Top Posters
Since Sunday
5
a
5
k
5
c
5
B
5
l
5
C
4
s
4
a
4
t
4
i
4
r
4
A free membership is required to access uploaded content. Login or Register.

Test bank for Management Information Systems

Uploaded: 6 years ago
Contributor: iFISH
Category: Management
Type: Solutions
Rating: N/A
Helpful
Unhelpful
Filename:   laudon_04.doc (113.5 kB)
Page Count: 29
Credit Cost: 1
Views: 158
Last Download: N/A
Description
Chapter 2
7th edition
Transcript
Laudon/Laudon/Brabston, Management Information Systems, Seventh Canadian Edition Chapter 4 Social, Ethical, and Legal Issues in the Digital Firm 1) Even in today's legal climate, there is little incentive for firms to cooperate with prosecutors investigating financial crimes at their firm. Answer: FALSE Diff: 2 Page Ref: 102 AACSB: Use of information technology CASE: Comprehension Objective: 4.1 2) Advances in data storage have made routine violation of individual privacy more difficult. Answer: FALSE Diff: 1 Page Ref: 104 AACSB: Use of information technology CASE: Comprehension Objective: 4.1 3) The last step in analyzing an ethical issue should be to identify the stakeholders—people who have a vested interest in the outcome of the decision. Answer: FALSE Diff: 2 Page Ref: 107 AACSB: Ethical understanding and reasoning abilities CASE: Comprehension Objective: 4.2 4) Professionals take on special rights and obligations because of their special claims to knowledge, wisdom, and respect. Answer: TRUE Diff: 1 Page Ref: 108 AACSB: Ethical understanding and reasoning abilities CASE: Comprehension Objective: 4.2 5) Privacy is the right to be left alone when you want to be, without surveillance or interference from other individuals or organizations. Answer: TRUE Diff: 1 Page Ref: 109 AACSB: Reflective thinking skills CASE: Comprehension Objective: 4.3 6) Most American and European privacy law is based on a set of five principles called COPPA. Answer: FALSE Diff: 2 Page Ref: 110 AACSB: Reflective thinking skills CASE: Comprehension Objective: 4.3 7) Spyware is software that comes hidden in downloaded applications and can track your online movements. Answer: TRUE Diff: 2 Page Ref: 112 AACSB: Use of information technology CASE: Comprehension Objective: 4.3 8) Most Internet businesses do very little to protect the privacy of their customers. Answer: TRUE Diff: 2 Page Ref: 112 AACSB: Use of information technology CASE: Comprehension Objective: 4.3 9) Data gathered by online behavioral tracking firms is limited to the user's behavior on a single Web site. Answer: FALSE Diff: 2 Page Ref: 99 AACSB: Use of information technology CASE: Comprehension Objective: 4.1 10) Copyright is the legal protection afforded intellectual property, such as a song, book, or video game. Answer: TRUE Diff: 2 Page Ref: 116 AACSB: Reflective thinking skills CASE: Comprehension Objective: 4.3 11) In white-collar fraud, information systems are most typically used as a means to hide financial evidence of crimes. Answer: TRUE Diff: 3 Page Ref: 102 AACSB: Reflective thinking skills CASE: Comprehension Objective: 4.1 12) The Copyright Office began registering software programs in the 1990s. Answer: FALSE Diff: 2 Page Ref: 116 AACSB: Reflective thinking skills CASE: Comprehension Objective: 4.3 13) The drawback to copyright protection is that the underlying ideas behind the work are not protected, only their reproduction in a product. Answer: TRUE Diff: 2 Page Ref: 116 AACSB: Reflective thinking skills CASE: Comprehension Objective: 4.3 14) According to the courts, in the creation of software, unique concepts, general functional features, and even colors are protectable by copyright law. Answer: FALSE Diff: 2 Page Ref: 116 AACSB: Reflective thinking skills CASE: Comprehension Objective: 4.3 15) The key concepts in patent law are originality, novelty, and value. Answer: FALSE Diff: 3 Page Ref: 117 AACSB: Reflective thinking skills CASE: Comprehension Objective: 4.3 16) Despite the passage of several laws defining and addressing computer crime, accessing a computer system without authorization is not yet a federal crime. Answer: FALSE Diff: 2 Page Ref: 121 AACSB: Reflective thinking skills CASE: Comprehension Objective: 4.3 17) Any unsolicited e-mail is legally considered spam. Answer: FALSE Diff: 1 Page Ref: 122 AACSB: Use of information technology CASE: Comprehension Objective: 4.3 18) The European Parliament has passed a ban on unsolicited commercial messaging. Answer: TRUE Diff: 2 Page Ref: 122 AACSB: Reflective thinking skills CASE: Comprehension Objective: 4.3 19) The most common type of computer-related RSI is CTS. Answer: TRUE Diff: 1 Page Ref: 124 AACSB: Use of information technology CASE: Comprehension Objective: 4.4 20) Technostress is a computer-related malady whose symptoms include fatigue. Answer: