Deck 3: Ethics and Privacy

Full screen (f)
exit full mode
Question
The _____________ approach highlights the interlocking relationships that underlie all societies.

A)common good
B)fairness
C)rights
D)utilitarian
Use Space or
up arrow
down arrow
to flip the card.
Question
_____________ issues involve collecting, storing, and disseminating information about individuals.

A)Accessibility
B)Accuracy
C)Privacy
D)Property
Question
____________ issues involve the ownership and value of information.

A)Accessibility
B)Accuracy
C)Privacy
D)Property
Question
Welfare and Obamacare follow the __________ approach as an ethical framework..

A)common good
B)fairness
C)rights
D)utilitarian
Question
Which of the following is NOT monitored by the NSA?

A)Credit card transactions
B)Internet traffic (e-mail and web searches)
C)Insurance claims
D)Phone networks
Question
PRISM is a data collection effort that obtains stored _________________.

A)credit card transactions
B)internet communications
C)insurance claims
D)phone call data
Question
The _____________ approach posits that ethical actions treat all human beings equally, or if unequally then fairly, based on some defensible standard.

A)code of ethics
B)digital dossier
C)ethics
D)fairness approach
Question
_______________ issues revolve around who should have access to information and whether they should pay a fee for this access.

A)Accessibility
B)Accuracy
C)Privacy
D)Property
Question
At your company, you put the highest priority on making sure customer credit card information cannot be breached. This means you are using the __________ approach as an ethical framework.

A)common good
B)fairness
C)rights
D)utilitarian
Question
______________ is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems.

A)Accountability
B)Due Process
C)Liability
D)Responsibility
Question
At your shipping company, the job description for a new position states the applicant must be able to lift packages over 50 pounds on a consistent basis. This means most women and physically disabled people will not be able to apply for the job. In this case, you are using the __________ approach as an ethical framework.

A)common good
B)fairness
C)rights
D)utilitarian
Question
______________ refers to determining who is responsible for actions that were taken.

A)Acceptance
B)Accountability
C)Liability
D)Responsibility
Question
_________________ issues involve the authenticity, fidelity, and correctness of information that is collected and processed.

A)Accessibility
B)Accuracy
C)Privacy
D)Property
Question
For leaking numerous classified ______documents, Edward Snowden has earned ______.

A)FBI; a pardon in the US by US citizens
B)FBI; exile in the US and asylum in Russia
C)NSA; a pardon in the US by US citizens
D)NSA; exile in the US and asylum in Russia
Question
______________ means that you accept the consequences of your decisions and actions.

A)Acceptance
B)Accountability
C)Liability
D)Responsibility
Question
The _____________ approach maintains that an ethical action is the one that best protects and respects the moral rights of the affected parties.

A)common good
B)fairness
C)rights
D)utilitarian
Question
The _____________ approach posits that ethical actions treat all human beings equally, or, if unequally, then fairly, based on some defensible standard.

A)common good
B)fairness
C)rights
D)utilitarian
Question
Edward Snowden leaked numerous classified documents that demonstrated how the ___.

A)FBI violates the privacy of US citizens
B)FBI captures and prosecutes foreign terrorists
C)NSA violates the privacy of US citizens
D)NSA captures and prosecutes foreign terrorists
Question
If you are most concerned about generating the highest profits margins to ensure your stockholders are getting the highest return on their investment, you would be using the _________ approach as an ethical framework.

A)common good
B)fairness
C)rights
D)utilitarian
Question
The _____________ approach states that an ethical action is the one that provides the most good or does the least harm.

A)common good
B)fairness
C)rights
D)utilitarian
Question
The _________ prohibits an organization from collecting any personal information unless the customer specifically authorizes it.

A)digital dossier policy
B)information privacy policy
C)opt-in model of informed consent
D)opt-out model of informed consent
Question
______________ is the right to be left alone and to be free of unreasonable personal intrusions.

A)A digital dossier
B)Information privacy
C)Privacy
D)Profiling
Question
The _________ permits the company to collect personal information until the customer specifically requests that the data not be collected.

