Nothing Special   »   [go: up one dir, main page]

Management Information Systems 3rd Edition Rainer Test Bank

Download as pdf or txt
Download as pdf or txt
You are on page 1of 24

Management Information Systems 3rd

Edition Rainer Test Bank


Visit to download the full and correct content document: https://testbankdeal.com/dow
nload/management-information-systems-3rd-edition-rainer-test-bank/
Package Title: Testbank Questions
Course Title: MIS 3e
Chapter Number: 6

Question Type: True/False

1) Information technology makes finding answers to ethical questions easier.

Answer: False

Title: Testbank Question 6.01


Learning Objective 1: LO 6.0 Provide a real world example of ethics and privacy.
Section Reference 1: Introduction
Difficulty: Easy
Bloom’s Taxonomy: Comprehension

2) An individual or organization faced with an ethical decision is basically considering whether to


break the law.

Answer: False

Title: Testbank Question 6.02


Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of
ethics, and describe the four categories of ethical issues related to information technology.
Section Reference 1: 6.1 Ethical Issues
Difficulty: Easy
Bloom’s Taxonomy: Comprehension

3) A code of ethics is a collection of principles that are intended to guide decision-making by


members of the organization.

Answer: True

Title: Testbank Question 6.03


Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of
ethics, and describe the four categories of ethical issues related to information technology.
Section Reference 1: 6.1 Ethical Issues
Difficulty: Easy
Bloom’s Taxonomy: Comprehension

4) The utilitarian approach to ethics states that an ethical action is the one that provides the
most good or does the least harm.

Answer: true

Title: Testbank Question 6.04


Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of
ethics, and describe the four categories of ethical issues related to information technology.
Section Reference 1: 6.1 Ethical Issues
Difficulty: Easy
Bloom’s Taxonomy: Comprehension

5) The fairness approach maintains that an ethical action is one that best protects and respects
the moral rights of the affected parties.

Answer: False

Title: Testbank Question 6.05


Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of
ethics, and describe the four categories of ethical issues related to information technology.
Section Reference 1: 6.1 Ethical Issues
Difficulty: Easy
Bloom’s Taxonomy: Comprehension

6) Improvements in information technologies are leading to a decreasing number of ethical


problems.

Answer: False

Title: Testbank Question 6.06


Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of
ethics, and describe the four categories of ethical issues related to information technology..
Section Reference 1: 6.1 Ethical Issues
Difficulty: Easy
Bloom’s Taxonomy: Application

7) The fundamental tenets of ethics include responsibility, accountability, and liability.

Answer: True

Title: Testbank Question 6.07


Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of
ethics, and describe the four categories of ethical issues related to information technology.
Section Reference 1: 6.1 Ethical Issues
Difficulty: Easy
Bloom’s Taxonomy: Knowledge

8) When you interview for a job at a company, it is likely that the company will Google you and
search social networking sites for information on you.

Answer: True

Title: Testbank Question 6.08


Learning Objective 1: LO 6.2 Identify three places that store personal data, and for each one,
discuss at least one potential threat to the privacy of the data stored there.
Section Reference 1: 6.2 Privacy
Difficulty: Easy
Bloom’s Taxonomy: Comprehension

9) The right of privacy is absolute.

Answer: False

Title: Testbank Question 6.09


Learning Objective 1: LO 6.2 Identify three places that store personal data, and for each one,
discuss at least one potential threat to the privacy of the data stored there.
Section Reference 1: 6.2 Privacy
Difficulty: Easy
Bloom’s Taxonomy: Knowledge

10) The individual’s right of privacy supersedes the public’s right to know.

Answer: False

Title: Testbank Question 6.10


Learning Objective 1: LO 6.2 Identify three places that store personal data, and for each one,
discuss at least one potential threat to the privacy of the data stored there.
Section Reference 1: 6.2 Privacy
Difficulty: Easy
Bloom’s Taxonomy: Comprehension

11) In general, employees have high legal protection against surveillance by employers.

