Вы находитесь на странице: 1из 13

Package Title: Testbank Questions

Course Title: IS 5e
Chapter Number: 3

Question Type: True/False

1. An individual or organization faced with an ethical decision is basically considering whether to


break the law.

Answer: False
Section reference 1: Ethical Issues
Difficulty: Easy
LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the
four categories of ethical issues related to information technology.

2. A code of ethics is a collection of principles that are intended to guide decision making by
members of the organization.

Answer: True
Section reference 1: Ethical Issues
Difficulty: Easy
LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the
four categories of ethical issues related to information technology.

3. Improvements in information technologies are leading to a decreasing number of ethical


problems.

Answer: False
Section reference 1: Ethical Issues
Difficulty: Easy
LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the
four categories of ethical issues related to information technology.

4. When you interview for a job at a company, it is likely that the company will Google you and
search social networking sites for information on you.

Answer: True
Section reference 1: Privacy
Difficulty: Easy
LO 3.2 Identify three places that store personal data, and, for each one, discuss at least one
potential threat to the privacy of the data stored there.

5. The right of privacy is absolute.


Answer: False
Section reference 1: Privacy
Difficulty: Easy
LO 3.2 Identify three places that store personal data, and, for each one, discuss at least one
potential threat to the privacy of the data stored there.

6. The individual’s right of privacy supersedes the public’s right to know.

Answer: False
Section reference 1: Privacy
Difficulty: Easy
LO 3.2 Identify three places that store personal data, and, for each one, discuss at least one
potential threat to the privacy of the data stored there.

7. In general, employees have high legal protection against surveillance by employers.

Answer: False
Section reference 1: Privacy
Difficulty: Easy
LO 3.2 Identify three places that store personal data, and, for each one, discuss at least one
potential threat to the privacy of the data stored there.

8. The opt-out model of informed consent allows a company to collect personal information until
the customers specifically requests otherwise.

Answer: True
Section reference 1: Privacy
Difficulty: Easy
LO 3.2 Identify three places that store personal data, and, for each one, discuss at least one
potential threat to the privacy of the data stored there.

9. The Platform for Privacy Preferences automatically communicates privacy policies between
a commerce Web site and its visitors.

Answer: True
Section reference 1: Privacy
Difficulty: Easy
LO 3.2 Identify three places that store personal data, and, for each one, discuss at least one
potential threat to the privacy of the data stored there.

10. The flow of information among countries is called transborder data flows.

Answer: True
Section reference 1: Privacy
Difficulty: Easy
LO 3.2 Identify three places that store personal data, and, for each one, discuss at least one
potential threat to the privacy of the data stored there.

11. The “safe harbor” framework details how the European Union exports data about U.S.
citizens.
Answer: False
Section reference 1: Privacy
Difficulty: Medium.
LO 3.2 Identify three places that store personal data, and, for each one, discuss at least one
potential threat to the privacy of the data stored there.

Question Type: Multiple Choice

12. The ____________ ethical standard states that an ethical action is the one that provides
the most good or does the least harm.
A. Common good
B. Fairness
C. Rights
D. Utilitarian
E. Well-being

Answer: D
Section reference 1: Ethic Issues
Difficulty: Medium
LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the
four categories of ethical issues related to information technology.

13. The ____________ ethical standard states that an ethical action is the one that best
protects and respects the moral rights of the affected parties.
A. Common good
B. Fairness
C. Rights
D. Utilitarian
E. Well-being

Answer: C
Section reference 1: Ethic Issues
Difficulty: Medium
LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the
four categories of ethical issues related to information technology.

14. The _____________ ethical standard states that ethical actions treat all human beings
equally.
A. Common good
B. Fairness
C. Rights
D. Utilitarian
E. Well-being

Answer: B
Section reference 1: Ethic Issues
Difficulty: Easy
LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the
four categories of ethical issues related to information technology.
15. The _______________ ethical standard states that respect and compassion for all others is
the basis for ethical actions.
A. Common good
B. Fairness
C. Rights
D. Utilitarian
E. Well-being

Answer: A
Section reference 1: Ethic Issues
Difficulty: Medium
LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the
four categories of ethical issues related to information technology.

16. Which of the following is not a step in ethical decision making?


A. Recognize the ethical issue.
B. Get the facts.
C. Evaluate alternative actions.
D. Make a decision and test it.
E. All of these are steps in ethical decision making.

Answer: E
Section reference 1: Ethic Issues
Difficulty: Medium
LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the
four categories of ethical issues related to information technology.