A)digital dossier policy
B)information privacy policy
C)opt-in model of informed consent
D)opt-out model of informed consent
Question
______________ is the process of forming a digital dossier.

A)Dossiering
B)Information privacy
C)Privacy
D)Profiling
Question
______________ is the right to determine when, and to what extent, information about you can be gathered and/or communicated to others.

A)A digital dossier
B)Information privacy
C)Privacy
D)Profiling
Question
Cheating is ________ common at business schools ____________ tools like Turnitin.

A)less; because of
B)less; even with
C)more; because of
D)more; even with
Question
______________ is a privacy tool available to consumers that automatically communicates privacy policies between an electronic commerce web site and the visitors to that site.

A)A digital dossier
B)An information privacy policy
C)Photo tagging
D)Platform for Privacy Preferences (P3P)
Question
The right of privacy ___________ absolute.

A)can be
B)cannot be
C)is
D)is not
Question
____________ countries have some form of data protection law.

A)All
B)Approximately 50
C)Approximately 100
D)Approximately 200
Question
A _______ is an informal, personal journal that is frequently updated and intended for general public reading.

A)blog
B)digital dossier
C)privacy policy
D)profile
Question
Turnitin is NOT currently used to detect plagiarism on ___________.

A)admissions essays
B)homework assignments
C)term papers
D)resumes
Question
______________ is a software package the helps detect plagiarism.

A)Iparadigms
B)NoPlagiarism
C)Turnitin
D)Wordprom
Question
______________ is an electronic profile of you and your habits.

A)A digital dossier
B)Information privacy
C)Privacy
D)Profiling
Question
___________-based Plagtracker is one of Turnitin's competitors.

A)Australian
B)Chinese
C)European
D)Ukranian
Question
Knowing what kind of surveillance an employer can use on its employees is a(n)_________ issue.

A)Accessibility
B)Accuracy
C)Privacy
D)Property
Question
Which of the following is NOT an example of a profiler?

A)Acxiom
B)Amazon
C)ChoicePoint
D)LexisNexis
Question
______________ is a privacy policy guideline for Data Collection.

A)Data should be adequate, relevant, and not excessive in relation to the business objective.
B)Data should be kept current, where and when necessary.
C)Data should not be disclosed for reasons incompatible with the business objective for which they are collected.
D)Third parties should not be given access to data without the individual's knowledge or permission, except as required by law.
Question
Determining whether or not you are allowed to sell your customers' information to a telemarketer is a(n)_________ issue.

A)Accessibility
B)Accuracy
C)Privacy
D)Property
Question
Making sure your customer's information is correct in your information systems is a(n)_________ issue.

A)Accessibility
B)Accuracy
C)Privacy
D)Property
Question
Determining whether or not corporate computers can be used for private purposes is a(n)_________ issue.

A)Accessibility
B)Accuracy
C)Privacy
D)Property
Question
_____________________________ issues involve the ownership and value of information.
Question
The FTC is NOT pressuring _____________ to establish a "Do Not Track" option for Internet users.

A)Advertisers
B)Browser companies
C)Consumer advocates
D)The government
Question
The _____________ approach highlights the interlocking relationship that underlie all societies.
Question
The right of privacy is absolute in the US since above all, we celebrate freedom.
Question
Companies have the right to monitor your web surfing when you are at work.
Question
The opt-out model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected.
Question
The use of EyeSee is a(n)___________ issue.

A)Ethical
B)Legal
C)Ethical and legal
D)Neither ethical nor legal
Question
EyeSee is being used in which of the following countries?

A)Australia
B)China
C)Europe
D)Russia
Question
The _____________ is pressuring browser companies, consumer advocates, and advertisers to establish a "Do Not Track" option for Internet users.

A)CIA
B)FBI
C)FTC
D)NSA
Question
Tapad uses a ___________ in its data collection efforts.

A)digital dossier policy
B)information privacy policy
C)opt-in model of informed consent
D)opt-out model of informed consent
Question
The first step in the general framework for ethics is getting the facts.
Question
__________________________ is the right to be left alone and to be free of unreasonable personal intrusion.
Question
Tapad specifically targets which of the following groups?

