Why Choose Us?
0% AI Guarantee
Human-written only.
24/7 Support
Anytime, anywhere.
Plagiarism Free
100% Original.
Expert Tutors
Masters & PhDs.
100% Confidential
Your privacy matters.
On-Time Delivery
Never miss a deadline.
Alamo Colleges IS 3003 Chapter 12 1)Which of the following best describes how new information systems result in legal gray areas? They are created from sets of logical and technological rules rather than social or organizational mores
Alamo Colleges
IS 3003
Chapter 12
- 1)Which of the following best describes how new information systems result in legal gray areas?
- They are created from sets of logical and technological rules rather than social or organizational mores.
- They are implemented by technicians rather than managers.
- They result in new situations that are not covered by old laws.
- They work with networked, electronic data, which are more difficult to control than information stored manually.
-
-
-
- The introduction of new information technology has a:
- dampening effect on the discourse of business ethics.
- ripple effect raising new ethical, social, and political issues.
- beneficial effect for society as a whole, while raising dilemmas for consumers.
- waterfall effect in raising ever more complex ethical issues.
- The introduction of new information technology has a:
-
-
-
-
-
- In the information age, the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of:
- property rights and obligations.
- system quality.
- accountability and control.
- information rights and obligations.
- In the information age, the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of:
-
-
-
-
-
- In the information age, the obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within the moral dimension of:
- family and home.
- property rights and obligations.
- system quality.
- quality of life.
- In the information age, the obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within the moral dimension of:
-
-
-
-
-
- The four key technical trends responsible for current ethical stresses related to information technology are (1) doubling of computer power every 18 months, (2) data analysis advances, (3) declining data storage costs, and (4)
-
-
.
-
-
-
-
- advances in wireless networking
- international standards for data protection
- networking advances and the Internet
- increased ease in file sharing and copying
-
-
-
-
-
-
- The U.S. Department of Commerce developed a framework in order to enable U.S. businesses to legally use personal data from EU countries.
- COPPA B) P3P
- The U.S. Department of Commerce developed a framework in order to enable U.S. businesses to legally use personal data from EU countries.
-
-
C) PGP D) safe-harbor
-
-
-
- The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called:
- profiling. B) phishing.
- The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called:
-
-
C) spamming. D) targeting.
-
-
-
- NORA is a:
- profiling technology used by the EU.
- federal privacy law protecting networked data.
- new data analysis technology that finds hidden connections between data in disparate sources.
- sentencing guideline adopted in 1987 mandating stiff sentences on business executives.
- NORA is a:
-
-
-
-
-
- Which of the five moral dimensions of the information age do the central business activities of ChoicePoint raise?
- Property rights and obligations
- System quality
- Accountability and control
- Information rights and obligations
- Which of the five moral dimensions of the information age do the central business activities of ChoicePoint raise?
-
-
-
-
-
- Accepting the potential costs, duties, and obligations for the decisions you make is referred to as:
- responsibility. B) accountability.
- Accepting the potential costs, duties, and obligations for the decisions you make is referred to as:
-
-
C) liability. D) due process.
-
-
-
- The feature of political systems in which a body of laws is in place that permits individuals to recover the damages done to them by other actors, systems, or organizations is referred to as:
- accountability. B) responsibility.
- The feature of political systems in which a body of laws is in place that permits individuals to recover the damages done to them by other actors, systems, or organizations is referred to as:
-
-
C) due process. D) liability.
-
-
-
- The feature of social institutions that means mechanisms are in place to determine responsibility for an action is called:
- due process. B) accountability.
- The feature of social institutions that means mechanisms are in place to determine responsibility for an action is called:
-
-
C) the courts of appeal. D) the judicial system.
-
-
-
- The process in law-governed societies in which laws are known and understood and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly is called:
- liability. B) due process.
- The process in law-governed societies in which laws are known and understood and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly is called:
-
-
C) the courts of appeal. D) accountability.
-
-
-
- Which of the following is not one of the five steps discussed in the chapter as a process for analyzing an ethical issue?
- Assign responsibility.
- Identify the stakeholders.
- Identify the options you can reasonably take.
- Identify and clearly describe the facts.
- Which of the following is not one of the five steps discussed in the chapter as a process for analyzing an ethical issue?
-
-
-
-
-
- A colleague of yours frequently takes for his own personal use small amounts of office supplies, noting that the loss to the company is minimal. You counter that if everyone were to take the office supplies, the loss would no longer be minimal. Your rationale expresses which historical ethical principle?
- Kant's Categorical Imperative
- The Golden Rule
- The Risk Aversion Principle
- The "No free lunch" rule
- A colleague of yours frequently takes for his own personal use small amounts of office supplies, noting that the loss to the company is minimal. You counter that if everyone were to take the office supplies, the loss would no longer be minimal. Your rationale expresses which historical ethical principle?
-
-
-
-
-
- A classic ethical dilemma is the hypothetical case of a man stealing from a grocery store in order to feed his starving family. If you used the Utilitarian Principle to evaluate this situation, you might argue that stealing the food is:
- acceptable, because the grocer suffers the least harm.
