Ch.3 Ethics and Privacy Test Bank Test Questions & Answers - Info Systems Canada 5e | Exam Pack by R. Kelly Rainer. DOCX document preview.
Package Title: Chapter 3, Testbank
Course Title: Rainer, IS 5e
Chapter Number: 3
Question type: Multiple Choice
1) Google understands that to attract digital advertising dollars from advertiser, they: .
a) Must provide discounts to users
b) Must prove that digital ads work
c) Must work with customers and offer them loyalty programs
d) Must first negotiate with the Canadian Government a regulation to protect privacy
Difficulty: Easy
Section Reference 1: IT’s about Business 3.1
Learning Objective 1: 3.1
Bloomcode: Knowledge
Standard: AACSB || Technology
2) Online publishers use tracking code from Google, Facebook, and many other companies to help target their advertising. What is a concern about this for individuals? ________.
a) That publishers should share profits with Google, Facebook and others
b) Privacy needs to be scrutinized more carefully.
c) That publishers should pay to users a fee for using their private information
d) That publishers should be careful to display only ads that are of interest to users
Difficulty: Easy
Section Reference 1: IT’s about Business 3.1
Learning Objective 1: 3.1
Bloomcode: Application
Standard: AACSB || Technology
3) How does Google protects the privacy of consumers?.
a) Through an agreement between Google and sellers
b) By using patent-pending mathematical formulas when it matches one of its users with a shopper who makes a purchase in a brick-and-mortar store
c) Through Google Attribution
d) Through Periscope Data Analysis
Difficulty: Easy
Section Reference 1: IT’s about Business 3.1
Learning Objective 1: 3.1
Bloomcode: Knowledge
Standard: AACSB || Technology
4) In regards to technology used by Google to protect the privacy of consumers, Paul Stephens of Privacy Rights Clearinghouse has asserted that a marketing organization can identify an individual by examining only a few pieces of data. He expressed skepticism about Google’s technology because:
a) The Google’s system for guarding the identities of users will stand up to the efforts of hackers
b) The Google’s system does not have a strong encryption algorithm
c) The Google’s system is too new to be trusted
d) The Google’s system is not meant to protect privacy but to share data with partners to increase profits
Difficulty: Easy
Section Reference 1: IT’s about Business 3.1
Learning Objective 1: 3.1
Bloomcode: Knowledge
Standard: AACSB || Technology
5) Marc Rotenberg, executive director of the Electronic Privacy Information Center, claims companies are becoming increasingly intrusive in terms of their data collection and are secretive as to how they gather and use those data. He proposed that:
a) Government regulators and the U.S. Congress should charge an extra tax to Google and other technology companies that are collecting and using data from their users G
b) Government regulators and the U.S. Congress should demand answers about how Google and other technology companies are collecting and using data from their users.
c) Government regulators and the U.S. Congress should request to Google and other technology companies that are collecting and using data from their users to give them access to their systems so they can control that they do.
d) Government regulators and the U.S. Congress should shut down Google and other technology companies that are collecting and using data from their users
Difficulty: Easy
Section Reference 1: IT’s about Business 3.1Learning Objective 1: 3.1
Bloomcode: Application
Standard: AACSB || Technology
6) The _________ approach states that an ethical action is the one that provides the most good or does the least harm.
a) common good
b) deontology
c) fairness
d) rights
e) utilitarian
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
7) Minimizing the organization’s carbon footprint and otherwise striving for “green IT” is an example of a _________ approach.
a) common good
b) deontology
c) fairness
d) rights
e) utilitarian
Difficulty: Hard
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.
Bloomcode: Synthesis, Evaluation
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
8) The _________ approach maintains that an ethical action is the one that best protects and respects the moral rights of the affected parties.
a) common good
b) deontology
c) fairness
d) rights
e) utilitarian
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
9) The pursuit of the “American dream” and our ability to choose our religious orientation is a reflection of the _________ approach.
a) common good
b) deontology
c) fairness
d) rights
e) utilitarian
Difficulty: Medium
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.
Bloomcode: Application
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
10) The _________ approach posits that ethical actions treat all human beings equally, or, if unequally, then fairly, based on some defensible standard.
a) common good
b) deontology
c) fairness
d) rights
e) utilitarian
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
11) The debate over CEO salaries being so much higher than other employees is an issue addressed by the _________ approach.
a) common good
b) deontology
c) fairness
d) rights
e) utilitarian
Difficulty: Medium
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.
