Deck 14: E-Commerce: Regulatory, Ethical, and Social Environments

Full screen (f)
exit full mode
Question
Legal precedents are decisions by judges that may be used as standards in similar legal cases that follow.
Use Space or
up arrow
down arrow
to flip the card.
Question
Digital technologies make it possible to produce and distribute a high-quality duplicate of any digital recording with minimal effort and cost.
Question
Business ethics is a form of applied ethics that examines ethical principles and moral or ethical problems that arise in a business environment.
Question
The Communications Decency Act gives U.S.law enforcement the right to shut down websites without trial or defense if it finds the central reason for the site is to distribute copyrighted information illegally.
Question
Creations of the mind,such as inventions,literary and artistic works,and symbols,names,images,and designs,used in commerce are known as private property.
Question
Acts or activities that are unethical are also illegal.
Question
A corporate code of ethics should specify whether the company allows employees to set up their own Web pages on the company intranet and the rules for private e-mail usage during working hours.
Question
According to a survey conducted by the 24/7 Wall St.Company,workers spend approximately 12 hours online each week on personal matters during work.
Question
Ethical principles that apply to the collection and use of personal information,such as notifying customers of information practices before collecting it,do not apply to information collected in e-commerce.
Question
The USA PATRIOT Act allows employers to monitor their electronic workplace.
Question
EC Web site content needs to be reviewed by attorneys with cyberlaw expertise to ensure that there is nothing unethical or illegal and that all required statements and disclaimers are properly included.
Question
Internet regulation at a federal level is authorized by the USA PATRIOT Act.
Question
A trademark is a symbol businesses use to identify their goods and services.
Question
Violation of copyrights on the Internet is a major problem for creators and distributors of intellectual property such as movies,music,and books.
Question
Virtually all U.S.states and the federal government,either by statute or by common law,recognize the right to privacy,but few government agencies actually follow all the statutes.
Question
In 2010,the Supreme Court ruled that patents cover abstract ideas.
Question
Government supercomputers are capable of reading every e-mail sent,listening to every mobile conversation,reading every text message,knowing every user location,and following every credit card purchase besides tracking every website visited by Internet users around the globe.
Question
Unlike hate sites that can cause problems for corporations or lead to lawsuits,fan sites are beneficial and welcomed by the entertainment industry.
Question
Trade secrets serve to protect tangible technological inventions,especially in traditional industrial areas.
Question
RFIDs can be used to track individuals.
Question
Contemporary information systems should be built to encourage compliance and maximize the possibility of accountability for violations.
Question
The right to be left alone and free from unreasonable personal intrusions best defines

A) intrusion protection.
B) privacy.
C) social law.
D) patent law.
Question
Teleconferencing or virtual work offers many green benefits,including reducing rush hour traffic,improving air quality,improving highway safety,and improving health care.
Question
The branch of philosophy that deals with what is considered to be right and wrong best defines

A) ethics.
B) due process.
C) intellectual property law.
D) business law.
Question
Digital reference is a generic,technology-neutral term that refers to the various methods by which one can sign an electronic record.
Question
Several public organizations and private companies attempt to protect consumers and build users' trust and confidence in the Internet through a seal of quality,such as Trustmark and BBBOnLine.
Question
Electronic Product Environmental Assessment Tool (EPEAT)is a searchable database of computer hardware that meets a strict set of environmental criteria.
Question
Green software refers to software products that help companies save energy or comply with EPA requirements.
Question
Online sellers can better protect themselves against fraud by requiring customers whose billing address is different from the shipping address to call their bank and have the alternate address added to their bank account.
Question
Various EC tools can help increase our safety at home and in public,such as e-911 systems; global collaborative commerce technologies,e-procurement,and e-government efforts at information sharing.
Question
According to a study by Robert Half Technology,the top time waster is