TRUE Diff: 2 Page Ref: 124 AACSB: Use of information technology CASE: Comprehension Objective: 4.4 21) Ethics refers to the principles of right and wrong that individuals, acting as free moral agents, use to make choices to guide their behaviours. Answer: TRUE Diff: 2 Page Ref: 102 AACSB: Reflective thinking skills CASE: Content Objective: 4.1 22) Internet and digital firm technologies make it more difficult than ever to assemble, integrate, and distribute information, unleashing new concerns about the appropriate use of customer information, the protection of personal privacy, and the protection of intellectual property. Answer: FALSE Diff: 2 Page Ref: 102 AACSB: Reflective thinking skills CASE: Content Objective: 4.1 23) Responsibility means that you accept the potential costs, duties, and obligations for the decisions you make. Answer: TRUE Diff: 2 Page Ref: 106 AACSB: Reflective thinking skills CASE: Content Objective: 4.2 24) In addition, in 2000, Parliament passed the Personal Technology Protection and Electronic Documents Act (PTPEDA), Canada’s modern privacy law. Answer: FALSE Diff: 2 Page Ref: 109 AACSB: Reflective thinking skills CASE: Content Objective: 4.3 25) In Europe, privacy protection is much weaker than in North America. Answer: FALSE Diff: 2 Page Ref: 110 AACSB: Reflective thinking skills CASE: Content Objective: 4.3 26) Informed consent can be defined as consent given without knowledge of all the facts needed to make a rational decision. Answer: FALSE Diff: 2 Page Ref: 110 AACSB: Reflective thinking skills CASE: Content Objective: 4.3 27) Canada’s privacy legislation meets the standards of the European Directive on Data Protection. Answer: TRUE Diff: 2 Page Ref: 110 AACSB: Reflective thinking skills CASE: Content Objective: 4.3 28) Cookies are small text files deposited on a computer hard drive when a user visits Web sites. Answer: TRUE Diff: 2 Page Ref: 111 AACSB: Reflective thinking skills CASE: Content Objective: 4.3 29) Web sites using cookie technology can directly obtain visitors’ names and addresses. Answer: FALSE Diff: 2 Page Ref: 111 AACSB: Reflective thinking skills CASE: Content Objective: 4.3 30) Which of the following best describes how new information systems result in legal gray areas? A) They work with networked, electronic data, which are more difficult to control than information stored manually. B) They result in new situations that are not covered by old laws. C) They are implemented by technicians rather than managers. D) They are created from sets of logical and technological rules rather than social or organizational mores. Answer: B Diff: 2 Page Ref: 102 AACSB: Ethical understanding and reasoning abilities CASE: Evaluation in terms of assess Objective: 4.1 31) The introduction of new information technology has a A) dampening effect on the discourse of business ethics. B) ripple effect raising new ethical, social, and political issues. C) beneficial effect for society as a whole, while raising dilemmas for consumers. D) waterfall effect in raising ever more complex ethical issues. Answer: B Diff: 2 Page Ref: 102 AACSB: Ethical understanding and reasoning abilities CASE: Comprehension Objective: 4.1 32) In the information age, the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of A) property rights and obligations. B) system quality. C) accountability and control. D) information rights and obligations. Answer: A Diff: 1 Page Ref: 102 AACSB: Ethical understanding and reasoning abilities CASE: Comprehension Objective: 4.1 33) In the information age, the obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within the moral dimension of A) family and home. B) property rights and obligations. C) system quality. D) quality of life. Answer: D Diff: 2 Page Ref: 103 AACSB: Ethical understanding and reasoning abilities CASE: Comprehension Objective: 4.1 34) All of the following are current key technology trends raising ethical issues except A) data storage improvements. B) data analysis advancements. C) increase in multimedia quality. D) increase in use of mobile devices. Answer: C Diff: 1 Page Ref: 104 AACSB: Reflective thinking skills CASE: Comprehension Objective: 4.1 35) The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called A) profiling. B) phishing. C) spamming. D) targeting. Answer: A Diff: 1 Page Ref: 104 AACSB: Reflective thinking skills CASE: Comprehension Objective: 4.1 36) Which of the five moral dimensions of the information age do the central business activities of ChoicePoint raise? A) property rights and obligations B) system quality C) accountability and control D) information rights and obligations Answer: D Diff: 3 Page Ref: 105 AACSB: Ethical understanding and reasoning abilities CASE: Analysis in terms of appraise Objective: 