Ch.3 Ethics and Privacy Test Bank Test Questions & Answers - Info Systems Canada 5e | Exam Pack by R. Kelly Rainer. DOCX document preview.

Ch.3 Ethics and Privacy Test Bank Test Questions & Answers

Package Title: Chapter 3, Testbank

Course Title: Rainer, IS 5e

Chapter Number: 3

Question type: Multiple Choice

1) Google understands that to attract digital advertising dollars from advertiser, they: .

a) Must provide discounts to users

b) Must prove that digital ads work

c) Must work with customers and offer them loyalty programs

d) Must first negotiate with the Canadian Government a regulation to protect privacy

Difficulty: Easy

Section Reference 1: IT’s about Business 3.1

Learning Objective 1: 3.1

Bloomcode: Knowledge

Standard: AACSB || Technology

2) Online publishers use tracking code from Google, Facebook, and many other companies to help target their advertising. What is a concern about this for individuals? ________.

a) That publishers should share profits with Google, Facebook and others

b) Privacy needs to be scrutinized more carefully.

c) That publishers should pay to users a fee for using their private information

d) That publishers should be careful to display only ads that are of interest to users

Difficulty: Easy

Section Reference 1: IT’s about Business 3.1

Learning Objective 1: 3.1

Bloomcode: Application

Standard: AACSB || Technology

3) How does Google protects the privacy of consumers?.

a) Through an agreement between Google and sellers

b) By using patent-pending mathematical formulas when it matches one of its users with a shopper who makes a purchase in a brick-and-mortar store

c) Through Google Attribution

d) Through Periscope Data Analysis

Difficulty: Easy

Section Reference 1: IT’s about Business 3.1

Learning Objective 1: 3.1

Bloomcode: Knowledge

Standard: AACSB || Technology

4) In regards to technology used by Google to protect the privacy of consumers, Paul Stephens of Privacy Rights Clearinghouse has asserted that a marketing organization can identify an individual by examining only a few pieces of data. He expressed skepticism about Google’s technology because:

a) The Google’s system for guarding the identities of users will stand up to the efforts of hackers

b) The Google’s system does not have a strong encryption algorithm

c) The Google’s system is too new to be trusted

d) The Google’s system is not meant to protect privacy but to share data with partners to increase profits

Difficulty: Easy

Section Reference 1: IT’s about Business 3.1

Learning Objective 1: 3.1

Bloomcode: Knowledge

Standard: AACSB || Technology

5) Marc Rotenberg, executive director of the Electronic Privacy Information Center, claims companies are becoming increasingly intrusive in terms of their data collection and are secretive as to how they gather and use those data. He proposed that:

a) Government regulators and the U.S. Congress should charge an extra tax to Google and other technology companies that are collecting and using data from their users G

b) Government regulators and the U.S. Congress should demand answers about how Google and other technology companies are collecting and using data from their users.

c) Government regulators and the U.S. Congress should request to Google and other technology companies that are collecting and using data from their users to give them access to their systems so they can control that they do.

d) Government regulators and the U.S. Congress should shut down Google and other technology companies that are collecting and using data from their users

Difficulty: Easy

Section Reference 1: IT’s about Business 3.1Learning Objective 1: 3.1

Bloomcode: Application

Standard: AACSB || Technology

6) The _________ approach states that an ethical action is the one that provides the most good or does the least harm.

a) common good

b) deontology

c) fairness

d) rights

e) utilitarian

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

7) Minimizing the organization’s carbon footprint and otherwise striving for “green IT” is an example of a _________ approach.

a) common good

b) deontology

c) fairness

d) rights

e) utilitarian

Difficulty: Hard

Section Reference 1: 3.1

Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.

Bloomcode: Synthesis, Evaluation

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

8) The _________ approach maintains that an ethical action is the one that best protects and respects the moral rights of the affected parties.

a) common good

b) deontology

c) fairness

d) rights

e) utilitarian

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

9) The pursuit of the “American dream” and our ability to choose our religious orientation is a reflection of the _________ approach.

a) common good

b) deontology

c) fairness

d) rights

e) utilitarian

Difficulty: Medium

Section Reference 1: 3.1

Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.

Bloomcode: Application

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

10) The _________ approach posits that ethical actions treat all human beings equally, or, if unequally, then fairly, based on some defensible standard.

a) common good

b) deontology

c) fairness

d) rights

e) utilitarian

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

11) The debate over CEO salaries being so much higher than other employees is an issue addressed by the _________ approach.

a) common good

b) deontology

c) fairness

d) rights

e) utilitarian

Difficulty: Medium

Section Reference 1: 3.1

Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.