A) online games.
B) personal email.
C) social networks.
D) gambling.
Question
Some believe that exposure to cellular mobile communication radiation may cause health problems; however,it may take years before the truth of this claim is known.
Question
Electronic signatures improve EC by helping to distinguish between legitimate and fraudulent transactions and build trust and predictability needed by parties doing business online.
Question
Virtual universities are helping to reduce the digital divide.
Question
According to the Gartner Group,40 percent of the world's data centers are constrained by heat,space,and power requirements.
Question
Biometric controls provide access procedures that match every valid user with a unique user identifier.
Question
Sustainability regulations such as RoHS in the European Union (EU)will increasingly impact how supply chains function regardless of location.
Question
Under the Dodd-Frank Act,privacy notices guarantee consumers certain rights while shopping online.
Question
Corporate Web policy guidelines include each of the following except

A) issue word-of-mouth acceptable use policies (AUP).
B) make it clear to employees that they cannot use copyrighted or trademarked material without permission.
C) post disclaimers concerning content.
D) have attorneys with cyber law expertise review Web content.
Question
Which of the following states the rules and expected behaviors and actions?

A) citizenship
B) job description
C) company mission statement
D) corporate code of ethics
Question
Section 5 of the FTC Act does each of the following except

A) prohibits unfair or deceptive EC practices.
B) gives the FTC authority to take action against companies whose lax security practices could expose customers' financial information to theft or loss.
C) protects privacy.
D) requires monitoring of employees' e-mail.
Question
Each of the following statements apply to hate Web sites except

A) web sites that contain legitimate complaints that are not defamatory, sponsored by competitors, or infringe upon trademark rights by confusing consumers are usually protected by the First Amendment.
B) many hate sites are directed against large corporations such as Wal-Mart, Microsoft, and Nike.
C) cyberbashing is the registration of a domain name that criticizes an organization or person.
D) the intent of most hate Web sites is to commit fraud.
Question
An exclusive right of the author or creator of a book,movie,musical composition,or other artistic property to print,copy,sell,license,distribute,transform to another medium,translate,record,perform,or otherwise use best defines

A) patent.
B) copyright.
C) fair use.
D) trademark law.
Question
Companies can improve their responsibility as custodians of customers' personal data by implementing

A) opt-in and opt-out information practices.
B) AUP.
C) e-mail monitoring.
D) firewalls.
Question
Use of the work without permission or contracting for payment of a royalty best defines

A) fair use.
B) infringement.
C) cyberlifting.
D) digital rights violation.
Question
Which intellectual property law is correctly matched with its protection?

A) Patent law protects inventions.
B) Trade secret law protects creations of the mind.
C) Copyright law protects confidential business information.
D) Trademark law protects discoveries.
Question
An Internet acceptable use policy (AUP)is an important safeguard because

A) it is required by the FTC.
B) it includes a corporate code of ethics.
C) without a formal AUP, it is much more difficult to enforce acceptable behaviors and eliminate unacceptable behaviors and punish violators.
D) employees may be using company e-mail to advertise their own businesses.
Question
Which of the following intellectual property laws protects inventions and discoveries?

A) patent law
B) trade secret law
C) law of licensing
D) trademark law
Question
Which of the following extends a copyright to 70 years after the death of the author?

A) Carry Grant Copyright Extension Act
B) Communications Privacy and Consumer Empowerment Act
C) Sonny Bono Copyright Extension Act
D) Sarbanes-Oxley Act
Question
Which of the following gives the authorities dramatic new copyright enforcement powers allowing them to take down entire domains dedicated to online piracy rather than just targeting files that actually infringe copyright law?