4.1 37) NORA is a A) profiling technology used by the EU. B) federal privacy law protecting networked data. C) data analysis technology that finds hidden connections between data in disparate sources. D) sentencing guideline adopted in 1987 mandating stiff sentences on business executives. Answer: C Diff: 2 Page Ref: 105 AACSB: Reflective thinking skills CASE: Comprehension Objective: 4.1 38) Accepting the potential costs, duties, and obligations for the decisions you make is referred to as A) responsibility. B) accountability. C) liability. D) due process. Answer: A Diff: 2 Page Ref: 105 AACSB: Reflective thinking skills CASE: Comprehension Objective: 4.2 39) The process in law-governed societies in which laws are known and understood and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly is called A) liability. B) due process. C) the courts of appeal. D) accountability. Answer: B Diff: 2 Page Ref: 113 AACSB: Reflective thinking skills CASE: Comprehension Objective: 4.2 40) The feature of social institutions that means mechanisms are in place to determine responsibility for an action is called A) due process. B) accountability. C) the courts of appeal. D) the judicial system. Answer: B Diff: 2 Page Ref: 113 AACSB: Reflective thinking skills CASE: Comprehension Objective: 4.2 41) Which of the following is not one of the five steps discussed in the chapter as a process for analyzing an ethical issue? A) Assign responsibility. B) Identify the stakeholders. C) Identify the options you can reasonably take. D) Identify and clearly describe the facts. Answer: A Diff: 2 Page Ref: 106 AACSB: Ethical understanding and reasoning abilities CASE: Comprehension Objective: 4.2 42) A colleague of yours frequently takes for his own personal use small amounts of office supplies, noting that the loss to the company is minimal. You counter that if everyone were to take the office supplies, the loss would no longer be minimal. Your rationale expresses which historical ethical principle? A) Kant's Categorical Imperative B) the Golden Rule C) the Risk Aversion Principle D) the "No free lunch" rule Answer: A Diff: 3 Page Ref: 108 AACSB: Ethical understanding and reasoning abilities CASE: Analysis in terms of categorize Objective: 4.2 43) Immanuel Kant's Categorical Imperative states that A) if an action cannot be taken repeatedly, then it is not right to be taken at any time. B) one should take the action that produces the least harm or incurs the least cost. C) one can put values in rank order and understand the consequences of various courses of action. D) if an action is not right for everyone to take, it is not right for anyone to take. Answer: D Diff: 2 Page Ref: 108 AACSB: Ethical understanding and reasoning abilities CASE: Comprehension Objective: 4.2 44) A classic ethical dilemma is the hypothetical case of a man stealing from a grocery store in order to feed his starving family. If you used the Utilitarian Principle to evaluate this situation, you might argue that stealing the food is A) acceptable, because the grocer suffers the least harm. B) acceptable, because the higher value is the survival of the family. C) wrong, because the man would not want the grocer to steal from him. D) wrong, because if everyone were to do this, the concept of personal property is defeated. Answer: B Diff: 2 Page Ref: 108 AACSB: Ethical understanding and reasoning abilities CASE: Analysis in terms of categorize Objective: 4.2 45) The ethical "no free lunch" rule states that A) if an action cannot be taken repeatedly, then it is not right to be taken at any time. B) one should take the action that produces the least harm or incurs the least cost. C) one can put values in rank order and understand the consequences of various courses of action. D) everything is owned by someone else, and that the creator wants compensation for this work. Answer: D Diff: 2 Page Ref: 108 AACSB: Ethical understanding and reasoning abilities CASE: Comprehension Objective: 4.2 46) According to the ________, you should take the action that produces the least harm. A) Categorical Imperative B) Risk Aversion Principle C) Utilitarian Principle D) Golden Rule Answer: B Diff: 2 Page Ref: 108 AACSB: Ethical understanding and reasoning abilities CASE: Comprehension Objective: 4.2 47) European privacy protection is ________ than in the United States. A) less far-reaching B) less liable to laws C) much less stringent D) much more strict Answer: D Diff: 2 Page Ref: 110 AACSB: Reflective thinking skills CASE: Comprehension Objective: 4.3 48) U.S. businesses are allowed to use personal data from EU countries if they A) have informed consent. B) create a safe harbor. C) develop equivalent privacy protection policies. D) make their privacy protection policies