Answer: False

Title: Testbank Question 6.11


Learning Objective 1: LO 6.2 Identify three places that store personal data, and for each one,
discuss at least one potential threat to the privacy of the data stored there.
Section Reference 1: 6.2 Privacy
Difficulty: Easy
Bloom’s Taxonomy: Comprehension

12) The opt-out model of informed consent allows a company to collect personal information
until the customers specifically requests otherwise.

Answer: True

Title: Testbank Question 6.12


Learning Objective 1: LO 6.2 Identify three places that store personal data, and for each one,
discuss at least one potential threat to the privacy of the data stored there.
Section Reference 1: 6.2 Privacy
Difficulty: Easy
Bloom’s Taxonomy: Comprehension

13) The Platform for Privacy Preferences automatically communicates privacy policies between
a commerce Web site and its visitors.

Answer: True

Title: Testbank Question 6.13


Learning Objective 1: LO 6.2 Identify three places that store personal data, and for each one,
discuss at least one potential threat to the privacy of the data stored there.
Section Reference 1: 6.2 Privacy
Difficulty: Easy
Bloom’s Taxonomy: Comprehension

14) The flow of information among countries is called transborder data flows.

Answer: True

Title: Testbank Question 6.14


Learning Objective 1: LO 6.2 Identify three places that store personal data, and for each one,
discuss at least one potential threat to the privacy of the data stored there.
Section Reference 1: 6.2 Privacy
Difficulty: Easy
Bloom’s Taxonomy: Comprehension

15) The “safe harbor” framework details how the European Union exports data about U.S.
citizens.

Answer: False

Title: Testbank Question 6.15


Learning Objective 1: LO 6.2 Identify three places that store personal data, and for each one,
discuss at least one potential threat to the privacy of the data stored there.
Section Reference 1: 6.2 Privacy
Difficulty: Medium
Bloom’s Taxonomy: Application

Question Type: Multiple Choice

16) Refer to Opening Case – Tapad Can Track You Across Devices: A digital cookie can track
____ device(s).

a) one
b) two
c) three
d) many

Answer: a

Title: Testbank Question 6.16


Learning Objective 1: LO 6.0 Provide a real world example of ethics and privacy.
Section Reference 1: Opening Case - Tapad Can Track You Across Devices
Difficulty: Easy
Refer to Opening Case -

17) Refer to Opening Case - Tapad Can Track You Across Devices: Which of the following is
not a correct statement about Tapad?

a) Places digital tokens on all user devices to link users.


b) Congress forcing “Do not Track” technology in Web browsers.
c) Analyzes 150 billion data points from various sources to link one device with another.
d) Uses information to serve ads to potential customers across devices.

Answer: a

Title: Testbank Question 6.17


Learning Objective 1: LO 6.0 Provide a real world example of ethics and privacy.
Section Reference 1: Opening Case
Difficulty: Medium
Refer to Opening Case –

18) The ____________ ethical standard states that an ethical action is the one that provides the
most good or does the least harm.

a) Common good
b) Fairness
c) Rights
d) Utilitarian
e) Well-being

Answer: d

Title: Testbank Question 6.18


Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of
ethics, and describe the four categories of ethical issues related to information technology.
Section Reference 1: 6.1 Ethical Issues
Difficulty: Medium
Bloom’s Taxonomy: Comprehension

19) The ____________ ethical standard states that an ethical action is the one that best
protects and respects the moral rights of the affected parties.

a) Common good
b) Fairness
c) Rights
d) Utilitarian
e) Well-being

Answer: c

Title: Testbank Question 6.19


Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of
ethics, and describe the four categories of ethical issues related to information technology.
Section Reference 1: 6.1 Ethical Issues
Difficulty: Medium
Bloom’s Taxonomy: Comprehension

20) The _____________ ethical standard states that ethical actions treat all human beings
equally.

