Introduction To Information Systems 4th Canadian Edition By Rainer – Test Bank
To Purchase
this Complete Test Bank with Answers Click the link Below
If face any problem or
Further information contact us At tbzuiqe@gmail.com
Sample Test
Chapter 3
Ethics and Privacy
Question type:True/False
1) When you access a website, the site could also have access to
your data.
Answer: True
Difficulty: Easy
Learning Objective:Define ethics, list and describe the three
fundamental tenets of ethics, and describe the four categories of ethical
issues related to information technology.
Section Reference:Case 3.1 The Huge Scope of Privacy Issues
AACSB: Information Technology
Bloomcode: Knowledge
2)Property issues involve the ownership and value of
information.
Answer: True
Difficulty: Easy
Learning Objective:Define ethics, list and describe the three
fundamental tenets of ethics, and describe the four categories of ethical
issues related to information technology.
Section Reference:3.1 Ethical Issues
AACSB: Reflective Thinking
Bloomcode: Knowledge
3) An individual or organization faced with an ethical decision
is basically considering whether to break the law.
Answer: False
Difficulty: Easy
Learning Objective:Define ethics, list and describe the three
fundamental tenets of ethics, and describe the four categories of ethical
issues related to information technology.
Section Reference:3.1 Ethical Issues
AACSB: Ethics
Bloomcode: Knowledge
4) A code of ethics is a collection of principles that are
intended to guide decision making by members of the organization.
Answer: True
Difficulty: Easy
Learning Objective:Define ethics, list and describe the three
fundamental tenets of ethics, and describe the four categories of ethical
issues related to information technology.
Section Reference:3.1 Ethical Issues
AACSB: Ethics
Bloomcode: Knowledge
5) If something is unethical, that means it is illegal.
Answer: False
Difficulty: Medium
Learning Objective:Define ethics, list and describe the three
fundamental tenets of ethics, and describe the four categories of ethical
issues related to information technology.
Section Reference:3.1 Ethical Issues
AACSB: Ethics
Bloomcode: Comprehension
6) Improvements in information technologies are leading to a
decreasing number of ethical problems.
Answer: False
Difficulty: Easy
Learning Objective:Define ethics, list and describe the three
fundamental tenets of ethics, and describe the four categories of ethical
issues related to information technology.
Section Reference:3.1 Ethical Issues
AACSB: Ethics
Bloomcode: Evaluation
7) When you interview for a job at a company, it is likely that
the company will google you and search social networking sites for information
on you.
Answer: True
Difficulty: Easy
Learning Objective:Identify three places that store personal
data, and for each one, discuss at least one potential threat to the privacy of
the data stored there.
Section Reference:3.2 Privacy
AACSB: Information Technology
Bloomcode: Comprehension
8) The right of privacy is absolute.
Answer: False
Difficulty: Easy
Learning Objective:Identify three places that store personal
data, and for each one, discuss at least one potential threat to the privacy of
the data stored there.
Section Reference:3.2 Privacy
AACSB: Ethics
Bloomcode: Comprehension
9) Most electronic surveillance of employees is legal.
Answer: True
Difficulty: Easy
Learning Objective:Identify three places that store personal
data, and for each one, discuss at least one potential threat to the privacy of
the data stored there.
Section Reference:3.2 Privacy
AACSB: Ethics
Bloomcode: Knowledge
10) Determining whose laws should be followed is a problem
related to the international aspects of privacy.
Answer: True
Difficulty: Easy
Learning Objective:Identify three places that store personal
data, and for each one, discuss at least one potential threat to the privacy of
the data stored there.
Section Reference:3.2 Privacy
AACSB: Analytic
Bloomcode: Knowledge
11) Facebook’s CEO believes privacy is no longer a social norm.
Answer: True
Difficulty: Easy
Learning Objective:Identify three places that store personal
data, and for each one, discuss at least one potential threat to the privacy of
the data stored there.
Section Reference:3.2 Privacy
AACSB: Reflective Thinking
Bloomcode: Knowledge
12) The individual’s right of privacy supersedes the public’s
right to know.