A) Federal Trademark Dilution Act
B) Communications Decency Act
C) Copyright Enforcement Bill
D) Anti-Cybersquatting Consumer Protection Act
Question
Fair use means

A) copyrighted material can be used for noncommercial purposes without paying royalties or getting permission.
B) a copyright holder has exclusive rights to the invention for a fixed number of years.
C) the author or creator of a book, movie, or musical composition can use his or her creations for an unlimited number of years.
D) copyrighted material can be digitally protected against misuse.
Question
The use of famous trademarks in public that diminishes the capacity of the mark to distinguish goods or services,or tarnishes the mark in the eyes of the consumer best defines

A) copyright infringement.
B) trademark dilution.
C) patent theft.
D) social use.
Question
A domain name that criticizes an organization or person best defines

A) repudiation site.
B) cyberstalking.
C) cyberbashing.
D) cyberflaming.
Question
Each of the following statements about digital rights management (DRM)is true except

A) DRM are technology-based protection measures.
B) DRM technologies were developed with strict regard for privacy protection.
C) typically, the content is a copyrighted digital work to which the vendor holds right.
D) DRM is an umbrella term for any arrangement that allows a vendor of content in electronic form to control the material and restrict its usage.
Question
An agreement that requires computer users to take specific steps to allow the collection of personal information best defines

A) opt-out.
B) information submission clause.
C) opt-in.
D) cyberawareness.
Question
Intellectual property law is the area of law that is associated with each of the following except

A) business contracts.
B) visual and performing arts.
C) patent law, copyright law, trademark law, and trade secret law.
D) electronic databases, advertising, and video games.
Question
An umbrella term for any of several arrangements that allow a vendor of content in electronic form to control the material and restrict its usage best defines

A) fair use.
B) electronic conservatorship.
C) digital rights management.
D) digital patent.
Question
Which of the following intellectual property laws protects confidential business information?

A) patent law
B) trademark law
C) law of licensing
D) trade secret law
Question
Which of the following mandated the use of filtering technologies in schools and libraries that receive certain types of U.S.federal funding?

A) Communications Decency Act
B) Federal commuter Fraud and Abuse Act
C) Lanham Act
D) Children's Internet Protection Act
Question
The business practice that gives consumers the opportunity to refuse sharing information about themselves best defines

A) opt-in.
B) opt-out.
C) right of refusal.
D) freedom of information.
Question
Methods used for collecting data about people include

A) search engines.
B) RFIDs.
C) site transaction logs.
D) all of the above.
Question
Ethical principles commonly applied to the collection and use of personal information include

A) choice or consent.
B) access or participation.
C) integrity or security.
D) all of the above.
Question
Potential benefits of telecommuting or virtual work for community and society include

A) allows the movement of job opportunities to areas of high unemployment.
B) increases employment.
C) reduces traffic-related pollution and congestion.
D) all of the above.
Question
Discovery in civil litigation that deals with information in electronic format best describes

A) electronic delivery.
B) electronic case files.
C) metadata.
D) electronic discovery.
Question
A major computer crime law to protect computers and other Internet-connected computers best describes

A) Computer Fraud and Abuse Act.
B) Sarbanes-Oxley Act.
C) American Recovery and Reinvestment Act.
D) Dodd-Frank Act.
Question
According to an ExecuNet survey,what percentage of hiring managers now use social media sites to check out job candidates?

A) 55 percent.
B) 77 percent.
C) 88 percent.
D) 66 percent.
Question
Potential benefits of telecommuting or virtual work for an organization include

A) reduces or eliminates travel-related time and expenses.
B) improves job satisfaction and productivity.
C) allows closer proximity to and involvement with family.
D) increases productivity despite distractions.
Question
Examples of electronic signatures to help distinguish between legitimate and fraudulent transactions include each of the following except

A) a name typed at the end of an e-mail message by the sender.
B) a digitized image of a handwritten signature attached to an electronic document.
C) a secret code or PIN to identify the sender to the recipient.
D) a Web site development agreement.
Question
Data pertaining to the enterprise included in the law that can be used for the purpose of implementing or validating compliance best defines

A) ethical data.
B) research data.
C) digital data.
D) compliance data.
Question
EC sellers need to protect against fraud and each of the following except

A) public keys.
B) customers who deny that they placed an order.
C) customers who give false credit card or bad check information in payment for products and services provided.
D) use of their name by imposter sellers.
Question
Important EC issues include

A) time and place.
B) liability.
C) defamation.
D) all of the above.
Question
The study and practice of eco-friendly computing resources which is now a key concern for businesses in all industries best defines

A) blue computing.
B) red computing.
C) green computing.
D) safe computing.
Question
All unwanted software programs designed to steal proprietary information or that target data stores containing confidential information best defines

A) viruses.
B) target emails.
C) spyware.
D) cybersniffers.
Question
The gap that has emerged between those who have and those who do not have the ability to use the technology best defines

A) digital divide.
B) electronic divide.
C) computing divide.
D) cyberdivide.
Question
Based on Richard Clarke's 2010 definition,which of the following refers to actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or disruption?

