Exam Prep Chapter 3 Ethics And Privacy - Info Systems 9e | Test Bank by Rainer by R. Kelly Rainer. DOCX document preview.

Exam Prep Chapter 3 Ethics And Privacy

Package Title: Chapter 3, Testbank

Course Title: Rainer, IS 9e

Chapter Number: 3

Question type: Multiple Choice

1) Colleges across the United States are using ______ to track hundreds of thousands of students more precisely than ever before.

a) campuswide Wi-Fi networks

b) city-wide WiMax networks

c) long-range Bluetooth sensors

d) short-range NFC sensors

Difficulty: Easy

Section Reference 1: Opening Case

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard: AACSB || Technology

2) Which of the following is NOT a company providing tracking technologies to colleges?

a) Degree Analytics

b) FitBit

c) Life360

d) SpotterEDU

Difficulty: Easy

Section Reference 1: Opening Case

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard: AACSB || Technology

3) Considering the SpotterEDU app, it ____ use GPS tracking and students _____ opt out if an individual professor chooses to use the app.

a) does; can

b) does; cannot

c) does not; can

d) does not; cannot

Difficulty: Easy

Section Reference 1: Opening Case

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard: AACSB || Technology

4) _________ focuses on class attendance.

a) Degree Analytics

b) FitBit

c) Life360

d) SpotterEDU

Difficulty: Easy

Section Reference 1: Opening Case

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard: AACSB || Technology

5) ________ focuses on helping parents monitor their children.

a) Degree Analytics

b) FitBit

c) Life360

d) SpotterEDU

Difficulty: Easy

Section Reference 1: Opening Case

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard: AACSB || Technology

6) Degree Analytics uses ____ check-ins to track the movements of some 200,000 students attending 19 state universities, private colleges, and other schools.

a) Bluetooth

b) Ethernet

c) WiMax

d) Wi-Fi

Difficulty: Easy

Section Reference 1: Opening Case

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard: AACSB || Technology

7) Degree Analytics uses ____ to search for patterns in student behavior.

a) algorithms

b) expert systems

c) machine learning

d) neural networks

Difficulty: Easy

Section Reference 1: Opening Case

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Application

Standard: AACSB || Technology

8) The _________ approach states that an ethical action is the one that provides the most good or does the least harm.

a) common good

b) deontology

c) fairness

d) rights

e) utilitarian

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

9) Minimizing the organization’s carbon footprint and otherwise striving for “green IT” is an example of a _________ approach.

a) common good

b) deontology

c) fairness

d) rights

e) utilitarian

Difficulty: Hard

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Synthesis, Evaluation

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

10) The commonly used “bystander at the switch” ethical dilemma where the bystander has to choose between letting the train hit five people or flipping the switch to let the train hit only one person is an example of the _________ approach.

a) common good

b) deontology

c) fairness

d) rights

e) utilitarian

Difficulty: Medium

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Application

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

11) The _________ approach maintains that an ethical action is the one that best protects and respects the moral rights of the affected parties.

a) common good

b) deontology

c) fairness

d) rights

e) utilitarian

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

12) The pursuit of the “American dream” and our ability to choose our religious orientation is a reflection of the _________ approach.

a) common good

b) deontology

c) fairness

d) rights

e) utilitarian

Difficulty: Medium

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Application

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

13) The _________ approach posits that ethical actions treat all human beings equally, or, if unequally, then fairly, based on some defensible standard.

a) common good

b) deontology

c) fairness

d) rights

e) utilitarian

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

14) The debate over CEO salaries being so much higher than other employees is an issue addressed by the _________ approach.

a) common good

b) deontology

c) fairness

d) rights

e) utilitarian

Difficulty: Medium

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Analysis

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

15) If you believe the death penalty is acceptable for murderers, you are using the _________ approach.

a) common good

b) deontology

c) fairness

d) rights

e) utilitarian

Difficulty: Hard

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Analysis, Evaluation

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

16) The _________ approach highlights the interlocking relationships that underlie all societies.

a) common good

b) deontology

c) fairness

d) rights

e) utilitarian

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

17) Obamacare was created to address the _________ approach.

a) common good

b) deontology

c) fairness

d) rights

e) utilitarian

Difficulty: Hard

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Evaluation

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

18) The _________ approach states that the morality of an action is based on whether the action itself is right or wrong under a series of rules, rather than based on the consequences of that action.

a) common good

b) deontology

c) fairness

d) rights

e) utilitarian

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

19) Suppose that you believe that killing someone is wrong even if it is self-defense. This is an example of the _________ approach.

a) common good

b) deontology

c) fairness

d) rights

e) utilitarian

Difficulty: Medium

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge, Evaluation

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

20) The _________ approach is the “black and white” approach to ethics.

a) common good

b) deontology

c) fairness

d) rights

e) utilitarian

Difficulty: Medium

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge, Evaluation

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

21) _________ is the first step in the general framework for ethics.