A)Desktop advertising
B)Mobile advertising
C)Television advertising
D)All of the above
Question
Ethics refers to the principles of right and wrong that ____________________ use to make choices that guide their behavior.
Question
____________ are/is able to track and target the same consumer across multiple devices using software algorithms.

A)Cookies
B)Google
C)Tapad
D)Web bugs
Question
This smartphone app sends encrypted notes that self-destruct after a set amount of time.

A)Burn Note
B)Silent Circle
C)TigerText
D)Wickr
Question
Actions that are ethical are always legal.
Question
The European Union's data protection laws are ___________ strict compared to the US laws.

A)Equally
B)Less
C)More
D)Non-existently
Question
The goal of EyeSee is to __________.

A)Catch shoplifters
B)Improve vision
C)Profile customers
D)Replace sales representatives
Question
The Sarbanes-Oxley Act in 2002 was passed to try to prevent fiascos like Enron, WorldCom, and Tyco.
Question
Given the global nature of our economy, what are the international aspects of privacy that we need to consider in our business dealings?
Question
Your university collects and maintains a great deal of information about you (and potentially your parents). Using the four general categories presented in the book, what are the issues with all this information being stored on your university's information systems?
Question
List at least 5 forms of electronic surveillance that are threatening our privacy. How do these things impact our lives? How should we address these things?
Answer (for the first question…the 2ⁿᵈ and 3ʳᵈ questions are largely opinion):
1)Surveillance cameras at airports, subways, banks, etc.
2)Digital sensors everywhere - laptop webcams, video-game motion sensors, smartphone cameras, ID cards, etc.
3)High-resolution photographs from the air (Google, Microsoft maps)
4)Cameras on the streets capturing license plates
5)Geotagging
6)GPS on smartphones - good and bad people can find us anywhere at any time
7)Facial recognition technology - photo tagging
Question
Every company needs to think about how to protect their customers' information. Using the five steps in the general framework for ethical decision making, how would you handle the situation if you were the CEO?
Question
List and describe the four widely used ethical standards/frameworks. Provide an example for each one using a real-world scenario.
Question
The __________ model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/66
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 3: Ethics and Privacy
1
The _____________ approach highlights the interlocking relationships that underlie all societies.

A)common good
B)fairness
C)rights
D)utilitarian
A
2
_____________ issues involve collecting, storing, and disseminating information about individuals.

A)Accessibility
B)Accuracy
C)Privacy
D)Property
C
3
____________ issues involve the ownership and value of information.

A)Accessibility
B)Accuracy
C)Privacy
D)Property
D
4
Welfare and Obamacare follow the __________ approach as an ethical framework..

A)common good
B)fairness
C)rights
D)utilitarian
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following is NOT monitored by the NSA?

A)Credit card transactions
B)Internet traffic (e-mail and web searches)
C)Insurance claims
D)Phone networks
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
6
PRISM is a data collection effort that obtains stored _________________.

A)credit card transactions
B)internet communications
C)insurance claims
D)phone call data
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
7
The _____________ approach posits that ethical actions treat all human beings equally, or if unequally then fairly, based on some defensible standard.

A)code of ethics
B)digital dossier
C)ethics
D)fairness approach
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
8
_______________ issues revolve around who should have access to information and whether they should pay a fee for this access.

A)Accessibility
B)Accuracy
C)Privacy
D)Property
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
9
At your company, you put the highest priority on making sure customer credit card information cannot be breached. This means you are using the __________ approach as an ethical framework.

A)common good
B)fairness
C)rights
D)utilitarian
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
10
______________ is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems.

A)Accountability
B)Due Process
C)Liability
D)Responsibility
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
11
At your shipping company, the job description for a new position states the applicant must be able to lift packages over 50 pounds on a consistent basis. This means most women and physically disabled people will not be able to apply for the job. In this case, you are using the __________ approach as an ethical framework.

A)common good
B)fairness
C)rights
D)utilitarian
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
12
______________ refers to determining who is responsible for actions that were taken.

A)Acceptance
B)Accountability
C)Liability
D)Responsibility
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
13
_________________ issues involve the authenticity, fidelity, and correctness of information that is collected and processed.

