Академический Документы
Профессиональный Документы
Культура Документы
Course Title: IS 5e
Chapter Number: 3
Answer: False
Section reference 1: Ethical Issues
Difficulty: Easy
LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the
four categories of ethical issues related to information technology.
2. A code of ethics is a collection of principles that are intended to guide decision making by
members of the organization.
Answer: True
Section reference 1: Ethical Issues
Difficulty: Easy
LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the
four categories of ethical issues related to information technology.
Answer: False
Section reference 1: Ethical Issues
Difficulty: Easy
LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the
four categories of ethical issues related to information technology.
4. When you interview for a job at a company, it is likely that the company will Google you and
search social networking sites for information on you.
Answer: True
Section reference 1: Privacy
Difficulty: Easy
LO 3.2 Identify three places that store personal data, and, for each one, discuss at least one
potential threat to the privacy of the data stored there.
Answer: False
Section reference 1: Privacy
Difficulty: Easy
LO 3.2 Identify three places that store personal data, and, for each one, discuss at least one
potential threat to the privacy of the data stored there.
Answer: False
Section reference 1: Privacy
Difficulty: Easy
LO 3.2 Identify three places that store personal data, and, for each one, discuss at least one
potential threat to the privacy of the data stored there.
8. The opt-out model of informed consent allows a company to collect personal information until
the customers specifically requests otherwise.
Answer: True
Section reference 1: Privacy
Difficulty: Easy
LO 3.2 Identify three places that store personal data, and, for each one, discuss at least one
potential threat to the privacy of the data stored there.
9. The Platform for Privacy Preferences automatically communicates privacy policies between
a commerce Web site and its visitors.
Answer: True
Section reference 1: Privacy
Difficulty: Easy
LO 3.2 Identify three places that store personal data, and, for each one, discuss at least one
potential threat to the privacy of the data stored there.
10. The flow of information among countries is called transborder data flows.
Answer: True
Section reference 1: Privacy
Difficulty: Easy
LO 3.2 Identify three places that store personal data, and, for each one, discuss at least one
potential threat to the privacy of the data stored there.
11. The “safe harbor” framework details how the European Union exports data about U.S.
citizens.
Answer: False
Section reference 1: Privacy
Difficulty: Medium.
LO 3.2 Identify three places that store personal data, and, for each one, discuss at least one
potential threat to the privacy of the data stored there.
12. The ____________ ethical standard states that an ethical action is the one that provides
the most good or does the least harm.
A. Common good
B. Fairness
C. Rights
D. Utilitarian
E. Well-being
Answer: D
Section reference 1: Ethic Issues
Difficulty: Medium
LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the
four categories of ethical issues related to information technology.
13. The ____________ ethical standard states that an ethical action is the one that best
protects and respects the moral rights of the affected parties.
A. Common good
B. Fairness
C. Rights
D. Utilitarian
E. Well-being
Answer: C
Section reference 1: Ethic Issues
Difficulty: Medium
LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the
four categories of ethical issues related to information technology.
14. The _____________ ethical standard states that ethical actions treat all human beings
equally.
A. Common good
B. Fairness
C. Rights
D. Utilitarian
E. Well-being
Answer: B
Section reference 1: Ethic Issues
Difficulty: Easy
LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the
four categories of ethical issues related to information technology.
15. The _______________ ethical standard states that respect and compassion for all others is
the basis for ethical actions.
A. Common good
B. Fairness
C. Rights
D. Utilitarian
E. Well-being
Answer: A
Section reference 1: Ethic Issues
Difficulty: Medium
LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the
four categories of ethical issues related to information technology.
Answer: E
Section reference 1: Ethic Issues
Difficulty: Medium
LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the
four categories of ethical issues related to information technology.
17. Various organizations that promote fair and responsible use of information systems often
develop a _____.
A. Code of ethics
B. Strategic plan
C. Mission statement
D. Responsibility charter
E. Goals outline
Answer: A
Section reference 1: Ethical Issues
Difficulty: Easy
LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the
four categories of ethical issues related to information technology.
Answer: C
Section reference 1: Ethical Issues
Difficulty: Medium
LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the
four categories of ethical issues related to information technology.
19. _____ issues involve collecting, storing, and disseminating information about individuals.
A. Privacy
B. Accuracy
C. TrAnswerferability
D. Property
E. Accessibility
Answer: A
Section reference 1: Ethical Issues
Difficulty: Easy
LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the
four categories of ethical issues related to information technology.
20. _____ issues involve the authenticity and fidelity of information that is collected and
processed.
A. Privacy
B. Accuracy
C. TrAnswerferability
D. Property
E. Accessibility
Answer: B
Section reference 1: Ethical Issues
Difficulty: Easy
LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the
four categories of ethical issues related to information technology.
21. _____ issues involve who may obtain information and how much they should pay for this
information.
A. Privacy
B. Accuracy
C. Transferability
D. Property
E. Accessibility
Answer: E
Section reference 1: Ethical Issues
Difficulty: Easy
LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the
four categories of ethical issues related to information technology.
