Test Bank E-Commerce Regulatory Ethical And Social Ch15 - Electronic Commerce 2018 9e Test Bank + Answers by Efraim Turban. DOCX document preview.

Test Bank E-Commerce Regulatory Ethical And Social Ch15

Chapter 15

True/False

1. Law is a set of moral principles or rules of how people are expected to conduct themselves.

A. True

B. False

2. Business ethics is a code of values, behaviors, and rules, written or unwritten, for how people should behave in the business world.

A. True

B. False

3. One of the major methods of violating copyrights is file sharing.

A. True

B. False

4. Privacy has a single meaning and definition.

A. True

B. False

5. Opt-in is based on the principle that consumers must approve in advance what information they receive from a company, or allow a company to share their information with third parties.

A. True

B. False

Multiple Choice

1. Lying to someone is:

A. unethical

B. illegal

C. always both

D. none of these

2. Instead of banning the use of social networks in the workplace, some employers are encouraging employees to:

A. check their social networks only once or twice a day

B. consolidate their social networking streams

C. develop a clear social networking policy

D. all of these

3. Which of these is not a common EC ethical issue?

A. intellectual property

B. embezzlement

C. privacy

D. consumer protection

4. A practical and necessary approach to limiting Internet surfing that is not work-related is a(n):

A. Firewall

B. Business code of ethics

C. Loss-prevention strategy

D. Internet Acceptable Use Policy (AUP)

5. A ______ is an exclusive legal right of an author or creator of intellectual property to publish, sell, license, distribute, or use such work in any desired way.

A. copyright

B. trademark

C. intellectual property

D. patent

6. A ______ is an exclusive legal right of an inventor to a discovery.

A. copyright

B. trademark

C. intellectual property

D. patent

7. A ______ is an exclusive legal right to a logo used in advertising.

A. copyright

B. trademark

C. intellectual property

D. patent

8. _____ describes a system of protecting the copyrights of data circulated over the Internet or digital media.

A. DRM

B. Firewall

C. RIAA

D. IP law

9. In law, ______ refers to the limited use of copyrighted material, without paying a fee or royalty, for certain purposes (e.g., reviews, commentaries, teaching).

A. fair use

B. license

C. copyright

D. privacy

10. There is a big debate about granting patents for ________.

A. software

B. business methods

C. military items

D. copyrights

11. Associated with hate sites is ______, which is the registration of a domain name that

criticizes (normally maliciously) an organization, product, or person.

A. copyright infringement

B. trademark infringement

C. online bullying

D. cyberbashing

12. Today’s youth seem to be ______ about privacy than they were in the past.

A. less concerned

B. more concerned

C. unchanged in concern

13. According to IBM, which of the following practices for implementing a successful privacy is not indicated?

A. Get organized

B. Conduct inventory of data

C. Contract a legal firm

D. Test a prototype system

14. ______ is a method that gives consumers the choice to refuse to share information about themselves, or to avoid receiving unsolicited information.

A. Opt-in

B. Opt-out

C. Cease and desist

D. None of these

15. How can an individual’s information be gathered online?

A. By tracking users’ movement on the Web

B. By using spyware

C. By website registration

D. All of these

16. A popular way for a website to gather information about an individual is by using:

A. spyware

B. cookies

C. spybots

D. None of these

17. Why would an employer be concerned about employee internet use?

A. wasting time online

B. disclose trade secrets

C. make employers liable for defamation

D. All of these

18. ____ is a protocol for privacy protection on the Web developed by the World Wide Web Consortium.

A. HTML5

B. P2P

C. P3P

D. W3C

19. ______ refers to the process of finding any type of electronic data (e.g., text, images, videos) by using computerized systems as a part of a legal case.

A. e-discovery

B. hacking

C. cracking

D. spyware and malware

20. ______ facilitates consumer confidence in business conducted online.

A. Trust services

B. Affiliates

C. E-discovery

D. All of these

Essay

1. What can a business do to increase consumer confidence online?

2. In the US, is free speech unlimited? Explain.

3. What is the difference between a copyright, patent and trademark.

4. Describe two things a seller can do to combat fake reviews.

5. Briefly describe net neutrality.

Document Information

Document Type:
DOCX
Chapter Number:
15
Created Date:
Aug 21, 2025
Chapter Name:
Chapter 15 E-Commerce Regulatory Ethical And Social Environments
Author:
Efraim Turban

Connected Book

Electronic Commerce 2018 9e Test Bank + Answers

By Efraim Turban

Test Bank General
View Product →

$24.99

100% satisfaction guarantee

Buy Full Test Bank

Benefits

Immediately available after payment
Answers are available after payment
ZIP file includes all related files
Files are in Word format (DOCX)
Check the description to see the contents of each ZIP file
We do not share your information with any third party