Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / California State University, Fresno - IS 6E Package Title: Test Bank Course Title: Introduction to IS 6e Chapter Number: 3 Question Type: Multiple Choice 1)Which of the following is NOT monitored by the NSA? A

California State University, Fresno - IS 6E Package Title: Test Bank Course Title: Introduction to IS 6e Chapter Number: 3 Question Type: Multiple Choice 1)Which of the following is NOT monitored by the NSA? A

Business

California State University, Fresno - IS 6E

Package Title: Test Bank

Course Title: Introduction to IS 6e Chapter Number: 3

Question Type: Multiple Choice

1)Which of the following is NOT monitored by the NSA?

A.         Credit card transactions

B.         Internet traffic (e-mail and web searches)

C.         Insurance claims

D.         Phone networks

 

 

2.         PRISM is a data collection effort that obtains stored .

A.         credit card transactions

B.         internet communications

C.         insurance claims

D.         phone call data

 

 

3.         Edward Snowden leaked numerous classified documents that demonstrated how the       .

A.         FBI violates the privacy of US citizens

B.         FBI captures and prosecutes foreign terrorists

C.         NSA violates the privacy of US citizens

D.         NSA captures and prosecutes foreign terrorists

 

 

 

4.         For leaking numerous classified         documents, Edward Snowden has earned      .

A.         FBI; a pardon in the US by US citizens

B.         FBI; exile in the US and asylum in Russia

C.         NSA; a pardon in the US by US citizens

D.         NSA; exile in the US and asylum in Russia

 

 

5.         The      approach states that an ethical action is the one that provides the most good or does the least harm.

A.         common good

B.         fairness

C.         rights

D.         utilitarian

 

 

6.         The      approach maintains that an ethical action is the one that best protects and respects the moral rights of the affected parties.

A.         common good

B.         fairness

C.         rights

D.         utilitarian

 

 

7.         The      approach posits that ethical actions treat all human beings equally, or, if unequally, then fairly, based on some defensible standard.

A.         common good

B.         fairness

C.         rights

D.         utilitarian

 

 

 

8.         The      approach highlights the interlocking relationships that underlie all societies.

A.         common good

B.         fairness

C.         rights

D.         utilitarian

 

 

9.         If you are most concerned about generating the highest profits margins to ensure your stockholders are getting the highest return on their investment, you would be using the

            approach as an ethical framework.

A.         common good

B.         fairness

C.         rights

D.         utilitarian

 

 

10.       At your company, you put the highest priority on making sure customer credit card information cannot be breached. This means you are using the   approach as an ethical framework.

A.         common good

B.         fairness

C.         rights

D.         utilitarian

 

 

 

11.       At your shipping company, the job description for a new position states the applicant must be able to lift packages over 50 pounds on a consistent basis. This means most women and physically disabled people will not be able to apply for the job. In this case, you are using the approach as an ethical framework.

A.         common good

B.         fairness

C.         rights

D.         utilitarian

 

 

12.       Welfare and Obamacare follow the  approach as an ethical framework..

A.         common good

B.         fairness

C.         rights

D.         utilitarian

 

 

 

 

 

13.       The      approach posits that ethical actions treat all human beings equally, or if unequally then fairly, based on some defensible standard.

A.         code of ethics

B.         digital dossier

C.         ethics

D.         fairness approach

 

 

 

 

 

14.                  means that you accept the consequences of your decisions and actions.

A.         Acceptance

B.         Accountability

C.         Liability

D.         Responsibility

 

 

 

 

15.                  refers to determining who is responsible for actions that were taken.

A.         Acceptance

B.         Accountability

C.         Liability

D.         Responsibility

 

 

 

 

16.                  is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems.

A.         Accountability

B.         Due Process

C.         Liability

D.         Responsibility

 

 

 

 

17.                  issues involve collecting, storing, and disseminating information about individuals.

A.         Accessibility

B.         Accuracy

C.         Privacy

D.         Property

 

 

 

 

 

18.                  issues involve the authenticity, fidelity, and correctness of information that is collected and processed.