a) Act and reflect on the outcome of your decision

b) Evaluate alternative actions

c) Get the facts

d) Make a decision and test it

e) Recognize an ethical issue

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

22) “Could this decision or situation damage someone or some group” is a question in the _________ step in the general framework for ethics.

a) Act and reflect on the outcome of your decision

b) Evaluate alternative actions

c) Get the facts

d) Make a decision and test it

e) Recognize an ethical issue

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

23) “Does this decision involve a choice between a good and a bad alternative” is a question in the _________ step in the general framework for ethics.

a) Act and reflect on the outcome of your decision

b) Evaluate alternative actions

c) Get the facts

d) Make a decision and test it

e) Recognize an ethical issue

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

24) “Does this issue involve more than simply legal considerations” is a question in the _________ step in the general framework for ethics.

a) Act and reflect on the outcome of your decision

b) Evaluate alternative actions

c) Get the facts

d) Make a decision and test it

e) Recognize an ethical issue

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

25) _________ is the second step in the general framework for ethics.

a) Act and reflect on the outcome of your decision

b) Evaluate alternative actions

c) Get the facts

d) Make a decision and test it

e) Recognize an ethical issue

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

26) “Do I have sufficient information to make a decision” is a question in the _________ step in the general framework for ethics.

a) Act and reflect on the outcome of your decision

b) Evaluate alternative actions

c) Get the facts

d) Make a decision and test it

e) Recognize an ethical issue

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

27) “Which individuals or groups have an important stake in the outcome” is a question in the _________ step in the general framework for ethics.

a) Act and reflect on the outcome of your decision

b) Evaluate alternative actions

c) Get the facts

d) Make a decision and test it

e) Recognize an ethical issue

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

28) “Have I consulted all relevant persons and groups” is a question in the _________ step in the general framework for ethics.

a) Act and reflect on the outcome of your decision

b) Evaluate alternative actions

c) Get the facts

d) Make a decision and test it

e) Recognize an ethical issue

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

29) _________ is the third step in the general framework for ethics.

a) Act and reflect on the outcome of your decision

b) Evaluate alternative actions

c) Get the facts

d) Make a decision and test it

e) Recognize an ethical issue

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

30) When you are choosing between the five widely used standards (ethical approaches), you are in the_________ step in the general framework for ethics.

a) Act and reflect on the outcome of your decision

b) Evaluate alternative actions

c) Get the facts

d) Make a decision and test it

e) Recognize an ethical issue

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

31) _________ is the fourth step in the general framework for ethics.

a) Act and reflect on the outcome of your decision

b) Evaluate alternative actions

c) Get the facts

d) Make a decision and test it

e) Recognize an ethical issue

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

32) _________ is the final step in the general framework for ethics.

a) Act and reflect on the outcome of your decision

b) Evaluate alternative actions

c) Get the facts

d) Make a decision and test it

e) Recognize an ethical issue

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

33) “How can I implement my decision with the greatest care and attention to the concerns of all stakeholders” is a question in the _________ step in the general framework for ethics.

a) Act and reflect on the outcome of your decision

b) Evaluate alternative actions

c) Get the facts

d) Make a decision and test it

e) Recognize an ethical issue

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

34) “How did my decision turn out, and what did I learn from this specific situation” is a question in the _________ step in the general framework for ethics.

a) Act and reflect on the outcome of your decision

b) Evaluate alternative actions

c) Get the facts

d) Make a decision and test it

e) Recognize an ethical issue

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

35) _________ means that you accept the consequences of your decisions and actions.

a) Accountability

b) Answerability

c) Liability

d) Responsibility

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

36) Suppose you only study two hours for your next test. If you understand that means you may not do well on that test and you are willing to accept the lower grade, it means you are taking _________ for your actions.

a) accountability

b) answerability

c) liability

d) responsibility

Difficulty: Medium

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Application

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

37) _________ refers to determining who is responsible for actions that were taken.

a) Accountability

b) Answerability

c) Liability

d) Responsibility

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

38) Suppose you only study two hours for your next test. You fail the test and tell the teacher that he or she obviously did a terrible job teaching the material. This means you are not accepting _________ for your actions.

a) accountability

b) answerability

c) liability

d) responsibility

Difficulty: Medium

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Application

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

39) _________ is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems.

a) Accountability

b) Answerability

c) Liability

d) Responsibility

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

40) Suppose you slip in the hallway and break your arm. You sue the school for not properly marking the wet spot that caused you to slip. This is an example of ________.

a) accountability

b) answerability

c) liability

d) responsibility

Difficulty: Medium

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Application

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

41) _________ is the most recent example of ethical misbehavior in organizations.

a) Enron

b) Tyco

c) Wells Fargo

d) WorldCom

Difficulty: Medium

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

42) The Sarbanes-Oxley Act requires publicly held companies to implement _________ controls; it was passed to address the _________ crisis.

