Fill This Form To Receive Instant Help
Homework answers / question archive / California State University, Fresno - IS 6E Package Title: Test Bank Course Title: Introduction to IS 6e Chapter Number: 3 Question Type: Multiple Choice 1)Which of the following is NOT monitored by the NSA? A
California State University, Fresno - IS 6E
Package Title: Test Bank
Course Title: Introduction to IS 6e Chapter Number: 3
Question Type: Multiple Choice
1)Which of the following is NOT monitored by the NSA?
A. Credit card transactions
B. Internet traffic (e-mail and web searches)
C. Insurance claims
D. Phone networks
2. PRISM is a data collection effort that obtains stored .
A. credit card transactions
B. internet communications
C. insurance claims
D. phone call data
3. Edward Snowden leaked numerous classified documents that demonstrated how the .
A. FBI violates the privacy of US citizens
B. FBI captures and prosecutes foreign terrorists
C. NSA violates the privacy of US citizens
D. NSA captures and prosecutes foreign terrorists
4. For leaking numerous classified documents, Edward Snowden has earned .
A. FBI; a pardon in the US by US citizens
B. FBI; exile in the US and asylum in Russia
C. NSA; a pardon in the US by US citizens
D. NSA; exile in the US and asylum in Russia
5. The approach states that an ethical action is the one that provides the most good or does the least harm.
A. common good
B. fairness
C. rights
D. utilitarian
6. The approach maintains that an ethical action is the one that best protects and respects the moral rights of the affected parties.
A. common good
B. fairness
C. rights
D. utilitarian
7. The approach posits that ethical actions treat all human beings equally, or, if unequally, then fairly, based on some defensible standard.
A. common good
B. fairness
C. rights
D. utilitarian
8. The approach highlights the interlocking relationships that underlie all societies.
A. common good
B. fairness
C. rights
D. utilitarian
9. If you are most concerned about generating the highest profits margins to ensure your stockholders are getting the highest return on their investment, you would be using the
approach as an ethical framework.
A. common good
B. fairness
C. rights
D. utilitarian
10. At your company, you put the highest priority on making sure customer credit card information cannot be breached. This means you are using the approach as an ethical framework.
A. common good
B. fairness
C. rights
D. utilitarian
11. At your shipping company, the job description for a new position states the applicant must be able to lift packages over 50 pounds on a consistent basis. This means most women and physically disabled people will not be able to apply for the job. In this case, you are using the approach as an ethical framework.
A. common good
B. fairness
C. rights
D. utilitarian
12. Welfare and Obamacare follow the approach as an ethical framework..
A. common good
B. fairness
C. rights
D. utilitarian
13. The approach posits that ethical actions treat all human beings equally, or if unequally then fairly, based on some defensible standard.
A. code of ethics
B. digital dossier
C. ethics
D. fairness approach
14. means that you accept the consequences of your decisions and actions.
A. Acceptance
B. Accountability
C. Liability
D. Responsibility
15. refers to determining who is responsible for actions that were taken.
A. Acceptance
B. Accountability
C. Liability
D. Responsibility
16. is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems.
A. Accountability
B. Due Process
C. Liability
D. Responsibility
17. issues involve collecting, storing, and disseminating information about individuals.
A. Accessibility
B. Accuracy
C. Privacy
D. Property
18. issues involve the authenticity, fidelity, and correctness of information that is collected and processed.
A. Accessibility
B. Accuracy
C. Privacy
D. Property
19. issues involve the ownership and value of information.
A. Accessibility
B. Accuracy
C. Privacy
D. Property
20. issues revolve around who should have access to information and whether they should pay a fee for this access.
A. Accessibility
B. Accuracy
C. Privacy
D. Property
21. Knowing what kind of surveillance an employer can use on its employees is a(n)
issue.
A. Accessibility
B. Accuracy
C. Privacy
D. Property
22. Making sure your customer’s information is correct in your information systems is a(n)
issue.
A. Accessibility
B. Accuracy
C. Privacy
D. Property
23. Determining whether or not corporate computers can be used for private purposes is a(n)
issue.
A. Accessibility
B. Accuracy
C. Privacy
D. Property
24. Determining whether or not you are allowed to sell your customers’ information to a telemarketer is a(n) issue.
A. Accessibility
B. Accuracy
C. Privacy
D. Property
25. Cheating is common at business schools tools like Turnitin.
A. less; because of
B. less; even with
C. more; because of
D. more; even with
26. -based Plagtracker is one of Turnitin’s competitors.
A. Australian
B. Chinese
C. European
D. Ukranian
27. Turnitin is NOT currently used to detect plagiarism on .
A. admissions essays
B. homework assignments
C. term papers
D. resumes
28. is a software package the helps detect plagiarism.
A. Iparadigms
B. NoPlagiarism
C. Turnitin
D. Wordprom
29. is the right to be left alone and to be free of unreasonable personal intrusions.