Bloomcode: Analysis
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
12) The _________ approach highlights the interlocking relationships that underlie all societies.
a) common good
b) deontology
c) fairness
d) rights
e) utilitarian
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
13) Obamacare was created to address the _________ approach.
a) common good
b) deontology
c) fairness
d) rights
e) utilitarian
Difficulty: Hard
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.
Bloomcode: Evaluation
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
14) The _________ approach states that the morality of an action is based on whether the action itself is right or wrong under a series of rules, rather than based on the consequences of that action.
a) common good
b) deontology
c) fairness
d) rights
e) utilitarian
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
15) Suppose that you believe that killing someone is wrong even if it is self-defense. This is an example of the _________ approach.
a) common good
b) deontology
c) fairness
d) rights
e) utilitarian
Difficulty: Medium
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.
Bloomcode: Knowledge, Evaluation
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
16) _________ is the first step in the general framework for ethics.
a) Act and reflect on the outcome of your decision
b) Evaluate alternative actions
c) Get the facts
d) Make a decision and test it
e) Recognize an ethical issue
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
17) _________ is the second step in the general framework for ethics.
a) Act and reflect on the outcome of your decision
b) Evaluate alternative actions
c) Get the facts
d) Make a decision and test it
e) Recognize an ethical issue
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
18) _________ is the third step in the general framework for ethics.
a) Act and reflect on the outcome of your decision
b) Evaluate alternative actions
c) Get the facts
d) Make a decision and test it
e) Recognize an ethical issue
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
19) _________ is the fourth step in the general framework for ethics.
a) Act and reflect on the outcome of your decision
b) Evaluate alternative actions
c) Get the facts
d) Make a decision and test it
e) Recognize an ethical issue
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
20) _________ is the final step in the general framework for ethics.
a) Act and reflect on the outcome of your decision
b) Evaluate alternative actions
c) Get the facts
d) Make a decision and test it
e) Recognize an ethical issue
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
21) _________ means that you accept the consequences of your decisions and actions.
a) Accountability
b) Answerability
c) Liability
d) Responsibility
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
22) Suppose you only study two hours for your next test. If you understand that means you may not do well on that test and you are willing to accept the lower grade, it means you are taking _________ for your actions.
a) accountability
b) answerability
c) liability
d) responsibility
Difficulty: Medium
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.
Bloomcode: Application
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
23) _________ refers to determining who is responsible for actions that were taken.
a) Accountability
b) Answerability
c) Liability
d) Responsibility
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
24) Suppose you only study two hours for your next test. You fail the test and tell the teacher that he or she obviously did a really terrible job teaching the material. This means you aren’t accepting _________ for your actions.
a) accountability
b) answerability
c) liability
d) responsibility
Difficulty: Medium
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.
Bloomcode: Application
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
25) _________ is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems.
a) Accountability
b) Answerability
c) Liability
d) Responsibility
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
26) Suppose you slip in the hallway and break your arm. You sue the school for not properly marking the wet spot that caused you to slip. This is an example of ________.
a) accountability
b) answerability
c) liability
d) responsibility
Difficulty: Medium
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.
Bloomcode: Application
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
27) _________ is the most recent example of ethical misbehavior in organizations.
a) Enron
b) Tyco
c) Wells Fargo bank
d) WorldCom
Difficulty: Medium
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
28) The Sarbanes-Oxley Act requires publicly held companies to implement _________ controls; it was passed to address the _________ crisis.
a) financial; Enron
b) financial; Wells Fargo bank
c) operational; Enron
d) operational; Wells Fargo bank
Difficulty: Hard
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
29) _________ issues involve collecting, storing, and disseminating information about individuals.
a) Accessibility
b) Accuracy
c) Privacy
d) Property
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
30) _________ issues involve the authenticity, fidelity, and correctness of information that is collected and processed.
a) Accessibility
b) Accuracy
c) Privacy
d) Property
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
31) You can check your credit report annually for free through TransUnion, Equifax, and Experian. This allows you to catch signs of identity theft early and note any problems in your credit reports. This is an example of an ethical issue that falls into the category of ________.
a) accessibility
b) accuracy
c) privacy
d) property
Difficulty: Hard
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.