Answer: False
Difficulty: Easy
Learning Objective:Identify three places that store personal
data, and for each one, discuss at least one potential threat to the privacy of
the data stored there.
Section Reference:3.2 Privacy
AACSB: Information Technology
Bloomcode: Knowledge
13) In general, employees have high legal protection against
surveillance by employers.
Answer: False
Difficulty: Easy
Learning Objective:Identify three places that store personal
data, and for each one, discuss at least one potential threat to the privacy of
the data stored there.
Section Reference:3.2 Privacy
AACSB: Communication
Bloomcode: Knowledge
14) Privacy is the right to be left alone and to be free of
unreasonable personal intrusions.
Answer: True
Difficulty: Easy
Learning Objective:Identify three places that store personal
data, and for each one, discuss at least one potential threat to the privacy of
the data stored there.
Section Reference:3.2 Privacy
AACSB: Ethics
Bloomcode: Knowledge
15) The opt-out model of informed consent allows a company to
collect personal information until the customers specifically requests
otherwise.
Answer: True
Difficulty: Easy
Learning Objective:Identify three places that store personal
data, and for each one, discuss at least one potential threat to the privacy of
the data stored there.
Section Reference:3.2 Privacy
AACSB: Analytic
Bloomcode: Knowledge
16) The Platform for Privacy Preferences automatically
communicates privacy policies between a commerce Web site and its visitors to
that site.
Answer: True
Difficulty: Easy
Learning Objective:Identify three places that store personal
data, and for each one, discuss at least one potential threat to the privacy of
the data stored there.
Section Reference:3.2 Privacy
AACSB: Information Technology
Bloomcode: Knowledge
17) The flow of information among countries is called
transborderdata flows.
Answer: True
Difficulty: Easy
Learning Objective:Identify three places that store personal
data, and for each one, discuss at least one potential threat to the privacy of
the data stored there.
Section Reference:3.2 Privacy
AACSB: Reflective Thinking
Bloomcode: Comprehension
Question type: Multiple Choice
18) Which of the following allows users to take pictures or
record videos that can self-destruct after a set amount of time and send them
to a selected recipients?
1. a)
Wickr
2. b)
Burn Note
3. c)
Tapad
4. d)
Snapchat
5. e) Disconnect
Answer: d
Difficulty: Medium
Learning Objective:Identify three places that store personal
data, and for each one, discuss at least one potential threat to the privacy of
the data stored there.
Section Reference:Case 3.2 Protecting Your Privacy
AACSB: Information Technology
Bloomcode: Knowledge
19) Which of the following the smartphone apps allows the user
to send a video that will be automatically deleted after a limited time without
leaving any trace of it?
1. a)
Wickr
2. b)
Burn Note
3. c)
Tapad
4. d)
Silent Circle
5. e)
Disconnect
Answer: d
Difficulty: Medium
Learning Objective:Identify three places that store personal
data, and for each one, discuss at least one potential threat to the privacy of
the data stored there.
Section Reference:Case 3.2 Protecting Your Privacy
AACSB: Information Technology
Bloomcode: Knowledge
20) The ____________ ethical standard states that an ethical
action is the one that provides the most good or does the least harm.
1. a)
Common good
2. b)
Fairness
3. c)
Rights
4. d)
Utilitarian
5. e)
Well-being
Answer: d
Difficulty: Medium
Learning Objective:Define ethics, list and describe the three
fundamental tenets of ethics, and describe the four categories of ethical
issues related to information technology.
Section Reference:3.1 Ethical Issues
AACSB: Analytic
Bloomcode: Comprehension
21) The ____________ ethical standard states that an ethical
action is the one that best protects and respects the moral rights of the
affected parties.
1. a)
Common good
2. b) Fairness
3. c)
Rights
4. d)
Utilitarian
5. e)
Well-being
Answer: c
Difficulty: Medium
Learning Objective:Define ethics, list and describe the three
fundamental tenets of ethics, and describe the four categories of ethical
issues related to information technology.
Section Reference:3.1 Ethical Issues
AACSB: Ethics
Bloomcode: Knowledge
22) The _______________ approach maintains that the most ethical
action is the one that provides the most good or does the least harm.