A)Accessibility
B)Accuracy
C)Privacy
D)Property
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
14
For leaking numerous classified ______documents, Edward Snowden has earned ______.

A)FBI; a pardon in the US by US citizens
B)FBI; exile in the US and asylum in Russia
C)NSA; a pardon in the US by US citizens
D)NSA; exile in the US and asylum in Russia
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
15
______________ means that you accept the consequences of your decisions and actions.

A)Acceptance
B)Accountability
C)Liability
D)Responsibility
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
16
The _____________ approach maintains that an ethical action is the one that best protects and respects the moral rights of the affected parties.

A)common good
B)fairness
C)rights
D)utilitarian
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
17
The _____________ approach posits that ethical actions treat all human beings equally, or, if unequally, then fairly, based on some defensible standard.

A)common good
B)fairness
C)rights
D)utilitarian
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
18
Edward Snowden leaked numerous classified documents that demonstrated how the ___.

A)FBI violates the privacy of US citizens
B)FBI captures and prosecutes foreign terrorists
C)NSA violates the privacy of US citizens
D)NSA captures and prosecutes foreign terrorists
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
19
If you are most concerned about generating the highest profits margins to ensure your stockholders are getting the highest return on their investment, you would be using the _________ approach as an ethical framework.

A)common good
B)fairness
C)rights
D)utilitarian
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
20
The _____________ approach states that an ethical action is the one that provides the most good or does the least harm.

A)common good
B)fairness
C)rights
D)utilitarian
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
21
The _________ prohibits an organization from collecting any personal information unless the customer specifically authorizes it.

A)digital dossier policy
B)information privacy policy
C)opt-in model of informed consent
D)opt-out model of informed consent
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
22
______________ is the right to be left alone and to be free of unreasonable personal intrusions.

A)A digital dossier
B)Information privacy
C)Privacy
D)Profiling
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
23
The _________ permits the company to collect personal information until the customer specifically requests that the data not be collected.

A)digital dossier policy
B)information privacy policy
C)opt-in model of informed consent
D)opt-out model of informed consent
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
24
______________ is the process of forming a digital dossier.

A)Dossiering
B)Information privacy
C)Privacy
D)Profiling
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
25
______________ is the right to determine when, and to what extent, information about you can be gathered and/or communicated to others.

A)A digital dossier
B)Information privacy
C)Privacy
D)Profiling
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
26
Cheating is ________ common at business schools ____________ tools like Turnitin.

A)less; because of
B)less; even with
C)more; because of
D)more; even with
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
27
______________ is a privacy tool available to consumers that automatically communicates privacy policies between an electronic commerce web site and the visitors to that site.

A)A digital dossier
B)An information privacy policy
C)Photo tagging
D)Platform for Privacy Preferences (P3P)
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
28
The right of privacy ___________ absolute.

A)can be
B)cannot be
C)is
D)is not
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
29
____________ countries have some form of data protection law.

A)All
B)Approximately 50
C)Approximately 100
D)Approximately 200
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
30
A _______ is an informal, personal journal that is frequently updated and intended for general public reading.

A)blog
B)digital dossier
C)privacy policy
D)profile
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
31
Turnitin is NOT currently used to detect plagiarism on ___________.

A)admissions essays
B)homework assignments
C)term papers
D)resumes
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
32
______________ is a software package the helps detect plagiarism.

A)Iparadigms
B)NoPlagiarism
C)Turnitin
D)Wordprom
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
33
______________ is an electronic profile of you and your habits.

A)A digital dossier
B)Information privacy
C)Privacy
D)Profiling
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
34
___________-based Plagtracker is one of Turnitin's competitors.

A)Australian
B)Chinese
C)European
D)Ukranian
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
35
Knowing what kind of surveillance an employer can use on its employees is a(n)_________ issue.

A)Accessibility
B)Accuracy
C)Privacy
D)Property
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
36
Which of the following is NOT an example of a profiler?

A)Acxiom
B)Amazon
C)ChoicePoint
D)LexisNexis
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
37
______________ is a privacy policy guideline for Data Collection.