A. A digital dossier
B. Information privacy
C. Privacy
D. Profiling
30. is the right to determine when, and to what extent, information about you can be gathered and/or communicated to others.
A. A digital dossier
B. Information privacy
C. Privacy
D. Profiling
31. is an electronic profile of you and your habits.
A. A digital dossier
B. Information privacy
C. Privacy
D. Profiling
32. is the process of forming a digital dossier.
A. Dossiering
B. Information privacy
C. Privacy
D. Profiling
33. Which of the following is NOT an example of a profiler?
A. Acxiom
B. Amazon
C. ChoicePoint
D. LexisNexis
34. The right of privacy absolute.
A. can be
B. cannot be
C. is
D. is not
35. The permits the company to collect personal information until the customer specifically requests that the data not be collected.
A. digital dossier policy
B. information privacy policy
C. opt-in model of informed consent
D. opt-out model of informed consent
36. The prohibits an organization from collecting any personal information unless the customer specifically authorizes it.
A. digital dossier policy
B. information privacy policy
C. opt-in model of informed consent
D. opt-out model of informed consent
37. is a privacy tool available to consumers that automatically communicates privacy policies between an electronic commerce web site and the visitors to that site.
A. A digital dossier
B. An information privacy policy
C. Photo tagging
D. Platform for Privacy Preferences (P3P)
38. A is an informal, personal journal that is frequently updated and intended for general public reading.
A. blog
B. digital dossier
C. privacy policy
D. profile
39. is a privacy policy guideline for Data Collection.
A. Data should be adequate, relevant, and not excessive in relation to the business objective.
B. Data should be kept current, where and when necessary.
C. Data should not be disclosed for reasons incompatible with the business objective for which they are collected.
D. Third parties should not be given access to data without the individual’s knowledge or permission, except as required by law.
40. countries have some form of data protection law.
A. All
B. Approximately 50
C. Approximately 100
D. Approximately 200
41. The European Union’s data protection laws are strict compared to the US laws.
A. Equally
B. Less
C. More
D. Non-existently
42. The goal of EyeSee is to .
A. Catch shoplifters
B. Improve vision
C. Profile customers
D. Replace sales representatives
43. EyeSee is being used in which of the following countries?
A. Australia
B. China
C. Europe
D. Russia
44. The use of EyeSee is a(n) issue.
A. Ethical
B. Legal
C. Ethical and legal
D. Neither ethical nor legal
45. are/is able to track and target the same consumer across multiple devices using software algorithms.
A. Cookies
B. Google
C. Tapad
D. Web bugs
46. Tapad uses a in its data collection efforts.
A. digital dossier policy
B. information privacy policy
C. opt-in model of informed consent
D. opt-out model of informed consent
47. Tapad specifically targets which of the following groups?
A. Desktop advertising
B. Mobile advertising
C. Television advertising
D. All of the above
48. The is pressuring browser companies, consumer advocates, and advertisers to establish a “Do Not Track” option for Internet users.
A. CIA
B. FBI
C. FTC
D. NSA
49. The FTC is NOT pressuring to establish a “Do Not Track” option for Internet users.
A. Advertisers
B. Browser companies
C. Consumer advocates
D. The government
50. This smartphone app sends encrypted notes that self-destruct after a set amount of time.
A. Burn Note
B. Silent Circle
C. TigerText
D. Wickr
Question Type: True/False
1. Actions that are ethical are always legal.
2. The Sarbanes-Oxley Act in 2002 was passed to try to prevent fiascos like Enron, WorldCom, and Tyco.
3. The first step in the general framework for ethics is getting the facts.
Section: Ethical Issues
4. The right of privacy is absolute in the US since above all, we celebrate freedom.
5. The opt-out model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected.
6. Companies have the right to monitor your web surfing when you are at work.
Question Type: Fill-in-the-Blank
1. Ethics refers to the principles of right and wrong that use to make choices that guide their behavior.
2. The approach highlights the interlocking relationship that underlie all societies.
3. issues involve the ownership and value of information.
4. is the right to be left alone and to be free of unreasonable personal intrusion.
5. The model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected.
Question Type: Essay
1. List and describe the four widely used ethical standards/frameworks. Provide an example for each one using a real-world scenario.
2. Every company needs to think about how to protect their customers’ information. Using the five steps in the general framework for ethical decision making, how would you handle the situation if you were the CEO?
3. Your university collects and maintains a great deal of information about you (and potentially your parents). Using the four general categories presented in the book, what are the issues with all this information being stored on your university’s information systems?
4. List at least 5 forms of electronic surveillance that are threatening our privacy. How do these things impact our lives? How should we address these things?
5. Given the global nature of our economy, what are the international aspects of privacy that we need to consider in our business dealings?
Already member? Sign In