17. Various organizations that promote fair and responsible use of information systems often
develop a _____.
A. Code of ethics
B. Strategic plan
C. Mission statement
D. Responsibility charter
E. Goals outline

Answer: A
Section reference 1: Ethical Issues
Difficulty: Easy
LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the
four categories of ethical issues related to information technology.

18. What is _____ is not necessarily _____.


A. Illegal, unethical
B. Ethical, illegal
C. Unethical, illegal
D. Unethical, legal
E. Ethical, legal

Answer: C
Section reference 1: Ethical Issues
Difficulty: Medium
LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the
four categories of ethical issues related to information technology.

19. _____ issues involve collecting, storing, and disseminating information about individuals.
A. Privacy
B. Accuracy
C. TrAnswerferability
D. Property
E. Accessibility

Answer: A
Section reference 1: Ethical Issues
Difficulty: Easy
LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the
four categories of ethical issues related to information technology.

20. _____ issues involve the authenticity and fidelity of information that is collected and
processed.
A. Privacy
B. Accuracy
C. TrAnswerferability
D. Property
E. Accessibility

Answer: B
Section reference 1: Ethical Issues
Difficulty: Easy
LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the
four categories of ethical issues related to information technology.

21. _____ issues involve who may obtain information and how much they should pay for this
information.
A. Privacy
B. Accuracy
C. Transferability
D. Property
E. Accessibility

Answer: E
Section reference 1: Ethical Issues
Difficulty: Easy
LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the
four categories of ethical issues related to information technology.
22. _____________ means accepting the consequences of your decisions and actions.
A. Privacy
B. Responsibility
C. Transferability
D. Accountability
E. Liability

Answer: B
Section reference 1: Ethical Issues
Difficulty: Easy
LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the
four categories of ethical issues related to information technology.

23. ______________ determines who is responsible for the actions taken.


A. Privacy
B. Responsibility
C. TrAnswerferability
D. Accountability
E. Liability

Answer: D
Section reference 1: Ethical Issues
Difficulty: Easy
LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the
four categories of ethical issues related to information technology.

24. Which of the following is not an ethical issue related to IT?


A. Privacy
B. Accuracy
C. Accountability
D. Property (such as intellectual property)
E. Accessibility to information

Answer: C
Section reference 1: Ethical Issues
Difficulty: Easy
LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the
four categories of ethical issues related to information technology.

25. ______________ is a legal concept that gives individuals the right to recover the damages
done to them by other individuals, organizations, or systems.
A. Privacy
B. Responsibility
C. TrAnswerferability
D. Accountability
E. Liability

Answer: E
Section reference 1: Ethical Issues
Difficulty: Easy
LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the
four categories of ethical issues related to information technology.

26. Which of the following statements is correct?


A. An individual’s right to privacy is absolute.
B. Determining and enforcing privacy regulations can be difficult.
C. An individual’s right to privacy supersedes the needs of society.
D. Advances in information technologies have not affected individual privacy.
E. The Internet has increased individuals’ privacy.

Answer: B
Section reference 1: Privacy
Difficulty: Medium
LO 3.2 Identify three places that store personal data, and, for each one, discuss at least one
potential threat to the privacy of the data stored there.

27. The process of profiling:


A. Increases individual privacy.
B. Decreases individual privacy.
C. Has no effect on individual privacy.
D. Is illegal in more than half of the states.
E. Is legal but unethical.

Answer: B
Section reference 1: Privacy
Difficulty: Medium
LO 3.2 Identify three places that store personal data, and, for each one, discuss at least one
potential threat to the privacy of the data stored there.

28. What is the relationship between advances in information technology and the practice of
profiling?
A. Advances in IT make it more difficult to profile individuals.
B. Advances in IT have no impact on profiling.
C. Advances in IT make it more expensive to profile individuals.
D. Advances in IT make it easier to profile individuals.

Answer: D
Section reference 1: Privacy
Difficulty: Medium
LO 3.2 Identify three places that store personal data, and, for each one, discuss at least one
potential threat to the privacy of the data stored there.

29. Which of the following statements is not correct?


A. Employees have limited protection against surveillance by employers.
B. The large majority of organizations monitor employee Internet usage.
C. The large majority of organizations use URL filtering.
D. As with normal first-class mail, employers cannot read employee e-mail.
E. Employees should be aware that surveillance is legal.

Answer: D
Section reference 1: Privacy
Difficulty: Medium
LO 3.2 Identify three places that store personal data, and, for each one, discuss at least one
potential threat to the privacy of the data stored there.

