Ch.12 Ethics And Privacy Test Bank 3rd Canadian Edition - Introduction to Information Systems 3rd Canadian Edition | Test Bank with Answer Key by Rainer by Rainer Cegielski. DOCX document preview.
Chapter 12
Ethics and Privacy
Question Type: True/False
1) WikiLeaks is illegal.
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.
Section Reference: Opening Case
Difficulty: Easy
2) Property issues involve the ownership and value of information.
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.
Section Reference: 12.1 Ethical Issues
Difficulty: Easy
3) An individual or organization faced with an ethical decision is basically considering whether to break the law.
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.
Section Reference: 12.1 Ethical Issues
Difficulty: Easy
4) A code of ethics is a collection of principles that are intended to guide decision making by members of the organization.
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.
Section Reference: 12.1 Ethical Issues
Difficulty: Easy
5) If something is unethical, that means it is illegal.
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.
Section Reference: 12.1 Ethical Issues
Difficulty: Medium
6) Improvements in information technologies are leading to a decreasing number of ethical problems.
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.
Section Reference: 12.1 Ethical Issues
Difficulty: Easy
7) When you interview for a job at a company, it is likely that the company will Google you and search social networking sites for information on you.
Learning Objective: Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there.
Section Reference: 12.2 Privacy
Difficulty: Easy
8) The right of privacy is absolute.
Learning Objective: Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there.
Section Reference: 12.2 Privacy
Difficulty: Easy
9) Electronic surveillance of employees is legal.
Learning Objective: Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there.
Section Reference: 12.2 Privacy
Difficulty: Easy
10) Determining whose laws should be followed is a problem related to the international aspects of privacy.
Learning Objective: Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there.
Section Reference: 12.2 Privacy
Difficulty: Easy
11) Facebook’s CEO believes privacy is no longer a social norm.
Learning Objective: Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there.
Section Reference: 12.2 Privacy
Difficulty: Easy
12) The individual’s right of privacy supersedes the public’s right to know.
Learning Objective: Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there.
Section Reference: 12.2 Privacy
Difficulty: Easy
13) In general, employees have high legal protection against surveillance by employers.
Learning Objective: Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there.
Section Reference: 12.2 Privacy
Difficulty: Easy
14) Privacy is the right to be left alone and to be free of unreasonable personal intrusions.
Learning Objective: Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there.
Section Reference: 12.2 Privacy
Difficulty: Easy
15) The opt-out model of informed consent allows a company to collect personal information until the customers specifically requests otherwise.
Learning Objective: Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there.
Section Reference: 12.2 Privacy
Difficulty: Easy
16) The Platform for Privacy Preferences automatically communicates privacy policies between a commerce Web site and its visitors.
Learning Objective: Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there.
Section Reference: 12.2 Privacy
Difficulty: Easy
17) The flow of information among countries is called transborder data flows.
Learning Objective: Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there.
Section Reference: 12.2 Privacy
Difficulty: Easy
18) Terry Childs, an employee of the San Francisco IT department, was not a single point of failure.
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.
Section Reference: Closing case
Difficulty: Easy
Question Type: Multiple Choice
19) The WikiLeaks case demonstrated _________________.
a) the Internet has very little impact on government organizations
b) how easy it is to capture huge amounts of company data
c) that employees need to follow specific procedures for posting things online
d) the Internet always has a positive influence on a company’s reputation
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.
Section Reference: Opening Case
Difficulty: Easy
20) The ____________ ethical standard states that an ethical action is the one that provides the most good or does the least harm.
a) Common good
b) Fairness
c) Rights
d) Utilitarian
e) Well-being
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.
Section Reference: 12.1 Ethical Issues
Difficulty: Medium
21) The ____________ ethical standard states that an ethical action is the one that best protects and respects the moral rights of the affected parties.
a) Common good
b) Fairness
c) Rights
d) Utilitarian
e) Well-being
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.
Section Reference: 12.1 Ethical Issues
Difficulty: Medium
22) The _______________ approach maintains that the most ethical action is the one that provides the most good or does the least harm.
a) Common good
b) Fairness
c) Rights
d) Utilitarian
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.