1. a)
Common good
2. b)
Fairness
3. c) Rights
4. d)
Utilitarian
Answer: d
Difficulty: Easy
Learning Objective:Define ethics, list and describe the three
fundamental tenets of ethics, and describe the four categories of ethical
issues related to information technology.
Section Reference:3.1 Ethical Issues
AACSB: Ethics
Bloomcode: Knowledge
23) The _____________ ethical standard states that ethical
actions treat all human beings equally.
1. a)
Common good
2. b)
Fairness
3. c)
Rights
4. d)
Utilitarian
5. e)
Well-being
Answer: b
Difficulty: Easy
Learning Objective:Define ethics, list and describe the three
fundamental tenets of ethics, and describe the four categories of ethical
issues related to information technology.
Section Reference:3.1 Ethical Issues
AACSB: Ethics
Bloomcode: Knowledge
24) The _______________ ethical standard states that respect and
compassion for all others is the basis for ethical actions.
1. a)
Common good
2. b)
Fairness
3. c)
Rights
4. d)
Utilitarian
5. e)
Well-being
Answer: a
Difficulty: Medium
Learning Objective:Define ethics, list and describe the three
fundamental tenets of ethics, and describe the four categories of ethical
issues related to information technology.
Section Reference:3.1 Ethical Issues
AACSB: Ethics
Bloomcode: Comprehension
25) Arguing that CEOs make 100 times more than their employees
because they have to take more risk than lower-level employees is the
____________ approach.
1. a)
Common good
2. b)
Fairness
3. c)
Rights
4. d)
Utilitarian
Answer: b
Difficulty: Medium
Learning Objective:Define ethics, list and describe the three
fundamental tenets of ethics, and describe the four categories of ethical
issues related to information technology.
Section Reference:3.1 Ethical Issues
AACSB: Ethics
Bloomcode: Knowledge
26) Which of the following is not a step in ethical decision
making?
1. a)
Recognize the ethical issue.
2. b)
Get the facts.
3. c)
Evaluate alternative actions.
4. d)
Make a decision and test it.
5. e)
All of these are steps in ethical decision making.
Answer: e
Difficulty: Medium
Learning Objective:Define ethics, list and describe the three
fundamental tenets of ethics, and describe the four categories of ethical
issues related to information technology.
Section Reference:3.1 Ethical Issues
AACSB: Ethics
Bloomcode: Knowledge
27) ____________ means that you accept the consequences of your
decisions and actions.
1. a)
Accountability
2. b)
Due process
3. c)
Liability
4. d)
Responsibility
Answer: d
Difficulty: Easy
Learning Objective:Define ethics, list and describe the three fundamental
tenets of ethics, and describe the four categories of ethical issues related to
information technology.
Section Reference:3.1 Ethical Issues
AACSB: Ethics
Bloomcode: Analysis
28) Various organizations that promote fair and responsible use
of information systems often develop a _____.
1. a)
Code of ethics
2. b)
Strategic plan
3. c)
Mission statement
4. d)
Responsibility charter
5. e)
Goals outline
Answer: a
Difficulty: Easy
Learning Objective:Define ethics, list and describe the three
fundamental tenets of ethics, and describe the four categories of ethical
issues related to information technology.
Section Reference:3.1 Ethical Issues
AACSB: Ethics
Bloomcode: Knowledge
29) The Sarbanes-Oxley Act in 2002 requires publicly held
companies to implement ________ controls.
1. a)
ethical
2. b)
financial
3. c)
security
4. d)
technology
Answer: b
Difficulty: Easy
Learning Objective:Define ethics, list and describe the three
fundamental tenets of ethics, and describe the four categories of ethical
issues related to information technology.
Section Reference:3.1 Ethical Issues
AACSB: Ethics
Bloomcode: Knowledge
30) ____________ issues revolve around who should have access to
information and whether they should have to pay for this access.
1. a) Accessibility
2. b)
Accuracy
3. c)
Privacy
4. d)
Property
Answer: a
Difficulty: Easy
Learning Objective:Define ethics, list and describe the three
fundamental tenets of ethics, and describe the four categories of ethical
issues related to information technology.