publicly available. Answer: C Diff: 2 Page Ref: 111 AACSB: Reflective thinking skills CASE: Comprehension Objective: 4.3 49) When a cookie is created during a Web site visit, it is stored A) on the Web site computer. B) on the visitor's computer. C) on the ISP's computer. D) in a Web directory. Answer: B Diff: 2 Page Ref: 111 AACSB: Use of information technology CASE: Comprehension Objective: 4.3 50) Flash cookies are different from ordinary cookies in that they A) are installed only at the user's request. B) are not stored on the user's computer. C) cannot be easily detected or deleted. D) monitor the user's behavior at a Web site. Answer: C Diff: 2 Page Ref: 112 AACSB: Analytic skills CASE: Analysis in terms of compare Objective: 4.3 51) The Online Privacy Alliance A) encourages self-regulation to develop a set of privacy guidelines for its members. B) protects user privacy during interactions with Web sites. C) has established technical guidelines for ensuring privacy. D) is a government agency regulating the use of customer information. Answer: A Diff: 2 Page Ref: 112 AACSB: Reflective thinking skills CASE: Comprehension Objective: 4.3 52) A(n) ________ model of informed consent permits the collection of personal information until the consumer specifically requests that the data not be collected. A) opt-in B) opt-out C) P3P D) PGP Answer: B Diff: 2 Page Ref: 112 AACSB: Reflective thinking skills CASE: Comprehension Objective: 4.3 53) Which of the following statements about trade secrets is not true? A) Trade secret protections vary from state to state. B) Any intellectual product, regardless of its purpose, can be classified as a trade secret. C) Software that contains unique elements can be claimed as a trade secret. D) Trade secret law protects the actual ideas in a product. Answer: B Diff: 2 Page Ref: 124 AACSB: Analytic skills CASE: Analysis in terms of appraise Objective: 4.3 54) Intellectual property can best be described as A) intangible property created by individuals or corporations. B) unique creative work or ideas. C) tangible or intangible property created from a unique idea. D) the expression of an intangible idea. Answer: A Diff: 3 Page Ref: 113 AACSB: Reflective thinking skills CASE: Comprehension Objective: 4.3 55) What legal mechanism protects the owners of intellectual property from having their work copied by others? A) patent protection B) intellectual property law C) copyright law D) Fair Use Doctrine Answer: C Diff: 2 Page Ref: 125 AACSB: Reflective thinking skills CASE: Comprehension Objective: 4.3 56) "Look and feel" copyright infringement lawsuits are concerned with A) the distinction between tangible and intangible ideas. B) the distinction between an idea and its expression. C) using the graphical elements of another product. D) using the creative elements of another product. Answer: B Diff: 2 Page Ref: 116 AACSB: Reflective thinking skills CASE: Comprehension Objective: 4.3 57) The strength of patent protection is that it A) puts the strength of law behind copyright. B) allows protection from Internet theft of ideas put forth publicly. C) is easy to define. D) grants a monopoly on underlying concepts and ideas. Answer: D Diff: 3 Page Ref: 117 AACSB: Reflective thinking skills CASE: Comprehension Objective: 4.3 58) One of the difficulties of patent protection is A) that only the underlying ideas are protected. B) digital media cannot be patented. C) preventing the ideas from falling into public domain. D) the years of waiting to receive it. Answer: D Diff: 3 Page Ref: 117 AACSB: Reflective thinking skills CASE: Comprehension Objective: 4.3 59) Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials? A) Digital Millennium Copyright Act B) Privacy Act C) Freedom of Information Act D) Electronic Communications Privacy Act Answer: A Diff: 3 Page Ref: 118 AACSB: Reflective thinking skills CASE: Comprehension Objective: 4.3 60) In general, it is very difficult to hold software producers liable for their software products when those products are considered to be A) part of a machine. B) similar to books. C) services. D) artistic expressions. Answer: B Diff: 2 Page Ref: 119 AACSB: Reflective thinking skills CASE: Comprehension Objective: 4.1 61) ________ are not held liable for the messages they transmit. A) Regulated common carriers B) Private individuals C) Organizations and businesses D) Elected officials Answer: A Diff: 2 Page Ref: 119 AACSB: Reflective thinking skills CASE: Comprehension Objective: 4.1 62) It is not feasible for companies to produce error-free software because A) any programming code is susceptible to error. B) it is too expensive to create perfect software. C) errors can be introduced in the maintenance stage of development. D) any software of any