A) cybercombat
B) cyberwarfare
C) cyberintrusion
D) cyberlashing
Question
Which of the following is one of the most common ways of gathering information on the Internet?

A) using spyware, keystroke loggers, and similar methods
B) wiretapping wireline and wireless communication lines
C) reading an individual's e-mail, IM, or text message
D) reading an individual's blogs or newsgroup postings
Question
A searchable database of computer hardware that meets a strict set of environmental criteria best defines

A) Electronic Product Environmental Assessment Tool.
B) Cybercollection Distribution Database.
C) Digital Rights Management Database.
D) Cloud Computing and Data Management Compliance Tool.
Question
Which of the following requires the FTC to enforce online privacy rights in EC,including the collection and use of personal data?

A) Communications Privacy and Consumer Empowerment Act
B) USA Patriot Act
C) Computer Fraud and Abuse Act
D) Dodd-Frank Act
Question
Which of the following is the European Union's directive that aims to regulate the activities of any person or company that controls the collection,storage,processing,or use of personal data on the Internet?

A) EU Privacy Enforcement Act
B) EU Information Control and Disbursal Act
C) EU Data Protection Directive
D) EU Internet Data Collection Act
Question
A protocol allowing websites to declare their intended use of information they collect about browsing users best defines

A) Platform for Privacy Preferences Project.
B) HTML.
C) Internet Data Collection Protocol.
D) Cyberawareness Authentication Signature.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/85
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 14: E-Commerce: Regulatory, Ethical, and Social Environments
1
Legal precedents are decisions by judges that may be used as standards in similar legal cases that follow.
True
2
Digital technologies make it possible to produce and distribute a high-quality duplicate of any digital recording with minimal effort and cost.
True
3
Business ethics is a form of applied ethics that examines ethical principles and moral or ethical problems that arise in a business environment.
True
4
The Communications Decency Act gives U.S.law enforcement the right to shut down websites without trial or defense if it finds the central reason for the site is to distribute copyrighted information illegally.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
5
Creations of the mind,such as inventions,literary and artistic works,and symbols,names,images,and designs,used in commerce are known as private property.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
6
Acts or activities that are unethical are also illegal.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
7
A corporate code of ethics should specify whether the company allows employees to set up their own Web pages on the company intranet and the rules for private e-mail usage during working hours.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
8
According to a survey conducted by the 24/7 Wall St.Company,workers spend approximately 12 hours online each week on personal matters during work.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
9
Ethical principles that apply to the collection and use of personal information,such as notifying customers of information practices before collecting it,do not apply to information collected in e-commerce.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
10
The USA PATRIOT Act allows employers to monitor their electronic workplace.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
11
EC Web site content needs to be reviewed by attorneys with cyberlaw expertise to ensure that there is nothing unethical or illegal and that all required statements and disclaimers are properly included.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
12
Internet regulation at a federal level is authorized by the USA PATRIOT Act.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
13
A trademark is a symbol businesses use to identify their goods and services.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
14
Violation of copyrights on the Internet is a major problem for creators and distributors of intellectual property such as movies,music,and books.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
15
Virtually all U.S.states and the federal government,either by statute or by common law,recognize the right to privacy,but few government agencies actually follow all the statutes.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
16
In 2010,the Supreme Court ruled that patents cover abstract ideas.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
17
Government supercomputers are capable of reading every e-mail sent,listening to every mobile conversation,reading every text message,knowing every user location,and following every credit card purchase besides tracking every website visited by Internet users around the globe.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
18
Unlike hate sites that can cause problems for corporations or lead to lawsuits,fan sites are beneficial and welcomed by the entertainment industry.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
19
Trade secrets serve to protect tangible technological inventions,especially in traditional industrial areas.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
20
RFIDs can be used to track individuals.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
21
Contemporary information systems should be built to encourage compliance and maximize the possibility of accountability for violations.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
22
The right to be left alone and free from unreasonable personal intrusions best defines