A.         Accessibility

B.         Accuracy

C.         Privacy

D.         Property

 

 

 

 

19.                  issues involve the ownership and value of information.

A.         Accessibility

B.         Accuracy

C.         Privacy

D.         Property

 

 

 

 

20.                  issues revolve around who should have access to information and whether they should pay a fee for this access.

A.         Accessibility

B.         Accuracy

C.         Privacy

D.         Property

 

 

 

 

21.       Knowing what kind of surveillance an employer can use on its employees is a(n)

            issue.

A.         Accessibility

B.         Accuracy

C.         Privacy

D.         Property

 

 

 

 

 

22.       Making sure your customer’s information is correct in your information systems is a(n)

            issue.

A.         Accessibility

B.         Accuracy

C.         Privacy

D.         Property

 

 

 

 

 

23.       Determining whether or not corporate computers can be used for private purposes is a(n)

            issue.

A.         Accessibility

B.         Accuracy

C.         Privacy

D.         Property

 

 

 

 

 

24.       Determining whether or not you are allowed to sell your customers’ information to a telemarketer is a(n)      issue.

A.         Accessibility

B.         Accuracy

C.         Privacy

D.         Property

 

 

 

 

 

25.       Cheating is      common at business schools  tools like Turnitin.

A.         less; because of

B.         less; even with

C.         more; because of

D.         more; even with

 

 

 

 

 

26.                  -based Plagtracker is one of Turnitin’s competitors.

A.         Australian

B.         Chinese

C.         European

D.         Ukranian

 

 

 

 

 

27.       Turnitin is NOT currently used to detect plagiarism on         .

A.         admissions essays

B.         homework assignments

C.         term papers

D.         resumes

 

 

 

 

 

28.                  is a software package the helps detect plagiarism.

A.         Iparadigms

B.         NoPlagiarism

C.         Turnitin

D.         Wordprom

 

 

 

 

 

29.                  is the right to be left alone and to be free of unreasonable personal intrusions.

A.         A digital dossier

B.         Information privacy

C.         Privacy

D.         Profiling

 

 

 

30.                  is the right to determine when, and to what extent, information about you can be gathered and/or communicated to others.

A.         A digital dossier

B.         Information privacy

C.         Privacy

D.         Profiling

 

 

 

 

31.                  is an electronic profile of you and your habits.

A.         A digital dossier

B.         Information privacy

C.         Privacy

 

D.         Profiling

 

 

 

32.                  is the process of forming a digital dossier.

A.         Dossiering

B.         Information privacy

C.         Privacy

D.         Profiling

  

 

 

33.       Which of the following is NOT an example of a profiler?

A.         Acxiom

B.         Amazon

C.         ChoicePoint

D.         LexisNexis

 

 

 

 

34.       The right of privacy    absolute.

A.         can be

B.         cannot be

C.         is

D.         is not

  

 

 

35.       The      permits the company to collect personal information until the customer specifically requests that the data not be collected.

A.         digital dossier policy

B.         information privacy policy

C.         opt-in model of informed consent

D.         opt-out model of informed consent

  

 

 

36.       The      prohibits an organization from collecting any personal information unless the customer specifically authorizes it.

A.         digital dossier policy

B.         information privacy policy

C.         opt-in model of informed consent

D.         opt-out model of informed consent

 

 

 

 

37.                  is a privacy tool available to consumers that automatically communicates privacy policies between an electronic commerce web site and the visitors to that site.

A.         A digital dossier

B.         An information privacy policy

C.         Photo tagging

D.         Platform for Privacy Preferences (P3P)

  

 

 

38.       A          is an informal, personal journal that is frequently updated and intended for general public reading.

A.         blog

B.         digital dossier

C.         privacy policy

D.         profile

 

 

 

 

 

39.                  is a privacy policy guideline for Data Collection.

A.         Data should be adequate, relevant, and not excessive in relation to the business objective.

B.         Data should be kept current, where and when necessary.

C.         Data should not be disclosed for reasons incompatible with the business objective for which they are collected.