a) financial; Enron

b) financial; Wells Fargo bank

c) operational; Enron

d) operational; Wells Fargo bank

Difficulty: Hard

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

43) _________ issues involve collecting, storing, and disseminating information about individuals.

a) Accessibility

b) Accuracy

c) Privacy

d) Property

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

44) _________ issues involve the authenticity, fidelity, and correctness of information that is collected and processed.

a) Accessibility

b) Accuracy

c) Privacy

d) Property

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

45) You can check your credit report annually for free through TransUnion, Equifax, and Experian. This allows you to catch signs of identity theft early and note any problems in your credit reports. This is an example of an ethical issue that falls into the category of ________.

a) accessibility

b) accuracy

c) privacy

d) property

Difficulty: Hard

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Evaluation

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

46) _________ issues involve the ownership and value of information.

a) Accessibility

b) Accuracy

c) Privacy

d) Property

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

47) _________ issues revolve around who should have access to information and whether they should pay a fee for this access.

a) Accessibility

b) Accuracy

c) Privacy

d) Property

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

48) Companies like Google and Facebook make their money by selling your information to advertisers. This is an example of an ethical issue that falls into the category of ________.

a) accessibility

b) accuracy

c) privacy

d) property

Difficulty: Hard

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Evaluation

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

49) Which of the following is a privacy issue?

a) How can we ensure that the information will be processed properly and presented accurately to users?

b) How should we handle illegally copying copyrighted software?

c) What information about oneself should an individual be required to reveal to others?

d) What information does a person or an organization have a right to obtain, under what conditions, and with what safeguards?

Difficulty: Hard

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Analysis

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

50) Which of the following is an accuracy issue?

a) How can we ensure that the information will be processed properly and presented accurately to users?

b) How should we handle illegally copying copyrighted software?

c) What information about oneself should an individual be required to reveal to others?

d) What information does a person or an organization have a right to obtain, under what conditions, and with what safeguards?

Difficulty: Medium

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Analysis

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

51) Which of the following is a property issue?

a) How can we ensure that the information will be processed properly and presented accurately to users?

b) How should we handle illegally copying copyrighted software?

c) What information about oneself should an individual be required to reveal to others?

d) What information does a person or an organization have a right to obtain, under what conditions, and with what safeguards?

Difficulty: Medium

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Analysis

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

52) Which of the following is an accessibility issue?

a) How can we ensure that the information will be processed properly and presented accurately to users?

b) How should we handle illegally copying copyrighted software?

c) What information about oneself should an individual be required to reveal to others?

d) What information does a person or an organization have a right to obtain, under what conditions, and with what safeguards?

Difficulty: Medium

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Analysis

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

53) Which of the following is a privacy issue?

a) How can we ensure that errors in databases, data transmissions, and data processing are accidental and not intentional?

b) How much should companies charge for permitting access to information in their databases?

c) Under what circumstances can one use proprietary databases?

d) What information about individuals should be kept in databases, and how secure is the information there?

Difficulty: Hard

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Analysis

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

54) Which of the following is an accuracy issue?

a) How can we ensure that errors in databases, data transmissions, and data processing are accidental and not intentional?

b) How much should companies charge for permitting access to information in their databases?

c) Under what circumstances can one use proprietary databases?

d) What information about individuals should be kept in databases, and how secure is the information there?

Difficulty: Medium

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Analysis

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

55) Which of the following is a property issue?

a) How can we ensure that errors in databases, data transmissions, and data processing are accidental and not intentional?

b) How much should companies charge for permitting access to information in their databases?

c) Under what circumstances can one use proprietary databases?

d) What information about individuals should be kept in databases, and how secure is the information there?

Difficulty: Medium

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Analysis

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

56) Which of the following is an accessibility issue?

a) How can we ensure that errors in databases, data transmissions, and data processing are accidental and not intentional?

b) How much should companies charge for permitting access to information in their databases?

c) Under what circumstances can one use proprietary databases?

d) What information about individuals should be kept in databases, and how secure is the information there?

Difficulty: Medium

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Analysis

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

57) ______ does not collect any data about your online activity and automatically blocks third-party trackers and all advertising cookies.

a) Brave

b) DuckDuckGo

c) Firefox

d) Tor

Difficulty: Easy

Section Reference 1: IT’s About Business 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard: AACSB || Technology

57) ______ does not have a standalone desktop browser.

a) Brave

b) DuckDuckGo

c) Firefox

d) Tor

Difficulty: Easy

Section Reference 1: IT’s About Business 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard: AACSB || Technology

58) ______ is the third most popular browser on the internet and automatically blocks third-party trackers and all advertising cookies.

a) Brave

b) DuckDuckGo

c) Firefox

d) Tor

Difficulty: Easy

Section Reference 1: IT’s About Business 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard: AACSB || Technology

59) ______ encrypts your web activities three times and sends them to three servers before you reach your desired website.

a) Brave

b) DuckDuckGo

c) Firefox

d) Tor

Difficulty: Easy

Section Reference 1: IT’s About Business 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard: AACSB || Technology