Bloomcode: Analysis

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

12) The _________ approach highlights the interlocking relationships that underlie all societies.

a) common good

b) deontology

c) fairness

d) rights

e) utilitarian

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

13) Obamacare was created to address the _________ approach.

a) common good

b) deontology

c) fairness

d) rights

e) utilitarian

Difficulty: Hard

Section Reference 1: 3.1

Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.

Bloomcode: Evaluation

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

14) The _________ approach states that the morality of an action is based on whether the action itself is right or wrong under a series of rules, rather than based on the consequences of that action.

a) common good

b) deontology

c) fairness

d) rights

e) utilitarian

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

15) Suppose that you believe that killing someone is wrong even if it is self-defense. This is an example of the _________ approach.

a) common good

b) deontology

c) fairness

d) rights

e) utilitarian

Difficulty: Medium

Section Reference 1: 3.1

Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.

Bloomcode: Knowledge, Evaluation

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

16) _________ is the first step in the general framework for ethics.

a) Act and reflect on the outcome of your decision

b) Evaluate alternative actions

c) Get the facts

d) Make a decision and test it

e) Recognize an ethical issue

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

17) _________ is the second step in the general framework for ethics.

a) Act and reflect on the outcome of your decision

b) Evaluate alternative actions

c) Get the facts

d) Make a decision and test it

e) Recognize an ethical issue

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

18) _________ is the third step in the general framework for ethics.

a) Act and reflect on the outcome of your decision

b) Evaluate alternative actions

c) Get the facts

d) Make a decision and test it

e) Recognize an ethical issue

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

19) _________ is the fourth step in the general framework for ethics.

a) Act and reflect on the outcome of your decision

b) Evaluate alternative actions

c) Get the facts

d) Make a decision and test it

e) Recognize an ethical issue

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

20) _________ is the final step in the general framework for ethics.

a) Act and reflect on the outcome of your decision

b) Evaluate alternative actions

c) Get the facts

d) Make a decision and test it

e) Recognize an ethical issue

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

21) _________ means that you accept the consequences of your decisions and actions.

a) Accountability

b) Answerability

c) Liability

d) Responsibility

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

22) Suppose you only study two hours for your next test. If you understand that means you may not do well on that test and you are willing to accept the lower grade, it means you are taking _________ for your actions.

a) accountability

b) answerability

c) liability

d) responsibility

Difficulty: Medium

Section Reference 1: 3.1

Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.

Bloomcode: Application

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

23) _________ refers to determining who is responsible for actions that were taken.

a) Accountability

b) Answerability

c) Liability

d) Responsibility

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

24) Suppose you only study two hours for your next test. You fail the test and tell the teacher that he or she obviously did a really terrible job teaching the material. This means you aren’t accepting _________ for your actions.

a) accountability

b) answerability

c) liability

d) responsibility

Difficulty: Medium

Section Reference 1: 3.1

Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.

Bloomcode: Application

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

25) _________ is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems.

a) Accountability

b) Answerability

c) Liability

d) Responsibility

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

26) Suppose you slip in the hallway and break your arm. You sue the school for not properly marking the wet spot that caused you to slip. This is an example of ________.

a) accountability

b) answerability

c) liability

d) responsibility

Difficulty: Medium

Section Reference 1: 3.1

Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.

Bloomcode: Application

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

27) _________ is the most recent example of ethical misbehavior in organizations.

a) Enron

b) Tyco

c) Wells Fargo bank

d) WorldCom

Difficulty: Medium

Section Reference 1: 3.1

Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

28) The Sarbanes-Oxley Act requires publicly held companies to implement _________ controls; it was passed to address the _________ crisis.

a) financial; Enron

b) financial; Wells Fargo bank

c) operational; Enron

d) operational; Wells Fargo bank

Difficulty: Hard

Section Reference 1: 3.1

Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

29) _________ issues involve collecting, storing, and disseminating information about individuals.

a) Accessibility

b) Accuracy

c) Privacy

d) Property

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

30) _________ issues involve the authenticity, fidelity, and correctness of information that is collected and processed.

a) Accessibility

b) Accuracy

c) Privacy

d) Property

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

31) You can check your credit report annually for free through TransUnion, Equifax, and Experian. This allows you to catch signs of identity theft early and note any problems in your credit reports. This is an example of an ethical issue that falls into the category of ________.

a) accessibility

b) accuracy

c) privacy

d) property

Difficulty: Hard

Section Reference 1: 3.1

Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.