D.         Third parties should not be given access to data without the individual’s knowledge or permission, except as required by law.

 

 

 

 

40.                  countries have some form of data protection law.

A.         All

B.         Approximately 50

C.         Approximately 100

D.         Approximately 200

 

 

 

 

41.       The European Union’s data protection laws are        strict compared to the US laws.

A.         Equally

B.         Less

C.         More

D.         Non-existently

 

 

 

 

 

42.       The goal of EyeSee is to          .

A.         Catch shoplifters

B.         Improve vision

C.         Profile customers

D.         Replace sales representatives

 

 

 

 

 

43.       EyeSee is being used in which of the following countries?

A.         Australia

B.         China

C.         Europe

D.         Russia

 

 

 

 

 

44.       The use of EyeSee is a(n)        issue.

A.         Ethical

B.         Legal

C.         Ethical and legal

D.         Neither ethical nor legal

 

 

 

 

 

45.                  are/is able to track and target the same consumer across multiple devices using software algorithms.

A.         Cookies

B.         Google

C.         Tapad

D.         Web bugs

 

 

 

 

 

46.       Tapad uses a   in its data collection efforts.

A.         digital dossier policy

B.         information privacy policy

C.         opt-in model of informed consent

D.         opt-out model of informed consent

 

 

 

 

47.       Tapad specifically targets which of the following groups?

A.         Desktop advertising

B.         Mobile advertising

C.         Television advertising

D.         All of the above

 

 

 

 

48.       The      is pressuring browser companies, consumer advocates, and advertisers to establish a “Do Not Track” option for Internet users.

A.         CIA

B.         FBI

C.         FTC

D.         NSA

 

 

 

 

49.       The FTC is NOT pressuring     to establish a “Do Not Track” option for Internet users.

A.         Advertisers

B.         Browser companies

C.         Consumer advocates

 

D.         The government

 

 

 

 

50.       This smartphone app sends encrypted notes that self-destruct after a set amount of time.

A.         Burn Note

B.         Silent Circle

C.         TigerText

D.         Wickr

 

 

 

 

Question Type: True/False

 

1.         Actions that are ethical are always legal.

 

 

 

 

2.         The Sarbanes-Oxley Act in 2002 was passed to try to prevent fiascos like Enron, WorldCom, and Tyco.

 

 

 

3.         The first step in the general framework for ethics is getting the facts.

 

Section: Ethical Issues

 

 

 

 

4.         The right of privacy is absolute in the US since above all, we celebrate freedom.

 

 

 

 

5.         The opt-out model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected.

 

 

 

 

6.         Companies have the right to monitor your web surfing when you are at work.

 

 

 

 

Question Type: Fill-in-the-Blank

 

1.         Ethics refers to the principles of right and wrong that          use to make choices that guide their behavior.

 

 

 

2.         The      approach highlights the interlocking relationship that underlie all societies.

 

 

 

 

3.                    issues involve the ownership and value of information.

 

 

 

4.                    is the right to be left alone and to be free of unreasonable personal intrusion.

 

 

 

 

5.         The      model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected.

 

 

 

Question Type: Essay

 

1.         List and describe the four widely used ethical standards/frameworks. Provide an example for each one using a real-world scenario.

 

 

 

2.         Every company needs to think about how to protect their customers’ information. Using the five steps in the general framework for ethical decision making, how would you handle the situation if you were the CEO?

 

 

 

 

3.         Your university collects and maintains a great deal of information about you (and potentially your parents). Using the four general categories presented in the book, what are the issues with all this information being stored on your university’s information systems?

 

 

 

4.         List at least 5 forms of electronic surveillance that are threatening our privacy. How do these things impact our lives? How should we address these things?

 

 

 

5.         Given the global nature of our economy, what are the international aspects of privacy that we need to consider in our business dealings?

 

 

 

Option 1

Low Cost Option
Download this past answer in few clicks

12.83 USD

PURCHASE SOLUTION

Already member?


Option 2

Custom new solution created by our subject matter experts

GET A QUOTE