What central issue of this chapter does the Washington, D.C., public school bus system’s technical innovations illustrate?
technology can be a double-egded sword
Which of the five moral dimensions of the information age did the D.C. school bus information system raise?
Information rights and obligations
Which ethical issues will be most central if your career is in finance and accounting?
Protecting information systems from fraud and abuse
raise new ethical questions
The introduction of new information technology has a
ripple effect raising new ethical, social, and political issues
The moral dimensions of the information society
cut across individual, social, and political levels of actions.
The four key technical trends responsible for current ethical stresses related to information technology are
doubling of computer power every 18 months, declining data storage costs, data analysis advances, networking advances and the Internet
In the information age, the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of
property rights and obligations
Advances in data storage techniques and rapidly declining storage costs have
made routine violations of privacy cheap and effective
The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called
a new data analysis technology that finds hidden connections between data in disparate sources
Which of the five moral dimensions of the information age do the central business activities of ChoicePoint raise?
Information rights and obligations
Accepting the potential costs, duties, and obligations for the decisions you make is referred to as
The feature of social institutions that means mechanisms are in place to determine responsibility for an action is called
The process in law-governed societies in which laws are known and understood and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly is called
Which of the following is not one of the five steps discussed in the chapter as a process for analyzing an ethical issue
A colleague of yours frequently takes small amounts of office supplies, noting that the loss to the company is minimal. You counter that if everyone were to take the office supplies, the loss would no longer be minimal. Your rationale expresses which historical ethical principle?
Kant’s Categorical Imperative
A classic ethical dilemma is the hypothetical case of a man stealing from a grocery store in order to feed his starving family. If one used the Utilitarian Principle to evaluate this situation, you might argue that
stealing the food is acceptable, because the higher value is the survival of the family
Immanuel Kant’s Categorical Imperative states that:
if an action is not right for everyone to take, it is not right for anyone to take
The ethical “no free lunch” rule states that
everything is owned by someone else, and that the creator wants compensation for this work
The ethical rules discussed in the textbook
cannot always be guides to actions
Which U.S. act restricts the information the federal government can collect and regulates what they can do with the information
Privacy Act of 1974
FIP principles are based on the notion of
mutuality of interest
The Federal Trade Commission Fair Information Practice principle of Notice/Awareness states that
websites must disclose their information practices before collecting data
European privacy protection is _________________ than in the United States
much more stringent
U.S. businesses are allowed to use personal data from EU countries if they
develop privacy protection policies that meet EU standards
The Online Privacy Alliance
encourages self-regulation to develop a set of privacy guidelines for its members
In 2006, new United Kingdom RFID-enhanced biometric passports were cracked by UK security experts in 48 hours using equipment costing less than $500. The moral questions raised by this accomplishment center primarily around the dimension of
The P3P standard is concerned with protecting privacy by
blocking or limiting cookies
The limitation of trade secret protection is that although virtually all software programs of any complexity contain unique elements of some sort, it is difficult to prevent the ideas in the work from falling into the public domain when
the software is widely distributed
Intellectual property can best be described as
intangible property created by individuals or corporations
What legal mechanism protects the owners of intellectual property from having their work copied by others?
“Look and feel” copyright infringement lawsuits are concerned with
the distinction between an idea and its expression
The strength of patent protection is that it
grants a monopoly on the underlying concepts and ideas
One of the difficulties of patent protection is
the years of waiting to receive it
Which of the following adjusts copyright laws to the Internet age by making it illegal to make, distribute, or use devices that circumvent technology-based protections of copyrighted materials?
digital millenium copyright act
In general, it is very difficult to hold software producers liable for their software products when those products are considered to be
similar to books
_________________ are not held liable for the messages they transmit.
regulated common carriers
It is not feasible for companies to produce error-free software because
it is too expensive to create perfect software.
The “do anything anywhere” computing environment can
blur the traditional boundaries between work and family time.
The chapter’s case study on the effect of Internet use on school-age children associates a higher use of the Internet with
lower socialization and interpersonal communications
The practice of spamming has been growing because
it is so inexpensive and can reach so many people.
Redesigning and automating business processes can be seen as a double-edged sword because:
the increases in efficiency may be accompanied by job losses
The U.S. CAN-SPAM Act of 2003
requires spammers to identify themselves
Which of the five moral dimensions of the information age does spamming raise
quality of life
Which of the following refers to large disparities in access to computers and the Internet among different social groups and different locations?
CVS refers to
eyestrain related to computer display screen use
Which of the following is stress induced by computer use, and its symptoms include aggravation, hostility toward humans, impatience, and enervation?
As discussed in the chapter case, the National Security Agency’s databasing of private U.S. citizen’s telephone calls and subsequent hearings and judicial reviews illustrates the complexity of:
applying due process in regards to new types of information systems such as data mining.
When a cookie is created during a Web site visit, it is stored
on the visitor’s computer.
Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed?
Need essay sample on "DS, Ch. 4"? We will write a custom essay sample specifically for you for only .90/page