Bloomcode: Evaluation

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

32) _________ issues involve the ownership and value of information.

a) Accessibility

b) Accuracy

c) Privacy

d) Property

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

33) _________ issues revolve around who should have access to information and whether they should pay a fee for this access.

a) Accessibility

b) Accuracy

c) Privacy

d) Property

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

34) Companies like Google and Facebook make their money by selling your information to advertisers. This is an example of an ethical issue that falls into the category of ________.

a) accessibility

b) accuracy

c) privacy

d) property

Difficulty: Hard

Section Reference 1: 3.1

Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.

Bloomcode: Evaluation

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

35) Which of the following is a privacy issue?

a) How can we ensure that the information will be processed properly and presented accurately to users?

b) How should we handle illegally copying copyrighted software?

c) What information about oneself should an individual be required to reveal to others?

d) What information does a person or an organization have a right to obtain, under what conditions, and with what safeguards?

Difficulty: Hard

Section Reference 1: 3.1

Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.

Bloomcode: Analysis

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

36) Which of the following is an accuracy issue?

a) How can we ensure that the information will be processed properly and presented accurately to users?

b) How should we handle illegally copying copyrighted software?

c) What information about oneself should an individual be required to reveal to others?

d) What information does a person or an organization have a right to obtain, under what conditions, and with what safeguards?

Difficulty: Medium

Section Reference 1: 3.1

Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.

Bloomcode: Analysis

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

37) Which of the following is a property issue?

a) How can we ensure that the information will be processed properly and presented accurately to users?

b) How should we handle illegally copying copyrighted software?

c) What information about oneself should an individual be required to reveal to others?

d) What information does a person or an organization have a right to obtain, under what conditions, and with what safeguards?

Difficulty: Medium

Section Reference 1: 3.1

Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.

Bloomcode: Analysis

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

38) Which of the following is an accessibility issue?

a) How can we ensure that the information will be processed properly and presented accurately to users?

b) How should we handle illegally copying copyrighted software?

c) What information about oneself should an individual be required to reveal to others?

d) What information does a person or an organization have a right to obtain, under what conditions, and with what safeguards?

Difficulty: Medium

Section Reference 1: 3.1

Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.

Bloomcode: Analysis

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

39) Which of the following is a privacy issue?

a) How can we ensure that errors in databases, data transmissions, and data processing are accidental and not intentional?

b) How much should companies charge for permitting access to information in their databases?

c) Under what circumstances can one use proprietary databases?

d) What information about individuals should be kept in databases, and how secure is the information there?

Difficulty: Hard

Section Reference 1: 3.1

Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.

Bloomcode: Analysis

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

40) Which of the following is an accuracy issue?

a) How can we ensure that errors in databases, data transmissions, and data processing are accidental and not intentional?

b) How much should companies charge for permitting access to information in their databases?

c) Under what circumstances can one use proprietary databases?

d) What information about individuals should be kept in databases, and how secure is the information there?

Difficulty: Medium

Section Reference 1: 3.1

Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.

Bloomcode: Analysis

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

41) Which of the following is a property issue?

a) How can we ensure that errors in databases, data transmissions, and data processing are accidental and not intentional?

b) How much should companies charge for permitting access to information in their databases?

c) Under what circumstances can one use proprietary databases?

d) What information about individuals should be kept in databases, and how secure is the information there?

Difficulty: Medium

Section Reference 1: 3.1

Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.

Bloomcode: Analysis

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

42) Which of the following is an accessibility issue?

a) How can we ensure that errors in databases, data transmissions, and data processing are accidental and not intentional?

b) How much should companies charge for permitting access to information in their databases?

c) Under what circumstances can one use proprietary databases?

d) What information about individuals should be kept in databases, and how secure is the information there?

Difficulty: Medium

Section Reference 1: 3.1

Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.

Bloomcode: Analysis

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

43) ________ can identify which clicks and key words had the largest impact on a consumer’s purchasing decision.

a) DoubleClick

b) Google Analytics

c) Google Attribution

d) Periscope Data Analysis

Difficulty: Easy

Section Reference 1: IT’s About Business 3.1

Learning Objective 1: 3.1

Bloomcode: Knowledge

Standard: AACSB || Technology

44) What does recent data from the U.S. Census Bureau indicate about consumer habits?

a) The majority of shopping takes place online at retailers such as Amazon and Alibaba.

b) The majority of shopping takes place offline, in brick-and-mortar stores.

c) Online versus offline shopping habits remain relatively evenly distributed.

d) The rise in popularity for consumer-to-consumer selling, such as Facebook Marketplace and Craigslist, has made it difficult to get accurate data about consumer shopping habits.

