Chapter 13 Flashcards

1
Q

Accessibility

A

Accessibility: An area of information control involved with the ability to obtain data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Accuracy

A

Accuracy: An area of information control dealing with the correctness of information or lack of errors in
information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cookies

A

Cookie: A small coded text message placed on or retrieved and updated from a person’s hard drive to allow
companies to track the person’s movements through a site or sites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Green Computing

A

Green computing: An upcoming technology strategy in which companies become more socially responsible by
using computing resources efficiently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Identity Theft

A

Identity theft: The taking of a victim’s identity to obtain credit and/or credit cards from banks and retailers, steal
money from the victim’s existing accounts, apply for loans, establish accounts with utility companies, rent an
apartment, file for bankruptcy, or obtain a job using the victim’s name.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Information Ethics

A

Information ethics: The ethical issues associated with the development and application of information
technologies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Online Reputation Management

A

Online reputation management: The service provided to a person or company for a fee to find negative formal
or informal reviews on Web sites and report results to the client periodically.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Privacy

A

Privacy: The area of information control involved with the right to be left alone; an individual’s ability to personally control information about himself or herself; it is involved with the protections from intrusion and
information gathering by others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Property

A

Property: An area of information control focused on who owns the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Social Contract Theory

A

Social contract theory: The theory used in business ethics that places responsibility on corporate managers to consider the needs of the society (societies) in which a corporation is embedded. Social contract theorists ask what
conditions would have to be met for the members of such a society to agree to allow a corporation to be formed.
Thus, society bestows legal recognition on a corporation to allow it to employ social resources toward given ends.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Stakeholder Theory

A

Stakeholder theory: A theory used in business ethics that suggests that managers, although bound by their relation to stockholders, are also entrusted with a fiduciary responsibility to all those who hold a stake in or a claim
on the firm, including employees, customers, vendors, neighbors, and so forth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. TJX’s handling of its serious data breach is consistent with which one of the following?
    a) Stakeholder theory
    b) Stockholder theory
    c) Social normative
    d) Social contract theory
    e) Corporate social responsibility
A

b) Stockholder theory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. Which normative theory of business ethics would TJX have displayed if it had informed customers as soon as the breach was corrected and told other retailers how to prevent future security breaches?
    a) Stakeholder
    b) Stockholder
    c) Social contract
    d) Investor
    e) Corporate social responsibility
A

c) Social contract

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. This is the term used to describe ethical dilemmas that arise with the development and application of IT.
    a) Stockholder theory
    b) PAPA principles
    c) Information ethics
    d) Normative theories
    e) IT dilemmas
A

c) Information ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. All of the following are examples of green computing EXCEPT:
    a) Virtualization
    b) Cloud computing
    c) Tidal powered servers
    d) Server workloads moved to off-peak hours
    e) Cookies
A

e) Cookies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. Green computing is often associated with supporting the triple bottom line known as:
    a) Economic, environmental and social
    b) Stockholder, stakeholder and society
    c) People, Privacy and Property
    d) Google, Facebook and Microsoft
    e) Data, information and knowledge
A

a) Economic, environmental and social

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  1. This is a text message that is stored on a user’s computer by a Web server that helps trace the user’s browsing habits.
    a) Script
    b) Cookie
    c) Id theft
    d) Firewall
    e) Data file
A

b) Cookie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  1. In the chapter, there is the statement, “Internet companies are in business for the money and hence they really would prefer to keep their customers in the dark about how their personal data is being used to generate profits”. Assuming this statement is true, with which ethical theory would you say these Internet companies are most aligned?
    a) Stockholder theory
    b) Stakeholder theory
    c) Property theory
    d) Fiduciary theory
    e) Normative theory
A

a) Stockholder theory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
  1. “Who owns information?” and “What are the just and fair prices for its exchange?” are part of this ethical issue:
    a) Privacy
    b) Accuracy
    c) Ownership
    d) Property
    e) Accessibility
A

d) Property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
  1. What principles, developed in 2000 by the US Department of Commerce (DOC) in consultation with the European Commission, allow U.S. companies to be placed on a list maintained by the DOC?
    a) Safe Harbor framework
    b) Approved Business framework
    c) PAPA framework
    d) Property Harbor framework
    e) Safe Business framework
A

a) Safe Harbor framework

21
Q
  1. The European Union Directive on Data Protection does all of the following EXCEPT:
    a) Expect accurate and up-to-date data on collected personal information
    b) Allow companies to only keep data as long as necessary
    c) Set standards for the collection, storage and processing of personal information
    d) Regulate data standards for publically traded companies
    e) Prohibit the transfer of personal data to non-European Union nations that do not meet certain standards
A

d) Regulate data standards for publically traded companies

22
Q
  1. Questions like “Who is responsible for the reliability of information?” and “Who will be accountable for errors in the information?” are part of this ethical issue.
    a) Privacy
    b) Accuracy
    c) Authenticity
    d) Perfection
    e) Purpose
A