Section Reference: 12.1 Ethical Issues
Difficulty: Easy
23) The _____________ ethical standard states that ethical actions treat all human beings equally.
a) Common good
b) Fairness
c) Rights
d) Utilitarian
e) Well-being
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.
Section Reference: 12.1 Ethical Issues
Difficulty: Easy
24) The _______________ ethical standard states that respect and compassion for all others is the basis for ethical actions.
a) Common good
b) Fairness
c) Rights
d) Utilitarian
e) Well-being
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.
Section Reference: 12.1 Ethical Issues
Difficulty: Medium
25) Arguing that CEOs make 100 times more than their employees because they have to take more risk than lower-level employees is the ____________ approach.
a) Common good
b) Fairness
c) Rights
d) Utilitarian
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.
Section Reference: 12.1 Ethical Issues
Difficulty: Medium
26) Which of the following is not a step in ethical decision making?
a) Recognize the ethical issue.
b) Get the facts.
c) Evaluate alternative actions.
d) Make a decision and test it.
e) All of these are steps in ethical decision making.
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.
Section Reference: 12.1 Ethical Issues
Difficulty: Medium
27) ____________ means that you accept the consequences of your decisions and actions.
a) Accountability
b) Due process
c) Liability
d) Responsibility
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.
Section Reference: 12.1 Ethical Issues
Difficulty: Easy
28) Various organizations that promote fair and responsible use of information systems often develop a _____.
a) Code of ethics
b) Strategic plan
c) Mission statement
d) Responsibility charter
e) Goals outline
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.
Section Reference: 12.1 Ethical Issues
Difficulty: Easy
29) The Sarbanes-Oxley Act in 2002 requires publicly held companies to implement ________ controls.
a) ethical
b) financial
c) security
d) technology
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.
Section Reference: 12.1 Ethical Issues
Difficulty: Easy
30) ____________ issues revolve around who should have access to information and whether they should have to pay for this access.
a) Accessibility
b) Accuracy
c) Privacy
d) Property
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.
Section Reference: 12.1 Ethical Issues
Difficulty: Easy
31) Which of the following is NOT a drawback of photo tagging and geotagging:
a) It is easier for everyone to gather information about you.
b) You are forced to manually un-tag yourself.
c) It is easier to lie about where you’ve been or what you’ve been doing.
d) You may experience a certain lack of control over your information.
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.
Section Reference: IT’s About Business: Big Brother is Watching You
Difficulty: Medium
32) Which of the following is NOT a benefit of photo tagging and geotagging:
a) It is easier for police to track criminals.
b) Criminals can be identified more quickly and accurately.
c) Our purchase history can be tracked so that billboards are more customized.
d) Digital sensors are more efficient so that home security is easier to implement.
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.
Section Reference: IT’s About Business: Big Brother is Watching You
Difficulty: Medium
33) What is _____ is not necessarily _____.
a) Illegal, unethical
b) Ethical, illegal
c) Unethical, illegal
d) Unethical, legal
e) Ethical, legal
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.
Section Reference: 12.1 Ethical Issues
Difficulty: Medium
34) _____ issues involve collecting, storing, and disseminating information about individuals.
a) Privacy
b) Accuracy
c) Transferability
d) Property
e) Accessibility
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.
Section Reference: 12.1 Ethical Issues
Difficulty: Easy
35) _____ issues involve the authenticity and fidelity of information that is collected and processed.
a) Privacy
b) Accuracy
c) Transferability
d) Property
e) Accessibility
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.
Section Reference: 12.1 Ethical Issues
Difficulty: Easy
36) _____ issues involve who may obtain information and how much they should pay for this information.
a) Privacy
b) Accuracy
c) Transferability
d) Property
e) Accessibility
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.
Section Reference: 12.1 Ethical Issues
Difficulty: Easy
37) _____________ means accepting the consequences of your decisions and actions.
a) Privacy
b) Responsibility
c) Transferability
d) Accountability
e) Liability
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.
Section Reference: 12.1 Ethical Issues
Difficulty: Easy
38) ______________ determines who is responsible for the actions taken.
a) Privacy
b) Responsibility
c) Transferability
d) Accountability
e) Liability
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.