complexity will have errors. Answer: B Diff: 2 Page Ref: 119 AACSB: Reflective thinking skills CASE: Comprehension Objective: 4.1 63) The most common source of business system failure is A) software bugs. B) software errors. C) hardware or facilities failures. D) data quality. Answer: D Diff: 2 Page Ref: 119 AACSB: Reflective thinking skills CASE: Comprehension Objective: 4.1 64) The "do anything anywhere" computing environment can A) make work environments much more pleasant. B) create economies of efficiency. C) centralize power at corporate headquarters. D) blur the traditional boundaries between work and family time. Answer: D Diff: 2 Page Ref: 120 AACSB: Reflective thinking skills CASE: Comprehension Objective: 4.3 65) The practice of spamming has been growing because A) telephone solicitation is no longer legal. B) it is good advertising practice and brings in many new customers. C) it helps pay for the Internet. D) it is so inexpensive and can reach so many people. Answer: D Diff: 2 Page Ref: 122 AACSB: Reflective thinking skills CASE: Comprehension Objective: 4.3 66) Which of the five moral dimensions of the information age does spamming raise? A) quality of life B) system quality C) accountability and control D) information rights and obligations Answer: A Diff: 2 Page Ref: 122 AACSB: Ethical understanding and reasoning abilities CASE: Evaluation in terms of assess Objective: 4.3 67) Re-designing and automating business processes can be seen as a double-edged sword because A) increases in efficiency may be accompanied by job losses. B) increases in efficiency may be accompanied by poor data quality. C) support for middle-management decision making may be offset by poor data quality. D) reliance on technology results in the loss of hands-on knowledge. Answer: A Diff: 2 Page Ref: 123 AACSB: Ethical understanding and reasoning abilities CASE: Evaluation in terms of assess Objective: 4.1 68) A tiny software object embedded in a Web page and used by tracking programs to monitor online user behavior is called A) spyware. B) a super cookie. C) a Web beacon. D) a cookie. Answer: C Diff: 1 Page Ref: 112 AACSB: Reflective thinking skills CASE: Comprehension Objective: 4.3 69) ________ can be induced by tens of thousands of repetitions under low-impact loads. A) CTS B) CVS C) RSI D) Technostress Answer: C Diff: 2 Page Ref: 125 AACSB: Reflective thinking skills CASE: Comprehension Objective: 4.3 70) “More organizations depend on computer systems for critical operations”, this impact is the result of what computing trend? A) Computing power doubles every 18 months B) Data storage costs rapidly decline C) Data analysis advances D) Networking advances Answer: A Diff: 2 Page Ref: 104 AACSB: Analytic skills CASE: Analysis Objective: 4.1 71) “Organizations can easily maintain detailed databases on individuals”, this impact is the result of what computing trend? A) Computing power doubles every 18 months B) Data storage costs rapidly decline C) Data analysis advances D) Networking advances Answer: B Diff: 2 Page Ref: 104 AACSB: Analytic skills CASE: Analysis Objective: 4.1 72) “Companies can analyze vast quantities of data gathered on individuals to develop detailed profiles of individual behaviour”, this impact is the result of what computing trend? A) Computing power doubles every 18 months B) Data storage costs rapidly decline C) Data analysis advances D) Networking advances Answer: C Diff: 2 Page Ref: 104 AACSB: Analytic skills CASE: Analysis Objective: 4.1 73) “Copying data from one location to another and accessing personal data from remote locations are both much easier”, this impact is the result of what computing trend? A) Computing power doubles every 18 months B) Data storage costs rapidly decline C) Data analysis advances D) Networking advances Answer: D Diff: 2 Page Ref: 104 AACSB: Analytic skills CASE: Analysis Objective: 4.1 74) ______________________in Canada is one of the principal means of protecting computer software in Canada. A) PIPEDA law B) FOIP law C) Patent law D) Copyright law Answer: D Diff: 2 Page Ref: 116 AACSB: Analytic skills CASE: Analysis Objective: 4.3 75) ______________________ grants the owner an exclusive monopoly on the ideas behind an invention for between 17 and 20 years. A) The Fair Use Doctrine B) FOIP C) A patent D) A copyright Answer: C Diff: 2 Page Ref: 116 AACSB: Analytic skills CASE: Analysis Objective: 4.3 76) ______________________ is the commission of illegal acts through the use of a computer or against a computer system. A) Computer misconduct B) Computer crime C) Computer abuse D) Computer violence Answer: B Diff: 2 Page Ref: 121 AACSB: Analytic skills CASE: Analysis Objective: 4.3 77) ______________________ is the commission of acts involving a computer