Ch13 Complete Test Bank Privacy and Ethics in Management - Managing Information Systems 7e Answer Key + Test Bank by Keri E. Pearlson. DOCX document preview.
File: chapter13TestBank.docx, Chapter 13, Privacy and Ethical Considerations in Information Management
Multiple Choice
- TJX’s handling of its serious data breach is consistent with which one of the following?
- Stakeholder theory
- Stockholder theory
- Social normative
- Social contract theory
- Corporate social responsibility
- Which normative theory of business ethics would TJX have displayed if it had informed customers as soon as the breach was corrected and told other retailers how to prevent future security breaches?
- Stakeholder
- Stockholder
- Social contract
- Investor
- Corporate social responsibility
- What term is used to describe ethical dilemmas that arise with the development and application of IT?
- Stockholder theory
- PAPA principles
- Information ethics
- Normative theories
- IT dilemmas
- All of the following are examples of green computing EXCEPT:
- Virtualization
- Cloud computing
- Tidal powered servers
- Server workloads moved to off-peak hours
- Cookies
- Green computing is often associated with supporting the triple bottom line, known as:
- Economic, environmental, and social
- Stockholder, stakeholder, and society
- People, Privacy, and Property
- Google, Facebook, and Microsoft
- Data, information, and knowledge
6. Which of the following is a text message that is stored on a user’s computer by a Web server that helps trace the user’s browsing habits?
- Script
- Cookie
- Id theft
- Firewall
- Data file
7. The chapter contends that Internet companies are in business for the money and hence they really would prefer to keep their customers in the dark about how their personal data is being used to generate profits. Assuming this statement is true, with which ethical theory would you say these Internet companies are most aligned?
- Stockholder theory
- Stakeholder theory
- Property theory
- Fiduciary theory
- Normative theory
8. “Who owns information?” and “What are the just and fair prices for its exchange?” are part of which ethical issue?
- Privacy
- Accuracy
- Ownership
- Property
- Accessibility
9. In 2018, the European Union enacted what legislation to set standards for the collection, storage, and processing of personal information?
- General Data Protection Regulation
- Safe Harbor Regulation
- PAPA framework
- Property Harbor framework
- Fair Credit Reporting
10. In 2014, Cambridge Analytica scraped preferences, locations, and friends of 50 million Facebook users, meaning it:
- Redirected users to its Web site.
- Targeted advertisements.
- Collected user passwords.
- Captured from screen displays.
- Sold personal data to third parties.
11. Questions like “Who is responsible for the reliability of information?” and “Who will be accountable for errors in the information?” are part of which ethical issue?
- Privacy
- Accuracy
- Authenticity
- Perfection
- Purpose
12. The question “What information does a person or an organization have a right or a privilege to obtain?” is part of this ethical issue.
- Privacy
- Accuracy
- Accessibility
- Perfection
- Property
13. In today’s digital word, individuals can control their privacy through choice, ______ , and correction.
- Protection
- Consent
- Property
- Communication
- Consideration
14. Which type of “cookies” enables a user to stay logged to a site and keeps your shopping cart intact as you click from page to page?
- Essential
- Non-essential
- Location
- Widget
- None of the above.
15. Today's managers must ensure that information about their employees and customers is only available to those who have a right to see it and use it, an issue referred to as:
- Screening
- Accuracy
- Accessibility
- Perfection
- Property
16. A manager who primarily focuses on the shareholders of the corporation rather than all of the vested parties in the businesses operations and activities is practicing which theory of normative business ethics?
- Stakeholder theory
- Investor theory
- Stockholder theory
- Shareholder theory
- Social contract theory
17. Which theory of normative business ethics seeks to create value for people in a manner that is just and nondiscriminatory?
- Stakeholder theory
- Investor theory
- Social contract theory
- Shareholder theory
- Stockholder theory
18. Which act of 1996 is designed to safeguard the electronic exchange of patient records in the health care industry?
- SoX
- HIPAA
- IETF
- COBIT
- PAPA
19. Information privacy guidelines should come from what level in a company?
- CEO and top-level executives
- Middle management
- Employees
- Federal regulations
- State laws
20. Google Flu Trends aggregates personal search data in order to estimate world-wide flu activity. Google’s site has drawn criticism due to the sharing of users’ online behavior without getting their consent. This, in essence, violates the user’s right to:
- Privacy
- Property
- Accuracy
- Accessibility
- Identity
21. An Internet web site that wishes to abide by fair privacy practices will do all of the following EXCEPT:
- Allow the consumer the choice to participate in the site or not
- Post policies about how personal information gathered from consumers will be used
- Afford the consumer the opportunity to view and contest the accuracy of the data collected
- Secure collected consumer information
- All of the above
22. Target found out a teenager was pregnant by (1) ________ and revealed that fact to her dad by (2) _______
- (1) Overhearing the teen in the store; (2) Calling her dad
- (1) Her purchases of diapers; (2) sending an official letter to the dad
- (1) Her purchases of unscented soap, cotton balls, and vitamins; (2) mailing her some ads for diapers and maternity clothes
- (1) Her sudden elation when visiting the children’s department; (2) sending a video of her tears of happiness in that department
- None of the above
True/False
23. In an exercise at a 2017 hacker conference, attendees were able to breach voting machines in under 2 hours.
24. Unlike the European Union, the U.S. has no general legislature ensuring Internet privacy rights. Instead, the U.S. encourages self-regulation and has introduced industry-specific regulations as needed.