Section Reference: 12.1 Ethical Issues
Difficulty: Easy
39) Which of the following is not an ethical issue related to IT?
a) Privacy
b) Accuracy
c) Accountability
d) Property (such as intellectual property)
e) Accessibility to information
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.
Section Reference: 12.1 Ethical Issues
Difficulty: Easy
40) ______________ is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems.
a) Privacy
b) Responsibility
c) Transferability
d) Accountability
e) Liability
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.
Section Reference: 12.1 Ethical Issues
Difficulty: Easy
41) Shelli runs a small boutique in Tel Aviv. She accepts credit cards and writes the number on her copy of the receipt in case there is a problem later. This practice involves which ethical issue related to IT?
a) Privacy
b) Accuracy
c) Accountability
d) Property (such as intellectual property)
e) Accessibility to information
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.
Section Reference: 12.1 Ethical Issues
Difficulty: Medium
42) Shelli runs a small boutique in Tel Aviv. She has built up a very nice client base and regularly sends her clients a newsletter. A new bakery business down the block wants to buy Shelli’s client list from her. If Shelli does sell the list, which ethical issue related to IT would be involved?
a) Privacy
b) Accuracy
c) Accountability
d) Property (such as intellectual property)
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.
Section Reference: 12.1 Ethical Issues
Difficulty: Medium
43) Shelli runs a small boutique in Tel Aviv. She has built up a very nice client base and regularly sends her clients a newsletter. She keeps all her client data on her laptop in a password-protected file. Her decision to protect the file reflects which ethical issue related to IT?
a) Privacy
b) Accuracy
c) Accountability
d) Property (such as intellectual property)
e) Accessibility to information
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.
Section Reference: 12.1 Ethical Issues
Difficulty: Medium
44) Shelli runs a small boutique in Tel Aviv. She has built up a very nice client base and regularly sends her clients a newsletter. Clients fill out a form to join her mailing list. Shelli indicates on the form that client information will not be shared without permission. This policy illustrates which ethical issue related to IT?
a) Privacy
b) Accuracy
c) Accountability
d) Property (such as intellectual property)
e) Accessibility to information
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.
Section Reference: 12.1 Ethical Issues
Difficulty: Medium
45) Shelli runs a small boutique in Tel Aviv. Her intern just came to her with a new design for her Web site. Shelli really likes the design, and she informs the intern that he is quite the artist. Section ReferenceThe intern responds that he found the design on the Internet. Shelli replies that they can’t use it. Her decision reflects which ethical issue related to IT?
a) Privacy
b) Accuracy
c) Accountability
d) Property (such as intellectual property)
e) Accessibility to information
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.
Section Reference: 12.1 Ethical Issues
Difficulty: Medium
46) Shelli runs a small boutique in Tel Aviv. Her intern was checking the boutique’s Facebook page and noticed some negative comments. He deleted them. At the end of the day, when they were closing up, he told Shelli about the comments and what he had done. Shelli was not pleased, and she told him so. Why wasn’t Shelli pleased?
a) She didn’t like hearing anything negative about her store.
b) People are free to say what they wish.
c) She thought he should ask her before he deleted them.
d) He wasn’t supposed to be checking Facebook.
e) All of these are reasons for Shelli’s not being pleased.
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.
Section Reference: 12.1 Ethical Issues
Difficulty: Medium
47) Which of the following statements is correct?
a) An individual’s right to privacy is absolute.
b) Determining and enforcing privacy regulations can be difficult.
c) An individual’s right to privacy supersedes the needs of society.
d) Advances in information technologies have not affected individual privacy.
e) The Internet has increased individuals’ privacy.
Learning Objective: Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there.
Section Reference: 12.2 Privacy
Difficulty: Medium
48) The public’s right to know is ___________ to the individual’s right of privacy.
a) equal
b) inferior
c) superior
d) undecided
Learning Objective: Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there.
Section Reference: 12.2 Privacy
Difficulty: Easy
49) Privacy rights apply to ______________.
a) groups
b) individuals
c) institutions
d) all of the above
Learning Objective: Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there.