Bloomcode: Evaluation
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
32) _________ issues involve the ownership and value of information.
a) Accessibility
b) Accuracy
c) Privacy
d) Property
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
33) _________ issues revolve around who should have access to information and whether they should pay a fee for this access.
a) Accessibility
b) Accuracy
c) Privacy
d) Property
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
34) Companies like Google and Facebook make their money by selling your information to advertisers. This is an example of an ethical issue that falls into the category of ________.
a) accessibility
b) accuracy
c) privacy
d) property
Difficulty: Hard
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.
Bloomcode: Evaluation
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
35) Which of the following is a privacy issue?
a) How can we ensure that the information will be processed properly and presented accurately to users?
b) How should we handle illegally copying copyrighted software?
c) What information about oneself should an individual be required to reveal to others?
d) What information does a person or an organization have a right to obtain, under what conditions, and with what safeguards?
Difficulty: Hard
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.
Bloomcode: Analysis
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
36) Which of the following is an accuracy issue?
a) How can we ensure that the information will be processed properly and presented accurately to users?
b) How should we handle illegally copying copyrighted software?
c) What information about oneself should an individual be required to reveal to others?
d) What information does a person or an organization have a right to obtain, under what conditions, and with what safeguards?
Difficulty: Medium
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.
Bloomcode: Analysis
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
37) Which of the following is a property issue?
a) How can we ensure that the information will be processed properly and presented accurately to users?
b) How should we handle illegally copying copyrighted software?
c) What information about oneself should an individual be required to reveal to others?
d) What information does a person or an organization have a right to obtain, under what conditions, and with what safeguards?
Difficulty: Medium
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.
Bloomcode: Analysis
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
38) Which of the following is an accessibility issue?
a) How can we ensure that the information will be processed properly and presented accurately to users?
b) How should we handle illegally copying copyrighted software?
c) What information about oneself should an individual be required to reveal to others?
d) What information does a person or an organization have a right to obtain, under what conditions, and with what safeguards?
Difficulty: Medium
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.
Bloomcode: Analysis
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
39) Which of the following is a privacy issue?
a) How can we ensure that errors in databases, data transmissions, and data processing are accidental and not intentional?
b) How much should companies charge for permitting access to information in their databases?
c) Under what circumstances can one use proprietary databases?
d) What information about individuals should be kept in databases, and how secure is the information there?
Difficulty: Hard
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.
Bloomcode: Analysis
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
40) Which of the following is an accuracy issue?
a) How can we ensure that errors in databases, data transmissions, and data processing are accidental and not intentional?
b) How much should companies charge for permitting access to information in their databases?
c) Under what circumstances can one use proprietary databases?
d) What information about individuals should be kept in databases, and how secure is the information there?
Difficulty: Medium
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.
Bloomcode: Analysis
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
41) Which of the following is a property issue?
a) How can we ensure that errors in databases, data transmissions, and data processing are accidental and not intentional?
b) How much should companies charge for permitting access to information in their databases?
c) Under what circumstances can one use proprietary databases?
d) What information about individuals should be kept in databases, and how secure is the information there?
Difficulty: Medium
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.
Bloomcode: Analysis
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
42) Which of the following is an accessibility issue?
a) How can we ensure that errors in databases, data transmissions, and data processing are accidental and not intentional?
b) How much should companies charge for permitting access to information in their databases?
c) Under what circumstances can one use proprietary databases?
d) What information about individuals should be kept in databases, and how secure is the information there?
Difficulty: Medium
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.
Bloomcode: Analysis
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
43) ________ can identify which clicks and key words had the largest impact on a consumer’s purchasing decision.
a) DoubleClick
b) Google Analytics
c) Google Attribution
d) Periscope Data Analysis
Difficulty: Easy
Section Reference 1: IT’s About Business 3.1
Learning Objective 1: 3.1
Bloomcode: Knowledge
Standard: AACSB || Technology
44) What does recent data from the U.S. Census Bureau indicate about consumer habits?
a) The majority of shopping takes place online at retailers such as Amazon and Alibaba.
b) The majority of shopping takes place offline, in brick-and-mortar stores.
c) Online versus offline shopping habits remain relatively evenly distributed.
d) The rise in popularity for consumer-to-consumer selling, such as Facebook Marketplace and Craigslist, has made it difficult to get accurate data about consumer shopping habits.