30. How does society keep owners of electronic bulletin boards from disseminating offensive or
untrue content? This is a difficult question because it involves the conflict between _____ on
the one hand and _____ on the other.
A. The public, the individual
B. The public, ethics
C. Freedom of speech, privacy
D. The individual, freedom of speech
E. Ethics, security

Answer: C
Section reference 1: Privacy
Difficulty: Hard
LO 3.2 Identify three places that store personal data, and, for each one, discuss at least one
potential threat to the privacy of the data stored there.

31. Privacy advocates prefer which model of informed consent?


A. Opt-in
B. Opt-out
C. Either A or B
D. Neither A nor B

Answer: A
Section reference 1: Privacy
Difficulty: Easy
LO 3.2 Identify three places that store personal data, and, for each one, discuss at least one
potential threat to the privacy of the data stored there.

32. Which of the following statements is correct?


A. International privacy and security laws are very consistent.
B. Consistent international privacy and security laws help companies with their regulatory
requirements from country to country.
C. Consistent international privacy and security laws enable information to flow freely among
countries.
D. The absence of consistent international privacy and security laws has led to a complex global
legal framework.
E. Consistent international privacy and security laws are followed by all countries.

Answer: D
Section reference 1: Privacy
Difficulty: Medium
LO 3.2 Identify three places that store personal data, and, for each one, discuss at least one
potential threat to the privacy of the data stored there.

33. Data aggregators sell digital dossiers to companies that want to know their customers
better. This practice is called ________.
A. Customer relationships
B. Customer profiling
C. Customer intimacy
D. Customer knowledge
E. Spying

Answer: C
Section reference 1: Privacy
Difficulty: Medium
LO 3.2 Identify three places that store personal data, and, for each one, discuss at least one
potential threat to the privacy of the data stored there.

34. Refer to Opening Case– What to Do About WikiLeaks?: Which of the following is false
about WikiLeaks?
A. Anyone can submit files to WikiLeaks.
B. The most controversial expose involved the U.S. government.
C. Governments and companies are using network forensics to identify intruders who break
into systems.
D. Because of WikiLeaks, governments and companies are trying to use data leak prevention
software to prevent unauthorized downloads.
E. WikiLeaks is legally protected in the U.S. because it is merely a conduit for the documents.

Answer: C
Section reference 1: Opening Case
Difficulty: Medium
LO 3.0 Provide a real-world application relating to ethics and privacy in the use of information
systems.

35. Refer to IT’s About Business 3.1: Pinterest: Pinterest’s user agreements allows
A. Users to pin images that they have created
B. Users to pin images from any website
C. Users to pin images others have pinned
D. A and C
E. A, B and C

Answer: A
Section reference 1: IT’s About Business 3.1
Difficulty: Medium
LO 3.0 Provide a real-world application relating to ethics and privacy in the use of information
systems.

36. Refer to IT’s About Business 3.2 -- The Dot Clones: It is easy to replicate online business
models because of the following reasons
A. eCommerce website and their business models are easy to replicate
B. eCommerce websites can be easily sold and rebranded
C. eCommerce websites do not require a large amount of investment
D. eCommerce website cannot have a presence in more than one country

Answer: A
Section reference 1: IT’s About Business 3.2
Difficulty: Medium
LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the
four categories of ethical issues related to information technology.

37. Refer to IT’s About Business 3.3 -- Google Glass: Big Brother Really Is Watching You:
Which of the following is true about the privacy issues surrounding the use of Google glass to
record audio and visual information?
A. It is possible to get the consent of everyone who is being recorded
B. Audio and visual recordings from Google Glass can be used for any purpose, including legal
proceedings
C. Audio and visual recordings data are solely the property of Google
D. Users of Google Glass have to announce to the public if they are going to record or
photograph anything

Answer: B
Section reference 1: IT’s About Business 3.3
Difficulty: Medium
LO 3.2 Identify three places that store personal data, and, for each one, discuss at least one
potential threat to the privacy of the data stored there.

38. Refer to Closing Case: Traget Provides a Surprise: which of the following is not a source of
information used by Target to profile their customers?
A. Shopping patterns for each guest
B. Online shopping activities
C. User’s e-mail correspondences
D. Customer’s public records
E. Customer’s credit information

Answer: C
Section reference 1: Closing Case
Difficulty: Medium
LO 3.0 Provide a real-world application relating to ethics and privacy in the use of information
systems.

Question Type: Essay

39. Identify and analyze the fundamental ethical issues involved with information
technology.

Section reference 1: Ethical Issues


Difficulty: Medium
LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the
four categories of ethical issues related to information technology.

40. Discuss the fundamental tenants of ethics: responsibility, accountability, and liability.
Section reference 1: Ethical Issues
Difficulty: Medium
LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the
four categories of ethical issues related to information technology.