Section Reference: 12.2 Privacy
Difficulty: Easy
50) _____________ is the tracking of people’s activities, online or offline, with the aid of computers.
a) Computer spying
b) Data aggregation
c) Electronic surveillance
d) Profiling
Learning Objective: Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there.
Section Reference: 12.2 Privacy
Difficulty: Easy
51) Customer intimacy is a __________ outcome of profiling.
a) positive
b) negative
c) neutral
d) inevitable
Learning Objective: Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there.
Section Reference: 12.2 Privacy
Difficulty: Medium
52) The __________ permits the company to collect personal information until the customer specifically requests that the data not be collected.
a) opt-in model
b) opt-out model
c) government
d) privacy code
Learning Objective: Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there.
Section Reference: 12.2 Privacy
Difficulty: Easy
53) Which of the following is a correct argument on the pros and cons of conveniently sharing information and protecting privacy?
a) We have quick and easy access to our contacts on social networking sites, but it is much easier for stalking to occur.
b) Protecting our privacy is difficult and complicated, even if securing our information makes us feel more comfortable with using the Internet.
c) We need to be careful about what we post online, particularly since it may be difficult to ensure the security of our information on the Internet.
d) All of the above are correct.
Learning Objective: Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there.
Section Reference: 12.2 Privacy
Difficulty: Medium
54) The process of profiling:
a) Increases individual privacy.
b) Decreases individual privacy.
c) Has no effect on individual privacy.
d) Is illegal in more than half of the states.
e) Is legal but unethical.
Learning Objective: Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there.
Section Reference: 12.2 Privacy
Difficulty: Medium
55) What is the relationship between advances in information technology and the practice of profiling?
a) Advances in IT make it more difficult to profile individuals.
b) Advances in IT have no impact on profiling.
c) Advances in IT make it more expensive to profile individuals.
d) Advances in IT make it easier to profile individuals.
Learning Objective: Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there.
Section Reference: 12.2 Privacy
Difficulty: Medium
56) Which of the following statements is not correct?
a) Employees have limited protection against surveillance by employers.
b) The large majority of organizations monitor employee Internet usage.
c) The large majority of organizations use URL filtering.
d) As with normal first-class mail, employers cannot read employee e-mail.
e) Employees should be aware that surveillance is legal.
Learning Objective: Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there.
Section Reference: 12.2 Privacy
Difficulty: Medium
57) How does society keep owners of electronic bulletin boards from disseminating offensive or untrue content? This is a difficult question because it involves the conflict between _____ on the one hand and _____ on the other.
a) The public, the individual
b) The public, ethics
c) Freedom of speech, privacy
d) The individual, freedom of speech
e) Ethics, security
Learning Objective: Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there.
Section Reference: 12.2 Privacy
Difficulty: Hard
58) Privacy advocates prefer which model of informed consent?
a) Opt-in
b) Opt-out
c) Either A or B
d) Neither A nor B
Learning Objective: Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there.
Section Reference: 12.2 Privacy
Difficulty: Easy
59) Which of the following statements is correct?
a) International privacy and security laws are very consistent.
b) Consistent international privacy and security laws help companies with their regulatory requirements from country to country.
c) Consistent international privacy and security laws enable information to flow freely among countries.
d) The absence of consistent international privacy and security laws has led to a complex global legal framework.
e) Consistent international privacy and security laws are followed by all countries.
Learning Objective: Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there.
Section Reference: 12.2 Privacy
Difficulty: Medium
60) Data aggregators sell digital dossiers to companies that want to know their customers better. This practice is called ________.
a) Customer relationships
b) Customer profiling
c) Customer intimacy
d) Customer knowledge
e) Spying
Learning Objective: Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there.
Section Reference: 12.2 Privacy
Difficulty: Medium
61) Which of the following is false about WikiLeaks?
a) Anyone can submit files to WikiLeaks.
b) The most controversial expose involved the U.S. government.
c) Governments and companies are using network forensics to identify intruders who break into systems.
d) Because of WikiLeaks, governments and companies are trying to use data leak prevention software to prevent unauthorized downloads.
e) WikiLeaks is legally protected in the U.S. because it is merely a conduit for the documents.
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.
Section Reference: Opening Case: What to Do About WikiLeaks?