60) Google ___ have a privacy policy. Google ____ track offline spending behavior in physical stores.

a) does; does

b) does; does not

c) does not; does

d) does not; does not

Difficulty: Easy

Section Reference 1: IT’s About Business 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard: AACSB || Technology

61) What is considered to be the “holy grail” of online advertising?

a) Being able to determine repeat customers to an online retailer

b) Being able to determine exact spending habits of the 18-35 year old demographic

c) Being able to determine which Web browsers elicit the most ad revenue

d) Being able to determine purchases generated by digital ad campaigns

Difficulty: Easy

Section Reference 1: IT’s About Business 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Comprehension

Standard: AACSB || Technology

62) The Supreme People’s Court of China started a ____list of people who the government alleged did not comply with court judgments.

a) black

b) gray

c) red

d) white

Difficulty: Easy

Section Reference 1: IT’s About Business 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard: AACSB || Technology

63) Considering China’s Social Credit System, people on the ____list have exhibited negative behaviors; people on the ____list have demonstrated positive ones.

a) black; red

b) black; white

c) red; black

d) red; white

Difficulty: Easy

Section Reference 1: IT’s About Business 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard: AACSB || Technology

64) The Chinese government has authorized some _____ Chinese companies to conduct pilots of the Social Credit System; citizens can opt ____ these systems at any time upon request.

a) private; in

b) private; out

c) public; in

d) public; out

Difficulty: Easy

Section Reference 1: IT’s About Business 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard: AACSB || Technology

65) The Chines central government appears to be sharing ____lists with technology platforms to prevent those citizens from engaging in e-commerce.

a) black

b) gray

c) red

d) white

Difficulty: Easy

Section Reference 1: IT’s About Business 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard: AACSB || Technology

66) Privacy rights apply to ____.

a) groups

b) individuals

c) institutions

d) groups, individuals, and institutions

Difficulty: Easy

Section Reference 1: 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

67) The right of privacy ____ absolute; the public’s right to know ____ the individual’s right of privacy.

a) is; guarantees

b) is; supersedes

c) is not; guarantees

d) is not; supersedes

Difficulty: Easy

Section Reference 1: 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

68) _________ is an electronic profile of you and your habits.

a) The digital divide

b) A digital dossier

c) IoT

d) RFID

Difficulty: Easy

Section Reference 1: 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

69) _________ is NOT an example of a data aggregator.

a) Acxiom

b) Amazon

c) ChoicePoint

d) LexisNexis

Difficulty: Easy

Section Reference 1: 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

70) Companies purchase digital dossiers to ________.

a) create customer intimacy

b) engage in electronic surveillance

c) evaluate the competition

d) track their own reputations

Difficulty: Medium

Section Reference 1: 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

71) Photo tagging is a type of _________ technology.

a) facial recognition

b) GPS

c) information privacy

d) RFID

Difficulty: Easy

Section Reference 1: 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

72) URL filtering is a type of _________ technology.

a) electronic surveillance

b) GPS

c) information privacy

d) RFID

Difficulty: Easy

Section Reference 1: 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

73) The _________ model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected.

a) opt-in

b) opt-out

c) sign-up

d) sign-out

Difficulty: Easy

Section Reference 1: 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

74) The _________ model of informed consent prohibits an organization from collecting any personal information unless the customer specifically authorizes it.

a) opt-in

b) opt-out

c) sign-up

d) sign-out

Difficulty: Easy

Section Reference 1: 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

75) Companies prefer the _________ model of informed consent.

a) opt-in

b) opt-out

c) sign-up

d) sign-out

Difficulty: Hard

Section Reference 1: 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Evaluation

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

76) Europeans and privacy advocates prefer the _________ model of informed consent.

a) opt-in

b) opt-out

c) sign-up

d) sign-out

Difficulty: Hard

Section Reference 1: 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Evaluation

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

77) The General Data Protection Regulation, the world’s strongest data protection laws, went into effect in ____ on May 25, 2018.

a) China

b) the EU

c) India

d) the US

Difficulty: Easy

Section Reference 1: 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

78) ________ are/is the world’s strongest data protection laws.

a) GDPA

b) HIPAA

c) SOX

d) USMCA

Difficulty: Medium

Section Reference 1: 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

79) The General Data Protection Regulation applies to _____ which are the organizations that have relationships with data subjects.

a) data controllers

b) data processors

c) data subjects

d) natural persons

Difficulty: Easy

Section Reference 1: 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

80) The General Data Protection Regulation applies to _____ which are the living human beings.

a) data controllers

b) data processors

c) data subjects

d) natural persons

Difficulty: Easy

Section Reference 1: 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

81) The General Data Protection Regulation applies to _____ which are the human beings whose data an organization has or processes.

a) data controllers

b) data processors

c) data subjects

d) natural persons

Difficulty: Easy

Section Reference 1: 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

82) The ___________ is the new legal framework for transatlantic data flows that replaces ____.

