Exam Prep Chapter 3 Ethics And Privacy - Info Systems 9e | Test Bank by Rainer by R. Kelly Rainer. DOCX document preview.
Package Title: Chapter 3, Testbank
Course Title: Rainer, IS 9e
Chapter Number: 3
Question type: Multiple Choice
1) Colleges across the United States are using ______ to track hundreds of thousands of students more precisely than ever before.
a) campuswide Wi-Fi networks
b) city-wide WiMax networks
c) long-range Bluetooth sensors
d) short-range NFC sensors
Difficulty: Easy
Section Reference 1: Opening Case
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard: AACSB || Technology
2) Which of the following is NOT a company providing tracking technologies to colleges?
a) Degree Analytics
b) FitBit
c) Life360
d) SpotterEDU
Difficulty: Easy
Section Reference 1: Opening Case
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard: AACSB || Technology
3) Considering the SpotterEDU app, it ____ use GPS tracking and students _____ opt out if an individual professor chooses to use the app.
a) does; can
b) does; cannot
c) does not; can
d) does not; cannot
Difficulty: Easy
Section Reference 1: Opening Case
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard: AACSB || Technology
4) _________ focuses on class attendance.
a) Degree Analytics
b) FitBit
c) Life360
d) SpotterEDU
Difficulty: Easy
Section Reference 1: Opening Case
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard: AACSB || Technology
5) ________ focuses on helping parents monitor their children.
a) Degree Analytics
b) FitBit
c) Life360
d) SpotterEDU
Difficulty: Easy
Section Reference 1: Opening Case
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard: AACSB || Technology
6) Degree Analytics uses ____ check-ins to track the movements of some 200,000 students attending 19 state universities, private colleges, and other schools.
a) Bluetooth
b) Ethernet
c) WiMax
d) Wi-Fi
Difficulty: Easy
Section Reference 1: Opening Case
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard: AACSB || Technology
7) Degree Analytics uses ____ to search for patterns in student behavior.
a) algorithms
b) expert systems
c) machine learning
d) neural networks
Difficulty: Easy
Section Reference 1: Opening Case
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Application
Standard: AACSB || Technology
8) The _________ approach states that an ethical action is the one that provides the most good or does the least harm.
a) common good
b) deontology
c) fairness
d) rights
e) utilitarian
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
9) Minimizing the organization’s carbon footprint and otherwise striving for “green IT” is an example of a _________ approach.
a) common good
b) deontology
c) fairness
d) rights
e) utilitarian
Difficulty: Hard
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Synthesis, Evaluation
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
10) The commonly used “bystander at the switch” ethical dilemma where the bystander has to choose between letting the train hit five people or flipping the switch to let the train hit only one person is an example of the _________ approach.
a) common good
b) deontology
c) fairness
d) rights
e) utilitarian
Difficulty: Medium
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Application
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
11) The _________ approach maintains that an ethical action is the one that best protects and respects the moral rights of the affected parties.
a) common good
b) deontology
c) fairness
d) rights
e) utilitarian
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
12) The pursuit of the “American dream” and our ability to choose our religious orientation is a reflection of the _________ approach.
a) common good
b) deontology
c) fairness
d) rights
e) utilitarian
Difficulty: Medium
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Application
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
13) The _________ approach posits that ethical actions treat all human beings equally, or, if unequally, then fairly, based on some defensible standard.
a) common good
b) deontology
c) fairness
d) rights
e) utilitarian
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
14) The debate over CEO salaries being so much higher than other employees is an issue addressed by the _________ approach.
a) common good
b) deontology
c) fairness
d) rights
e) utilitarian
Difficulty: Medium
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Analysis
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
15) If you believe the death penalty is acceptable for murderers, you are using the _________ approach.
a) common good
b) deontology
c) fairness
d) rights
e) utilitarian
Difficulty: Hard
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Analysis, Evaluation
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
16) The _________ approach highlights the interlocking relationships that underlie all societies.
a) common good
b) deontology
c) fairness
d) rights
e) utilitarian
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
17) Obamacare was created to address the _________ approach.
a) common good
b) deontology
c) fairness
d) rights
e) utilitarian
Difficulty: Hard
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Evaluation
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
18) The _________ approach states that the morality of an action is based on whether the action itself is right or wrong under a series of rules, rather than based on the consequences of that action.
a) common good
b) deontology
c) fairness
d) rights
e) utilitarian
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
19) Suppose that you believe that killing someone is wrong even if it is self-defense. This is an example of the _________ approach.
a) common good
b) deontology
c) fairness
d) rights
e) utilitarian
Difficulty: Medium
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge, Evaluation
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
20) The _________ approach is the “black and white” approach to ethics.
a) common good
b) deontology
c) fairness
d) rights
e) utilitarian
Difficulty: Medium
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge, Evaluation
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
21) _________ is the first step in the general framework for ethics.
