Chapter.5 Test Questions & Answers Ethical And Legal Issues - E-Marketing 8e Complete Test Bank by Raymond D. Frost. DOCX document preview.

Chapter.5 Test Questions & Answers Ethical And Legal Issues

CHAPTER FIVE ETHICAL AND LEGAL ISSUES

Multiple Choice

  1. Which of the following is not true in relation to law?
  2. law is directed toward the behavior of individuals or small groups, as opposed to entire populations
  3. law attempts to be consistent in time and place
  4. making law is often slow and complex
  5. law is an expression of values
  6. The central focus of ________ is the analysis and description of what is right and wrong and how we judge the difference.
  7. law
  8. ethics
  9. self-regulation
  10. privacy
  11. Which of the following is an ethical issue currently confronting those who work in electronic environments?
  12. intellectual property
  13. the role of privacy
  14. freedom of expression
  15. all of the above
  16. Favor for the model of self-regulation is supported by all of the following points except ________.
  17. the private sector’s speed in resolving problems within its area of expertise
  18. the often contradictory and confusing nature of law
  19. the motivation to voluntary compliance is compelled by greater consumer confidence
  20. the insufficiently compelling incentives
  21. The concept of privacy encompasses ________.
  22. ethical aspects
  23. legal aspects
  24. both of the above
  25. neither of the above
  26. The general attributes of privacy fall into each of the following categories except the ________.
  27. seclusion theory
  28. autonomy model
  29. access-control viewpoint
  30. vacuum model
  31. What purpose(s) do digital cookies serve?
  32. recalling stored sales information
  33. collecting user data, such as name, addresses and phone numbers
  34. creating/updating features such as virtual shopping baskets
  35. all of the above
  36. Critics of opt out presumptions argue which of the following points?
  37. average consumers are often confused by many opt out routines
  38. consumers prefer targeted advertising
  39. the ability of consumers to opt-out cuts down on the effectiveness of marketing efforts
  40. opt out policies keep marketers from learning anything about consumers
  41. Which of the following companies have been subject to criticism regarding their possible misuse of users’ private information?
  42. DoubleClick
  43. America Online
  44. Facebook
  45. All of the above
  46. Which of the following is a ubiquitous application, meaning it is able to function without a user’s knowledge or control?
  47. Java applet
  48. Windows
  49. E-mail
  50. XML
  51. Which of the following issues can be addressed by current conventional criminal statutes?
  52. workers are extended an expectation of privacy from their employers
  53. privacy of all American citizens is assured by federal law
  54. sanctions against the misuse of consumer data
  55. right of users to opt-out of data submission
  56. Traditionally, the law has used _______ to define ownership and protect intellectual property rights?
  57. copyrights
  58. patents
  59. trademarks
  60. all of the above
  61. Thus far, ________ have been established as the primary means of protecting most of content on the Internet.
  62. copyrights
  63. patents
  64. trademarks
  65. licenses
  66. According to trademark law, a certain redundancy is permitted as long as there is enough dissimilarity in which of the following factors?
  67. type of business
  68. product name
  69. language in brand promotions
  70. all of the above
  71. ________ allow a buyer to use a company’s product, but with restrictions on the ability to duplicate or distribute it.
  72. Copyrights
  73. Patents
  74. Trademarks
  75. Licenses
  76. All of the following can be defined as trade secrets except ________.
  77. formulas
  78. facts
  79. market data
  80. algorithms
  81. Which of the following is not a widely held criticism of spam?
  82. it places burdens on network resources
  83. it reduces the costs of marketing to target consumers
  84. it is an unwanted intrusion for receivers
  85. it is often derived from mailing lists not intended to be used for mass solicitation
  86. What is a legal method of protecting children from exposure to inappropriate, obscene, or indecent material online?
  87. filtering models
  88. censorship of the entire Internet
  89. the Computer Decency Act of 1996
  90. all of the above
  91. Jurisdiction ________.
  92. is a legal term that describes the authority of a court over individuals, groups, or firms
  93. has traditionally been based upon physical presence/location
  94. is unlikely to be exercised within the geographic boundaries of other nations or states
  95. all of the above
  96. Which of the following is not a possible sanction for fraudulent conduct?
  97. forfeiture of property
  98. lifetime bans on Internet commerce
  99. civil judgments
  100. consumer education

True/False

  1. The study of ethics has been in existence for over 2,500 years.
  2. True
  3. False

  1. If individuals copy, share, or distribute computer software without having purchased it under a licensed, then they may be supporting software piracy.
  2. True
  3. False
  4. There is currently no law regulating consumers’ right to opt-out of unwanted data collection.
  5. True
  6. False
  7. The issue of data collection is the only problem within the context of online privacy.
  8. True
  9. False
  10. Cyber squatting refers to practices whereby one party registers domain names belonging to or resembling the trade names of others.
  11. True
  12. False
  13. Only registered trademarks are protected under the rules outlined in the US Lanham Act.
  14. True
  15. False
  16. Metatags can be used to protect against one’s own or cyber squat against another’s intellectual property, product, or trade name.
  17. True
  18. False
  19. Shrinkwrap, clickwrap, and break-the-seal represent methods of corporate attempts to communicate software licensing obligations to consumers.
  20. True
  21. False
  22. The mass distribution of unsolicited electronic mail is often referred to as spam.
  23. True
  24. False
  25. The use of email or websites to impersonate individuals or corporations is known as spidering.
  26. True
  27. False

  1. According to the text, privacy issues have been a subject of close international attention.
  2. True
  3. False
  4. The Federal Economic Espionage Act of 1996 was enacted, in part, to prevent and prosecute against foreign distribution of corporate trade secrets.
  5. True
  6. False

Essay Questions

  1. What is the distinction between law and ethics?
  2. What are the arguments for and against self-regulation? Which position holds more validity in your opinion?
  3. The issue of privacy can be broken down into three general areas. Identify and define these areas.
  4. What are the arguments for and against the mass distribution of unsolicited email? Support one of these viewpoints using evidence from your own use of email.
  5. What are some ways for consumers to protect themselves from fraud? Your answer should include a definition of fraud and a specific website useful in protecting consumers.
  6. What are the norms used by the FTC that represent the minimum requirements essential to the ethical use of consumer information?
  7. What are some examples of trade secrets that could be distributed illegally according to the US Economic Espionage Act of 1996?

Document Information

Document Type:
DOCX
Chapter Number:
5
Created Date:
Aug 21, 2025
Chapter Name:
Chapter 5 Ethical And Legal Issues
Author:
Raymond D. Frost

Connected Book

E-Marketing 8e Complete Test Bank

By Raymond D. Frost

Test Bank General
View Product →

$24.99

100% satisfaction guarantee

Buy Full Test Bank

Benefits

Immediately available after payment
Answers are available after payment
ZIP file includes all related files
Files are in Word format (DOCX)
Check the description to see the contents of each ZIP file
We do not share your information with any third party