a) EU-US Privacy Shield; General Data Protection Regulation

b) EU-US Privacy Shield; Safe Harbor

c) Safe Harbor; EU-US Privacy Shield

d) Safe Harbor; General Data Protection Regulation

Difficulty: Easy

Section Reference 1: 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

83) ____ technology is controversial because it contributes to a loss of ____.

a) Facial recognition; privacy

b) Facial recognition; security

c) Expert system; privacy

d) Expert system; security

Difficulty: Easy

Section Reference 1: IT’s About Business 3.3

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard: AACSB || Technology

84) The practice of extracting images from a website is known as _____.

a) facial recognition

b) image scraping

c) neural networking

d) photo tagging

Difficulty: Easy

Section Reference 1: IT’s About Business 3.3

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard: AACSB || Technology

85) _____________ claims that organizations have used its app to help solve shoplifting, identity theft, credit card fraud, murder, and child sexual exploitation cases.

a) Clearview

b) Facebook

c) Google

d) Rekognition

Difficulty: Easy

Section Reference 1: IT’s About Business 3.3

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard: AACSB || Technology

86) Grubhub used ____ to charge restaurants higher fees; this is ____.

a) cybersquatting; illegal

b) cybersquatting; legal

c) domain tasting; illegal

d) domain tasting; legal

Difficulty: Medium

Section Reference 1: Closing Case

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge, Synthesis

Standard: AACSB || Technology

87) Grubhub used an opt-___ strategy for non-partnered restaurants; this was labeled as ____ behavior.

a) in; anticompetitive

b) in; competitive

c) out; anticompetitive

d) out; competitive

Difficulty: Hard

Section Reference 1: Closing Case

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Evaluation, Synthesis

Standard: AACSB || Technology

88) Grubhub referred to their ____ practices as creating a ____.

a) cybersquatting; microsite

b) cybersquatting; minisite

c) domain tasting; microsite

d) domain tasting; minisite

Difficulty: Easy

Section Reference 1: Closing Case

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knoweldge

Standard: AACSB || Technology

89) As of 2020,____ leads the food delivery industry.

a) AmazonGo

b) DoorDash

c) Grubhub

d) UberEats

Difficulty: Easy

Section Reference 1: Closing Case

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard: AACSB || Technology

Question type: True/False

90) People using Life360 must weigh the safety and security of their loved ones against their privacy.

Difficulty: Easy

Section Reference 1: Opening Case

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and the four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard: AACSB || Technology

91) Tracking apps do not constitute a breach of privacy because students can opt-out of them.

Difficulty: Medium

Section Reference 1: Opening Case

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and the four categories of ethical issues related to information technology.

Bloomcode: Knowledge, Analysis, Evaluation

Standard: AACSB || Technology

92) Deciding what is right or wrong is always easy and clear-cut.

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

93) If you want to do what is best for the most people, you use the utilitarian approach to ethical decision making.

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

94) The rights approach posits that all human beings should be treated equally.

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

95) The general framework for ethics has four steps.

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

96) The general framework for ethics has five steps.

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

97) A privacy policy is a collection of principles intended to guide decision making by members of the organization.

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

98) A code of ethics is a collection of principles intended to guide decision making by members of the organization.

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

99) Responsibility refers to determining who is responsible for actions there were taken.

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

100) Accountability refers to determining who is responsible for actions there were taken.

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

101) Liability is the legal concept that gives individuals the right to recover damages done to them.

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

102) What is unethical is not necessarily illegal.

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

103) If it is unethical, it is illegal.

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

104) All unethical actions are illegal in the United States.

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

105) A monopoly is illegal and unethical.

Difficulty: Hard

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Evaluation

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

106) All employees have a responsibility to encourage ethical uses of information and information technology.

Difficulty: Medium

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

107) Executives have the sole responsibility for encouraging ethical uses of information and information technology.

Difficulty: Medium

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

108) You check your credit report annually to ensure your identity hasn’t been stolen. This is an example of a property issue.

Difficulty: Medium

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Analysis

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

109) Google and Facebook collect, store, and disseminate a great deal of information about the people who use their websites. This is an example of an accuracy issue.

Difficulty: Medium

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Application

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

110) Telemarketing and ads on Google are examples of accessibility issues.

Difficulty: Hard

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Evaluation

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

111) Google can analyze offline purchase activity even when consumers deactivate location tracking on their smartphones.

Difficulty: Easy

Section Reference 1: IT’s About Business 3.1

Learning Objective 3.1: Define ethics and explain its three fundamental tenets and the four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard: AACSB || Technology

112) Google has a tracker network to develop extensive individual profiles.

Difficulty: Easy

Section Reference 1: IT’s About Business 3.1

Learning Objective 3.1: Define ethics and explain its three fundamental tenets and the four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard: AACSB || Technology

113) Cookies do not require the user’s permission.