a) Act and reflect on the outcome of your decision
b) Evaluate alternative actions
c) Get the facts
d) Make a decision and test it
e) Recognize an ethical issue
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
22) “Could this decision or situation damage someone or some group” is a question in the _________ step in the general framework for ethics.
a) Act and reflect on the outcome of your decision
b) Evaluate alternative actions
c) Get the facts
d) Make a decision and test it
e) Recognize an ethical issue
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
23) “Does this decision involve a choice between a good and a bad alternative” is a question in the _________ step in the general framework for ethics.
a) Act and reflect on the outcome of your decision
b) Evaluate alternative actions
c) Get the facts
d) Make a decision and test it
e) Recognize an ethical issue
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
24) “Does this issue involve more than simply legal considerations” is a question in the _________ step in the general framework for ethics.
a) Act and reflect on the outcome of your decision
b) Evaluate alternative actions
c) Get the facts
d) Make a decision and test it
e) Recognize an ethical issue
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
25) _________ is the second step in the general framework for ethics.
a) Act and reflect on the outcome of your decision
b) Evaluate alternative actions
c) Get the facts
d) Make a decision and test it
e) Recognize an ethical issue
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
26) “Do I have sufficient information to make a decision” is a question in the _________ step in the general framework for ethics.
a) Act and reflect on the outcome of your decision
b) Evaluate alternative actions
c) Get the facts
d) Make a decision and test it
e) Recognize an ethical issue
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
27) “Which individuals or groups have an important stake in the outcome” is a question in the _________ step in the general framework for ethics.
a) Act and reflect on the outcome of your decision
b) Evaluate alternative actions
c) Get the facts
d) Make a decision and test it
e) Recognize an ethical issue
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
28) “Have I consulted all relevant persons and groups” is a question in the _________ step in the general framework for ethics.
a) Act and reflect on the outcome of your decision
b) Evaluate alternative actions
c) Get the facts
d) Make a decision and test it
e) Recognize an ethical issue
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
29) _________ is the third step in the general framework for ethics.
a) Act and reflect on the outcome of your decision
b) Evaluate alternative actions
c) Get the facts
d) Make a decision and test it
e) Recognize an ethical issue
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
30) When you are choosing between the five widely used standards (ethical approaches), you are in the_________ step in the general framework for ethics.
a) Act and reflect on the outcome of your decision
b) Evaluate alternative actions
c) Get the facts
d) Make a decision and test it
e) Recognize an ethical issue
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
31) _________ is the fourth step in the general framework for ethics.
a) Act and reflect on the outcome of your decision
b) Evaluate alternative actions
c) Get the facts
d) Make a decision and test it
e) Recognize an ethical issue
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
32) _________ is the final step in the general framework for ethics.
a) Act and reflect on the outcome of your decision
b) Evaluate alternative actions
c) Get the facts
d) Make a decision and test it
e) Recognize an ethical issue
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
33) “How can I implement my decision with the greatest care and attention to the concerns of all stakeholders” is a question in the _________ step in the general framework for ethics.
a) Act and reflect on the outcome of your decision
b) Evaluate alternative actions
c) Get the facts
d) Make a decision and test it
e) Recognize an ethical issue
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
34) “How did my decision turn out, and what did I learn from this specific situation” is a question in the _________ step in the general framework for ethics.
a) Act and reflect on the outcome of your decision
b) Evaluate alternative actions
c) Get the facts
d) Make a decision and test it
e) Recognize an ethical issue
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
35) _________ means that you accept the consequences of your decisions and actions.
a) Accountability
b) Answerability
c) Liability
d) Responsibility
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
36) Suppose you only study two hours for your next test. If you understand that means you may not do well on that test and you are willing to accept the lower grade, it means you are taking _________ for your actions.
a) accountability
b) answerability
c) liability
d) responsibility
Difficulty: Medium
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Application
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
37) _________ refers to determining who is responsible for actions that were taken.
a) Accountability
b) Answerability
c) Liability
d) Responsibility
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
38) Suppose you only study two hours for your next test. You fail the test and tell the teacher that he or she obviously did a terrible job teaching the material. This means you are not accepting _________ for your actions.
a) accountability
b) answerability
c) liability
d) responsibility
Difficulty: Medium
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Application
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
39) _________ is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems.
a) Accountability
b) Answerability
c) Liability
d) Responsibility
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
40) Suppose you slip in the hallway and break your arm. You sue the school for not properly marking the wet spot that caused you to slip. This is an example of ________.
a) accountability
b) answerability
c) liability
d) responsibility
Difficulty: Medium
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Application
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
41) _________ is the most recent example of ethical misbehavior in organizations.
a) Enron
b) Tyco
c) Wells Fargo
d) WorldCom
Difficulty: Medium
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
42) The Sarbanes-Oxley Act requires publicly held companies to implement _________ controls; it was passed to address the _________ crisis.