a) Common good
b) Fairness
c) Rights
d) Utilitarian
e) Well-being

Answer: b

Title: Testbank Question 6.20


Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of
ethics, and describe the four categories of ethical issues related to information technology.
Section Reference 1: 6.1 Ethical Issues
Difficulty: Easy
Bloom’s Taxonomy: Comprehension

21) The _______________ ethical standard states that respect and compassion for all others is
the basis for ethical actions.

a) Common good
b) Fairness
c) Rights
d) Utilitarian
e) Well-being

Answer: a

Title: Testbank Question 6.21


Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of
ethics, and describe the four categories of ethical issues related to information technology.
Section Reference 1: 6.1 Ethical Issues
Difficulty: Medium
Bloom’s Taxonomy: Comprehension
22) Which of the following is not a step in ethical decision-making?

a) Recognize the ethical issue.


b) Get the facts.
c) Evaluate alternative actions.
d) Make a decision and test it.
e) All of these are steps in ethical decision-making.

Answer: e

Title: Testbank Question 6.22


Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of
ethics, and describe the four categories of ethical issues related to information technology.
Section Reference 1: 6.1 Ethical Issues
Difficulty: Medium
Bloom’s Taxonomy: Application

23) Various organizations that promote fair and responsible use of information systems often
develop a _____.

a) Code of ethics
b) Strategic plan
c) Mission statement
d) Responsibility charter
e) Goals outline

Answer: A

Title: Testbank Question 6.23


Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of
ethics, and describe the four categories of ethical issues related to information technology..
Section Reference 1: 6.1 Ethical Issues
Difficulty: Easy
Bloom’s Taxonomy: Application

24) Refer to IT’s About Business 6.1 – Cheating is Risky for Business Students: Which of the
following statements is TurnItIn is not correct?

a) Provides a site where students and find or copy existing papers.


b) Maintains a repository of academic research papers.
c) It looks for matches in submitted material to what is posted in WIKIPEDIA.
d) Maintains a repository of college term papers.

Answer: a

Title: Testbank Question 6.24


Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of
ethics, and describe the four categories of ethical issues related to information technology.
Section Reference 1: IT’s About Business 6.1 – Cheating is Risky for Business Students
Difficulty: Medium
Bloom’s Taxonomy: Comprehension

25) What is _____ is not necessarily _____.

a) Illegal, unethical
b) Ethical, illegal
c) Unethical, illegal
d) Unethical, legal
e) Ethical, legal

Answer: c

Title: Testbank Question 6.25


Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of
ethics, and describe the four categories of ethical issues related to information technology.
Section Reference 1: 6.1 Ethical Issues
Difficulty: Medium
Bloom’s Taxonomy: Comprehension

26) _____ issues involve collecting, storing, and disseminating information about individuals.

a) Privacy
b) Accuracy
c) Transferability
d) Property
e) Accessibility

Answer: a

Title: Testbank Question 6.26


Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of
ethics, and describe the four categories of ethical issues related to information technology.
Section Reference 1: 6.1 Ethical Issues
Difficulty: Easy
Bloom’s Taxonomy: Comprehension

27) _____ issues involve the authenticity and fidelity of information that is collected and
processed.

a) Privacy
b) Accuracy
c) Transferability
d) Property
e) Accessibility
Answer: b

Title: Testbank Question 6.27


Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of
ethics, and describe the four categories of ethical issues related to information technology.
Section Reference 1: 6.1 Ethical Issues
Difficulty: Easy
Bloom’s Taxonomy: Comprehension

28) _____ issues involve who may obtain information and how much they should pay for this
information.

a) Privacy
b) Accuracy
c) Transferability
d) Property
e) Accessibility

Answer: e

Title: Testbank Question 6.28


Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of
ethics, and describe the four categories of ethical issues related to information technology.
Section Reference 1: 6.1 Ethical Issues
Difficulty: Easy
Bloom’s Taxonomy: Comprehension

29) _____________ means accepting the consequences of your decisions and actions.