Difficulty: Medium

Section Reference 1: IT’s About Business 3.1

Learning Objective 1: 3.1

Bloomcode: Application

Standard: AACSB || Technology

45) What is considered to be the “holy grail” of online advertising?

a) Being able to determine repeat customers to an online retailer

b) Being able to determine exact spending habits of the 18-35 year old demographic

c) Being able to determine which Web browsers elicit the most ad revenue

d) Being able to determine purchases generated by online ad campaigns

Difficulty: Easy

Section Reference 1: IT’s About Business 3.1

Learning Objective 1: 3.1

Bloomcode: Comprehension

Standard: AACSB || Technology

46) _______ is a mobile, Web-based study application used by half of all high school students and one-third of all college students in the United States.

a) Brainly

b) Dropbox

c) Google Docs

d) Quizlet

Difficulty: Easy

Section Reference 1: IT’s About Business 3.2

Learning Objective 1: 3.1

Bloomcode: Knowledge

Standard: AACSB || Technology

47) The issues that came up in the Quizlet/Texas Christian University cheating scandal in 2018 highlighted the need for ____________.

a) more Web-based study tools to be available to students of all socioeconomic backgrounds.

b) universities to adapt to the changing nature of technology as it pertains to the ways in which students are learning.

c) widespread reform in terms of Internet access on college campuses.

d) colleges to revise their Codes of Conduct to eliminate the ambiguity in students using opensource study tools.

Difficulty: Medium

Section Reference 1: IT’s About Business 3.2

Learning Objective 1: 3.1

Bloomcode: Application

Standard: AACSB || Technology

48) _________ is NOT an example of a data aggregator.

a) Acxiom

b) ChoicePoint

c) Google

d) LexisNexis

Difficulty: Easy

Section Reference 1: 3.2

Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

49) Companies purchase digital dossiers to ________.

a) create customer intimacy

b) engage in electronic surveillance

c) evaluate the competition

d) track their own reputations

Difficulty: Medium

Section Reference 1: 3.2

Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

50) Photo tagging is a type of _________ technology.

a) facial recognition

b) GPS

c) information privacy

d) RFID

Difficulty: Easy

Section Reference 1: 3.2

Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

51) The _________ model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected.

a) opt-in

b) opt-out

c) sign-up

d) sign-out

Difficulty: Easy

Section Reference 1: 3.2

Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

52) The _________ model of informed consent prohibits an organization from collecting any personal information unless the customer specifically authorizes it.

a) opt-in

b) opt-out

c) sign-up

d) sign-out

Difficulty: Easy

Section Reference 1: 3.2

Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

53) Companies prefer the _________ model of informed consent.

a) opt-in

b) opt-out

c) sign-up

d) sign-out

Difficulty: Hard

Section Reference 1: 3.2

Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Evaluation

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

54) Europeans and privacy advocates prefer the _________ model of informed consent.

a) opt-in

b) opt-out

c) sign-up

d) sign-out

Difficulty: Hard

Section Reference 1: 3.2

Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Evaluation

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

55) License plate reader companies maintain that only two groups can use their software to find the owner of a car: law enforcement agencies and ______ companies.

a) advertising

b) insurance

c) loan

d) repossession

Difficulty: Easy

Section Reference 1: IT’s About Business 3.3

Learning Objective 1: 3.2

Bloomcode: Knowledge

Standard: AACSB || Technology

56) While law enforcement officials, insurance companies, and automakers might be proponents of LPR companies and the technology they use, private citizens are largely concerned with _______.

a) issues of privacy

b) elimination of certain jobs that the technology replaces

c) increased costs of things like municipal fees and fines and insurance premiums

d) the Department of Motor Vehicles’ access to this information

Difficulty: Medium

Section Reference 1: IT’s About Business 3.3

Learning Objective 1: 3.2

Bloomcode: Application

Standard: AACSB || Technology

57) Aadhaar is a _______ database.

a) biometric

b) credit card

c) password

d) security

Difficulty: Easy

Section Reference 1: IT’s About Business 3.4

Learning Objective 1: 3.2

Bloomcode: Knowledge

Standard: AACSB || Technology

58) ________ implemented a biometric database to better serve its poor citizens.

a) Australia

b) China

c) India

d) Russia

Difficulty: Easy

Section Reference 1: IT’s About Business 3.4

Learning Objective 1: 3.2

Bloomcode: Knowledge

Standard: AACSB || Technology

59) Which is NOT a current negative consequence of Aadhaar?

a) People were unfairly dropped from food subsidiary lists.

b) People have been dropped from life insurance programs.

c) Millions of users’ information has been leaked to non-government entities.

d) Government agencies have wrongfully published welfare beneficiaries’ information.