Difficulty: Easy

Section Reference 1: IT’s About Business 3.1

Learning Objective 3.1: Define ethics and explain its three fundamental tenets and the four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard: AACSB || Technology

114) Cookies require the user’s permission, but hidden webpages do not.

Difficulty: Easy

Section Reference 1: IT’s About Business 3.1

Learning Objective 3.1: Define ethics and explain its three fundamental tenets and the four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard: AACSB || Technology

115) Google insists users are providing informed consent while others argue data collection is almost always performed without consumers’ knowledge.

Difficulty: Easy

Section Reference 1: IT’s About Business 3.1

Learning Objective 3.1: Define ethics and explain its three fundamental tenets and the four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard: AACSB || Technology

116) The Chinese government is pursuing the Social Credit Score as a way to address the fact that many citizens do not have a credit history.

Difficulty: Medium

Section Reference 1: IT’s About Business 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Comprehension

Standard: AACSB || Technology

117) Ant Financial Services Group, an affiliate company of Amazon Web Services, developed a credit scoring and loyalty program operated by Credit Sesame.

Difficulty: Easy

Section Reference 1: IT’s About Business 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard: AACSB || Technology

118) Ant Financial Services Group, an affiliate company of Alibaba Group, developed a credit scoring and loyalty program operated by Credit Sesame.

Difficulty: Easy

Section Reference 1: IT’s About Business 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard: AACSB || Technology

119) Data inputs into the Social Credit System include data from court documents, government and corporate records, and citizen observers.

Difficulty: Easy

Section Reference 1: IT’s About Business 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Comprehension

Standard: AACSB || Technology

120) China’s Social Credit System resembles the FICO credit scoring system in the US.

Difficulty: Easy

Section Reference 1: IT’s About Business 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Comprehension

Standard: AACSB || Technology

121) China’s Social Credit System focuses on financial information just like the FICO credit scoring system in the US.

Difficulty: Easy

Section Reference 1: IT’s About Business 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Comprehension

Standard: AACSB || Technology

122) The Chinese government is using facial recognition technology less as they rely more on the Social Credit System.

Difficulty: Easy

Section Reference 1: IT’s About Business 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Comprehension

Standard: AACSB || Technology

123) Facial recognition technology is increasingly widespread across China.

Difficulty: Easy

Section Reference 1: IT’s About Business 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Comprehension

Standard: AACSB || Technology

124) Privacy rights apply only to individuals.

Difficulty: Medium

Section Reference 1: 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

125) Privacy rights apply to individuals, groups, and institutions.

Difficulty: Easy

Section Reference 1: 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

126) The right to privacy is recognized today in all the US states and by the federal government, either by statute or in common law.

Difficulty: Hard

Section Reference 1: 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

127) The right of privacy is absolute.

Difficulty: Medium

Section Reference 1: 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

128) The right of privacy is not absolute.

Difficulty: Medium

Section Reference 1: 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

129) Privacy must be balanced against the needs of society.

Difficulty: Medium

Section Reference 1: 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

130) The public’s right to know supersedes the individual’s right of privacy.

Difficulty: Medium

Section Reference 1: 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

131) The public’s right to know isn’t as important as the individual’s right of privacy.

Difficulty: Medium

Section Reference 1: 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

132) Advancements in information technology make privacy harder to manage.

Difficulty: Medium

Section Reference 1: 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Analysis

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

133) Data aggregators can collect public and non-public information to create digital dossiers.

Difficulty: Medium

Section Reference 1: 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

134) The ethical purpose behind profiling is customer intimacy.

Difficulty: Medium

Section Reference 1: 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge, Synthesis

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

135) Electronic surveillance is decreasing in the United States as people call for more privacy.

Difficulty: Easy

Section Reference 1: 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

136) Electronic surveillance is increasing.

Difficulty: Easy

Section Reference 1: 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

137) Smartphones are sensors that can be used for electronic surveillance.

Difficulty: Easy

Section Reference 1: 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

138) Individuals do not have to be aware of the photo tagging process for it to work.

Difficulty: Easy

Section Reference 1: 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

139) The internet illustrates the conflict between free speech and privacy.

Difficulty: Easy

Section Reference 1: 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

140) The opt-out model of informed consent means companies can collect information unless the consumer specifies it should not be collected.

Difficulty: Easy

Section Reference 1: 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

141) The opt-in model of informed consent means companies can collect information unless the consumer specifies it should not be collected.

Difficulty: Easy

Section Reference 1: 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

142) Privacy advocates prefer the opt-out model of informed consent.

Difficulty: Easy

Section Reference 1: 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

143) Privacy advocates prefer the opt-in model of informed consent.

Difficulty: Easy

Section Reference 1: 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

144) Facebook prefers the opt-out model of informed consent.

Difficulty: Medium

Section Reference 1: 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Application

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

145) Facebook prefers the opt-in model of informed consent.

Difficulty: Medium

Section Reference 1: 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Application

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

146) The United Nations ensures privacy laws are consistent across countries so that it is easier to do business in multiple countries.