Difficulty: Medium
Section Reference 1: IT’s About Business 3.1
Learning Objective 1: 3.1
Bloomcode: Application
Standard: AACSB || Technology
45) What is considered to be the “holy grail” of online advertising?
a) Being able to determine repeat customers to an online retailer
b) Being able to determine exact spending habits of the 18-35 year old demographic
c) Being able to determine which Web browsers elicit the most ad revenue
d) Being able to determine purchases generated by online ad campaigns
Difficulty: Easy
Section Reference 1: IT’s About Business 3.1
Learning Objective 1: 3.1
Bloomcode: Comprehension
Standard: AACSB || Technology
46) _______ is a mobile, Web-based study application used by half of all high school students and one-third of all college students in the United States.
a) Brainly
b) Dropbox
c) Google Docs
d) Quizlet
Difficulty: Easy
Section Reference 1: IT’s About Business 3.2
Learning Objective 1: 3.1
Bloomcode: Knowledge
Standard: AACSB || Technology
47) The issues that came up in the Quizlet/Texas Christian University cheating scandal in 2018 highlighted the need for ____________.
a) more Web-based study tools to be available to students of all socioeconomic backgrounds.
b) universities to adapt to the changing nature of technology as it pertains to the ways in which students are learning.
c) widespread reform in terms of Internet access on college campuses.
d) colleges to revise their Codes of Conduct to eliminate the ambiguity in students using opensource study tools.
Difficulty: Medium
Section Reference 1: IT’s About Business 3.2
Learning Objective 1: 3.1
Bloomcode: Application
Standard: AACSB || Technology
48) _________ is NOT an example of a data aggregator.
a) Acxiom
b) ChoicePoint
c) Google
d) LexisNexis
Difficulty: Easy
Section Reference 1: 3.2
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
49) Companies purchase digital dossiers to ________.
a) create customer intimacy
b) engage in electronic surveillance
c) evaluate the competition
d) track their own reputations
Difficulty: Medium
Section Reference 1: 3.2
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
50) Photo tagging is a type of _________ technology.
a) facial recognition
b) GPS
c) information privacy
d) RFID
Difficulty: Easy
Section Reference 1: 3.2
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
51) The _________ model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected.
a) opt-in
b) opt-out
c) sign-up
d) sign-out
Difficulty: Easy
Section Reference 1: 3.2
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
52) The _________ model of informed consent prohibits an organization from collecting any personal information unless the customer specifically authorizes it.
a) opt-in
b) opt-out
c) sign-up
d) sign-out
Difficulty: Easy
Section Reference 1: 3.2
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
53) Companies prefer the _________ model of informed consent.
a) opt-in
b) opt-out
c) sign-up
d) sign-out
Difficulty: Hard
Section Reference 1: 3.2
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Evaluation
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
54) Europeans and privacy advocates prefer the _________ model of informed consent.
a) opt-in
b) opt-out
c) sign-up
d) sign-out
Difficulty: Hard
Section Reference 1: 3.2
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Evaluation
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
55) License plate reader companies maintain that only two groups can use their software to find the owner of a car: law enforcement agencies and ______ companies.
a) advertising
b) insurance
c) loan
d) repossession
Difficulty: Easy
Section Reference 1: IT’s About Business 3.3
Learning Objective 1: 3.2
Bloomcode: Knowledge
Standard: AACSB || Technology
56) While law enforcement officials, insurance companies, and automakers might be proponents of LPR companies and the technology they use, private citizens are largely concerned with _______.
a) issues of privacy
b) elimination of certain jobs that the technology replaces
c) increased costs of things like municipal fees and fines and insurance premiums
d) the Department of Motor Vehicles’ access to this information
Difficulty: Medium
Section Reference 1: IT’s About Business 3.3
Learning Objective 1: 3.2
Bloomcode: Application
Standard: AACSB || Technology
57) Aadhaar is a _______ database.
a) biometric
b) credit card
c) password
d) security
Difficulty: Easy
Section Reference 1: IT’s About Business 3.4
Learning Objective 1: 3.2
Bloomcode: Knowledge
Standard: AACSB || Technology
58) ________ implemented a biometric database to better serve its poor citizens.
a) Australia
b) China
c) India
d) Russia
Difficulty: Easy
Section Reference 1: IT’s About Business 3.4
Learning Objective 1: 3.2
Bloomcode: Knowledge
Standard: AACSB || Technology
59) Which is NOT a current negative consequence of Aadhaar?
a) People were unfairly dropped from food subsidiary lists.
b) People have been dropped from life insurance programs.
c) Millions of users’ information has been leaked to non-government entities.
d) Government agencies have wrongfully published welfare beneficiaries’ information.