A) intrusion protection.
B) privacy.
C) social law.
D) patent law.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
23
Teleconferencing or virtual work offers many green benefits,including reducing rush hour traffic,improving air quality,improving highway safety,and improving health care.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
24
The branch of philosophy that deals with what is considered to be right and wrong best defines

A) ethics.
B) due process.
C) intellectual property law.
D) business law.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
25
Digital reference is a generic,technology-neutral term that refers to the various methods by which one can sign an electronic record.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
26
Several public organizations and private companies attempt to protect consumers and build users' trust and confidence in the Internet through a seal of quality,such as Trustmark and BBBOnLine.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
27
Electronic Product Environmental Assessment Tool (EPEAT)is a searchable database of computer hardware that meets a strict set of environmental criteria.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
28
Green software refers to software products that help companies save energy or comply with EPA requirements.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
29
Online sellers can better protect themselves against fraud by requiring customers whose billing address is different from the shipping address to call their bank and have the alternate address added to their bank account.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
30
Various EC tools can help increase our safety at home and in public,such as e-911 systems; global collaborative commerce technologies,e-procurement,and e-government efforts at information sharing.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
31
According to a study by Robert Half Technology,the top time waster is

A) online games.
B) personal email.
C) social networks.
D) gambling.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
32
Some believe that exposure to cellular mobile communication radiation may cause health problems; however,it may take years before the truth of this claim is known.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
33
Electronic signatures improve EC by helping to distinguish between legitimate and fraudulent transactions and build trust and predictability needed by parties doing business online.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
34
Virtual universities are helping to reduce the digital divide.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
35
According to the Gartner Group,40 percent of the world's data centers are constrained by heat,space,and power requirements.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
36
Biometric controls provide access procedures that match every valid user with a unique user identifier.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
37
Sustainability regulations such as RoHS in the European Union (EU)will increasingly impact how supply chains function regardless of location.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
38
Under the Dodd-Frank Act,privacy notices guarantee consumers certain rights while shopping online.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
39
Corporate Web policy guidelines include each of the following except

A) issue word-of-mouth acceptable use policies (AUP).
B) make it clear to employees that they cannot use copyrighted or trademarked material without permission.
C) post disclaimers concerning content.
D) have attorneys with cyber law expertise review Web content.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
40
Which of the following states the rules and expected behaviors and actions?

A) citizenship
B) job description
C) company mission statement
D) corporate code of ethics
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
41
Section 5 of the FTC Act does each of the following except

A) prohibits unfair or deceptive EC practices.
B) gives the FTC authority to take action against companies whose lax security practices could expose customers' financial information to theft or loss.
C) protects privacy.
D) requires monitoring of employees' e-mail.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
42
Each of the following statements apply to hate Web sites except

A) web sites that contain legitimate complaints that are not defamatory, sponsored by competitors, or infringe upon trademark rights by confusing consumers are usually protected by the First Amendment.
B) many hate sites are directed against large corporations such as Wal-Mart, Microsoft, and Nike.
C) cyberbashing is the registration of a domain name that criticizes an organization or person.
D) the intent of most hate Web sites is to commit fraud.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
43
An exclusive right of the author or creator of a book,movie,musical composition,or other artistic property to print,copy,sell,license,distribute,transform to another medium,translate,record,perform,or otherwise use best defines

A) patent.
B) copyright.
C) fair use.
D) trademark law.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
44
Companies can improve their responsibility as custodians of customers' personal data by implementing

A) opt-in and opt-out information practices.
B) AUP.
C) e-mail monitoring.
D) firewalls.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
45
Use of the work without permission or contracting for payment of a royalty best defines

A) fair use.
B) infringement.
C) cyberlifting.
D) digital rights violation.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
46
Which intellectual property law is correctly matched with its protection?