Difficulty: Easy

Section Reference 1: 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

147) The European Union has stricter data protection laws than the US.

Difficulty: Medium

Section Reference 1: 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

148) Safe Harbor laws are the world’s strongest data protection laws.

Difficulty: Medium

Section Reference 1: 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

149) The General Data Protect Regulation laws are the world’s strongest data protection laws.

Difficulty: Medium

Section Reference 1: 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

150) Safe Harbor replaced the EU-US Privacy Shield in 2016.

Difficulty: Medium

Section Reference 1: 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

151) The EU-US Privacy Shield replaced Safe Harbor in 2016.

Difficulty: Medium

Section Reference 1: 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

152) Facial recognition has become much more accurate over the last 20 years and is now used for more than police work.

Difficulty: Easy

Section Reference 1: IT’s About Business 3.3

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard: AACSB || Technology

153) The Clearview app works so well that federal agencies use it almost exclusively.

Difficulty: Easy

Section Reference 1: IT’s About Business 3.3

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard: AACSB || Technology

154) The Clearview app has a tendency to deliver false matches for women and people of color.

Difficulty: Easy

Section Reference 1: IT’s About Business 3.3

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard: AACSB || Technology

155) The Clearview app has been tested and approved by the National Institute of Standards and Techology.

Difficulty: Easy

Section Reference 1: IT’s About Business 3.3

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard: AACSB || Technology

156) It is easy to have your photos removed from Clearview’s app if you complete the required paperwork.

Difficulty: Easy

Section Reference 1: IT’s About Business 3.3

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard: AACSB || Technology

157) Facial recognition technology is lucrative.

Difficulty: Medium

Section Reference 1: IT’s About Business 3.3

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard: AACSB || Technology

158) According to restaurant owners, Grubhub engaged in cybersquatting to increase the commissions restaurant owners had to pay.

Difficulty: Easy

Section Reference 1: Closing Case

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard: AACSB || Technology

159) Grubhub’s business practices ensure it will maintain its leading market share in the food delivery industry.

Difficulty: Easy

Section Reference 1: Closing Case

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard: AACSB || Technology

Question type: Text Entry

160) _____ refers to the principles of right and wrong that individuals use to make choices that guide their behavior.

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

161) The utilitarian approach states that an ethical action is the one that provides the most ___ or does the least ___.

Answer 1: good

Answer 2: harm

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

162) The fairness approach posits that ethical actions treat all human beings equally, or, if unequally, then fairly, based on some ___.

Difficulty: Medium

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

163) The common good approach highlights the ___ relationships that underlie all societies.

Difficulty: Medium

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

164) The deontology approach states that the morality of an action is based on whether that action itself is right or wrong under a series of rules, rather than based on the ___ of that action.

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

165) A(n) _______________ is a collection of principles intended to guide decision making by members of the organization.

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

166) _________ means that you accept the consequences of your decisions and actions.

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

167) ___________ is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems.

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

168) Liability is a legal concept that gives individuals the right to _____________ done to them by other individuals, organizations, or systems.

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

169) ___________ issues involve collecting, storing, and disseminating information about individuals.

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

170) ___________ issues involve the authenticity, fidelity, and correctness of information that is collected and processed.

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

171) ___________ issues involve the ownership and value of information.

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

172) ___________ issues revolve around who should have access to information and whether they should pay a fee for this access.

Difficulty: Easy

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

173) ___ is the right to be left alone and to be free of unreasonable personal intrusions.

Difficulty: Easy

Section Reference 1: 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

174) Privacy is the right to be ___ and to be free of unreasonable personal intrusions.

Difficulty: Medium

Section Reference 1: 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

175) Information privacy is the right to determine when, and to what extent, ___ about you can be gathered or communicated to others.

Difficulty: Medium

Section Reference 1: 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

176) ___ is the right to determine when, and to what extent, information about you can be gathered or communicated to others.

Difficulty: Easy

Section Reference 1: 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

177) A(n) ______________ is an electronic profile of you and your habits.

Difficulty: Easy

Section Reference 1: 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

178) The process of forming a digital dossier is called ___.

Difficulty: Easy

Section Reference 1: 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

179) _____________ is the process of assigning names to images of people.

Difficulty: Easy

Section Reference 1: 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

180) __________________ are an organization’s guidelines for protecting the privacy of its customers, clients, and employees.

Difficulty: Easy

Section Reference 1: 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

181) The opt-_________ model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected.

Difficulty: Easy

Section Reference 1: 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

182) The opt-_________ model of informed consent prohibits an organization from collecting any personal information unless the customer specifically authorizes it.

Difficulty: Easy

Section Reference 1: 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Knowledge

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

Question type: Essay

183) What is ethics? Is an ethical decision easy and clear-cut? Why or why not? List and describe the five widely used ethical standards/frameworks. Evaluate a SINGLE ethical scenario with all five approaches.