Difficulty: Easy
Section Reference 1: IT’s About Business 3.4
Learning Objective 1: 3.2
Bloomcode: Comprehension
Standard: AACSB || Technology
60) Some are concerned that the use of Aadhaar’s information will further impede _________.
a) tax collection
b) access to the Internet
c) social mobility
d) government transparency
Difficulty: Easy
Section Reference 1: IT’s About Business 3.4
Learning Objective 1: 3.2
Bloomcode: Comprehension
Standard: AACSB || Technology
61) The Facebook and Cambridge Analytica scandal occurred in ______; the problem started in ______.
a) 2016; 2010
b) 2016; 2017
c) 2018; 2010
d) 2018; 2017
Difficulty: Easy
Section Reference 1: IT’s About Business 3.5
Learning Objective 1: 3.2
Bloomcode: Knowledge
Standard: AACSB || Technology
62) The Cambridge Analytica scandal involved ______ user data.
a) Amazon
b) Facebook
c) Google
d) Twitter
Difficulty: Easy
Section Reference 1: IT’s About Business 3.5
Learning Objective 1: 3.2
Bloomcode: Knowledge
Standard: AACSB || Technology
63) Cambridge Analytica’s data collection of Facebook users has been used to impact and affect which area the most?
a) Politics
b) Retail
c) Banking and finance
d) Education
Difficulty: Easy
Section Reference 1: IT’s About Business 3.5
Learning Objective 1: 3.2
Bloomcode: Comprehension
Standard: AACSB || Technology
Question type: True/False
64) When a patient is admitted to a hospital emergency room, the physician
may have never seen them before, and must diagnose their problem quickly. If the physician knew the patient’s medical history, then the examination and subsequent diagnosis would be faster. To address this problem, the Government of Canada created Canada Health Infoway.
Difficulty: Easy
Section Reference 1: Closing Case
Learning Objective 1: 3.2
Bloomcode: Knowledge
Standard: AACSB || Technology
Question type: Multiple Choice
65) In Canada. Doctors across the country now use electronic medical records to access patient information online. Medical data is private, confidential data. There are three provinces that
had privacy laws that are considered similar enough to PIPEDA to be used in its stead: .
a) Alberta, British Columbia, and Ontario
b) Alberta, British Columbia, and Quebec
c) Alberta, British Columbia, and Manitoba
d) Alberta, Quebec, and Nova Scotia
Difficulty: Easy
Section Reference 1: Closing Case
Learning Objective 1: 3.2
Bloomcode: Knowledge
Standard: AACSB || Technology
66) One source of data used for medical and pharmaceutical research
is anonymized health data. IQVIA Biotech (www.iqviabiotech.com) is
a company that sells data to pharmaceutical industry when physicians and clinics
have given permission and patient’s data is striped of names and other personal
information. Why is this legal and does not violate Canadian legislation?
a) Such anonymized data is not covered by privacy legislation.
b) Because physicians and clinics are giving permission
c) Once data is collected by Doctors, they own the data and not patients
d) Privacy laws do not apply to a clinic’s data
Difficulty: Easy
Section Reference 1: Closing Case
Learning Objective 1: 3.2
Bloomcode: Knowledge
Standard: AACSB || Technology
67) What was the result of E-Health Saskatchewan tracking access to the health records for the privacy of the victims of the Humboldt Broncos junior hockey team bus crash of April 2018?
a) Several Doctors lost their license as a result of this tracking effort. .
b) Clinics were charged for selling private medical records to insurance companies.
c) Several doctors and an office manager were charged with inappropriately accessing the team’s medical records during April and May 2018.
d) E-Health Saskatchewan was charged with invasion of privacy by Doctors and Clinics.
Difficulty: Medium
Section Reference 1: Closing Case
Learning Objective 1: 3.2
Bloomcode: Application
Standard: AACSB || Technology
68) Besides doctors and medical clinics that are gathering electronic health information, who else is gathering health information?.
a) The manufactures of smartphones, tablets, and personal technology such as Fitbit
b) Gyms gather information on users
c) Car manufacturers gather health information of drivers
d) Walmart monitors and gathers health of information of consumers
Difficulty: Medium
Section Reference 1: Closing Case
Learning Objective 1: 3.2
Bloomcode: Application
Standard: AACSB || Technology
Question type: True/False
69) When you use an Internet app, the app could also have access to your data
Difficulty: Easy
Section Reference 1: Opening Case
Learning Objective 1: Define ethics and explain its three fundamental tenets and the four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard: AACSB || Technology
70) When you use your email, or an Internet browser, the advertisements change rapidly in response to your searches in Google.