a) Privacy
b) Responsibility
c) Transferability
d) Accountability
e) Liability

Answer: b

Title: Testbank Question 6.29


Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of
ethics, and describe the four categories of ethical issues related to information technology.
Section Reference 1: 6.1 Ethical Issues
Difficulty: Easy
Bloom’s Taxonomy: Comprehension

30) ______________ determines who is responsible for the actions taken.

a) Privacy
b) Responsibility
c) Transferability
d) Accountability
e) Liability

Answer: d

Title: Testbank Question 6.30


Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of
ethics, and describe the four categories of ethical issues related to information technology.
Section Reference 1: 6.1 Ethical Issues
Difficulty: Easy
Bloom’s Taxonomy: Comprehension

31) Which of the following is not an ethical issue related to IT?

a) Privacy
b) Accuracy
c) Accountability
d) Property (such as intellectual property)
e) Accessibility to information

Answer: c

Title: Testbank Question 6.31


Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of
ethics, and describe the four categories of ethical issues related to information technology.
Section Reference 1: 6.1 Ethical Issues
Difficulty: Easy
Bloom’s Taxonomy: Comprehension

32) ______________ is a legal concept that gives individuals the right to recover the damages
done to them by other individuals, organizations, or systems.

a) Privacy
b) Responsibility
c) Transferability
d) Accountability
e) Liability

Answer: e

Title: Testbank Question 6.32


Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of
ethics, and describe the four categories of ethical issues related to information technology.
Section Reference 1: 6.1 Ethical Issues
Difficulty: Easy
Bloom’s Taxonomy: Comprehension
33) You just started to work in a branch of your local bank. Which of the following statements is
false?

a) Two employees talking about a customer’s account is an ethical issue.


b) Employees talking to friends about people’s bank accounts is an ethical issue.
c) Educating employees will solve the problems at the bank.
d) Privacy is the responsibility of all employees of the bank.
e) Strong information technology security is not the solution.

Answer: c

Title: Testbank Question 6.33


Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of
ethics, and describe the four categories of ethical issues related to information technology.
Section Reference 1: 6.1 Ethical Issues
Difficulty: Medium
Bloom’s Taxonomy: Analysis

34) Shelli runs a small boutique in Tel Aviv. She accepts credit cards and writes the number on
her copy of the receipt in case there is a problem later. This practice involves which ethical
issue related to IT?

a) Privacy
b) Accuracy
c) Accountability
d) Property (such as intellectual property)
e) Accessibility to information

Answer: a

Title: Testbank Question 6.34


Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of
ethics, and describe the four categories of ethical issues related to information technology.
Section Reference 1: 6.1 Ethical Issues
Difficulty: Medium
Bloom’s Taxonomy: Application

35) Shelli runs a small boutique in Tel Aviv. She has built up a very nice client base and
regularly sends her clients a newsletter. A new bakery business down the block wants to buy
Shelli’s client list from her. If Shelli does sell the list, which ethical issue related to IT would be
involved?

a) Privacy
b) Accuracy
c) Accountability
d) Property (such as intellectual property)
e) Accessibility to information
Answer: a

Title: Testbank Question 6.35


Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of
ethics, and describe the four categories of ethical issues related to information technology.
Section Reference 1: 6.1 Ethical Issues
Difficulty: Medium
Bloom’s Taxonomy: Application

36) Shelli runs a small boutique in Tel Aviv. She has built up a very nice client base and
regularly sends her clients a newsletter. She keeps all her client data on her laptop in a
password-protected file. Her decision to protect the file reflects which ethical issue related to IT?

a) Privacy
b) Accuracy
c) Accountability
d) Property (such as intellectual property)
e) Accessibility to information

Answer: e

Title: Testbank Question 6.36


Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of
ethics, and describe the four categories of ethical issues related to information technology.
Section Reference 1: 6.1 Ethical Issues
Difficulty: Medium
Bloom’s Taxonomy: Application