Difficulty: Hard

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Synthesis, Evaluation

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

Standard 3 : AACSB || Communication

Standard 4 : AACSB || Analytic

Standard 5 : AACSB || Reflective Thinking

Solution: Ethics – principles of right and wrong that individuals use to make choices that guide their behavior
No because an answer could be different based on the approach chosen
1) Utilitarian approach states that an ethical action is the one that provides the most good or does the least harm; a policeman killing a person who is holding others hostage is best for those being held hostage
2) Rights approach maintains that an ethical action is the one that best protects and respects the moral rights of the affected parties; nobody should be killed because everyone has the right to live
3) Fairness approach posits that ethical actions treat all human beings equally, or, if unequally, then fairly, based on some defensible standard; killing someone who is holding others hostage is fair because people know it isn’t right to threaten the lives of others
4) Common good approach highlights the interlocking relationships that underlie all societies; the police being on-scene is for the best of everyone – they have the right to kill under these circumstances
5) Deontology approach states that the morality of an action is based on whether than action itself is right or wrong under a series of rules, rather than based on the consequences of that action; it is never OK to kill a person even if they are being “bad”

184) The concept of “green IT” is an ethical decision every company needs to make. Using the five steps in the general framework for ethical decision-making, how would you handle the situation if you were the CEO?

Difficulty: Medium

Section Reference 1: 3.1

Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.

Bloomcode: Application

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

Standard 3 : AACSB || Communication

Standard 4 : AACSB || Reflective Thinking

Solution: 1) Recognize an ethical issue – could not being green damage the environment? What are the good and bad alternatives for being green? Are there legal requirements for being green (energy consumption, pollution, etc.) ?
2) Get the facts – what area will be hurt by non-green activities (water, air, land)? Sufficient information? Who has a stake (environmental groups, customers, suppliers)? Have I consulted those people?
3) Evaluate alternative actions – 5 approaches – utilitarian, rights, fairness, common good, deontology
4) Make a decision and test it – pick an option
5) Act and reflect on the outcome of your decision – am I taking better care of the environment?

185) Describe five ways a digital dossier is created. Describe a potential profile that has been created for your life.

Difficulty: Hard

Section Reference 1: 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Synthesis

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

Standard 3 : AACSB || Communication

Standard 4 : AACSB || Reflective Thinking

Solution: Surveillance cameras on roads or in buildings, credit card transactions, telephone calls, banking transactions, queries to search engines, government records
Potential profile – many schools have cameras and many towns have cameras at intersections to record what students are doing at school or on the road (students may also have ID badges that are required to get into buildings) ; many students already have credit cards so purchases are tracked, all activity on phones can be tracked including phone calls and text messages, many students are already doing online banking, all Internet searching is tracked, students may also talk about traveling, Facebook activity (photo tagging) , etc., basically, everything we do can be tracked

186) Who conducts electronic surveillance? What types of electronic surveillance impact your life? Are you paranoid about this? If not, should you be? Explain why or why not for these last two questions.

Difficulty: Medium

Section Reference 1: 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Application

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

Standard 3 : AACSB || Communication

Standard 4 : AACSB || Reflective Thinking

Solution: Cameras at many public venues, digital sensors everywhere (smartphones have many capabilities now), ID cards, webcams, video-game motion sensors, satellite photos, biometric readers, GPS, facial recognition technology (and photo tagging), in-store digital billboards that watch activity, drones, URL filtering, etc.

187) How does the Internet create a conflict between free speech and privacy?

Difficulty: Medium

Section Reference 1: 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Analysis

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

Standard 3 : AACSB || Communication

Standard 4 : AACSB || Reflective Thinking

Solution: Easy to be anonymous and derogatory with no basis of fact and no recourse; companies can check the Internet on potential and current employees, but people may not be able to defend themselves (could harm chances of getting hired or could result in getting fired).

188) Given the global nature of our economy, what are the international aspects of privacy that we need to consider in our business dealings?

Difficulty: Easy

Section Reference 1: 3.2

Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.

Bloomcode: Comprehension

Standard 1 : AACSB || Ethics

Standard 2 : AACSB || Technology

Standard 3 : AACSB || Communication

Solution: 50 countries have data protection laws
Some countries have stricter laws (Europe)
No consistent or uniform standards for privacy and security – obstructs flow of information among countries (transborder data flows)
Privacy issues – whose laws do you follow?
Come up with “safe harbor” frameworks for regulation

Document Information

Document Type:
DOCX
Chapter Number:
3
Created Date:
Aug 21, 2025
Chapter Name:
Chapter 3 Ethics And Privacy
Author:
R. Kelly Rainer

Connected Book

Info Systems 9e | Test Bank by Rainer

By R. Kelly Rainer

Test Bank General
View Product →

$24.99

100% satisfaction guarantee

Buy Full Test Bank

Benefits

Immediately available after payment
Answers are available after payment
ZIP file includes all related files
Files are in Word format (DOCX)
Check the description to see the contents of each ZIP file
We do not share your information with any third party