a) financial; Enron
b) financial; Wells Fargo bank
c) operational; Enron
d) operational; Wells Fargo bank
Difficulty: Hard
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
43) _________ issues involve collecting, storing, and disseminating information about individuals.
a) Accessibility
b) Accuracy
c) Privacy
d) Property
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
44) _________ issues involve the authenticity, fidelity, and correctness of information that is collected and processed.
a) Accessibility
b) Accuracy
c) Privacy
d) Property
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
45) You can check your credit report annually for free through TransUnion, Equifax, and Experian. This allows you to catch signs of identity theft early and note any problems in your credit reports. This is an example of an ethical issue that falls into the category of ________.
a) accessibility
b) accuracy
c) privacy
d) property
Difficulty: Hard
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Evaluation
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
46) _________ issues involve the ownership and value of information.
a) Accessibility
b) Accuracy
c) Privacy
d) Property
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
47) _________ issues revolve around who should have access to information and whether they should pay a fee for this access.
a) Accessibility
b) Accuracy
c) Privacy
d) Property
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
48) Companies like Google and Facebook make their money by selling your information to advertisers. This is an example of an ethical issue that falls into the category of ________.
a) accessibility
b) accuracy
c) privacy
d) property
Difficulty: Hard
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Evaluation
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
49) Which of the following is a privacy issue?
a) How can we ensure that the information will be processed properly and presented accurately to users?
b) How should we handle illegally copying copyrighted software?
c) What information about oneself should an individual be required to reveal to others?
d) What information does a person or an organization have a right to obtain, under what conditions, and with what safeguards?
Difficulty: Hard
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Analysis
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
50) Which of the following is an accuracy issue?
a) How can we ensure that the information will be processed properly and presented accurately to users?
b) How should we handle illegally copying copyrighted software?
c) What information about oneself should an individual be required to reveal to others?
d) What information does a person or an organization have a right to obtain, under what conditions, and with what safeguards?
Difficulty: Medium
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Analysis
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
51) Which of the following is a property issue?
a) How can we ensure that the information will be processed properly and presented accurately to users?
b) How should we handle illegally copying copyrighted software?
c) What information about oneself should an individual be required to reveal to others?
d) What information does a person or an organization have a right to obtain, under what conditions, and with what safeguards?
Difficulty: Medium
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Analysis
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
52) Which of the following is an accessibility issue?
a) How can we ensure that the information will be processed properly and presented accurately to users?
b) How should we handle illegally copying copyrighted software?
c) What information about oneself should an individual be required to reveal to others?
d) What information does a person or an organization have a right to obtain, under what conditions, and with what safeguards?
Difficulty: Medium
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Analysis
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
53) Which of the following is a privacy issue?
a) How can we ensure that errors in databases, data transmissions, and data processing are accidental and not intentional?
b) How much should companies charge for permitting access to information in their databases?
c) Under what circumstances can one use proprietary databases?
d) What information about individuals should be kept in databases, and how secure is the information there?
Difficulty: Hard
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Analysis
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
54) Which of the following is an accuracy issue?
a) How can we ensure that errors in databases, data transmissions, and data processing are accidental and not intentional?
b) How much should companies charge for permitting access to information in their databases?
c) Under what circumstances can one use proprietary databases?
d) What information about individuals should be kept in databases, and how secure is the information there?
Difficulty: Medium
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Analysis
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
55) Which of the following is a property issue?
a) How can we ensure that errors in databases, data transmissions, and data processing are accidental and not intentional?
b) How much should companies charge for permitting access to information in their databases?
c) Under what circumstances can one use proprietary databases?
d) What information about individuals should be kept in databases, and how secure is the information there?
Difficulty: Medium
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Analysis
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
56) Which of the following is an accessibility issue?
a) How can we ensure that errors in databases, data transmissions, and data processing are accidental and not intentional?
b) How much should companies charge for permitting access to information in their databases?
c) Under what circumstances can one use proprietary databases?
d) What information about individuals should be kept in databases, and how secure is the information there?
Difficulty: Medium
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Analysis
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
57) ______ does not collect any data about your online activity and automatically blocks third-party trackers and all advertising cookies.
a) Brave
b) DuckDuckGo
c) Firefox
d) Tor
Difficulty: Easy
Section Reference 1: IT’s About Business 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard: AACSB || Technology
57) ______ does not have a standalone desktop browser.
a) Brave
b) DuckDuckGo
c) Firefox
d) Tor
Difficulty: Easy
Section Reference 1: IT’s About Business 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard: AACSB || Technology
58) ______ is the third most popular browser on the internet and automatically blocks third-party trackers and all advertising cookies.
a) Brave
b) DuckDuckGo
c) Firefox
d) Tor
Difficulty: Easy
Section Reference 1: IT’s About Business 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard: AACSB || Technology
59) ______ encrypts your web activities three times and sends them to three servers before you reach your desired website.