22. _____________ means accepting the consequences of your decisions and actions.
A. Privacy
B. Responsibility
C. Transferability
D. Accountability
E. Liability
Answer: B
Section reference 1: Ethical Issues
Difficulty: Easy
LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the
four categories of ethical issues related to information technology.
Answer: D
Section reference 1: Ethical Issues
Difficulty: Easy
LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the
four categories of ethical issues related to information technology.
Answer: C
Section reference 1: Ethical Issues
Difficulty: Easy
LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the
four categories of ethical issues related to information technology.
25. ______________ is a legal concept that gives individuals the right to recover the damages
done to them by other individuals, organizations, or systems.
A. Privacy
B. Responsibility
C. TrAnswerferability
D. Accountability
E. Liability
Answer: E
Section reference 1: Ethical Issues
Difficulty: Easy
LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the
four categories of ethical issues related to information technology.
Answer: B
Section reference 1: Privacy
Difficulty: Medium
LO 3.2 Identify three places that store personal data, and, for each one, discuss at least one
potential threat to the privacy of the data stored there.
Answer: B
Section reference 1: Privacy
Difficulty: Medium
LO 3.2 Identify three places that store personal data, and, for each one, discuss at least one
potential threat to the privacy of the data stored there.
28. What is the relationship between advances in information technology and the practice of
profiling?
A. Advances in IT make it more difficult to profile individuals.
B. Advances in IT have no impact on profiling.
C. Advances in IT make it more expensive to profile individuals.
D. Advances in IT make it easier to profile individuals.
Answer: D
Section reference 1: Privacy
Difficulty: Medium
LO 3.2 Identify three places that store personal data, and, for each one, discuss at least one
potential threat to the privacy of the data stored there.
Answer: D
Section reference 1: Privacy
Difficulty: Medium
LO 3.2 Identify three places that store personal data, and, for each one, discuss at least one
potential threat to the privacy of the data stored there.
30. How does society keep owners of electronic bulletin boards from disseminating offensive or
untrue content? This is a difficult question because it involves the conflict between _____ on
the one hand and _____ on the other.
A. The public, the individual
B. The public, ethics
C. Freedom of speech, privacy
D. The individual, freedom of speech
E. Ethics, security
Answer: C
Section reference 1: Privacy
Difficulty: Hard
LO 3.2 Identify three places that store personal data, and, for each one, discuss at least one
potential threat to the privacy of the data stored there.
Answer: A
Section reference 1: Privacy
Difficulty: Easy
LO 3.2 Identify three places that store personal data, and, for each one, discuss at least one
potential threat to the privacy of the data stored there.
Answer: D
Section reference 1: Privacy
Difficulty: Medium
LO 3.2 Identify three places that store personal data, and, for each one, discuss at least one
potential threat to the privacy of the data stored there.
33. Data aggregators sell digital dossiers to companies that want to know their customers
better. This practice is called ________.
A. Customer relationships
B. Customer profiling
C. Customer intimacy
D. Customer knowledge
E. Spying
Answer: C
Section reference 1: Privacy
Difficulty: Medium
LO 3.2 Identify three places that store personal data, and, for each one, discuss at least one
potential threat to the privacy of the data stored there.
34. Refer to Opening Case– What to Do About WikiLeaks?: Which of the following is false
about WikiLeaks?
A. Anyone can submit files to WikiLeaks.
B. The most controversial expose involved the U.S. government.
C. Governments and companies are using network forensics to identify intruders who break
into systems.
D. Because of WikiLeaks, governments and companies are trying to use data leak prevention
software to prevent unauthorized downloads.
E. WikiLeaks is legally protected in the U.S. because it is merely a conduit for the documents.
Answer: C
Section reference 1: Opening Case
Difficulty: Medium
LO 3.0 Provide a real-world application relating to ethics and privacy in the use of information
systems.
35. Refer to IT’s About Business 3.1: Pinterest: Pinterest’s user agreements allows
A. Users to pin images that they have created
B. Users to pin images from any website
C. Users to pin images others have pinned
D. A and C
E. A, B and C
Answer: A
Section reference 1: IT’s About Business 3.1
Difficulty: Medium
LO 3.0 Provide a real-world application relating to ethics and privacy in the use of information
systems.
36. Refer to IT’s About Business 3.2 -- The Dot Clones: It is easy to replicate online business
models because of the following reasons
A. eCommerce website and their business models are easy to replicate
B. eCommerce websites can be easily sold and rebranded
C. eCommerce websites do not require a large amount of investment
D. eCommerce website cannot have a presence in more than one country
Answer: A
Section reference 1: IT’s About Business 3.2
Difficulty: Medium
LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the
four categories of ethical issues related to information technology.
37. Refer to IT’s About Business 3.3 -- Google Glass: Big Brother Really Is Watching You:
Which of the following is true about the privacy issues surrounding the use of Google glass to
record audio and visual information?