Difficulty: Easy

Section Reference 1: IT’s About Business 3.4

Learning Objective 1: 3.2

Bloomcode: Comprehension

Standard: AACSB || Technology

60) Some are concerned that the use of Aadhaar’s information will further impede _________.

a) tax collection

b) access to the Internet

c) social mobility

d) government transparency

Difficulty: Easy

Section Reference 1: IT’s About Business 3.4

Learning Objective 1: 3.2

Bloomcode: Comprehension

Standard: AACSB || Technology

61) The Facebook and Cambridge Analytica scandal occurred in ______; the problem started in ______.

a) 2016; 2010

b) 2016; 2017

c) 2018; 2010

d) 2018; 2017

Difficulty: Easy

Section Reference 1: IT’s About Business 3.5

Learning Objective 1: 3.2

Bloomcode: Knowledge

Standard: AACSB || Technology

62) The Cambridge Analytica scandal involved ______ user data.

a) Amazon

b) Facebook

c) Google

d) Twitter

Difficulty: Easy

Section Reference 1: IT’s About Business 3.5

Learning Objective 1: 3.2

Bloomcode: Knowledge

Standard: AACSB || Technology

63) Cambridge Analytica’s data collection of Facebook users has been used to impact and affect which area the most?

a) Politics

b) Retail

c) Banking and finance

d) Education

Difficulty: Easy

Section Reference 1: IT’s About Business 3.5

Learning Objective 1: 3.2

Bloomcode: Comprehension

Standard: AACSB || Technology

Question type: True/False

64) When a patient is admitted to a hospital emergency room, the physician

may have never seen them before, and must diagnose their problem quickly. If the physician knew the patient’s medical history, then the examination and subsequent diagnosis would be faster. To address this problem, the Government of Canada created Canada Health Infoway.

Difficulty: Easy

Section Reference 1: Closing Case

Learning Objective 1: 3.2

Bloomcode: Knowledge

Standard: AACSB || Technology

Question type: Multiple Choice

65) In Canada. Doctors across the country now use electronic medical records to access patient information online. Medical data is private, confidential data. There are three provinces that

had privacy laws that are considered similar enough to PIPEDA to be used in its stead: .

a) Alberta, British Columbia, and Ontario

b) Alberta, British Columbia, and Quebec

c) Alberta, British Columbia, and Manitoba

d) Alberta, Quebec, and Nova Scotia

Difficulty: Easy

Section Reference 1: Closing Case

Learning Objective 1: 3.2

Bloomcode: Knowledge

Standard: AACSB || Technology

66) One source of data used for medical and pharmaceutical research

is anonymized health data. IQVIA Biotech (www.iqviabiotech.com) is

a company that sells data to pharmaceutical industry when physicians and clinics

have given permission and patient’s data is striped of names and other personal

information. Why is this legal and does not violate Canadian legislation?

a) Such anonymized data is not covered by privacy legislation.

b) Because physicians and clinics are giving permission

c) Once data is collected by Doctors, they own the data and not patients

d) Privacy laws do not apply to a clinic’s data

Difficulty: Easy

Section Reference 1: Closing Case

Learning Objective 1: 3.2

Bloomcode: Knowledge

Standard: AACSB || Technology

67) What was the result of E-Health Saskatchewan tracking access to the health records for the privacy of the victims of the Humboldt Broncos junior hockey team bus crash of April 2018?

a) Several Doctors lost their license as a result of this tracking effort. .

b) Clinics were charged for selling private medical records to insurance companies.

c) Several doctors and an office manager were charged with inappropriately accessing the team’s medical records during April and May 2018.

d) E-Health Saskatchewan was charged with invasion of privacy by Doctors and Clinics.

Difficulty: Medium

Section Reference 1: Closing Case

Learning Objective 1: 3.2

Bloomcode: Application

Standard: AACSB || Technology

68) Besides doctors and medical clinics that are gathering electronic health information, who else is gathering health information?.

a) The manufactures of smartphones, tablets, and personal technology such as Fitbit

b) Gyms gather information on users

c) Car manufacturers gather health information of drivers

d) Walmart monitors and gathers health of information of consumers

Difficulty: Medium

Section Reference 1: Closing Case

Learning Objective 1: 3.2

Bloomcode: Application

Standard: AACSB || Technology

Question type: True/False

69) When you use an Internet app, the app could also have access to your data

Difficulty: Easy

Section Reference 1: Opening Case

Learning Objective 1: Define ethics and explain its three fundamental tenets and the four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard: AACSB || Technology

70) When you use your email, or an Internet browser, the advertisements change rapidly in response to your searches in Google.