A) Patent law protects inventions.
B) Trade secret law protects creations of the mind.
C) Copyright law protects confidential business information.
D) Trademark law protects discoveries.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
47
An Internet acceptable use policy (AUP)is an important safeguard because

A) it is required by the FTC.
B) it includes a corporate code of ethics.
C) without a formal AUP, it is much more difficult to enforce acceptable behaviors and eliminate unacceptable behaviors and punish violators.
D) employees may be using company e-mail to advertise their own businesses.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
48
Which of the following intellectual property laws protects inventions and discoveries?

A) patent law
B) trade secret law
C) law of licensing
D) trademark law
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
49
Which of the following extends a copyright to 70 years after the death of the author?

A) Carry Grant Copyright Extension Act
B) Communications Privacy and Consumer Empowerment Act
C) Sonny Bono Copyright Extension Act
D) Sarbanes-Oxley Act
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
50
Which of the following gives the authorities dramatic new copyright enforcement powers allowing them to take down entire domains dedicated to online piracy rather than just targeting files that actually infringe copyright law?

A) Federal Trademark Dilution Act
B) Communications Decency Act
C) Copyright Enforcement Bill
D) Anti-Cybersquatting Consumer Protection Act
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
51
Fair use means

A) copyrighted material can be used for noncommercial purposes without paying royalties or getting permission.
B) a copyright holder has exclusive rights to the invention for a fixed number of years.
C) the author or creator of a book, movie, or musical composition can use his or her creations for an unlimited number of years.
D) copyrighted material can be digitally protected against misuse.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
52
The use of famous trademarks in public that diminishes the capacity of the mark to distinguish goods or services,or tarnishes the mark in the eyes of the consumer best defines

A) copyright infringement.
B) trademark dilution.
C) patent theft.
D) social use.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
53
A domain name that criticizes an organization or person best defines

A) repudiation site.
B) cyberstalking.
C) cyberbashing.
D) cyberflaming.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
54
Each of the following statements about digital rights management (DRM)is true except

A) DRM are technology-based protection measures.
B) DRM technologies were developed with strict regard for privacy protection.
C) typically, the content is a copyrighted digital work to which the vendor holds right.
D) DRM is an umbrella term for any arrangement that allows a vendor of content in electronic form to control the material and restrict its usage.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
55
An agreement that requires computer users to take specific steps to allow the collection of personal information best defines

A) opt-out.
B) information submission clause.
C) opt-in.
D) cyberawareness.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
56
Intellectual property law is the area of law that is associated with each of the following except

A) business contracts.
B) visual and performing arts.
C) patent law, copyright law, trademark law, and trade secret law.
D) electronic databases, advertising, and video games.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
57
An umbrella term for any of several arrangements that allow a vendor of content in electronic form to control the material and restrict its usage best defines

A) fair use.
B) electronic conservatorship.
C) digital rights management.
D) digital patent.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
58
Which of the following intellectual property laws protects confidential business information?

A) patent law
B) trademark law
C) law of licensing
D) trade secret law
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
59
Which of the following mandated the use of filtering technologies in schools and libraries that receive certain types of U.S.federal funding?