A)Data should be adequate, relevant, and not excessive in relation to the business objective.
B)Data should be kept current, where and when necessary.
C)Data should not be disclosed for reasons incompatible with the business objective for which they are collected.
D)Third parties should not be given access to data without the individual's knowledge or permission, except as required by law.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
38
Determining whether or not you are allowed to sell your customers' information to a telemarketer is a(n)_________ issue.

A)Accessibility
B)Accuracy
C)Privacy
D)Property
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
39
Making sure your customer's information is correct in your information systems is a(n)_________ issue.

A)Accessibility
B)Accuracy
C)Privacy
D)Property
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
40
Determining whether or not corporate computers can be used for private purposes is a(n)_________ issue.

A)Accessibility
B)Accuracy
C)Privacy
D)Property
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
41
_____________________________ issues involve the ownership and value of information.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
42
The FTC is NOT pressuring _____________ to establish a "Do Not Track" option for Internet users.

A)Advertisers
B)Browser companies
C)Consumer advocates
D)The government
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
43
The _____________ approach highlights the interlocking relationship that underlie all societies.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
44
The right of privacy is absolute in the US since above all, we celebrate freedom.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
45
Companies have the right to monitor your web surfing when you are at work.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
46
The opt-out model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
47
The use of EyeSee is a(n)___________ issue.

A)Ethical
B)Legal
C)Ethical and legal
D)Neither ethical nor legal
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
48
EyeSee is being used in which of the following countries?

A)Australia
B)China
C)Europe
D)Russia
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
49
The _____________ is pressuring browser companies, consumer advocates, and advertisers to establish a "Do Not Track" option for Internet users.

A)CIA
B)FBI
C)FTC
D)NSA
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
50
Tapad uses a ___________ in its data collection efforts.

A)digital dossier policy
B)information privacy policy
C)opt-in model of informed consent
D)opt-out model of informed consent
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
51
The first step in the general framework for ethics is getting the facts.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
52
__________________________ is the right to be left alone and to be free of unreasonable personal intrusion.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
53
Tapad specifically targets which of the following groups?

A)Desktop advertising
B)Mobile advertising
C)Television advertising
D)All of the above
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
54
Ethics refers to the principles of right and wrong that ____________________ use to make choices that guide their behavior.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
55
____________ are/is able to track and target the same consumer across multiple devices using software algorithms.

A)Cookies
B)Google
C)Tapad
D)Web bugs
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
56
This smartphone app sends encrypted notes that self-destruct after a set amount of time.

A)Burn Note
B)Silent Circle
C)TigerText
D)Wickr
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
57
Actions that are ethical are always legal.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
58
The European Union's data protection laws are ___________ strict compared to the US laws.

A)Equally
B)Less
C)More
D)Non-existently
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
59
The goal of EyeSee is to __________.

A)Catch shoplifters
B)Improve vision
C)Profile customers
D)Replace sales representatives
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
60
The Sarbanes-Oxley Act in 2002 was passed to try to prevent fiascos like Enron, WorldCom, and Tyco.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
61
Given the global nature of our economy, what are the international aspects of privacy that we need to consider in our business dealings?
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
62
Your university collects and maintains a great deal of information about you (and potentially your parents). Using the four general categories presented in the book, what are the issues with all this information being stored on your university's information systems?
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
63
List at least 5 forms of electronic surveillance that are threatening our privacy. How do these things impact our lives? How should we address these things?
Answer (for the first question…the 2ⁿᵈ and 3ʳᵈ questions are largely opinion):
1)Surveillance cameras at airports, subways, banks, etc.
2)Digital sensors everywhere - laptop webcams, video-game motion sensors, smartphone cameras, ID cards, etc.
3)High-resolution photographs from the air (Google, Microsoft maps)
4)Cameras on the streets capturing license plates
5)Geotagging
6)GPS on smartphones - good and bad people can find us anywhere at any time
7)Facial recognition technology - photo tagging
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
64
Every company needs to think about how to protect their customers' information. Using the five steps in the general framework for ethical decision making, how would you handle the situation if you were the CEO?
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
65
List and describe the four widely used ethical standards/frameworks. Provide an example for each one using a real-world scenario.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
66
The __________ model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 66 flashcards in this deck.