- acceptable, because the higher value is the survival of the family.
- wrong, because the man would not want the grocery to steal from him.
- wrong, because if everyone were to do this, the concept of personal property is defeated.
- A classic ethical dilemma is the hypothetical case of a man stealing from a grocery store in order to feed his starving family. If you used the Utilitarian Principle to evaluate this situation, you might argue that stealing the food is:
-
-
-
-
-
- Immanuel Kant's Categorical Imperative states that:
- if an action cannot be taken repeatedly, then it is not right to be taken at any time.
- one should take the action that produces the least harm or incurs the least cost.
- one can put values in rank order and understand the consequences of various courses of action.
- if an action is not right for everyone to take, it is not right for anyone to take.
- Immanuel Kant's Categorical Imperative states that:
-
-
-
-
-
- The ethical "no free lunch" rule states that:
- if an action cannot be taken repeatedly, then it is not right to be taken at any time.
- one should take the action that produces the least harm or incurs the least cost.
- one can put values in rank order and understand the consequences of various courses of action.
- everything is owned by someone else, and that the creator wants compensation for this work.
- The ethical "no free lunch" rule states that:
-
-
-
-
-
- According to the , you should take the action that produces the least harm.
- Categorical Imperative
- Risk Aversion Principle
- Utilitarian Principle
- Golden Rule
- According to the , you should take the action that produces the least harm.
-
-
-
-
-
- Which U.S. act restricts the information the federal government can collect and regulates what they can do with the information?
- Privacy Act of 1974
- Gramm-Leach-Bliley Act of 1999
- Freedom of Information Act
- HIPAA of 1996
- Which U.S. act restricts the information the federal government can collect and regulates what they can do with the information?
-
-
-
-
-
- FIP principles are based on the notion of the:
- accountability of the record holder.
- responsibility of the record holder.
- mutuality of interest between the record holder and the individual.
- privacy of the individual.
- FIP principles are based on the notion of the:
-
-
-
-
-
- The Federal Trade Commission FIP principle of Notice/Awareness states that:
- customers must be allowed to choose how their information will be used for secondary purposes other than the supporting transaction.
- data collectors must take responsible steps to assure that consumer information is accurate and secure from unauthorized use.
- there is a mechanism in place to enforce FIP principles.
- Web sites must disclose their information practices before collecting data.
- The Federal Trade Commission FIP principle of Notice/Awareness states that:
-
-
-
-
-
- Which of the following U.S. laws gives patients access to personal medical records and the right to authorize
-
-
how this information can be used or disclosed?
-
-
-
-
- HIPAA
- Gramm-Leach-Bliley Act
- Privacy Protection Act
- Freedom of Information Act
-
-
-
-
-
-
- European privacy protection is than in the United States.
- less far-reaching B) less liable to laws
- European privacy protection is than in the United States.
-
-
C) much less stringent D) much more stringent
-
-
-
- U.S. businesses are allowed to use personal data from EU countries if they:
- have informed consent.
- create a safe harbor.
- develop equivalent privacy protection policies.
- make their privacy protection policies publicly available.
- U.S. businesses are allowed to use personal data from EU countries if they:
-
-
-
-
-
- When a cookie is created during a Web site visit, it is stored:
- on the Web site computer.
- on the visitor's computer.
- on the ISP's computer.
- in a Web directory.
- When a cookie is created during a Web site visit, it is stored:
-
-
-
-
-
- The Online Privacy Alliance:
- encourages self-regulation to develop a set of privacy guidelines for its members.
- protects user privacy during interactions with Web sites.
- has established technical guidelines for ensuring privacy.
- is a government agency regulating the use of customer information.
- The Online Privacy Alliance:
-
-
-
-
-
- A(n) model of informed consent permits the collection of personal information until the consumer specifically requests that the data not be collected.
- opt-in B) opt-out
- A(n) model of informed consent permits the collection of personal information until the consumer specifically requests that the data not be collected.
-
-
C) P3P D) PGP
-
-
-
- P3P stands for:
- Privacy for Personal Protection.
- Platform for Privacy Preferences.
- Personal Privacy Policy.
- Personal Privacy Protection.
- P3P stands for:
-
-
-
-
-
- The P3P standard is concerned with:
- controlling pop-up ads based on user profiles and preventing ads from collecting or sending information.
- allowing users to surf the Web anonymously.
- scrambling data so that it can't be read.
- blocking or limiting cookies.
- The P3P standard is concerned with:
-
-
-
-
-
- The limitation of trade secret protection for software is that it is difficult to prevent the ideas in the work from falling into the public domain when:
- the courts become involved.
- hackers are able to break into the source code.
- the software is widely distributed.
- a new version of the software is released.
- The limitation of trade secret protection for software is that it is difficult to prevent the ideas in the work from falling into the public domain when:
-
-
-
-
-
- Intellectual property can best be described as:
- intangible property created by individuals or corporations.