Section Reference:3.1 Ethical Issues
AACSB: Ethics
Bloomcode: Knowledge
31) Which of the following is NOT a drawback of photo tagging
and geotagging:
1. a) It
is easier for everyone to gather information about you.
2. b)
You are forced to manually un-tag yourself.
3. c) It
is easier to lie about where you’ve been or what you’ve been doing.
4. d)
You may experience a certain lack of control over your information.
Answer: c
Difficulty: Medium
Learning Objective:Define ethics, list and describe the three fundamental
tenets of ethics, and describe the four categories of ethical issues related to
information technology.
Section Reference:3.2 Privacy
AACSB: Information Technology
Bloomcode: Knowledge
32) Which of the following is NOT a benefit of photo tagging and
geotagging:
1. a) It
is easier for police to track criminals.
2. b)
Criminals can be identified more quickly and accurately.
3. c)
Our purchase history can be tracked so that billboards are more customized.
4. d)
Digital sensors are more efficient so that home security is easier to
implement.
Answer: c
Difficulty: Medium
Learning Objective:Define ethics, list and describe the three
fundamental tenets of ethics, and describe the four categories of ethical
issues related to information technology.
Section Reference:3.2 Privacy
AACSB: Analytic
Bloomcode: Comprehension
33) What is _____ is not necessarily _____.
1. a)
Illegal, unethical
2. b)
Ethical, illegal
3. c)
Unethical, illegal
4. d)
Unethical, legal
5. e)
Ethical, legal
Answer: c
Difficulty: Medium
Learning Objective:Define ethics, list and describe the three
fundamental tenets of ethics, and describe the four categories of ethical
issues related to information technology.
Section Reference:3.1 Ethical Issues
AACSB: Ethics
Bloomcode: Knowledge
34) _____ issues involve collecting, storing, and disseminating
information about individuals.
1. a)
Privacy
2. b)
Accuracy
3. c)
Transferability
4. d)
Property
5. e)
Accessibility
Answer: a
Difficulty: Easy
Learning Objective:Define ethics, list and describe the three
fundamental tenets of ethics, and describe the four categories of ethical
issues related to information technology.
Section Reference:3.1 Ethical Issues
AACSB: Ethics
Bloomcode: Knowledge
35) _____ issues involve the authenticity and fidelity of information
that is collected and processed.
1. a)
Privacy
2. b)
Accuracy
3. c)
Transferability
4. d)
Property
5. e)
Accessibility
Answer: b
Difficulty: Easy
Learning Objective:Define ethics, list and describe the three
fundamental tenets of ethics, and describe the four categories of ethical
issues related to information technology.
Section Reference:3.1 Ethical Issues
AACSB: Ethics
Bloomcode: Comprehension
36) _____ issues involve who may obtain information and how much
they should pay for this information.
1. a)
Privacy
2. b)
Accuracy
3. c)
Transferability
4. d)
Property
5. e)
Accessibility
Answer: e
Difficulty: Easy
Learning Objective:Define ethics, list and describe the three
fundamental tenets of ethics, and describe the four categories of ethical
issues related to information technology.
Section Reference:3.1 Ethical Issues
AACSB: Reflective Thinking
Bloomcode: Knowledge
37) _____________ means accepting the consequences of your
decisions and actions.
1. a)
Privacy
2. b)
Responsibility
3. c) Transferability
4. d)
Accountability
5. e)
Liability
Answer: b
Difficulty: Easy
Learning Objective:Define ethics, list and describe the three
fundamental tenets of ethics, and describe the four categories of ethical
issues related to information technology.
Section Reference:3.1 Ethical Issues
AACSB: Communication, Ethics, Analytic, Information Technology,
Diversity, Reflective Thinking
Bloomcode: Knowledge, Comprehension, Application, Analysis,
Synthesis, Evaluation
38) ______________ determines who is responsible for the actions
taken.
1. a)
Privacy
2. b)
Responsibility
3. c)
Transferability
4. d)
Accountability
5. e)
Liability
Answer: d
Difficulty: Easy
Learning Objective:Define ethics, list and describe the three
fundamental tenets of ethics, and describe the four categories of ethical
issues related to information technology.