37) Shelli runs a small boutique in Tel Aviv. She has built up a very nice client base and
regularly sends her clients a newsletter. Clients fill out a form to join her mailing list. Shelli
indicates on the form that client information will not be shared without permission. This policy
illustrates which ethical issue related to IT?

a) Privacy
b) Accuracy
c) Accountability
d) Property (such as intellectual property)
e) Accessibility to information

Answer: a

Title: Testbank Question 6.37


Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of
ethics, and describe the four categories of ethical issues related to information technology.
Section Reference 1: 6.1 Ethical Issues
Difficulty: Medium
Bloom’s Taxonomy: Application
38) Shelli runs a small boutique in Tel Aviv. Her intern just came to her with a new design for
her Web site. Shelli really likes the design, and she informs the intern that he is quite the artist.
Section reference 1The intern responds that he found the design on the Internet. Shelli replies
that they can’t use it. Her decision reflects which ethical issue related to IT?

a) Privacy
b) Accuracy
c) Accountability
d) Property (such as intellectual property)
e) Accessibility to information

Answer: d

Title: Testbank Question 6.38


Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of
ethics, and describe the four categories of ethical issues related to information technology.
Section Reference 1: 6.1 Ethical Issues
Difficulty: Medium
Bloom’s Taxonomy: Application

39) Shelli runs a small boutique in Tel Aviv. Her intern was checking the boutique’s Facebook
page and noticed some negative comments. He deleted them. At the end of the day, when they
were closing up, he told Shelli about the comments and what he had done. Shelli was not
pleased, and she told him so. Why wasn’t Shelli pleased?

a) She didn’t like hearing anything negative about her store.


b) People are free to say what they wish.
c) She thought he should ask her before he deleted them.
d) He wasn’t supposed to be checking Facebook.
e) All of these are reasons for Shelli’s not being pleased.

Answer: b

Title: Testbank Question 6.39


Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of
ethics, and describe the four categories of ethical issues related to information technology.
Section Reference 1: 6.1 Ethical Issues
Difficulty: Medium
Bloom’s Taxonomy: Application

40) Shelli runs a small boutique in Tel Aviv. She only has two part time employees and keeps all
of their information (social security number, payroll deductions, etc.) in the back of the top
drawer in your filing cabinet. Which ethical issue does this raise?

a) Privacy
b) Accuracy
c) Accountability
d) Property (such as intellectual property)
e) Accessibility to information
Answer: e

Title: Testbank Question 6.40


Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of
ethics, and describe the four categories of ethical issues related to information technology.
Section Reference 1: 6.1 Ethical Issues
Difficulty: Easy
Bloom’s Taxonomy: Application

41) Shelli runs a small boutique in Tel Aviv. She only has two part time employees and keeps all
of their information (social security number, payroll deductions, etc.) in a Word document on her
laptop. The file is password protected. Which ethical issue is Shelli considering?

a) Privacy
b) Accuracy
c) Accountability
d) Property (such as intellectual property)
e) Accessibility to information

Answer: e

Title: Testbank Question 6.41


Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of
ethics, and describe the four categories of ethical issues related to information technology.
Section Reference 1: 6.1 Ethical Issues
Difficulty: Medium
Bloom’s Taxonomy: Application

42) Which of the following statements is correct?

a) An individual’s right to privacy is absolute.


b) Determining and enforcing privacy regulations can be difficult.
c) An individual’s right to privacy supersedes the needs of society.
d) Advances in information technologies have not affected individual privacy.
e) The Internet has increased individuals’ privacy.

Answer: b

Title: Testbank Question 6.42


Learning Objective 1: LO 6.2 Identify three places that store personal data, and for each one,
discuss at least one potential threat to the privacy of the data stored there.
Section Reference 1: 6.2 Privacy
Difficulty: Medium
Bloom’s Taxonomy: Application

43) Refer to IT’s About Business 6.2 – Those Mannequins Are Watching You: EyeSee is
designed to___________
a) Provide a better platform for marketing and displaying cloths and other products.
b) Provide product information to store customers.
c) Collect customer demographic information such as customer age and sex.
d) Act as a customer kiosk.