b) Accuracy

23
Q
  1. The question “What information does a person or an organization have a right or a privilege to obtain?” is part of this ethical issue.
    a) Privacy
    b) Accuracy
    c) Accessibility
    d) Perfection
    e) Property
A

c) Accessibility

24
Q
  1. In today’s digital word, individuals can control their privacy through choice, ______ , and correction.
    a) Protection
    b) Consent
    c) Property
    d) Communication
    e) Consideration
A

b) Consent

25
14. A company should examine this area of the control of information if it wants to determine what data it has the right to monitor and capture from its employees. a) Privacy b) Accuracy c) Accessibility d) Perfection e) Property
a) Privacy
26
15. Today's managers must ensure that information about their employees and customers is only available to those who have a right to see it and use it, an issue referred to as: a) Screening b) Accuracy c) Accessibility d) Perfection e) Property
c) Accessibility
27
16. A manager who primarily focuses on the shareholders of the corporation rather than all of the vested parties in the businesses operations and activities is practicing which theory of normative business ethics? a) Stakeholder theory b) Investor theory c) Stockholder theory d) Shareholder theory e) Social contract theory
c) Stockholder theory
28
17. This theory of normative business ethics seeks to create value for people in a manner that is just and nondiscriminatory. a) Stakeholder theory b) Investor theory c) Social contract theory d) Shareholder theory e) Stockholder theory
c) Social contract theory
29
18. This act of 1996 is designed to safeguard the electronic exchange of patient records in the health care industry. a) SoX b) HIPAA c) IETF d) COBIT e) PAPA
b) HIPAA
30
19. Information privacy guidelines should come from what level in a company? a) CEO and top-level executives b) Middle management c) Employees d) Federal regulations e) State laws
a) CEO and top-level executives
31
20. The European Union relies on a government data protection agency and specific privacy protection standards outlined in the ___________. a) Safe Harbor Framework b) PAPA Principles c) Directive on Data Protection d) HIPPA e) SoX Act
c) Directive on Data Protection
32
21. Google Flu Trends aggregates personal search data in order to estimate world-wide flu activity. Google’s site has drawn criticism due to the sharing of users’ online behavior without getting their consent. This, in essence, violates the user’s right to: a) Privacy b) Property c) Accuracy d) Accessibility e) Identity
a) Privacy
33
22. An Internet web site that wishes to abide by fair privacy practices will do all of the following EXCEPT: a) Allow the consumer the choice to participate in the site or not b) Post policies about how personal information gathered from consumers will be used c) Afford the consumer the opportunity to view and contest the accuracy of the data collected d) Secure collected consumer information e) All of the above
e) All of the above
34
23. Target found out a teenager was pregnant by (1) ________ and revealed that fact to her dad by (2) _______ a) (1) Overhearing the teen in the store; (2) Calling her dad b) (1) Her purchases of diapers; (2) sending an official letter to the dad c) (1) Her purchases of unscented soap, cotton balls and vitamins; (2) mailing her some ads for diapers and maternity clothes d) (1) Her sudden elation when visiting the children's department; (2) sending a video of her tears of happiness in that department e) None of the above
c) (1) Her purchases of unscented soap, cotton balls and vitamins; (2) mailing her some ads for diapers and maternity clothes
35
24. Unlike the European Union, the U.S. has no general legislature ensuring Internet privacy rights. Instead, the U.S. encourages self-regulation and has introduced industry-specific regulations as needed.
T
36
25. Over time it becomes easier to maintain the accuracy of information.
F
37
26. The Stakeholder theory requires managers to pursue projects in ways that are compatible with the well-being of society.
F
38
27. Green computing is a passing phase and will likely be less strategic to companies in the very near future.
F
39
28. “Digital natives” are uncomfortable building relationships on the Internet because they understand the consequences of sharing information publically.
F
40
29. Those who possess the “best” information and know how to use it, win.
T
41
30. The concern about privacy on Facebook and other social media sites is greater in the U.S. than it is in Europe.
F
42
31. This is a growing service designed to help individuals and companies clean up their online presence so that a search for their name produces favorable results.
Ans: Reputation management
43
32. This term is used to define energy-efficient computing resources.
Ans: Green computing
44
33. The social contract theory is made up of two distinct components – social welfare and _________.
Ans: Justice
45
34. Green computing benefits _____ which is sometimes referred to as “People, Planet, Profit”.
Ans: 3BL or triple bottom line
46
35. In today’s digital word, individuals can control their privacy through ______, consent, and correction.
Ans: Choice
47
36. List the four areas, as outlined in the text, which deal with control of information.
Ans: Privacy, Accuracy, Property, and Accessibility
48
37. Give an example of U.S. legislature designed to ensure the privacy and protection of information for a specific industry.
Ans: HIPAA, Gramm-Leach-Bliley, Fair Credit Reporting