Difficulty: Medium
62) Which of the following is false?
a) Two employees talking about a customer’s account is an ethical issue.
b) Employees talking to friends about peoples bank accounts is an ethical issue.
c) Educating employees will solve the problems at the bank.
d) ShaNiqua should have told the bank managers.
e) Strong information technology security is not the solution.
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.
Section Reference: IT’s About Small Business: 12.1 MidTown Bank
Difficulty: Medium
63) Is the use of privately collected data without a person’s knowledge unethical? Which of the following is not increasing the amount of collected data?
a) Inexpensive database management software
b) Inexpensive digital sensors
c) Low-cost digital cameras
d) Cell phones with cameras and GPS sensors
e) Low cost of storing digital data
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.
Section Reference: IT’s About Business: 12.2 Big Brother Is Watching You
Difficulty: Medium
64) Which of the following is false about photo tagging?
a) Users must assign names to people in photos.
b) People do not need to give permission to be tagged.
c) Facial-recognition software can only look for similar facial features among the user’s photos.
d) Facial-recognition software can look at videos as well as photos.
e) There is no way a person can stop this.
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.
Section Reference: IT’s About Business: 12.2 Big Brother Is Watching You
Difficulty: Medium
65) Which of the following is false about Facebook’s privacy polices?
a) Facebook puts the responsibility of privacy in the hands of the user.
b) Facebook as an “off switch” that lets users block all access to their information from third-party applications and Web sites.
c) Facebook’s CEO feels that privacy is no longer a social norm.
d) Facebook created new “buckets” that could be designated to groups of people.
e) Facebook uses an Opt-in model.
Learning Objective: Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there.
Section Reference: IT’s About Business: 12.3 Your Privacy on Facebook
Difficulty: Medium
66) According to Terry Childs’s defense lawyer, his actions were justified because _______.
a) he was the only one who knew the system
b) he had access to his supervisor’s account
c) he never used the data he downloaded
d) he didn’t cause any damage to the system
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.
Section Reference: Closing Case
Difficulty: Hard
Question Type: Essay
67) Identify and analyze the fundamental ethical issues involved with information technology.
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.
Section Reference: 12.1 Ethical Issues
Difficulty: Medium
68) Discuss the fundamental tenants of ethics: responsibility, accountability, and liability.
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.
Section Reference: 12.1 Ethical Issues
Difficulty: Medium
69) Explain why something that is unethical might not necessarily be illegal.
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.
Section Reference: 12.1 Ethical Issues
Difficulty: Medium
70) Discuss the two rules of privacy: The right of privacy is not absolute, and the public’s right to know supersedes the individual’s right to privacy.
Learning Objective: Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there.
Section Reference: 12.2 Privacy
Difficulty: Medium
71) Compare and contrast the two informed consent models: opt-in and opt-out. Why do companies prefer one over the other? Why do privacy advocates prefer one over the other?
Learning Objective: Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there.
Section Reference: 12.2 Privacy
Difficulty: Medium
72) Discuss the relationship between surveillance and privacy.
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.
Section Reference: 12.1 Ethical Issues
Difficulty: Hard
73) Compare and contrast the four widely used stands for ethics: utilitarian, rights, fairness, and common good.
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.
Section Reference: 12.1 Ethical Issues
Difficulty: Medium
74) Discuss the international aspects of privacy. How do these aspects impact transborder data flows?
Learning Objective: Identify three places that store personal data, and, for each one, discuss at least one potential threat to the privacy of the data stored there.
Section Reference: 12.2 Privacy
Difficulty: Medium
Legal Notice
Copyright © 2014 by John Wiley & Sons Canada, Ltd. or related companies. All rights reserved.
The data contained in these files are protected by copyright. This manual is furnished under licence and may be used only in accordance with the terms of such licence.
The material provided herein may not be downloaded, reproduced, stored in a retrieval system, modified, made available on a network, used to create derivative works, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise without the prior written permission of John Wiley & Sons Canada, Ltd.
Document Information
Connected Book
Introduction to Information Systems 3rd Canadian Edition | Test Bank with Answer Key by Rainer
By Rainer Cegielski