Answer: c

Title: Testbank Question 6.43


Learning Objective 1: LO 6.2 Identify three places that store personal data, and for each one,
discuss at least one potential threat to the privacy of the data stored there.
Section Reference 1: IT’s About Business 6.2 – Those Mannequins Are Watching You
Difficulty: easy
Bloom’s Taxonomy: Comprehension

44) The process of profiling ______________.

a) Increases individual privacy.


b) Decreases individual privacy.
c) Has no effect on individual privacy.
d) Is illegal in more than half of the states.
e) Is legal but unethical.

Answer: b

Title: Testbank Question 6.44


Learning Objective 1: LO 6.2 Identify three places that store personal data, and for each one,
discuss at least one potential threat to the privacy of the data stored there.
Section Reference 1: 6.2 Privacy
Difficulty: Medium
Bloom’s Taxonomy: Comprehension

45) What is the relationship between advances in information technology and the practice of
profiling?

a) Advances in IT make it more difficult to profile individuals.


b) Advances in IT have no impact on profiling.
c) Advances in IT make it more expensive to profile individuals.
d) Advances in IT make it easier to profile individuals.

Answer: d

Title: Testbank Question 6.45


Learning Objective 1: LO 6.2 Identify three places that store personal data, and for each one,
discuss at least one potential threat to the privacy of the data stored there.
Section Reference 1: 6.2 Privacy
Difficulty: Medium
Bloom’s Taxonomy: Application
46) Which of the following statements is not correct?

a) Employees have limited protection against surveillance by employers.


b) The large majority of organizations monitor employee Internet usage.
c) The large majority of organizations use URL filtering.
d) As with normal first-class mail, employers cannot read employee e-mail.
e) Employees should be aware that surveillance is legal.

Answer: d

Title: Testbank Question 6.46


Learning Objective 1: LO 6.2 Identify three places that store personal data, and for each one,
discuss at least one potential threat to the privacy of the data stored there.
Section Reference 1: 6.2 Privacy
Difficulty: Medium
Bloom’s Taxonomy: Application

47) You just started to work in a branch of your local bank. Over lunch in the break room you
find out that the bank has been concerned that employees are stealing from the bank. Which of
the following statements is false?

a) The bank can read employee’s Emails on bank-supplied accounts.


b) The bank can have surveillance cameras without notifying employees.
c) The bank can monitor Internet usage on bank-owed computers.
d) Employees have considerable legal protection against surveillance.

Answer: d

Title: Testbank Question 6.47


Learning Objective 1: LO 6.2 Identify three places that store personal data, and for each one,
discuss at least one potential threat to the privacy of the data stored there. Discuss potential
threats to the privacy of personal data stored in different locations.
Section Reference 1: 6.2 Privacy
Difficulty: Medium
Bloom’s Taxonomy: Application

48) You just started to work in a branch of your local bank. The bank is dealing with the privacy
standards that exist for transferring data to banks in other countries. This flow of information is
called __________.

a) information passing.
b) transborder data flows.
c) normal business practice.
d) data processing.
e) privacy issues.

Answer: b
Title: Testbank Question 6.48
Learning Objective 1: LO 6.2 Identify three places that store personal data, and for each one,
discuss at least one potential threat to the privacy of the data stored there. Discuss potential
threats to the privacy of personal data stored in different locations.
Section Reference 1: 6.2 Privacy
Difficulty: Easy
Bloom’s Taxonomy: Application

49) How does society keep owners of electronic bulletin boards from disseminating offensive or
untrue content? This is a difficult question because it involves the conflict between _____ on
the one hand and _____ on the other.

a) The public, the individual


b) The public, ethics
c) Freedom of speech, privacy
d) The individual, freedom of speech
e) Ethics, security