Difficulty: Easy
Section Reference 1: Opening Case
Learning Objective 1: Define ethics and explain its three fundamental tenets and the four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard: AACSB || Technology
71) Deciding what is right or wrong is always easy and clear-cut.
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
72) What is unethical is not necessarily illegal.
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
73) If it is unethical, it is illegal.
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
74) All unethical actions are illegal in the United States.
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
75) All employees have a responsibility to encourage ethical uses of information and information technology.
Difficulty: Medium
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
76) You check your credit report annually to ensure your identity hasn’t been stolen. This is an example of a property issue.
Difficulty: Medium
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.
Bloomcode: Analysis
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
77) Google and Facebook collect, store, and disseminate a great deal of information about the people who use their websites. This is an example of an accuracy issue.
Difficulty: Medium
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.
Bloomcode: Application
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
78) Telemarketing and ads on Google are examples of accessibility issues.
Difficulty: Hard
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.
Bloomcode: Evaluation
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
79) Google can analyze offline purchase activity even when consumers deactivate location tracking on their smartphones.
Difficulty: Easy
Section Reference 1: IT’s About Business 3.1
Learning Objective 1: Define ethics and explain its three fundamental tenets and the four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard: AACSB || Technology
80) Privacy experts agree with Google that Google’s double-blind encryption ensures the privacy and security of consumer information.
Difficulty: Medium
Section Reference 1: IT’s About Business 3.1
Learning Objective 1: Define ethics and explain its three fundamental tenets and the four categories of ethical issues related to information technology.
Bloomcode: Comprehension
Standard: AACSB || Technology
81) Credit card data is only helpful to online retailers and publishers if those cards are used for purchasing items online; they do not provide relevant information for brick-and-mortar purchases.
Difficulty: Medium
Section Reference 1: IT’s About Business 3.1
Learning Objective 1: Define ethics and explain its three fundamental tenets and the four categories of ethical issues related to information technology.
Bloomcode: Comprehension
Standard: AACSB || Technology
82) The suspended Texas Christian University (TCU) students won their battle against TCU because there was not enough evidence to prove they had cheated using Quizlet.
Difficulty: Medium
Section Reference 1: IT’s About Business 3.2
Learning Objective 1: Define ethics and explain its three fundamental tenets and the four categories of ethical issues related to information technology.
Bloomcode: Comprehension
Standard: AACSB || Technology
83) Quizlet’s community guidelines explicitly prohibit cheating.
Difficulty: Easy
Section Reference 1: IT’s About Business 3.2
Learning Objective 1: Define ethics and explain its three fundamental tenets and the four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard: AACSB || Technology
84) One thing that the popularity of open source and online studying resources has uncovered is that what learning looks like in many areas of study has drastically changed.
Difficulty: Easy
Section Reference 1: IT’s About Business 3.2
Learning Objective 1: Define ethics and explain its three fundamental tenets and the four categories of ethical issues related to information technology.
Bloomcode: Comprehension
Standard: AACSB || Technology
85) Privacy rights apply only to individuals.
Difficulty: Medium
Section Reference 1: 3.2
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
86) Privacy rights apply to individuals, groups, and institutions.
Difficulty: Easy
Section Reference 1: 3.2
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
87) The right to privacy is recognized today in all the US states and by the federal government, either by statute or in common law.
Difficulty: Hard
Section Reference 1: 3.2
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
88) The right of privacy is absolute.
Difficulty: Medium
Section Reference 1: 3.2
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
89) The right of privacy is not absolute.
Difficulty: Medium
Section Reference 1: 3.2
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
90) Privacy must be balanced against the needs of society.
Difficulty: Medium
Section Reference 1: 3.2
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
91) The public’s right to know supersedes the individual’s right of privacy.
Difficulty: Medium
Section Reference 1: 3.2
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
92) The public’s right to know isn’t as important as the individual’s right of privacy.
Difficulty: Medium
Section Reference 1: 3.2
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
93) Advancements in information technology make privacy harder to manage.
Difficulty: Medium
Section Reference 1: 3.2
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Analysis
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
94) Data aggregators can collect public and non-public information to create digital dossiers.
Difficulty: Medium
Section Reference 1: 3.2
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
95) Smartphones are sensors that can be used for electronic surveillance.