that may not be illegal but that are considered unethical. A) Computer misconduct B) Computer crime C) Computer abuse D) Computer violence Answer: C Diff: 2 Page Ref: 121 AACSB: Analytic skills CASE: Analysis Objective: 4.3 78) Several studies, including at least two by Statistics Canada, have found that _____________________in Canada are less likely to have computers or online Internet access. A) old and minority groups B) poor and majority groups C) poor and main stream groups D) poor and minority groups Answer: D Diff: 2 Page Ref: 123 AACSB: Analytic skills CASE: Analysis Objective: 4.3 79) ________________________ refers to any eyestrain condition related to display screen use in desktop computers, laptops, e-readers, smartphones, and handheld video games. A) Computer vision syndrome (CVS) B) Technostress C) Carpal tunnel syndrome (CTS) D) Compustress Answer: A Diff: 2 Page Ref: 126 AACSB: Analytic skills CASE: Analysis Objective: 4.3 80) The newest computer-related malady is _________________________which is stress induced by computer use. Its symptoms include aggravation, hostility toward humans, impatience, and fatigue. A) Computer vision syndrome (CVS) B) Technostress C) Carpal tunnel syndrome (CTS) D) Compustress Answer: B Diff: 2 Page Ref: 126 AACSB: Analytic skills CASE: Analysis Objective: 4.3 81) _______________________ extends the concept of responsibility further to the area of laws; it is a feature of political systems in which a body of laws is in place that permits individuals to recover the damages done to them by other actors, systems, or organizations. A) Due process B) Liability C) Responsibility D) Accountability Answer: B Diff: 2 Page Ref: 106 AACSB: Analytic skills CASE: Analysis Objective: 4.2 82) The principles of right and wrong that can be used by individuals acting as free moral agents to make choices to guide their behavior are called ________. Answer: ethics Diff: 1 Page Ref: 102 AACSB: Reflective thinking skills CASE: Comprehension Objective: 4.1 83) ________ refers to the existence of laws that permit individuals to recover damages done to them by other actors, systems, or organizations. Answer: Liability Diff: 2 Page Ref: 106 AACSB: Reflective thinking skills CASE: Comprehension Objective: 4.2 84) The ethical principle called ________ asks you to put yourself in the place of others, and think of yourself as the object of the decision. Answer: the Golden Rule Diff: 3 Page Ref: 107 AACSB: Ethical understanding and reasoning abilities CASE: Comprehension Objective: 4.2 85) Descartes' rule of change, that if an action cannot be taken repeatedly, it is not right to take at all, is also known as the ________ rule. Answer: slippery-slope Diff: 2 Page Ref: 108 AACSB: Ethical understanding and reasoning abilities CASE: Comprehension Objective: 4.2 86) ________ is permission given with knowledge of all the facts needed to make a rational decision. Answer: Informed consent Diff: 2 Page Ref: 108 AACSB: Reflective thinking skills CASE: Comprehension Objective: 4.3 87) A wide disparity in the ability of different social groups to access computers and the Internet is referred to as ________. Answer: digital divide, the digital divide Diff: 2 Page Ref: 123 AACSB: Reflective thinking skills CASE: Comprehension Objective: 4.3 88) Advertisers use ________ targeting in order to display more relevant ads based on user's search and browsing history. Answer: behavioral Diff: 2 Page Ref: 100 AACSB: Reflective thinking skills CASE: Comprehension Objective: 4.1 89) The ________ model prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use. Answer: opt-in Diff: 2 Page Ref: 112 AACSB: Reflective thinking skills CASE: Comprehension Objective: 4.3 90) A(n) ________ grants the owner an exclusive monopoly on the ideas behind an invention for 20 years. Answer: patent Diff: 2 Page Ref: 116 AACSB: Reflective thinking skills CASE: Comprehension Objective: 4.3 91) The commission of acts involving the use of a computer that may not be illegal but are considered unethical is called computer ________. Answer: abuse Diff: 2 Page Ref: 122 AACSB: Reflective thinking skills CASE: Comprehension Objective: 4.1 92) ____________________ means that you accept the potential costs, duties, and obligations for the decisions you make. Answer: Responsibility Diff: 2 Page Ref: 106 AACSB: Use of information technology CASE: Content Objective: 4.2 93) The _______________________________________________ is Canada’s modern privacy law. Answer: Personal Information Protection and Electronic Documents Act (PIPEDA) Diff: 2 Page Ref: 109 AACSB: Use of information technology CASE: Content Objective: 4.3 94) _______________________ can be defined as consent given with knowledge of all the facts needed to make a rational