A) Communications Decency Act
B) Federal commuter Fraud and Abuse Act
C) Lanham Act
D) Children's Internet Protection Act
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
60
The business practice that gives consumers the opportunity to refuse sharing information about themselves best defines

A) opt-in.
B) opt-out.
C) right of refusal.
D) freedom of information.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
61
Methods used for collecting data about people include

A) search engines.
B) RFIDs.
C) site transaction logs.
D) all of the above.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
62
Ethical principles commonly applied to the collection and use of personal information include

A) choice or consent.
B) access or participation.
C) integrity or security.
D) all of the above.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
63
Potential benefits of telecommuting or virtual work for community and society include

A) allows the movement of job opportunities to areas of high unemployment.
B) increases employment.
C) reduces traffic-related pollution and congestion.
D) all of the above.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
64
Discovery in civil litigation that deals with information in electronic format best describes

A) electronic delivery.
B) electronic case files.
C) metadata.
D) electronic discovery.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
65
A major computer crime law to protect computers and other Internet-connected computers best describes

A) Computer Fraud and Abuse Act.
B) Sarbanes-Oxley Act.
C) American Recovery and Reinvestment Act.
D) Dodd-Frank Act.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
66
According to an ExecuNet survey,what percentage of hiring managers now use social media sites to check out job candidates?

A) 55 percent.
B) 77 percent.
C) 88 percent.
D) 66 percent.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
67
Potential benefits of telecommuting or virtual work for an organization include

A) reduces or eliminates travel-related time and expenses.
B) improves job satisfaction and productivity.
C) allows closer proximity to and involvement with family.
D) increases productivity despite distractions.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
68
Examples of electronic signatures to help distinguish between legitimate and fraudulent transactions include each of the following except

A) a name typed at the end of an e-mail message by the sender.
B) a digitized image of a handwritten signature attached to an electronic document.
C) a secret code or PIN to identify the sender to the recipient.
D) a Web site development agreement.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
69
Data pertaining to the enterprise included in the law that can be used for the purpose of implementing or validating compliance best defines

A) ethical data.
B) research data.
C) digital data.
D) compliance data.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
70
EC sellers need to protect against fraud and each of the following except

A) public keys.
B) customers who deny that they placed an order.
C) customers who give false credit card or bad check information in payment for products and services provided.
D) use of their name by imposter sellers.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
71
Important EC issues include

A) time and place.
B) liability.
C) defamation.
D) all of the above.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
72
The study and practice of eco-friendly computing resources which is now a key concern for businesses in all industries best defines

A) blue computing.
B) red computing.
C) green computing.
D) safe computing.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
73
All unwanted software programs designed to steal proprietary information or that target data stores containing confidential information best defines

A) viruses.
B) target emails.
C) spyware.
D) cybersniffers.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
74
The gap that has emerged between those who have and those who do not have the ability to use the technology best defines

A) digital divide.
B) electronic divide.
C) computing divide.
D) cyberdivide.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
75
Based on Richard Clarke's 2010 definition,which of the following refers to actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or disruption?

A) cybercombat
B) cyberwarfare
C) cyberintrusion
D) cyberlashing
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
76
Which of the following is one of the most common ways of gathering information on the Internet?

A) using spyware, keystroke loggers, and similar methods
B) wiretapping wireline and wireless communication lines
C) reading an individual's e-mail, IM, or text message
D) reading an individual's blogs or newsgroup postings
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
77
A searchable database of computer hardware that meets a strict set of environmental criteria best defines

A) Electronic Product Environmental Assessment Tool.
B) Cybercollection Distribution Database.
C) Digital Rights Management Database.
D) Cloud Computing and Data Management Compliance Tool.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
78
Which of the following requires the FTC to enforce online privacy rights in EC,including the collection and use of personal data?

A) Communications Privacy and Consumer Empowerment Act
B) USA Patriot Act
C) Computer Fraud and Abuse Act
D) Dodd-Frank Act
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
79
Which of the following is the European Union's directive that aims to regulate the activities of any person or company that controls the collection,storage,processing,or use of personal data on the Internet?

A) EU Privacy Enforcement Act
B) EU Information Control and Disbursal Act
C) EU Data Protection Directive
D) EU Internet Data Collection Act
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
80
A protocol allowing websites to declare their intended use of information they collect about browsing users best defines

A) Platform for Privacy Preferences Project.
B) HTML.
C) Internet Data Collection Protocol.
D) Cyberawareness Authentication Signature.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 85 flashcards in this deck.