A. It is possible to get the consent of everyone who is being recorded
B. Audio and visual recordings from Google Glass can be used for any purpose, including legal
proceedings
C. Audio and visual recordings data are solely the property of Google
D. Users of Google Glass have to announce to the public if they are going to record or
photograph anything
Answer: B
Section reference 1: IT’s About Business 3.3
Difficulty: Medium
LO 3.2 Identify three places that store personal data, and, for each one, discuss at least one
potential threat to the privacy of the data stored there.
38. Refer to Closing Case: Traget Provides a Surprise: which of the following is not a source of
information used by Target to profile their customers?
A. Shopping patterns for each guest
B. Online shopping activities
C. User’s e-mail correspondences
D. Customer’s public records
E. Customer’s credit information
Answer: C
Section reference 1: Closing Case
Difficulty: Medium
LO 3.0 Provide a real-world application relating to ethics and privacy in the use of information
systems.
39. Identify and analyze the fundamental ethical issues involved with information
technology.
40. Discuss the fundamental tenants of ethics: responsibility, accountability, and liability.
Section reference 1: Ethical Issues
Difficulty: Medium
LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the
four categories of ethical issues related to information technology.
41. Explain why something that is unethical might not necessarily be illegal.
42. Discuss the two rules of privacy: The right of privacy is not absolute, and the public’s right to
know supersedes the individual’s right to privacy.
43. Compare and contrast the two informed consent models: opt-in and opt-out. Why do
companies prefer one over the other? Why do privacy advocates prefer one over the other?
45. Compare and contrast the four widely used stands for ethics: utilitarian, rights, fairness, and
common good.
46. Discuss the international aspects of privacy. How do these aspects impact trAnswerborder
data flows?
47. Shelli runs a small boutique in Tel Aviv. She accepts credit cards and writes the number on
her copy of the receipt in case there is a problem later. This practice involves which ethical issue
related to IT?
A. Privacy
B. Accuracy
C. Accountability
D. Property (such as intellectual property)
E. Accessibility to information
Answer: A
Section reference 1: Ethical Issues
Difficulty: Medium
LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the
four categories of ethical issues related to information technology.
48. Shelli runs a small boutique in Tel Aviv. She has built up a very nice client base and
regularly sends her clients a newsletter. A new bakery business down the block wants to buy
Shelli’s client list from her. If Shelli does sell the list, which ethical issue related to IT would be
involved?
A. Privacy
B. Accuracy
C. Accountability
D. Property (such as intellectual property)
Answer: A
Section reference 1: Ethical Issues
Difficulty: Medium
LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the
four categories of ethical issues related to information technology.
49. Shelli runs a small boutique in Tel Aviv. She has built up a very nice client base and
regularly sends her clients a newsletter. She keeps all her client data on her laptop in a
password-protected file. Her decision to protect the file reflects which ethical issue related to IT?
A. Privacy
B. Accuracy
C. Accountability
D. Property (such as intellectual property)
E. Accessibility to information
Answer: E
Section reference 1: Ethical Issues
Difficulty: Medium
LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the
four categories of ethical issues related to information technology.
50. Shelli runs a small boutique in Tel Aviv. She has built up a very nice client base and
regularly sends her clients a newsletter. Clients fill out a form to join her mailing list. Shelli
indicates on the form that client information will not be shared without permission. This policy
illustrates which ethical issue related to IT?
A. Privacy
B. Accuracy
C. Accountability
D. Property (such as intellectual property)
E. Accessibility to information
Answer: A
Section reference 1: Ethical Issues
Difficulty: Medium
LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the
four categories of ethical issues related to information technology.
51. Shelli runs a small boutique in Tel Aviv. Her intern just came to her with a new design for her
Web site. Shelli really likes the design, and she informs the intern that he is quite the artist.
Section reference 1The intern responds that he found the design on the Internet. Shelli replies
that they can’t use it. Her decision reflects which ethical issue related to IT?
A. Privacy
B. Accuracy
C. Accountability
D. Property (such as intellectual property)
E. Accessibility to information
Answer: D
Section reference 1: Ethical Issues
Difficulty: Medium
LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the
four categories of ethical issues related to information technology.
52. Shelli runs a small boutique in Tel Aviv. Her intern was checking the boutique’s Facebook
page and noticed some negative comments. He deleted them. At the end of the day, when they
were closing up, he told Shelli about the comments and what he had done. Shelli was not
pleased, and she told him so. Why wasn’t Shelli pleased?
A. She didn’t like hearing anything negative about her store.
B. People are free to say what they wish.
C. She thought he should ask her before he deleted them.
D. He wasn’t supposed to be checking Facebook.
E. All of these are reasons for Shelli’s not being pleased.
Answer: B
Section reference 1: Ethical Issues
Difficulty: Medium
LO 3.1 Define ethics, list and describe the three fundamental tenets of ethics, and describe the
four categories of ethical issues related to information technology.