Difficulty: Easy

Section Reference 1: Opening Case

Learning Objective 1: Define ethics and explain its three fundamental tenets and the four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard: AACSB || Technology

71) Deciding what is right or wrong is always easy and clear-cut.

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

72) What is unethical is not necessarily illegal.

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

73) If it is unethical, it is illegal.

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

74) All unethical actions are illegal in the United States.

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

75) All employees have a responsibility to encourage ethical uses of information and information technology.

Difficulty: Medium

Section Reference 1: 3.1

Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

76) You check your credit report annually to ensure your identity hasn’t been stolen. This is an example of a property issue.

Difficulty: Medium

Section Reference 1: 3.1

Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.

Bloomcode: Analysis

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

77) Google and Facebook collect, store, and disseminate a great deal of information about the people who use their websites. This is an example of an accuracy issue.

Difficulty: Medium

Section Reference 1: 3.1

Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.

Bloomcode: Application

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

78) Telemarketing and ads on Google are examples of accessibility issues.

Difficulty: Hard

Section Reference 1: 3.1

Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.

Bloomcode: Evaluation

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

79) Google can analyze offline purchase activity even when consumers deactivate location tracking on their smartphones.

Difficulty: Easy

Section Reference 1: IT’s About Business 3.1

Learning Objective 1: Define ethics and explain its three fundamental tenets and the four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard: AACSB || Technology

80) Privacy experts agree with Google that Google’s double-blind encryption ensures the privacy and security of consumer information.

Difficulty: Medium

Section Reference 1: IT’s About Business 3.1

Learning Objective 1: Define ethics and explain its three fundamental tenets and the four categories of ethical issues related to information technology.

Bloomcode: Comprehension

Standard: AACSB || Technology

81) Credit card data is only helpful to online retailers and publishers if those cards are used for purchasing items online; they do not provide relevant information for brick-and-mortar purchases.

Difficulty: Medium

Section Reference 1: IT’s About Business 3.1

Learning Objective 1: Define ethics and explain its three fundamental tenets and the four categories of ethical issues related to information technology.

Bloomcode: Comprehension

Standard: AACSB || Technology

82) The suspended Texas Christian University (TCU) students won their battle against TCU because there was not enough evidence to prove they had cheated using Quizlet.

Difficulty: Medium

Section Reference 1: IT’s About Business 3.2

Learning Objective 1: Define ethics and explain its three fundamental tenets and the four categories of ethical issues related to information technology.

Bloomcode: Comprehension

Standard: AACSB || Technology

83) Quizlet’s community guidelines explicitly prohibit cheating.

Difficulty: Easy

Section Reference 1: IT’s About Business 3.2

Learning Objective 1: Define ethics and explain its three fundamental tenets and the four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard: AACSB || Technology

84) One thing that the popularity of open source and online studying resources has uncovered is that what learning looks like in many areas of study has drastically changed.

Difficulty: Easy

Section Reference 1: IT’s About Business 3.2

Learning Objective 1: Define ethics and explain its three fundamental tenets and the four categories of ethical issues related to information technology.

Bloomcode: Comprehension

Standard: AACSB || Technology

85) Privacy rights apply only to individuals.

Difficulty: Medium

Section Reference 1: 3.2

Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

86) Privacy rights apply to individuals, groups, and institutions.

Difficulty: Easy

Section Reference 1: 3.2

Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

87) The right to privacy is recognized today in all the US states and by the federal government, either by statute or in common law.

Difficulty: Hard

Section Reference 1: 3.2

Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

88) The right of privacy is absolute.

Difficulty: Medium

Section Reference 1: 3.2

Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

89) The right of privacy is not absolute.

Difficulty: Medium

Section Reference 1: 3.2

Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

90) Privacy must be balanced against the needs of society.

Difficulty: Medium

Section Reference 1: 3.2

Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

91) The public’s right to know supersedes the individual’s right of privacy.

Difficulty: Medium

Section Reference 1: 3.2

Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

92) The public’s right to know isn’t as important as the individual’s right of privacy.

Difficulty: Medium

Section Reference 1: 3.2

Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

93) Advancements in information technology make privacy harder to manage.

Difficulty: Medium

Section Reference 1: 3.2

Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Analysis

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

94) Data aggregators can collect public and non-public information to create digital dossiers.

Difficulty: Medium

Section Reference 1: 3.2

Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

95) Smartphones are sensors that can be used for electronic surveillance.