Section Reference:3.1 Ethical Issues
AACSB: Ethics
Bloomcode: Comprehension
39) Which of the following is not an ethical issue related to
IT?
1. a)
Privacy
2. b)
Accuracy
3. c) Accountability
4. d)
Property (such as intellectual property)
5. e)
Accessibility to information
Answer: c
Difficulty: Easy
Learning Objective:Define ethics, list and describe the three
fundamental tenets of ethics, and describe the four categories of ethical
issues related to information technology.
Section Reference:3.1 Ethical Issues
AACSB: Reflective Thinking
Bloomcode: Knowledge
40) ______________ is a legal concept that gives individuals the
right to recover the damages done to them by other individuals, organizations,
or systems.
1. a)
Privacy
2. b)
Responsibility
3. c)
Transferability
4. d)
Accountability
5. e)
Liability
Answer: e
Difficulty: Easy
Learning Objective:Define ethics, list and describe the three
fundamental tenets of ethics, and describe the four categories of ethical
issues related to information technology.
Section Reference:3.1 Ethical Issues
AACSB: Reflective Thinking
Bloomcode: Knowledge
41) Shelli runs a small boutique in Tel Aviv. She accepts credit
cards and writes the number on her copy of the receipt in case there is a
problem later. This practice involves which ethical issue related to IT?
1. a)
Privacy
2. b)
Accuracy
3. c)
Accountability
4. d)
Property (such as intellectual property)
5. e)
Accessibility to information
Answer: a
Difficulty: Medium
Learning Objective:Define ethics, list and describe the three
fundamental tenets of ethics, and describe the four categories of ethical
issues related to information technology.
Section Reference:3.1 Ethical Issues
AACSB: Ethics
Bloomcode: Application
42) Shelli runs a small boutique in Tel Aviv. She has built up a
very nice client base and regularly sends her clients a newsletter. A new
bakery business down the block wants to buy Shelli’s client list from her. If
Shelli does sell the list, which ethical issue related to IT would be involved?
1. a)
Privacy
2. b)
Accuracy
3. c)
Accountability
4. d)
Property (such as intellectual property)
Answer: a
Difficulty: Medium
Learning Objective:Define ethics, list and describe the three
fundamental tenets of ethics, and describe the four categories of ethical
issues related to information technology.
Section Reference:3.1 Ethical Issues
AACSB: Ethics
Bloomcode: Comprehension
43) Shelli runs a small boutique in Tel Aviv. She has built up a
very nice client base and regularly sends her clients a newsletter. She keeps
all her client data on her laptop in a password-protected file. Her decision to
protect the file reflects which ethical issue related to IT?
1. a)
Privacy
2. b)
Accuracy
3. c)
Accountability
4. d)
Property (such as intellectual property)
5. e)
Accessibility to information
Answer: e
Difficulty: Medium
Learning Objective:Define ethics, list and describe the three
fundamental tenets of ethics, and describe the four categories of ethical issues
related to information technology.
Section Reference:3.1 Ethical Issues
AACSB: Ethics
Bloomcode: Analysis
44) Shelli runs a small boutique in Tel Aviv. She has built up a
very nice client base and regularly sends her clients a newsletter. Clients
fill out a form to join her mailing list. Shelli indicates on the form that
client information will not be shared without permission. This policy
illustrates which ethical issue related to IT?
1. a)
Privacy
2. b)
Accuracy
3. c)
Accountability
4. d)
Property (such as intellectual property)
5. e)
Accessibility to information
Answer: a
Difficulty: Medium
Learning Objective:Define ethics, list and describe the three
fundamental tenets of ethics, and describe the four categories of ethical
issues related to information technology.
Section Reference:3.1 Ethical Issues
AACSB: Ethics
Bloomcode: Knowledge
45) Shelli runs a small boutique in Tel Aviv. Her intern just
came to her with a new design for her Web site. Shelli really likes the design,
and she informs the intern that he is quite the artist. The intern responds
that he found the design on the Internet. Shelli replies that they can’t use
it. Her decision reflects which ethical issue related to IT?