Difficulty: Easy
Section Reference 1: 3.2
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
96) The United Nations ensures privacy laws are consistent across countries so that it is easier to do business in multiple countries.
Difficulty: Easy
Section Reference 1: 3.2
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
97) The European Union has stricter data protection laws than the US.
Difficulty: Medium
Section Reference 1: 3.2
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
98) The city of Boston suspended its license plate reader program because it accidently revealed information to a newspaper.
Difficulty: Easy
Section Reference 1: IT’s About Business 3.3
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard: AACSB || Technology
99) Vigilant makes money by charging police departments for license plate readers and access to its databases.
Difficulty: Easy
Section Reference 1: IT’s About Business 3.3
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard: AACSB || Technology
100) The Driver’s Privacy Protection Act of 1994 does not limit who can access information about automobile registrations and drivers, only what information can be used for.
Difficulty: Medium
Section Reference 1: IT’s About Business 3.3
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Analysis
Standard: AACSB || Technology
101) Critics view Aadhaar as a step toward a surveillance state.
Difficulty: Easy
Section Reference 1: IT’s About Business 3.4
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard: AACSB || Technology
102) As anticipated by Aadhaar’s opponents, the Supreme Court found that Aadhaar violates privacy rights.
Difficulty: Easy
Section Reference 1: IT’s About Business 3.4
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard: AACSB || Technology
103) The origination of Aadhaar was from a benevolent place: identifying impoverished Indians so that they could be documented and therefore receive government benefits.
Difficulty: Easy
Section Reference 1: IT’s About Business 3.4
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Comprehension
Standard: AACSB || Technology
104) According to Facebook executives, the Facebook and Cambridge Analytica scandal occurred because hackers got access to the database by stealing key passwords from users.
Difficulty: Easy
Section Reference 1: IT’s About Business 3.5
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard: AACSB || Technology
105) Facebook’s main legal battles are against Russia.
Difficulty: Easy
Section Reference 1: IT’s About Business 3.5
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard: AACSB || Technology
106) Much of the discovery of the ways in which Cambridge Analytica and Facebook were misusing user data came from the Pew Research Center.
Difficulty: Easy
Section Reference 1: IT’s About Business 3.5
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Comprehension
Standard: AACSB || Technology
107) Facebook has been harshly fined and has undergone massive restructuring as a result of the discovery of the Cambridge Analytica scandal.
Difficulty: Medium
Section Reference 1: IT’s About Business 3.5
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Application
Standard: AACSB || Technology
Question type: Text Entry
108) _____ refers to the principles of right and wrong that individuals use to make choices that guide their behavior.
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
109) The utilitarian approach states that an ethical action is the one that provides the most ___ or does the least ___.
Answer 1: good
Answer 2: harm
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
110) The fairness approach posits that ethical actions treat all human beings equally, or, if unequally, then fairly, based on some ___.
Difficulty: Medium
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
111) The common good approach highlights the ___ relationships that underlie all societies.
Difficulty: Medium
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
112) The deontology approach states that the morality of an action is based on whether that action itself is right or wrong under a series of rules, rather than based on the ___ of that action.
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
113) ___ is the right to be left alone and to be free of unreasonable personal intrusions.
Difficulty: Easy
Section Reference 1: 3.2
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
114) Privacy is the right to be ___ and to be free of unreasonable personal intrusions.
Difficulty: Medium
Section Reference 1: 3.2
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
115) Information privacy is the right to determine when, and to what extent, ___ about you can be gathered or communicated to others.
Difficulty: Medium
Section Reference 1: 3.2
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
116) ___ is the right to determine when, and to what extent, information about you can be gathered or communicated to others.
Difficulty: Easy
Section Reference 1: 3.2
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
117) The process of forming a digital dossier is called ___.
Difficulty: Easy
Section Reference 1: 3.2
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
Question type: Essay
118) What is ethics? Is an ethical decision easy and clear-cut? Why or why not? List and describe the five widely used ethical standards/frameworks. Evaluate a SINGLE ethical scenario with all five approaches.
Difficulty: Hard
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.