decision. Answer: Informed consent Diff: 2 Page Ref: 110 AACSB: Use of information technology CASE: Content Objective: 4.3 95) _______________________ are small text files deposited on a computer hard drive when a user visits Web sites and identify the visitor’s Web browser software and track visits to the Web site. Answer: Cookies Diff: 2 Page Ref: 111 AACSB: Use of information technology CASE: Content Objective: 4.3 96) _______________________are tiny software programs that keep a record of users’ online clickstream and report this data back to whoever owns the tracking file invisibly embedded in e-mail messages and Web pages that are designed to monitor the behaviour of the user visiting a Web site or sending e-mail. Answer: Web beacons Diff: 2 Page Ref: 112 AACSB: Use of information technology CASE: Content Objective: 4.3 97) _______________________ is considered to be intangible property created by individuals or corporations. Answer: Intellectual property Diff: 2 Page Ref: 113 AACSB: Use of information technology CASE: Content Objective: 4.3 98) One of the capabilities of Internet communication is the ability of the individual to appear essentially anonymous by using made-up user names. Is anonymity the same thing as privacy, and should it be a right? What ethical issues are raised by increased anonymity? Answer: Student answers will vary, but should include a definition of privacy and an attempt to differentiate between anonymity and privacy, as well as an understanding that anonymity can result in a breakdown of clear accountability or responsibility for actions. A sample answer is: Privacy is the claim to be left alone, free from surveillance. This is different from anonymity, in which nobody knows who you are or what actions you take even in a public arena. Some individuals, if they feel they are anonymous, may have lapses in ethical behavior because anonymity means they are no longer accountable for their actions. I don't know if anonymity should be a right, but perhaps anonymity should not be permissible for some types of communication. Diff: 3 Page Ref: 109-113 AACSB: Ethical understanding and reasoning abilities CASE: Evaluation in terms of assess Objective: 4.3 99) List and describe the five moral dimensions that are involved in political, social, and ethical issues. Which do you think will be the most difficult for society to deal with? Support your opinion. Answer: The five moral dimensions are: 1. Information rights and obligations. What rights do individuals and organizations have with respect to information pertaining to them? 2. Property rights. How can intellectual property rights be protected when it is so easy to copy digital materials? 3. Accountability and control. Who will be held accountable and liable for the harm done to individual and collective information and property rights? 4. System quality. What standards of data and system quality should we demand to protect individual rights and the safety of society? 5. Quality of life. What values should be preserved? What institutions must we protect? What cultural values can be harmed? Individual answers for determining the most difficult for society to deal with will vary. One answer might be: Quality of life issues will be most difficult for society to deal with in societies that are comprised of many different cultural and ethnic groups, such as the United States. It is difficult to regulate concerns that are based on subjective values. Diff: 2 Page Ref: 102-103 AACSB: Analytic skills CASE: Evaluation in terms of assess Objective: 4.1 100) Discuss at least three key technology trends that raise ethical issues. Give an example of an ethical or moral impact connected to each one. Answer: Key technology trends include the following: 1. Computer power doubling every 18 months: ethical impact—because more organizations depend on computer systems for critical operations, these systems are vulnerable to computer crime and computer abuse; 2. Data storage costs are rapidly declining: ethical impact—it is easy to maintain detailed databases on individuals—who has access to and control of these databases?; 3. Data analysis advances: ethical impact—vast databases full of individual information may be used to develop detailed profiles of individual behavior; and 4. Networking advances and the Internet: ethical impact—it is easy to copy data from one location to another. Who owns data? How can ownership be protected? Diff: 2 Page Ref: 104-106 AACSB: Analytic skills CASE: Synthesis in terms of applying Objective: 4.1 101) Define the basic concepts of responsibility, accountability, and liability as applied to ethical decisions. How are these concepts related? Answer: Responsibility is the first key element of ethical action. Responsibility