a) Brave
b) DuckDuckGo
c) Firefox
d) Tor
Difficulty: Easy
Section Reference 1: IT’s About Business 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard: AACSB || Technology
60) Google ___ have a privacy policy. Google ____ track offline spending behavior in physical stores.
a) does; does
b) does; does not
c) does not; does
d) does not; does not
Difficulty: Easy
Section Reference 1: IT’s About Business 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard: AACSB || Technology
61) What is considered to be the “holy grail” of online advertising?
a) Being able to determine repeat customers to an online retailer
b) Being able to determine exact spending habits of the 18-35 year old demographic
c) Being able to determine which Web browsers elicit the most ad revenue
d) Being able to determine purchases generated by digital ad campaigns
Difficulty: Easy
Section Reference 1: IT’s About Business 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Comprehension
Standard: AACSB || Technology
62) The Supreme People’s Court of China started a ____list of people who the government alleged did not comply with court judgments.
a) black
b) gray
c) red
d) white
Difficulty: Easy
Section Reference 1: IT’s About Business 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard: AACSB || Technology
63) Considering China’s Social Credit System, people on the ____list have exhibited negative behaviors; people on the ____list have demonstrated positive ones.
a) black; red
b) black; white
c) red; black
d) red; white
Difficulty: Easy
Section Reference 1: IT’s About Business 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard: AACSB || Technology
64) The Chinese government has authorized some _____ Chinese companies to conduct pilots of the Social Credit System; citizens can opt ____ these systems at any time upon request.
a) private; in
b) private; out
c) public; in
d) public; out
Difficulty: Easy
Section Reference 1: IT’s About Business 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard: AACSB || Technology
65) The Chines central government appears to be sharing ____lists with technology platforms to prevent those citizens from engaging in e-commerce.
a) black
b) gray
c) red
d) white
Difficulty: Easy
Section Reference 1: IT’s About Business 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard: AACSB || Technology
66) Privacy rights apply to ____.
a) groups
b) individuals
c) institutions
d) groups, individuals, and institutions
Difficulty: Easy
Section Reference 1: 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
67) The right of privacy ____ absolute; the public’s right to know ____ the individual’s right of privacy.
a) is; guarantees
b) is; supersedes
c) is not; guarantees
d) is not; supersedes
Difficulty: Easy
Section Reference 1: 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
68) _________ is an electronic profile of you and your habits.
a) The digital divide
b) A digital dossier
c) IoT
d) RFID
Difficulty: Easy
Section Reference 1: 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
69) _________ is NOT an example of a data aggregator.
a) Acxiom
b) Amazon
c) ChoicePoint
d) LexisNexis
Difficulty: Easy
Section Reference 1: 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
70) Companies purchase digital dossiers to ________.
a) create customer intimacy
b) engage in electronic surveillance
c) evaluate the competition
d) track their own reputations
Difficulty: Medium
Section Reference 1: 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
71) Photo tagging is a type of _________ technology.
a) facial recognition
b) GPS
c) information privacy
d) RFID
Difficulty: Easy
Section Reference 1: 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
72) URL filtering is a type of _________ technology.
a) electronic surveillance
b) GPS
c) information privacy
d) RFID
Difficulty: Easy
Section Reference 1: 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
73) The _________ model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected.
a) opt-in
b) opt-out
c) sign-up
d) sign-out
Difficulty: Easy
Section Reference 1: 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
74) The _________ model of informed consent prohibits an organization from collecting any personal information unless the customer specifically authorizes it.
a) opt-in
b) opt-out
c) sign-up
d) sign-out
Difficulty: Easy
Section Reference 1: 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
75) Companies prefer the _________ model of informed consent.
a) opt-in
b) opt-out
c) sign-up
d) sign-out
Difficulty: Hard
Section Reference 1: 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Evaluation
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
76) Europeans and privacy advocates prefer the _________ model of informed consent.
a) opt-in
b) opt-out
c) sign-up
d) sign-out
Difficulty: Hard
Section Reference 1: 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Evaluation
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
77) The General Data Protection Regulation, the world’s strongest data protection laws, went into effect in ____ on May 25, 2018.
a) China
b) the EU
c) India
d) the US
Difficulty: Easy
Section Reference 1: 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
78) ________ are/is the world’s strongest data protection laws.
a) GDPA
b) HIPAA
c) SOX
d) USMCA
Difficulty: Medium
Section Reference 1: 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
79) The General Data Protection Regulation applies to _____ which are the organizations that have relationships with data subjects.
a) data controllers
b) data processors
c) data subjects
d) natural persons
Difficulty: Easy
Section Reference 1: 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
80) The General Data Protection Regulation applies to _____ which are the living human beings.
a) data controllers
b) data processors
c) data subjects
d) natural persons
Difficulty: Easy
Section Reference 1: 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
81) The General Data Protection Regulation applies to _____ which are the human beings whose data an organization has or processes.