Bloomcode: Synthesis, Evaluation
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
Standard 3 : AACSB || Communication
Standard 4 : AACSB || Analytic
Standard 5 : AACSB || Reflective Thinking
Solution: Ethics – principles of right and wrong that individuals use to make choices that guide their behavior
No because an answer could be different based on the approach chosen
1) Utilitarian approach states that an ethical action is the one that provides the most good or does the least harm; a policeman killing a person who is holding others hostage is best for those being held hostage
2) Rights approach maintains that an ethical action is the one that best protects and respects the moral rights of the affected parties; nobody should be killed because everyone has the right to live
3) Fairness approach posits that ethical actions treat all human beings equally, or, if unequally, then fairly, based on some defensible standard; killing someone who is holding others hostage is fair because people know it isn’t right to threaten the lives of others
4) Common good approach highlights the interlocking relationships that underlie all societies; the police being on-scene is for the best of everyone – they have the right to kill under these circumstances
5) Deontology approach states that the morality of an action is based on whether than action itself is right or wrong under a series of rules, rather than based on the consequences of that action; it is never OK to kill a person even if they are being “bad”
119) The concept of “green IT” is an ethical decision every company needs to make. Using the five steps in the general framework for ethical decision-making, how would you handle the situation if you were the CEO?
Difficulty: Medium
Section Reference 1: 3.1
Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.
Bloomcode: Application
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
Standard 3 : AACSB || Communication
Standard 4 : AACSB || Reflective Thinking
Solution: 1) Recognize an ethical issue – could not being green damage the environment? What are the good and bad alternatives for being green? Are there legal requirements for being green (energy consumption, pollution, etc.) ?
2) Get the facts – what area will be hurt by non-green activities (water, air, land)? Sufficient information? Who has a stake (environmental groups, customers, suppliers)? Have I consulted those people?
3) Evaluate alternative actions – 5 approaches – utilitarian, rights, fairness, common good, deontology
4) Make a decision and test it – pick an option
5) Act and reflect on the outcome of your decision – am I taking better care of the environment?
120) Describe five ways a digital dossier is created. Describe a potential profile that has been created for your life.
Difficulty: Hard
Section Reference 1: 3.2
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Synthesis
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
Standard 3 : AACSB || Communication
Standard 4 : AACSB || Reflective Thinking
Solution: Surveillance cameras on roads or in buildings, credit card transactions, telephone calls, banking transactions, queries to search engines, government records
Potential profile – many schools have cameras and many towns have cameras at intersections to record what students are doing at school or on the road (students may also have ID badges that are required to get into buildings) ; many students already have credit cards so purchases are tracked, all activity on phones can be tracked including phone calls and text messages, many students are already doing online banking, all Internet searching is tracked, students may also talk about traveling, Facebook activity (photo tagging) , etc., basically, everything we do can be tracked
121) Who conducts electronic surveillance? What types of electronic surveillance impact your life? Are you paranoid about this? If not, should you be? Explain why or why not for these last two questions.
Difficulty: Medium
Section Reference 1: 3.2
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Application
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
Standard 3 : AACSB || Communication
Standard 4 : AACSB || Reflective Thinking
Solution: Cameras at many public venues, digital sensors everywhere (smartphones have many capabilities now), ID cards, webcams, video-game motion sensors, satellite photos, biometric readers, GPS, facial recognition technology (and photo tagging), in-store digital billboards that watch activity, drones, URL filtering, etc.
122) How does the Internet create a conflict between free speech and privacy?
Difficulty: Medium
Section Reference 1: 3.2
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Analysis
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
Standard 3 : AACSB || Communication
Standard 4 : AACSB || Reflective Thinking
Solution: Easy to be anonymous and derogatory with no basis of fact and no recourse; companies can check the Internet on potential and current employees, but people may not be able to defend themselves (could harm chances of getting hired or could result in getting fired).
123) Given the global nature of our economy, what are the international aspects of privacy that we need to consider in our business dealings?
Difficulty: Easy
Section Reference 1: 3.2
Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Comprehension
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
Standard 3 : AACSB || Communication
Solution: 50 countries have data protection laws
Some countries have stricter laws (Europe)
No consistent or uniform standards for privacy and security – obstructs flow of information among countries (transborder data flows)
Privacy issues – whose laws do you follow?
Come up with “safe harbor” frameworks for regulation
Document Information
Connected Book
Explore recommendations drawn directly from what you're reading
Chapter 2 Org Strategy Competitive InfoSys
DOCX Ch. 2
Chapter 3 Ethics and Privacy Practice Quizzes
DOCX Ch. 3
Chapter 3 Ethics and Privacy Test Bank
DOCX Ch. 3 Current
Chapter 4 Information Security and Controls Practice Quizzes
DOCX Ch. 4
Chapter 4 Information Security and Controls Test Bank
DOCX Ch. 4