Chapter 4 Flashcards
(16 cards)
The principles of right and wrong that guide an individual are called ________.
A. environment
B. ethics
C. laws
D. rules
E. company policy
B. ethics
Ethical issues in information systems have become more of an urgent topic because of the rise of ________.
A. organizational culture
B. the Internet and e-commerce
C. disruptive technology
D. negative organizational environment
E. business processes
B. the Internet and e-commerce
The introduction of new information technology has a ripple effect which raises many issues. These issues have the following moral dimensions: information rights and obligations, property rights and obligations, system quality, quality of life, and ________.
A. organizational culture
B. organizational environment
C. corporate profits
D. accountability and control
E. business process
D. accountability and control
All the following are technology trends that raise ethical issues EXCEPT ________.
A. disruptive technologies
B. data storage costs rapidly decline
C. data analysis advances
D. network advances
E. computing power doubles every 18 months
A. disruptive technologies
________ means that mechanisms are in place to determine who in an organization took responsible action.
A. Due process
B. Feasibility
C. Responsibility
D. Accountability
E. Liability
D. Accountability
Immanuel Kant’s Categorical Imperative states ________.
A. if an action is not right for everyone to take, it is not right for anyone
B. do unto others as you would have them do unto you
C. take the action that produces the least harm or the least potential cost
D. take the action that achieves the higher or greater value
E. assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise
A. if an action is not right for everyone to take, it is not right for anyone
Promises by professions to regulate themselves in the general interest of society are called ________.
A. licensing
B. laws
C. codes of conduct
D. honouring property rights
E. risk aversion principles
C. codes of conduct
All the following are steps that should be taken when confronted with a new ethical situation EXCEPT ________.
A. identify the options that you can reasonably take
B. define the conflict or dilemma and identify the higher-order values involved
C. analyze the organizational structure
D. identify the stakeholders
E. identify and describe the facts clearly
C. analyze the organizational structure
In the United States, the claim to privacy is protected primarily by ________.
A. state government
B. professional societies
C. individual organizations
D. local government
E. the First Amendment
E. the First Amendment
A set of principles governing the collection and use of information about users is called ________.
A. Internet privacy model
B. fair exchange practices
C. Computer Matching and Privacy Protection Act of 1988
D. fair information practices
E. Freedom of Information Act
D. fair information practices
Privacy protection for medical records is covered under ________.
A. Fair Credit Reporting Act of 1970
B. The Health Reporting Act of 1999
C. Right to Financial Privacy Act of 1978
D. The Health Insurance Portability and Accountability Act of 1996 (HIPAA)
E. Computer Security Act of 1987
D. The Health Insurance Portability and Accountability Act of 1996 (HIPAA)
Tiny software programs that keep track of where a user visited on the Internet and report this back to a server are called ________.
A. Trojan horses
B. cookies
C. session variables
D. Web beacons
E. SQL injection
D. Web beacons
The commission of illegal acts against a computer or using a computer is called ________.
A. cyber-stalking
B. data breach
C. computer abuse
D. cyber tracing
E. computer crime
E. computer crime
The most common source of business system failure is (are) ________.
A. facility catastrophes
B. data quality
C. viruses
D. cybercrime
E. software bugs
B. data quality
U.S. schools are experiencing a(n) ________, which means that students in poorer schools have less access to technology.
A. lack of training
B. lack of equipment
C. Internet restriction
D. digital divide
E. digital reflux
D. digital divide
The most common type of repetitive stress injury is ________.
A. technostress
B. tendonitis
C. computer vision syndrome
D. detached retina
E. carpal tunnel syndrome
E. carpal tunnel syndrome