Exam 12: Ethics and Privacy
Exam 1: Introduction to Information Systems63 Questions
Exam 2: Organizational Strategy, Competitive Advantage, and Information Systems140 Questions
Exam 3: Data and Knowledge Management101 Questions
Exam 4: Networks132 Questions
Exam 5: E-Business and E-Commerce109 Questions
Exam 6: Wireless, Mobile Computing, and Mobile Commerce118 Questions
Exam 7: Web 2.0 and Social Networks72 Questions
Exam 8: Information Systems Within the Organization98 Questions
Exam 9: Customer Relationship Management and Supply Chain Management141 Questions
Exam 10: Business Intelligence100 Questions
Exam 11: Acquiring Information Systems and Applications119 Questions
Exam 12: Ethics and Privacy66 Questions
Exam 13: Information Security114 Questions
Exam 14: Tech Guide 1: Hardware76 Questions
Exam 15: Tech Guide 2: Software53 Questions
Exam 16: Tech Guide 3: Emerging types of enterprise computing57 Questions
Exam 17: Tech Guide 4: Intelligent Systems61 Questions
Exam 18: Tech Guide 5: Protecting your information assets44 Questions
Select questions type
Which of the following is a correct argument on the pros and cons of conveniently sharing information and protecting privacy?
Free
(Multiple Choice)
4.8/5
(33)
Correct Answer:
D
Privacy advocates prefer which model of informed consent?
Free
(Multiple Choice)
4.8/5
(28)
Correct Answer:
A
Privacy is the right to be left alone and to be free of unreasonable personal intrusions.
Free
(True/False)
4.8/5
(30)
Correct Answer:
True
______________ is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems.
(Multiple Choice)
4.8/5
(29)
How does society keep owners of electronic bulletin boards from disseminating offensive or untrue content? This is a difficult question because it involves the conflict between _____ on the one hand and _____ on the other.
(Multiple Choice)
4.8/5
(33)
The opt-out model of informed consent allows a company to collect personal information until the customers specifically requests otherwise.
(True/False)
4.8/5
(34)
_____ issues involve the authenticity and fidelity of information that is collected and processed.
(Multiple Choice)
4.9/5
(33)
The ____________ ethical standard states that an ethical action is the one that provides the most good or does the least harm.
(Multiple Choice)
4.9/5
(42)
____________ issues revolve around who should have access to information and whether they should have to pay for this access.
(Multiple Choice)
4.9/5
(35)
Shelli runs a small boutique in Tel Aviv.She has built up a very nice client base and regularly sends her clients a newsletter.A new bakery business down the block wants to buy Shelli's client list from her.If Shelli does sell the list, which ethical issue related to IT would be involved?
(Multiple Choice)
4.7/5
(33)
Various organizations that promote fair and responsible use of information systems often develop a _____.
(Multiple Choice)
4.7/5
(37)
A code of ethics is a collection of principles that are intended to guide decision making by members of the organization.
(True/False)
4.8/5
(36)
Arguing that CEOs make 100 times more than their employees because they have to take more risk than lower-level employees is the ____________ approach.
(Multiple Choice)
4.8/5
(29)
Shelli runs a small boutique in Tel Aviv.She accepts credit cards and writes the number on her copy of the receipt in case there is a problem later.This practice involves which ethical issue related to IT?
(Multiple Choice)
4.9/5
(33)
____________ means that you accept the consequences of your decisions and actions.
(Multiple Choice)
4.8/5
(44)
Showing 1 - 20 of 66
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)