a) data controllers
b) data processors
c) data subjects
d) natural persons
Difficulty: Easy
Section Reference 1: 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
82) The ___________ is the new legal framework for transatlantic data flows that replaces ____.
a) EU-US Privacy Shield; General Data Protection Regulation
b) EU-US Privacy Shield; Safe Harbor
c) Safe Harbor; EU-US Privacy Shield
d) Safe Harbor; General Data Protection Regulation
Difficulty: Easy
Section Reference 1: 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
83) ____ technology is controversial because it contributes to a loss of ____.
a) Facial recognition; privacy
b) Facial recognition; security
c) Expert system; privacy
d) Expert system; security
Difficulty: Easy
Section Reference 1: IT’s About Business 3.3
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard: AACSB || Technology
84) The practice of extracting images from a website is known as _____.
a) facial recognition
b) image scraping
c) neural networking
d) photo tagging
Difficulty: Easy
Section Reference 1: IT’s About Business 3.3
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard: AACSB || Technology
85) _____________ claims that organizations have used its app to help solve shoplifting, identity theft, credit card fraud, murder, and child sexual exploitation cases.
a) Clearview
b) Facebook
c) Google
d) Rekognition
Difficulty: Easy
Section Reference 1: IT’s About Business 3.3
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard: AACSB || Technology
86) Grubhub used ____ to charge restaurants higher fees; this is ____.
a) cybersquatting; illegal
b) cybersquatting; legal
c) domain tasting; illegal
d) domain tasting; legal
Difficulty: Medium
Section Reference 1: Closing Case
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge, Synthesis
Standard: AACSB || Technology
87) Grubhub used an opt-___ strategy for non-partnered restaurants; this was labeled as ____ behavior.
a) in; anticompetitive
b) in; competitive
c) out; anticompetitive
d) out; competitive
Difficulty: Hard
Section Reference 1: Closing Case
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Evaluation, Synthesis
Standard: AACSB || Technology
88) Grubhub referred to their ____ practices as creating a ____.
a) cybersquatting; microsite
b) cybersquatting; minisite
c) domain tasting; microsite
d) domain tasting; minisite
Difficulty: Easy
Section Reference 1: Closing Case
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knoweldge
Standard: AACSB || Technology
89) As of 2020,____ leads the food delivery industry.
a) AmazonGo
b) DoorDash
c) Grubhub
d) UberEats
Difficulty: Easy
Section Reference 1: Closing Case
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard: AACSB || Technology
Question type: True/False
90) People using Life360 must weigh the safety and security of their loved ones against their privacy.
Difficulty: Easy
Section Reference 1: Opening Case
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and the four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard: AACSB || Technology
91) Tracking apps do not constitute a breach of privacy because students can opt-out of them.
Difficulty: Medium
Section Reference 1: Opening Case
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and the four categories of ethical issues related to information technology.
Bloomcode: Knowledge, Analysis, Evaluation
Standard: AACSB || Technology
92) Deciding what is right or wrong is always easy and clear-cut.
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
93) If you want to do what is best for the most people, you use the utilitarian approach to ethical decision making.
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
94) The rights approach posits that all human beings should be treated equally.
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
95) The general framework for ethics has four steps.
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
96) The general framework for ethics has five steps.
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
97) A privacy policy is a collection of principles intended to guide decision making by members of the organization.
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
98) A code of ethics is a collection of principles intended to guide decision making by members of the organization.
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
99) Responsibility refers to determining who is responsible for actions there were taken.
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
100) Accountability refers to determining who is responsible for actions there were taken.
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
101) Liability is the legal concept that gives individuals the right to recover damages done to them.
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
102) What is unethical is not necessarily illegal.
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
103) If it is unethical, it is illegal.
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
104) All unethical actions are illegal in the United States.
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
105) A monopoly is illegal and unethical.
Difficulty: Hard
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Evaluation
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
106) All employees have a responsibility to encourage ethical uses of information and information technology.
Difficulty: Medium
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
107) Executives have the sole responsibility for encouraging ethical uses of information and information technology.
Difficulty: Medium
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
108) You check your credit report annually to ensure your identity hasn’t been stolen. This is an example of a property issue.
Difficulty: Medium
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Analysis
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
109) Google and Facebook collect, store, and disseminate a great deal of information about the people who use their websites. This is an example of an accuracy issue.
Difficulty: Medium
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Application
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
110) Telemarketing and ads on Google are examples of accessibility issues.
Difficulty: Hard
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Evaluation
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
111) Google can analyze offline purchase activity even when consumers deactivate location tracking on their smartphones.
Difficulty: Easy
Section Reference 1: IT’s About Business 3.1
Learning Objective 3.1: Define ethics and explain its three fundamental tenets and the four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard: AACSB || Technology
112) Google has a tracker network to develop extensive individual profiles.