41. Explain why something that is unethical might not necessarily be illegal.

Section reference 1: Ethical Issues


Difficulty: Medium
LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the
four categories of ethical issues related to information technology.

42. Discuss the two rules of privacy: The right of privacy is not absolute, and the public’s right to
know supersedes the individual’s right to privacy.

Section reference 1: Privacy


Difficulty: Medium
LO 3.2 Identify three places that store personal data, and, for each one, discuss at least one
potential threat to the privacy of the data stored there.

43. Compare and contrast the two informed consent models: opt-in and opt-out. Why do
companies prefer one over the other? Why do privacy advocates prefer one over the other?

Section reference 1: Privacy


Difficulty: Medium
LO 3.2 Identify three places that store personal data, and, for each one, discuss at least one
potential threat to the privacy of the data stored there.

44 Discuss the relationship between surveillance and privacy.

Section reference 1: Ethical Issues


Difficulty: Hard
LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the
four categories of ethical issues related to information technology.

45. Compare and contrast the four widely used stands for ethics: utilitarian, rights, fairness, and
common good.

Section reference 1: Ethical Issues


Difficulty: Medium
LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the
four categories of ethical issues related to information technology.

46. Discuss the international aspects of privacy. How do these aspects impact trAnswerborder
data flows?

Section reference 1: Privacy


Difficulty: Medium
LO 3.2 Identify three places that store personal data, and, for each one, discuss at least one
potential threat to the privacy of the data stored there.
Question Type: Multiple Choice

47. Shelli runs a small boutique in Tel Aviv. She accepts credit cards and writes the number on
her copy of the receipt in case there is a problem later. This practice involves which ethical issue
related to IT?
A. Privacy
B. Accuracy
C. Accountability
D. Property (such as intellectual property)
E. Accessibility to information

Answer: A
Section reference 1: Ethical Issues
Difficulty: Medium
LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the
four categories of ethical issues related to information technology.

48. Shelli runs a small boutique in Tel Aviv. She has built up a very nice client base and
regularly sends her clients a newsletter. A new bakery business down the block wants to buy
Shelli’s client list from her. If Shelli does sell the list, which ethical issue related to IT would be
involved?
A. Privacy
B. Accuracy
C. Accountability
D. Property (such as intellectual property)

Answer: A
Section reference 1: Ethical Issues
Difficulty: Medium
LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the
four categories of ethical issues related to information technology.

49. Shelli runs a small boutique in Tel Aviv. She has built up a very nice client base and
regularly sends her clients a newsletter. She keeps all her client data on her laptop in a
password-protected file. Her decision to protect the file reflects which ethical issue related to IT?
A. Privacy
B. Accuracy
C. Accountability
D. Property (such as intellectual property)
E. Accessibility to information

Answer: E
Section reference 1: Ethical Issues
Difficulty: Medium
LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the
four categories of ethical issues related to information technology.

50. Shelli runs a small boutique in Tel Aviv. She has built up a very nice client base and
regularly sends her clients a newsletter. Clients fill out a form to join her mailing list. Shelli
indicates on the form that client information will not be shared without permission. This policy
illustrates which ethical issue related to IT?
A. Privacy
B. Accuracy
C. Accountability
D. Property (such as intellectual property)
E. Accessibility to information

Answer: A
Section reference 1: Ethical Issues
Difficulty: Medium
LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the
four categories of ethical issues related to information technology.

51. Shelli runs a small boutique in Tel Aviv. Her intern just came to her with a new design for her
Web site. Shelli really likes the design, and she informs the intern that he is quite the artist.
Section reference 1The intern responds that he found the design on the Internet. Shelli replies
that they can’t use it. Her decision reflects which ethical issue related to IT?
A. Privacy
B. Accuracy
C. Accountability
D. Property (such as intellectual property)
E. Accessibility to information

Answer: D
Section reference 1: Ethical Issues
Difficulty: Medium
LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the
four categories of ethical issues related to information technology.

52. Shelli runs a small boutique in Tel Aviv. Her intern was checking the boutique’s Facebook
page and noticed some negative comments. He deleted them. At the end of the day, when they
were closing up, he told Shelli about the comments and what he had done. Shelli was not
pleased, and she told him so. Why wasn’t Shelli pleased?
A. She didn’t like hearing anything negative about her store.
B. People are free to say what they wish.
C. She thought he should ask her before he deleted them.
D. He wasn’t supposed to be checking Facebook.
E. All of these are reasons for Shelli’s not being pleased.

Answer: B
Section reference 1: Ethical Issues
Difficulty: Medium
LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the
four categories of ethical issues related to information technology.

Вам также может понравиться