1. a)
Privacy
2. b)
Accuracy
3. c)
Accountability
4. d)
Property (such as intellectual property)
5. e)
Accessibility to information
Answer: d
Difficulty: Medium
Learning Objective:Define ethics, list and describe the three
fundamental tenets of ethics, and describe the four categories of ethical
issues related to information technology.
Section Reference:3.1 Ethical Issues
AACSB: Ethics
Bloomcode: Evaluation
46) Shelli runs a small boutique in Tel Aviv. Her intern was
checking the boutique’s Facebook page and noticed some negative comments. He
deleted them. At the end of the day, when they were closing up, he told Shelli
about the comments and what he had done. Shelli was not pleased, and she told
him so. Why wasn’t Shelli pleased?
1. a)
She didn’t like hearing anything negative about her store.
2. b)
People are free to say what they wish.
3. c)
She thought he should ask her before he deleted them.
4. d) He
wasn’t supposed to be checking Facebook.
5. e)
All of these are reasons for Shelli’s not being pleased.
Answer: b
Difficulty: Medium
Learning Objective:Define ethics, list and describe the three
fundamental tenets of ethics, and describe the four categories of ethical
issues related to information technology.
Section Reference:3.1 Ethical Issues
AACSB: Reflective Thinking
Bloomcode: Synthesis
47) Which of the following statements is correct?
1. a) An
individual’s right to privacy is absolute.
2. b)
Determining and enforcing privacy regulations can be difficult.
3. c) An
individual’s right to privacy supersedes the needs of society.
4. d)
Advances in information technologies have not affected individual privacy.
5. e)
The Internet has increased individuals’ privacy.
Answer: b
Difficulty: Medium
Learning Objective:Identify three places that store personal
data, and for each one, discuss at least one potential threat to the privacy of
the data stored there.
Section Reference:3.2 Privacy
AACSB: Ethics
Bloomcode: Comprehension
48) The public’s right to know is ___________ to the
individual’s right of privacy.
1. a)
equal
2. b)
inferior
3. c)
superior
4. d)
undecided
Answer: c
Difficulty: Easy
Learning Objective:Identify three places that store personal
data, and for each one, discuss at least one potential threat to the privacy of
the data stored there.
Section Reference:3.2 Privacy
AACSB: Communication, Ethics, Analytic, Information Technology,
Diversity, Reflective Thinking
Bloomcode: Knowledge, Comprehension, Application, Analysis,
Synthesis, Evaluation
49) Privacy rights apply to ______________.
1. a)
groups
2. b)
individuals
3. c)
institutions
4. d)
all of the above
Answer: d
Difficulty: Easy
Learning Objective:Identify three places that store personal
data, and for each one, discuss at least one potential threat to the privacy of
the data stored there.
Section Reference:3.2 Privacy
AACSB: Ethics
Bloomcode: Knowledge
50) _____________ is the tracking of people’s activities, online
or offline, with the aid of computers.
1. a)
Computer spying
2. b)
Data aggregation
3. c)
Electronic surveillance
4. d)
Profiling
Answer: c
Difficulty: Easy
Learning Objective:Identify three places that store personal
data, and for each one, discuss at least one potential threat to the privacy of
the data stored there.
Section Reference:3.2 Privacy
AACSB: Reflective Thinking
Bloomcode: Knowledge
51) Customer intimacy is a(n) __________ outcome of profiling.
1. a)
positive
2. b)
negative
3. c)
neutral
4. d)
inevitable
Answer: a
Difficulty: Medium
Learning Objective:Identify three places that store personal
data, and for each one, discuss at least one potential threat to the privacy of
the data stored there.
Section Reference:3.2 Privacy
AACSB: Ethics
Bloomcode: Knowledge
52) The __________ permits the company to collect personal
information until the customer specifically requests that the data not be
collected.
1. a) opt-in
model
2. b)
opt-out model
3. c)
government
4. d)
privacy code
Answer: b
Difficulty: Easy
Learning Objective:Identify three places that store personal
data, and for each one, discuss at least one potential threat to the privacy of
the data stored there.