Difficulty: Easy
Section Reference 1: IT’s About Business 3.1
Learning Objective 3.1: Define ethics and explain its three fundamental tenets and the four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard: AACSB || Technology
113) Cookies do not require the user’s permission.
Difficulty: Easy
Section Reference 1: IT’s About Business 3.1
Learning Objective 3.1: Define ethics and explain its three fundamental tenets and the four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard: AACSB || Technology
114) Cookies require the user’s permission, but hidden webpages do not.
Difficulty: Easy
Section Reference 1: IT’s About Business 3.1
Learning Objective 3.1: Define ethics and explain its three fundamental tenets and the four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard: AACSB || Technology
115) Google insists users are providing informed consent while others argue data collection is almost always performed without consumers’ knowledge.
Difficulty: Easy
Section Reference 1: IT’s About Business 3.1
Learning Objective 3.1: Define ethics and explain its three fundamental tenets and the four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard: AACSB || Technology
116) The Chinese government is pursuing the Social Credit Score as a way to address the fact that many citizens do not have a credit history.
Difficulty: Medium
Section Reference 1: IT’s About Business 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Comprehension
Standard: AACSB || Technology
117) Ant Financial Services Group, an affiliate company of Amazon Web Services, developed a credit scoring and loyalty program operated by Credit Sesame.
Difficulty: Easy
Section Reference 1: IT’s About Business 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard: AACSB || Technology
118) Ant Financial Services Group, an affiliate company of Alibaba Group, developed a credit scoring and loyalty program operated by Credit Sesame.
Difficulty: Easy
Section Reference 1: IT’s About Business 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard: AACSB || Technology
119) Data inputs into the Social Credit System include data from court documents, government and corporate records, and citizen observers.
Difficulty: Easy
Section Reference 1: IT’s About Business 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Comprehension
Standard: AACSB || Technology
120) China’s Social Credit System resembles the FICO credit scoring system in the US.
Difficulty: Easy
Section Reference 1: IT’s About Business 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Comprehension
Standard: AACSB || Technology
121) China’s Social Credit System focuses on financial information just like the FICO credit scoring system in the US.
Difficulty: Easy
Section Reference 1: IT’s About Business 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Comprehension
Standard: AACSB || Technology
122) The Chinese government is using facial recognition technology less as they rely more on the Social Credit System.
Difficulty: Easy
Section Reference 1: IT’s About Business 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Comprehension
Standard: AACSB || Technology
123) Facial recognition technology is increasingly widespread across China.
Difficulty: Easy
Section Reference 1: IT’s About Business 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Comprehension
Standard: AACSB || Technology
124) Privacy rights apply only to individuals.
Difficulty: Medium
Section Reference 1: 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
125) Privacy rights apply to individuals, groups, and institutions.
Difficulty: Easy
Section Reference 1: 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
126) The right to privacy is recognized today in all the US states and by the federal government, either by statute or in common law.
Difficulty: Hard
Section Reference 1: 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
127) The right of privacy is absolute.
Difficulty: Medium
Section Reference 1: 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
128) The right of privacy is not absolute.
Difficulty: Medium
Section Reference 1: 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
129) Privacy must be balanced against the needs of society.
Difficulty: Medium
Section Reference 1: 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
130) The public’s right to know supersedes the individual’s right of privacy.
Difficulty: Medium
Section Reference 1: 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
131) The public’s right to know isn’t as important as the individual’s right of privacy.
Difficulty: Medium
Section Reference 1: 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
132) Advancements in information technology make privacy harder to manage.
Difficulty: Medium
Section Reference 1: 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Analysis
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
133) Data aggregators can collect public and non-public information to create digital dossiers.
Difficulty: Medium
Section Reference 1: 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
134) The ethical purpose behind profiling is customer intimacy.
Difficulty: Medium
Section Reference 1: 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge, Synthesis
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
135) Electronic surveillance is decreasing in the United States as people call for more privacy.
Difficulty: Easy
Section Reference 1: 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
136) Electronic surveillance is increasing.
Difficulty: Easy
Section Reference 1: 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
137) Smartphones are sensors that can be used for electronic surveillance.
Difficulty: Easy
Section Reference 1: 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
138) Individuals do not have to be aware of the photo tagging process for it to work.
Difficulty: Easy
Section Reference 1: 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
139) The internet illustrates the conflict between free speech and privacy.
Difficulty: Easy
Section Reference 1: 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
140) The opt-out model of informed consent means companies can collect information unless the consumer specifies it should not be collected.
Difficulty: Easy
Section Reference 1: 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
141) The opt-in model of informed consent means companies can collect information unless the consumer specifies it should not be collected.
Difficulty: Easy
Section Reference 1: 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
142) Privacy advocates prefer the opt-out model of informed consent.
Difficulty: Easy
Section Reference 1: 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
143) Privacy advocates prefer the opt-in model of informed consent.
