Exam 4: Ethical and Social Issues in Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Discuss the history of Apple's and Samsung's patent battle against each other.

(Essay)
4.8/5
(35)

Copyright is a legal protection given to creators of certain types of intellectual property.

(True/False)
4.8/5
(40)

Which of the following were involved in what has been called the patent trial of the century?

(Multiple Choice)
4.7/5
(31)

Gaining unapproved access to a computer is a federal crime.

(True/False)
4.9/5
(42)

What percent of global Internet users use Google Search and other Google services?

(Multiple Choice)
5.0/5
(36)

________ means that you accept the potential costs and obligations for the decisions you make.

(Multiple Choice)
4.8/5
(31)

A colleague at work takes small amounts of office supplies for her own personal use, saying that this is a tiny loss to the company. You tell her that if everyone were to take office supplies, then the loss would no longer be minimal. Your rationale expresses which of the following ethical principles?

(Multiple Choice)
4.8/5
(36)

Which of the following is not a difficulty in establishing patent protection?

(Multiple Choice)
4.8/5
(35)

How does protection of privacy in Europe differ from the United States?

(Essay)
5.0/5
(44)

The Online Privacy Alliance:

(Multiple Choice)
4.9/5
(36)

The U.S. CAN-SPAM Act:

(Multiple Choice)
4.8/5
(38)

Which of the following is a data analysis technology that finds hidden connections between data in disparate sources?

(Multiple Choice)
4.9/5
(37)

Although online tracking gathers an enormous amount of information on individual users, it is anonymous and can't be tied to a specific person.

(True/False)
4.9/5
(35)

Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials?

(Multiple Choice)
4.9/5
(35)

________ prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use.

(Multiple Choice)
5.0/5
(33)

Which of the following statements about spam is not true?

(Multiple Choice)
4.8/5
(39)

All of the following are technical solutions to protecting user privacy except:

(Multiple Choice)
4.8/5
(40)

Identifying the stakeholders-people who have a vested interest in the outcome of the decision-is the last step in analyzing an ethical issue.

(True/False)
4.9/5
(34)

According to ________, you should take the action that produces the least harm.

(Multiple Choice)
4.9/5
(33)

Which of the following is the most common reason that business systems fail?

(Multiple Choice)
4.9/5
(45)
Showing 41 - 60 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)