means that an individual, group, or organization accepts the potential costs, duties, and obligations for decisions made. Accountability is a feature of systems and social institutions. It means that mechanisms are in place to determine who took responsible action; i.e., who is responsible for the action. Liability is a feature of political systems in which a body of law is in place that permits individuals to recover the damages done to them by others. These concepts are related as follows: I will assume the blame or benefit for the actions I take (responsibility); this blame or benefit accrues to me through the requirement that I be able to explain why I have taken the actions I have (accountability) for actions traceable to me by defined mechanisms in the organization, and if those actions result in harm to another, I will be held by law to reparations for those actions (liability). Diff: 3 Page Ref: 106-107 AACSB: Ethical understanding and reasoning abilities CASE: Analysis in terms of examine Objective: 4.2 102) What are the steps in conducting an ethical analysis? Answer: The steps are: 1. identify and describe clearly the facts; 2. define the conflict or dilemma and identify the higher-order values involved; 3. identify the stakeholders; 4. identify the options that you can reasonably take; and 5. identify the potential consequences of your options. Diff: 1 Page Ref: 106-107 AACSB: Ethical understanding and reasoning abilities CASE: Analysis in terms of organizing Objective: 4.2 103) List and define the six ethical principles discussed in your text. Answer: The six ethical principles are the Golden Rule, Kant's Categorical Imperative, Descartes' rule of change (slippery slope), the Utilitarian Principle, the Risk Aversion Principle, and the "no free lunch" rule. The Golden Rule proposes: do unto others as you would have them do unto you. Immanuel Kant's Categorical Imperative proposes, if an action is not right for everyone to take, it is not right for anyone. Descartes' rule of change says: If an action cannot be taken repeatedly, it is not right to take at all. The Utilitarian Principle is: Take the action that achieves the higher or greater value. The Risk Aversion Principle is: Take the action that produces the least harm or the least potential cost. The ethical no free lunch rule says: Assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise. Diff: 2 Page Ref: 107-108 AACSB: Ethical understanding and reasoning abilities CASE: Analysis in terms of summarize Objective: 4.2 104) How does a cookie work? Answer: A cookie works as follows: A user opens a Web browser and selects a site to visit. The user's computer sends a request for information to the computer running at the Web site. The Web site computer is called the server, since it allows the user's computer to display the Web site. At the same time it sends a cookie—a data file containing information like an encrypted user ID and information about when the user visited and what he did on the site. The user's computer receives the cookie and places it in a file on the hard drive. Whenever the user goes back to the Web site, the server running the site retrieves the cookie to help identify the user. Diff: 2 Page Ref: 111 AACSB: Analytic skills CASE: Analysis in terms of summarize Objective: 4.3 105) What do you consider to be the primary ethical, social, and political issues regarding the quality of a software product? Answer: Student answers will vary, but should include a description of the software manufacturer's responsibility in software quality and an understanding of the difference between social concerns (culture, lifestyle effects) and political concerns (legal, institutional effects). A sample answer is: The central quality-related ethical issue that software quality raises is what responsibility does a software manufacturer have in the performance of its software? At what point can the manufacturer conclude that its software achieves an adequate level of quality? The leading social issue raised by quality is: how is our society affected by low-quality software, and is this a concern? How much accountability should the software manufacturer have? The central political concern raised by software quality is whether and how to enforce software quality minimums and standards, and what institutions are thus also held accountable. Diff: 2 Page Ref: AACSB: Ethical understanding and reasoning abilities CASE: Synthesis in terms of propose Objective: 4.1

Related Downloads
Explore
Post your homework questions and get free online help from our incredible volunteers
  1329 People Browsing
Your Opinion
Which 'study break' activity do you find most distracting?
Votes: 741

Previous poll results: Where do you get your textbooks?