Difficulty: Easy
Section Reference 1: 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
144) Facebook prefers the opt-out model of informed consent.
Difficulty: Medium
Section Reference 1: 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Application
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
145) Facebook prefers the opt-in model of informed consent.
Difficulty: Medium
Section Reference 1: 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Application
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
146) The United Nations ensures privacy laws are consistent across countries so that it is easier to do business in multiple countries.
Difficulty: Easy
Section Reference 1: 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
147) The European Union has stricter data protection laws than the US.
Difficulty: Medium
Section Reference 1: 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
148) Safe Harbor laws are the world’s strongest data protection laws.
Difficulty: Medium
Section Reference 1: 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
149) The General Data Protect Regulation laws are the world’s strongest data protection laws.
Difficulty: Medium
Section Reference 1: 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
150) Safe Harbor replaced the EU-US Privacy Shield in 2016.
Difficulty: Medium
Section Reference 1: 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
151) The EU-US Privacy Shield replaced Safe Harbor in 2016.
Difficulty: Medium
Section Reference 1: 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
152) Facial recognition has become much more accurate over the last 20 years and is now used for more than police work.
Difficulty: Easy
Section Reference 1: IT’s About Business 3.3
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard: AACSB || Technology
153) The Clearview app works so well that federal agencies use it almost exclusively.
Difficulty: Easy
Section Reference 1: IT’s About Business 3.3
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard: AACSB || Technology
154) The Clearview app has a tendency to deliver false matches for women and people of color.
Difficulty: Easy
Section Reference 1: IT’s About Business 3.3
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard: AACSB || Technology
155) The Clearview app has been tested and approved by the National Institute of Standards and Techology.
Difficulty: Easy
Section Reference 1: IT’s About Business 3.3
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard: AACSB || Technology
156) It is easy to have your photos removed from Clearview’s app if you complete the required paperwork.
Difficulty: Easy
Section Reference 1: IT’s About Business 3.3
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard: AACSB || Technology
157) Facial recognition technology is lucrative.
Difficulty: Medium
Section Reference 1: IT’s About Business 3.3
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard: AACSB || Technology
158) According to restaurant owners, Grubhub engaged in cybersquatting to increase the commissions restaurant owners had to pay.
Difficulty: Easy
Section Reference 1: Closing Case
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard: AACSB || Technology
159) Grubhub’s business practices ensure it will maintain its leading market share in the food delivery industry.
Difficulty: Easy
Section Reference 1: Closing Case
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard: AACSB || Technology
Question type: Text Entry
160) _____ refers to the principles of right and wrong that individuals use to make choices that guide their behavior.
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
161) The utilitarian approach states that an ethical action is the one that provides the most ___ or does the least ___.
Answer 1: good
Answer 2: harm
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
162) The fairness approach posits that ethical actions treat all human beings equally, or, if unequally, then fairly, based on some ___.
Difficulty: Medium
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
163) The common good approach highlights the ___ relationships that underlie all societies.
Difficulty: Medium
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
164) The deontology approach states that the morality of an action is based on whether that action itself is right or wrong under a series of rules, rather than based on the ___ of that action.
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
165) A(n) _______________ is a collection of principles intended to guide decision making by members of the organization.
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
166) _________ means that you accept the consequences of your decisions and actions.
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
167) ___________ is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems.
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
168) Liability is a legal concept that gives individuals the right to _____________ done to them by other individuals, organizations, or systems.
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
169) ___________ issues involve collecting, storing, and disseminating information about individuals.
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
170) ___________ issues involve the authenticity, fidelity, and correctness of information that is collected and processed.
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
171) ___________ issues involve the ownership and value of information.
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
172) ___________ issues revolve around who should have access to information and whether they should pay a fee for this access.
Difficulty: Easy
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
173) ___ is the right to be left alone and to be free of unreasonable personal intrusions.
Difficulty: Easy
Section Reference 1: 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
174) Privacy is the right to be ___ and to be free of unreasonable personal intrusions.
Difficulty: Medium
Section Reference 1: 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
175) Information privacy is the right to determine when, and to what extent, ___ about you can be gathered or communicated to others.
Difficulty: Medium
Section Reference 1: 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
176) ___ is the right to determine when, and to what extent, information about you can be gathered or communicated to others.
Difficulty: Easy
Section Reference 1: 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
177) A(n) ______________ is an electronic profile of you and your habits.
Difficulty: Easy
Section Reference 1: 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
178) The process of forming a digital dossier is called ___.
Difficulty: Easy
Section Reference 1: 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
179) _____________ is the process of assigning names to images of people.
Difficulty: Easy
Section Reference 1: 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
180) __________________ are an organization’s guidelines for protecting the privacy of its customers, clients, and employees.
Difficulty: Easy
Section Reference 1: 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
181) The opt-_________ model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected.
Difficulty: Easy
Section Reference 1: 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
182) The opt-_________ model of informed consent prohibits an organization from collecting any personal information unless the customer specifically authorizes it.