Section Reference:3.2 Privacy
AACSB: Ethics
Bloomcode: Knowledge
53) Which of the following is a correct argument on the pros and
cons of conveniently sharing information and protecting privacy?
1. a) We
have quick and easy access to our contacts on social networking sites, but it
is much easier for stalking to occur.
2. b)
Protecting our privacy is difficult and complicated, even if securing our
information makes us feel more comfortable with using the Internet.
3. c) We
need to be careful about what we post online, particularly since it may be
difficult to ensure the security of our information on the Internet.
4. d)
All of the above are correct.
Answer: d
Difficulty: Medium
Learning Objective:Identify three places that store personal
data, and for each one, discuss at least one potential threat to the privacy of
the data stored there.
Section Reference:3.2 Privacy
AACSB: Ethics
Bloomcode: Evaluation
54) The process of profiling:
1. a)
Increases individual privacy.
2. b)
Decreases individual privacy.
3. c)
Has no effect on individual privacy.
4. d) Is
illegal in more than half of the states.
5. e) Is
legal but unethical.
Answer: b
Difficulty: Medium
Learning Objective:Identify three places that store personal
data, and for each one, discuss at least one potential threat to the privacy of
the data stored there.
Section Reference:3.2 Privacy
AACSB: Ethics
Bloomcode: Knowledge
55) What is the relationship between advances in information
technology and the practice of profiling?
1. a)
Advances in IT make it more difficult to profile individuals.
2. b)
Advances in IT have no impact on profiling.
3. c)
Advances in IT make it more expensive to profile individuals.
4. d)
Advances in IT make it easier to profile individuals.
Answer: d
Difficulty: Medium
Learning Objective:Identify three places that store personal
data, and for each one, discuss at least one potential threat to the privacy of
the data stored there.
Section Reference:3.2 Privacy
AACSB: Ethics
Bloomcode: Knowledge
56) Which of the following statements is not correct?
1. a)
Employees have limited protection against surveillance by employers.
2. b)
The large majority of organizations monitor employee Internet usage.
3. c)
The large majority of organizations use URL filtering.
4. d) As
with normal first-class mail, employers cannot read employee e-mail.
5. e)
Employees should be aware that surveillance is legal.
Answer: d
Difficulty: Medium
Learning Objective:Identify three places that store personal
data, and for each one, discuss at least one potential threat to the privacy of
the data stored there.
Section Reference:3.2 Privacy
AACSB: Analytic
Bloomcode: Evaluation
57)How does society keep owners of electronic bulletin boards
from disseminating offensive or untrue content? This is a difficult question
because it involves the conflict between _____ on the one hand and _____ on the
other.
1. a)
The public, the individual
2. b)
The public, ethics
3. c)
Freedom of speech, privacy
4. d)
The individual, freedom of speech
5. e)
Ethics, security
Answer: c
Difficulty: Hard
Learning Objective:Identify three places that store personal
data, and for each one, discuss at least one potential threat to the privacy of
the data stored there.
Section Reference:3.2 Privacy
AACSB: Ethics
Bloomcode: Knowledge
58) Privacy advocates prefer which model of informed consent?
1. a)
Opt-in
2. b)
Opt-out
3. c)
Either A or B
4. d)
Neither A nor B
Answer: a
Difficulty: Easy
Learning Objective:Identify three places that store personal
data, and for each one, discuss at least one potential threat to the privacy of
the data stored there.
Section Reference:3.2 Privacy
AACSB: Ethics
Bloomcode: Knowledge
59) Which of the following statements is correct?
1. a)
International privacy and security laws are very consistent.
2. b)
Consistent international privacy and security laws help companies with their
regulatory requirements from country to country.
3. c)
Consistent international privacy and security laws enable information to flow
freely among countries.
4. d)
The absence of consistent international privacy and security laws has led to a
complex global legal framework.
5. e)
Consistent international privacy and security laws are followed by all
countries.
Answer: d
Difficulty: Medium
Learning Objective:Identify three places that store personal
data, and for each one, discuss at least one potential threat to the privacy of
the data stored there.
Section Reference:3.2 Privacy
AACSB: Ethics
Bloomcode: Knowledge
Comments
Post a Comment