25. Over time it becomes easier to maintain the accuracy of information.
26. The Stakeholder theory requires managers to pursue projects in ways that are compatible with the well-being of society.
27. Green computing is a passing phase and will likely be less strategic to companies in the very near future.
28. “Digital natives” are uncomfortable building relationships on the Internet because they understand the consequences of sharing information publicly.
29. Those who possess the “best” information and know how to use it, win.
30. In 2017, Target was breached and the private information of 147.7 people in the United States was taken.
31. Research shows that despite concerns about privacy, most users don’t actually alter their online behavior.
Short Answer
32. is a growing service designed to help individuals and companies clean up their online presence so that a search for their name produces favorable results.
33. term is used to define energy-efficient computing resources.
34. The social contract theory is made up of two distinct components: social welfare and _________.
35. Green computing benefits _____ which is sometimes referred to as “People, Planet, Profit”.
36. In today’s digital word, individuals can control their privacy through ______, consent, and correction.
37. The four areas, as outlined in the text, that deal with control of information are , , , and .
38. is an example of U.S. legislature designed to ensure the privacy and protection of information for a specific industry.
39. Using the theory, some content that if that third party mines the data and derives valuable insights, the fruits of that data mining legitimately belong to the third party.
Essay
40. Explain how green computing can satisfy each of the three normative theories of business ethics.
41. Provide an example of a company that has faced a dilemma reconciling their corporate policies within a country where it hopes to operate.
42. Give reasons why users are so willing to forgo privacy on the Internet.
43. How does the European Union approach data protection differently than the United States?
Matching
44. Match the U.S. legislative/regulatory act with the industry for which it governs the control of information.
Sarbanes-Oxley Act | Publicly held companies |
HIPAA | Health insurance companies and health care providers |
Gramm-Leach-Bliley Act | Financial institutions |
1974 Privacy Act | Government agencies |
Fair Credit Reporting Act | Consumer reporting agencies |
45. Match each normative theory of business ethics to its primary objective.
Stakeholder | Balance the rights and interests of all those who hold a claim on the firm |
Stockholder | Legally increase profits and maximize shareholder value |
Social contract | Create value for society |
46. Match the critical question with the information control issue it addresses.
Privacy | Can the information be used for purposes other than those for which it was initially captured? |
Privacy | Can the information provided be used to identify personal preferences or history even if the provider doesn’t want it known? |
Accuracy | Who is accountable for errors in the information? |
Property | Who owns the information? |
Accessibility | What information does an organization have the right to obtain? |
Accessibility | Does the person retrieving the information “need to know” the information that is being retrieved? |
47. Match the managerial control concern with the challenges a manager may face on a regular basis.
Privacy | Surveillance of employees to ensure productivity and utilization |
Property | Aggregating customer data and providing it to a marketing firm for a fee |
Accessibility | Giving employees improper rights to view other employee’s personal data |
Accuracy | Holding on to outdated customer records |
48. Match the situation below with the area of information control it falls under.
Privacy | A Web site seeks detailed information about your family; you do not feel that this information is in any way relevant to your usage of the Web site’s services. |
Accuracy | You have been the victim of a banking error. The error was corrected. Regardless, it appears on your credit report and your credit rating is terrible, impacting your ability to get a loan. |
Property | You believe that by contributing online to one non-profit your personal information has been shared with several other non-profit organizations that you are not familiar with. |
Accessibility | A friend indicates that his log in allows him to see not just his grades but also all student grades. |
49. Bradley Manning, a U.S. intelligence officer, took over 500,000 documents from the U.S. State Department and gave them to a public Web site called Wikileaks for publication. These documents were far ranging in their content. Match the actions below with the failure to control and the misuse of sensitive information.
Property | Even though the documents were made available on the site Wikileaks, the U.S. State Department still holds that the documents are classified and under their regulation. |
Accessibility | Manning was allowed to log into a database of classified information. No one monitored his retrieval of information that was outside the scope of his duties. |
Privacy | The U.S. State Department acknowledges that personal comments and assessments of foreign leaders revealed in some documents were strictly for the purpose of U.S. diplomacy. |
Document Information
Connected Book
Managing Information Systems 7e Answer Key + Test Bank
By Keri E. Pearlson