Difficulty: Easy
Section Reference 1: 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Knowledge
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
Question type: Essay
183) What is ethics? Is an ethical decision easy and clear-cut? Why or why not? List and describe the five widely used ethical standards/frameworks. Evaluate a SINGLE ethical scenario with all five approaches.
Difficulty: Hard
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Synthesis, Evaluation
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
Standard 3 : AACSB || Communication
Standard 4 : AACSB || Analytic
Standard 5 : AACSB || Reflective Thinking
Solution: Ethics – principles of right and wrong that individuals use to make choices that guide their behavior
No because an answer could be different based on the approach chosen
1) Utilitarian approach states that an ethical action is the one that provides the most good or does the least harm; a policeman killing a person who is holding others hostage is best for those being held hostage
2) Rights approach maintains that an ethical action is the one that best protects and respects the moral rights of the affected parties; nobody should be killed because everyone has the right to live
3) Fairness approach posits that ethical actions treat all human beings equally, or, if unequally, then fairly, based on some defensible standard; killing someone who is holding others hostage is fair because people know it isn’t right to threaten the lives of others
4) Common good approach highlights the interlocking relationships that underlie all societies; the police being on-scene is for the best of everyone – they have the right to kill under these circumstances
5) Deontology approach states that the morality of an action is based on whether than action itself is right or wrong under a series of rules, rather than based on the consequences of that action; it is never OK to kill a person even if they are being “bad”
184) The concept of “green IT” is an ethical decision every company needs to make. Using the five steps in the general framework for ethical decision-making, how would you handle the situation if you were the CEO?
Difficulty: Medium
Section Reference 1: 3.1
Learning Objective 3.1: Define ethics, and explain its three fundamental tenets and four categories of ethical issues related to information technology.
Bloomcode: Application
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
Standard 3 : AACSB || Communication
Standard 4 : AACSB || Reflective Thinking
Solution: 1) Recognize an ethical issue – could not being green damage the environment? What are the good and bad alternatives for being green? Are there legal requirements for being green (energy consumption, pollution, etc.) ?
2) Get the facts – what area will be hurt by non-green activities (water, air, land)? Sufficient information? Who has a stake (environmental groups, customers, suppliers)? Have I consulted those people?
3) Evaluate alternative actions – 5 approaches – utilitarian, rights, fairness, common good, deontology
4) Make a decision and test it – pick an option
5) Act and reflect on the outcome of your decision – am I taking better care of the environment?
185) Describe five ways a digital dossier is created. Describe a potential profile that has been created for your life.
Difficulty: Hard
Section Reference 1: 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Synthesis
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
Standard 3 : AACSB || Communication
Standard 4 : AACSB || Reflective Thinking
Solution: Surveillance cameras on roads or in buildings, credit card transactions, telephone calls, banking transactions, queries to search engines, government records
Potential profile – many schools have cameras and many towns have cameras at intersections to record what students are doing at school or on the road (students may also have ID badges that are required to get into buildings) ; many students already have credit cards so purchases are tracked, all activity on phones can be tracked including phone calls and text messages, many students are already doing online banking, all Internet searching is tracked, students may also talk about traveling, Facebook activity (photo tagging) , etc., basically, everything we do can be tracked
186) Who conducts electronic surveillance? What types of electronic surveillance impact your life? Are you paranoid about this? If not, should you be? Explain why or why not for these last two questions.
Difficulty: Medium
Section Reference 1: 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Application
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
Standard 3 : AACSB || Communication
Standard 4 : AACSB || Reflective Thinking
Solution: Cameras at many public venues, digital sensors everywhere (smartphones have many capabilities now), ID cards, webcams, video-game motion sensors, satellite photos, biometric readers, GPS, facial recognition technology (and photo tagging), in-store digital billboards that watch activity, drones, URL filtering, etc.
187) How does the Internet create a conflict between free speech and privacy?
Difficulty: Medium
Section Reference 1: 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Analysis
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
Standard 3 : AACSB || Communication
Standard 4 : AACSB || Reflective Thinking
Solution: Easy to be anonymous and derogatory with no basis of fact and no recourse; companies can check the Internet on potential and current employees, but people may not be able to defend themselves (could harm chances of getting hired or could result in getting fired).
188) Given the global nature of our economy, what are the international aspects of privacy that we need to consider in our business dealings?
Difficulty: Easy
Section Reference 1: 3.2
Learning Objective 3.2: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Bloomcode: Comprehension
Standard 1 : AACSB || Ethics
Standard 2 : AACSB || Technology
Standard 3 : AACSB || Communication
Solution: 50 countries have data protection laws
Some countries have stricter laws (Europe)
No consistent or uniform standards for privacy and security – obstructs flow of information among countries (transborder data flows)
Privacy issues – whose laws do you follow?
Come up with “safe harbor” frameworks for regulation