Difficulty: Easy

Section Reference 1: 3.2

Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

96) The United Nations ensures privacy laws are consistent across countries so that it is easier to do business in multiple countries.

Difficulty: Easy

Section Reference 1: 3.2

Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

97) The European Union has stricter data protection laws than the US.

Difficulty: Medium

Section Reference 1: 3.2

Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

98) The city of Boston suspended its license plate reader program because it accidently revealed information to a newspaper.

Difficulty: Easy

Section Reference 1: IT’s About Business 3.3

Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard: AACSB || Technology

99) Vigilant makes money by charging police departments for license plate readers and access to its databases.

Difficulty: Easy

Section Reference 1: IT’s About Business 3.3

Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard: AACSB || Technology

100) The Driver’s Privacy Protection Act of 1994 does not limit who can access information about automobile registrations and drivers, only what information can be used for.

Difficulty: Medium

Section Reference 1: IT’s About Business 3.3

Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Analysis

Standard: AACSB || Technology

101) Critics view Aadhaar as a step toward a surveillance state.

Difficulty: Easy

Section Reference 1: IT’s About Business 3.4

Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard: AACSB || Technology

102) As anticipated by Aadhaar’s opponents, the Supreme Court found that Aadhaar violates privacy rights.

Difficulty: Easy

Section Reference 1: IT’s About Business 3.4

Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard: AACSB || Technology

103) The origination of Aadhaar was from a benevolent place: identifying impoverished Indians so that they could be documented and therefore receive government benefits.

Difficulty: Easy

Section Reference 1: IT’s About Business 3.4

Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Comprehension

Standard: AACSB || Technology

104) According to Facebook executives, the Facebook and Cambridge Analytica scandal occurred because hackers got access to the database by stealing key passwords from users.

Difficulty: Easy

Section Reference 1: IT’s About Business 3.5

Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard: AACSB || Technology

105) Facebook’s main legal battles are against Russia.

Difficulty: Easy

Section Reference 1: IT’s About Business 3.5

Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard: AACSB || Technology

106) Much of the discovery of the ways in which Cambridge Analytica and Facebook were misusing user data came from the Pew Research Center.

Difficulty: Easy

Section Reference 1: IT’s About Business 3.5

Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Comprehension

Standard: AACSB || Technology

107) Facebook has been harshly fined and has undergone massive restructuring as a result of the discovery of the Cambridge Analytica scandal.

Difficulty: Medium

Section Reference 1: IT’s About Business 3.5

Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Application

Standard: AACSB || Technology

Question type: Text Entry

108) _____ refers to the principles of right and wrong that individuals use to make choices that guide their behavior.

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

109) The utilitarian approach states that an ethical action is the one that provides the most ___ or does the least ___.

Answer 1: good

Answer 2: harm

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

110) The fairness approach posits that ethical actions treat all human beings equally, or, if unequally, then fairly, based on some ___.

Difficulty: Medium

Section Reference 1: 3.1

Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

111) The common good approach highlights the ___ relationships that underlie all societies.

Difficulty: Medium

Section Reference 1: 3.1

Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

112) The deontology approach states that the morality of an action is based on whether that action itself is right or wrong under a series of rules, rather than based on the ___ of that action.

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

113) ___ is the right to be left alone and to be free of unreasonable personal intrusions.

Difficulty: Easy

Section Reference 1: 3.2

Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

114) Privacy is the right to be ___ and to be free of unreasonable personal intrusions.

Difficulty: Medium

Section Reference 1: 3.2

Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

115) Information privacy is the right to determine when, and to what extent, ___ about you can be gathered or communicated to others.

Difficulty: Medium

Section Reference 1: 3.2

Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

116) ___ is the right to determine when, and to what extent, information about you can be gathered or communicated to others.

Difficulty: Easy

Section Reference 1: 3.2

Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

117) The process of forming a digital dossier is called ___.

Difficulty: Easy

Section Reference 1: 3.2

Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

Question type: Essay

118) What is ethics? Is an ethical decision easy and clear-cut? Why or why not? List and describe the five widely used ethical standards/frameworks. Evaluate a SINGLE ethical scenario with all five approaches.

Difficulty: Hard

Section Reference 1: 3.1

Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.

