a U.S. federal law affecting private institutions?
(Multiple Choice)
4.8/5
(39)
Which of the following is a primary drawback to the "do anything anywhere" computing environment?
(Multiple Choice)
4.8/5
(39)
________ is a feature of law-governed society and involves having laws that are known and understood, along with the ability to appeal to higher authorities to ensure that the laws are applied correctly.
(Multiple Choice)
4.8/5
(37)
Some experts believe that exposure to computers reduces intelligence.
(True/False)
4.8/5
(29)
Which of the following is the world's largest collector of online user data?
(Multiple Choice)
5.0/5
(44)
European countries do not allow businesses to use personally identifiable information without consumers' prior consent.
(True/False)
4.8/5
(33)
Which of the following resulted in an outage for Netflix customers on Christmas Eve 2012?
(Multiple Choice)
4.9/5
(33)
A man steals from a grocery store in order to feed his starving family. Which of the following best expresses the utilitarian principle in evaluating this situation?
(Multiple Choice)
4.9/5
(40)
Which of the following protects the authors of a book from having their work copied by others?
(Multiple Choice)
4.7/5
(37)
Which of the following best describes Immanuel Kant's categorical imperative?
(Multiple Choice)
4.9/5
(45)
All of the following are steps in the process for analyzing an ethical issue except:
(Multiple Choice)
4.8/5
(40)
Some forms of illegal sharing of music files have declined as legitimate online music stores have expanded.
(True/False)
4.7/5
(34)
How does the use of electronic voting machines act as a "double-edged sword?" What moral dimensions are raised by this use of information technology?
(Essay)
4.7/5
(37)
The obligations that individuals and organizations have concerning rights to intellectual property involve which of the following moral dimensions of the information age?
(Multiple Choice)
4.8/5
(41)
The use of computers to assemble data from different sources to create digital dossiers of detailed information about individuals is known as which of the following?
(Multiple Choice)
4.8/5
(32)
In the ________ model of informed consent, personal information can be collected until the consumer specifically requests that his or her data not be collected.
(Multiple Choice)
4.9/5
(31)
Software programs were unprotected by copyright law until the early 1990s.
(True/False)
4.9/5
(39)
Showing 21 - 40 of 100
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)