- unique creative work or ideas.
- tangible or intangible property created from a unique idea.
- Intellectual property can best be described as:
-
-
-
-
-
-
- the expression of an intangible idea.
-
-
-
-
-
-
- What legal mechanism protects the owners of intellectual property from having their work copied by others?
- Patent protection B) Intellectual property law
- What legal mechanism protects the owners of intellectual property from having their work copied by others?
-
-
C) Copyright law D) Fair Use Doctrine
-
-
-
- "Look and feel" copyright infringement lawsuits are concerned with:
- the distinction between tangible and intangible ideas.
- the distinction between an idea and its expression.
- using the graphical elements of another product.
- using the creative elements of another product.
- "Look and feel" copyright infringement lawsuits are concerned with:
-
-
-
-
-
- The strength of patent protection is that it:
- puts the strength of law behind copyright.
- allows protection from Internet theft of ideas put forth publicly.
- is easy to define.
- grants a monopoly on underlying concepts and ideas.
- The strength of patent protection is that it:
-
-
-
-
-
- One of the difficulties of patent protection is:
- that only the underlying ideas are protected.
- digital media cannot be patented.
- preventing the ideas from falling into public domain.
- the years of waiting to receive it.
- One of the difficulties of patent protection is:
-
-
-
-
-
- Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology- based protections of copyrighted materials?
- Digital Millennium Copyright Act
- Privacy Act
- Freedom of Information Act
- Electronic Communications Privacy Act
- Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology- based protections of copyrighted materials?
-
-
-
-
-
- In general, it is very difficult to hold software producers liable for their software products when those products are considered to be:
- part of a machine. B) similar to books.
- In general, it is very difficult to hold software producers liable for their software products when those products are considered to be:
-
-
C) services. D) artistic expressions.
-
-
-
- are not held liable for the messages they transmit.
- Regulated common carriers
- Private individuals
- Organizations and businesses
- Elected officials
- are not held liable for the messages they transmit.
-
-
-
-
-
- It is not feasible for companies to produce error-free software because:
- any programming code is susceptible to error.
- it is too expensive create perfect software.
- errors can be introduced in the maintenance stage of development.
- any software of any complexity will have errors.
- It is not feasible for companies to produce error-free software because:
-
-
-
-
-
- The most common source of business system failure is:
- software bugs. B) software errors.
- The most common source of business system failure is:
-
-
C) hardware or facilities failures. D) data quality.
-
-
-
- Which of the following is not one of the three principal sources of poor system performance?
- Software bugs and errors
- Hardware or facility failures caused by natural or other causes
- Insufficient integration with external systems
- Which of the following is not one of the three principal sources of poor system performance?
-
-
-
-
-
-
- Poor input data quality
-
-
-
-
-
-
- The "do anything anywhere" computing environment can:
- make work environments much more pleasant.
- create economies of efficiency.
- centralize power at corporate headquarters.
- blur the traditional boundaries between work and family time.
- The "do anything anywhere" computing environment can:
-
-
-
-
-
- The practice of spamming has been growing because:
- telephone solicitation is no longer legal.
- it is good advertising practice and brings in many new customers.
- it helps pay for the Internet.
- it is so inexpensive and can reach so many people.
- The practice of spamming has been growing because:
-
-
-
-
-
- The U.S. CAN-SPAM Act of 2003:
- makes spamming illegal.
- requires spammers to identify themselves.
- has dramatically cut down spamming.
- does not override state anti-spamming laws.
- The U.S. CAN-SPAM Act of 2003:
-
-
-
-
-
- Which of the five moral dimensions of the information age does spamming raise?
- Quality of life
- System quality
- Accountability and control
- Information rights and obligations
- Which of the five moral dimensions of the information age does spamming raise?
-
-
-
-
-
- Re-designing and automating business processes can be seen as a double-edged sword because:
- increases in efficiency may be accompanied by job losses.
- increases in efficiency may be accompanied by poor data quality.
- support for middle-management decision making may be offset by poor data quality.
- reliance on technology results in the loss of hands-on knowledge.
- Re-designing and automating business processes can be seen as a double-edged sword because:
-
-
-
-
-
- The term " divide" refers to large disparities in access to computers and the Internet among different social groups and different locations.
- computer B) technology
- The term " divide" refers to large disparities in access to computers and the Internet among different social groups and different locations.
-
-
C) digital D) electronic
-
-
-
- CVS refers to:
- eyestrain related to computer display screen use.
- carpal vision syndrome.
- wrist injuries brought about by incorrect hand position when using a keyboard.
- stress induced by technology.
- CVS refers to:
-
-
-
-
-
- can be induced by tens of thousands of repetitions under low-impact loads.
- CTS B) CVS
- can be induced by tens of thousands of repetitions under low-impact loads.
-
-
- RSI D) Technostress
Expert Solution
PFA
Archived Solution
You have full access to this solution. To save a copy with all formatting and attachments, use the button below.
For ready-to-submit work, please order a fresh solution below.