Bloomcode: Synthesis, Evaluation

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

Standard 3 : AACSB || Communication

Standard 4 : AACSB || Analytic

Standard 5 : AACSB || Reflective Thinking

Solution: Ethics – principles of right and wrong that individuals use to make choices that guide their behavior
No because an answer could be different based on the approach chosen
1) Utilitarian approach states that an ethical action is the one that provides the most good or does the least harm; a policeman killing a person who is holding others hostage is best for those being held hostage
2) Rights approach maintains that an ethical action is the one that best protects and respects the moral rights of the affected parties; nobody should be killed because everyone has the right to live
3) Fairness approach posits that ethical actions treat all human beings equally, or, if unequally, then fairly, based on some defensible standard; killing someone who is holding others hostage is fair because people know it isn’t right to threaten the lives of others
4) Common good approach highlights the interlocking relationships that underlie all societies; the police being on-scene is for the best of everyone – they have the right to kill under these circumstances
5) Deontology approach states that the morality of an action is based on whether than action itself is right or wrong under a series of rules, rather than based on the consequences of that action; it is never OK to kill a person even if they are being “bad”

119) The concept of “green IT” is an ethical decision every company needs to make. Using the five steps in the general framework for ethical decision-making, how would you handle the situation if you were the CEO?

Difficulty: Medium

Section Reference 1: 3.1

Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.

Bloomcode: Application

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

Standard 3 : AACSB || Communication

Standard 4 : AACSB || Reflective Thinking

Solution: 1) Recognize an ethical issue – could not being green damage the environment? What are the good and bad alternatives for being green? Are there legal requirements for being green (energy consumption, pollution, etc.) ?
2) Get the facts – what area will be hurt by non-green activities (water, air, land)? Sufficient information? Who has a stake (environmental groups, customers, suppliers)? Have I consulted those people?
3) Evaluate alternative actions – 5 approaches – utilitarian, rights, fairness, common good, deontology
4) Make a decision and test it – pick an option
5) Act and reflect on the outcome of your decision – am I taking better care of the environment?

120) Describe five ways a digital dossier is created. Describe a potential profile that has been created for your life.

Difficulty: Hard

Section Reference 1: 3.2

Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Synthesis

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

Standard 3 : AACSB || Communication

Standard 4 : AACSB || Reflective Thinking

Solution: Surveillance cameras on roads or in buildings, credit card transactions, telephone calls, banking transactions, queries to search engines, government records
Potential profile – many schools have cameras and many towns have cameras at intersections to record what students are doing at school or on the road (students may also have ID badges that are required to get into buildings) ; many students already have credit cards so purchases are tracked, all activity on phones can be tracked including phone calls and text messages, many students are already doing online banking, all Internet searching is tracked, students may also talk about traveling, Facebook activity (photo tagging) , etc., basically, everything we do can be tracked

121) Who conducts electronic surveillance? What types of electronic surveillance impact your life? Are you paranoid about this? If not, should you be? Explain why or why not for these last two questions.

Difficulty: Medium

Section Reference 1: 3.2

Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Application

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

Standard 3 : AACSB || Communication

Standard 4 : AACSB || Reflective Thinking

Solution: Cameras at many public venues, digital sensors everywhere (smartphones have many capabilities now), ID cards, webcams, video-game motion sensors, satellite photos, biometric readers, GPS, facial recognition technology (and photo tagging), in-store digital billboards that watch activity, drones, URL filtering, etc.

122) How does the Internet create a conflict between free speech and privacy?

Difficulty: Medium

Section Reference 1: 3.2

Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Analysis

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

Standard 3 : AACSB || Communication

Standard 4 : AACSB || Reflective Thinking

Solution: Easy to be anonymous and derogatory with no basis of fact and no recourse; companies can check the Internet on potential and current employees, but people may not be able to defend themselves (could harm chances of getting hired or could result in getting fired).

123) Given the global nature of our economy, what are the international aspects of privacy that we need to consider in our business dealings?

Difficulty: Easy

Section Reference 1: 3.2

Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Comprehension

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

Standard 3 : AACSB || Communication

Solution: 50 countries have data protection laws
Some countries have stricter laws (Europe)
No consistent or uniform standards for privacy and security – obstructs flow of information among countries (transborder data flows)
Privacy issues – whose laws do you follow?
Come up with “safe harbor” frameworks for regulation

Document Information

Document Type:
DOCX
Chapter Number:
3
Created Date:
Aug 21, 2025
Chapter Name:
Chapter 3 Ethics and Privacy Test Bank
Author:
R. Kelly Rainer

Connected Book

Info Systems Canada 5e | Exam Pack

By R. Kelly Rainer

Test Bank General
View Product →

$24.99

100% satisfaction guarantee

Buy Full Test Bank

Benefits

Immediately available after payment
Answers are available after payment
ZIP file includes all related files
Files are in Word format (DOCX)
Check the description to see the contents of each ZIP file
We do not share your information with any third party