Chapter 13 Flashcards
Accessibility
Accessibility: An area of information control involved with the ability to obtain data.
Accuracy
Accuracy: An area of information control dealing with the correctness of information or lack of errors in
information.
Cookies
Cookie: A small coded text message placed on or retrieved and updated from a person’s hard drive to allow
companies to track the person’s movements through a site or sites.
Green Computing
Green computing: An upcoming technology strategy in which companies become more socially responsible by
using computing resources efficiently.
Identity Theft
Identity theft: The taking of a victim’s identity to obtain credit and/or credit cards from banks and retailers, steal
money from the victim’s existing accounts, apply for loans, establish accounts with utility companies, rent an
apartment, file for bankruptcy, or obtain a job using the victim’s name.
Information Ethics
Information ethics: The ethical issues associated with the development and application of information
technologies.
Online Reputation Management
Online reputation management: The service provided to a person or company for a fee to find negative formal
or informal reviews on Web sites and report results to the client periodically.
Privacy
Privacy: The area of information control involved with the right to be left alone; an individual’s ability to personally control information about himself or herself; it is involved with the protections from intrusion and
information gathering by others.
Property
Property: An area of information control focused on who owns the data.
Social Contract Theory
Social contract theory: The theory used in business ethics that places responsibility on corporate managers to consider the needs of the society (societies) in which a corporation is embedded. Social contract theorists ask what
conditions would have to be met for the members of such a society to agree to allow a corporation to be formed.
Thus, society bestows legal recognition on a corporation to allow it to employ social resources toward given ends.
Stakeholder Theory
Stakeholder theory: A theory used in business ethics that suggests that managers, although bound by their relation to stockholders, are also entrusted with a fiduciary responsibility to all those who hold a stake in or a claim
on the firm, including employees, customers, vendors, neighbors, and so forth.
- TJX’s handling of its serious data breach is consistent with which one of the following?
a) Stakeholder theory
b) Stockholder theory
c) Social normative
d) Social contract theory
e) Corporate social responsibility
b) Stockholder theory
- Which normative theory of business ethics would TJX have displayed if it had informed customers as soon as the breach was corrected and told other retailers how to prevent future security breaches?
a) Stakeholder
b) Stockholder
c) Social contract
d) Investor
e) Corporate social responsibility
c) Social contract
- This is the term used to describe ethical dilemmas that arise with the development and application of IT.
a) Stockholder theory
b) PAPA principles
c) Information ethics
d) Normative theories
e) IT dilemmas
c) Information ethics
- All of the following are examples of green computing EXCEPT:
a) Virtualization
b) Cloud computing
c) Tidal powered servers
d) Server workloads moved to off-peak hours
e) Cookies
e) Cookies
- Green computing is often associated with supporting the triple bottom line known as:
a) Economic, environmental and social
b) Stockholder, stakeholder and society
c) People, Privacy and Property
d) Google, Facebook and Microsoft
e) Data, information and knowledge
a) Economic, environmental and social
- This is a text message that is stored on a user’s computer by a Web server that helps trace the user’s browsing habits.
a) Script
b) Cookie
c) Id theft
d) Firewall
e) Data file
b) Cookie
- In the chapter, there is the statement, “Internet companies are in business for the money and hence they really would prefer to keep their customers in the dark about how their personal data is being used to generate profits”. Assuming this statement is true, with which ethical theory would you say these Internet companies are most aligned?
a) Stockholder theory
b) Stakeholder theory
c) Property theory
d) Fiduciary theory
e) Normative theory
a) Stockholder theory
- “Who owns information?” and “What are the just and fair prices for its exchange?” are part of this ethical issue:
a) Privacy
b) Accuracy
c) Ownership
d) Property
e) Accessibility
d) Property
- What principles, developed in 2000 by the US Department of Commerce (DOC) in consultation with the European Commission, allow U.S. companies to be placed on a list maintained by the DOC?
a) Safe Harbor framework
b) Approved Business framework
c) PAPA framework
d) Property Harbor framework
e) Safe Business framework
a) Safe Harbor framework
- The European Union Directive on Data Protection does all of the following EXCEPT:
a) Expect accurate and up-to-date data on collected personal information
b) Allow companies to only keep data as long as necessary
c) Set standards for the collection, storage and processing of personal information
d) Regulate data standards for publically traded companies
e) Prohibit the transfer of personal data to non-European Union nations that do not meet certain standards
d) Regulate data standards for publically traded companies
- Questions like “Who is responsible for the reliability of information?” and “Who will be accountable for errors in the information?” are part of this ethical issue.
a) Privacy
b) Accuracy
c) Authenticity
d) Perfection
e) Purpose
b) Accuracy
- The question “What information does a person or an organization have a right or a privilege to obtain?” is part of this ethical issue.
a) Privacy
b) Accuracy
c) Accessibility
d) Perfection
e) Property
c) Accessibility
- In today’s digital word, individuals can control their privacy through choice, ______ , and correction.
a) Protection
b) Consent
c) Property
d) Communication
e) Consideration
b) Consent