Answer: c

Title: Testbank Question 6.49


Learning Objective 1: LO 6.2 Identify three places that store personal data, and for each one,
discuss at least one potential threat to the privacy of the data stored there.
Section Reference 1: 6.2 Privacy
Difficulty: Hard
Bloom’s Taxonomy: Analysis

50) Refer to IT’s About Business 6.3 – Google Glass: Big Brother Really Is Watching You:
Google Glass is a(n) ___________.

a) augmented reality, wearable computer with a head-mounted display.


b) augmented reality computer that you wear while attaching 3D movies in a theater.
c) small tablet computer that links to your TV.
d) augmented reality computer that displays information on your car’s windshield.

Answer: a

Title: Testbank Question 6.50


Learning Objective 1: LO 6.2 Identify three places that store personal data, and for each one,
discuss at least one potential threat to the privacy of the data stored there
Section Reference 1: IT’s About Business 6.3 – Google Glass: Big Brother Really Is Watching
You
Difficulty: Medium
Bloom’s Taxonomy: Comprehension

51) Refer to IT’s About Business 6.3 – Google Glass: Big Brother Really Is Watching You:
Which of the following is not a correct statement about Google Glasses?
a) Can perform Internet search for questions asked of it.
b) Can perform language translations for user.
c) Can digitally capture every moment of every individual around the person wearing them.
d) Restaurants like Google glass users because other can see what they and others are eating.

Answer: d

Title: Testbank Question 6.51


Learning Objective 1: LO 6.2 Identify three places that store personal data, and for each one,
discuss at least one potential threat to the privacy of the data stored there
Section Reference 1: IT’s About Business 6.3 – Google Glass: Big Brother Really Is Watching
You
Difficulty: Medium
Bloom’s Taxonomy: Application

52) Privacy advocates prefer which model of informed consent?

a) Opt-in
b) Opt-out
c) Either A or B
d) Neither A nor B

Answer: a

Title: Testbank Question 6.52


Learning Objective 1: LO 6.2 Identify three places that store personal data, and for each one,
discuss at least one potential threat to the privacy of the data stored there.
Section Reference 1: 6.2 Privacy
Difficulty: Easy
Bloom’s Taxonomy: Comprehension

53) Shelli runs a small boutique in Tel Aviv. She has built up a very nice client base and
regularly sends her clients a newsletter. Clients fill out a form to join her mailing list. Shelli has a
box on the form that the customer checks to indicate they have read her policies which are on
the form. This check box is an example of ____________.

a) Privacy
b) Profiling
c) Opting-out
d) Opting-in

Answer: d

Title: Testbank Question 6.53


Learning Objective 1: LO 6.2 Identify three places that store personal data, and for each one,
discuss at least one potential threat to the privacy of the data stored there.
Section Reference 1: 6.2 Privacy
Difficulty: Medium
Bloom’s Taxonomy: Application
54) Which of the following statements is correct?

a) International privacy and security laws are very consistent.


b) Consistent international privacy and security laws help companies with their regulatory
requirements from country to country.
c) Consistent international privacy and security laws enable information to flow freely among
countries.
d) The absence of consistent international privacy and security laws has led to a complex global
legal framework.
e) Consistent international privacy and security laws are followed by all countries.

Answer: d

Title: Testbank Question 6.54


Learning Objective 1: LO 6.2 Identify three places that store personal data, and for each one,
discuss at least one potential threat to the privacy of the data stored there.
Section Reference 1: 6.2 Privacy
Difficulty: Medium
Bloom’s Taxonomy: Application

55) Data aggregators sell digital dossiers to companies that want to know their customers
better, which is a process called ________.

a) Customer relationships
b) Customer profiling
c) Customer intimacy
d) Customer knowledge
e) Spying

Answer: c

Title: Testbank Question 6.55


Learning Objective 1: LO 6.2 Identify three places that store personal data, and for each one,
discuss at least one potential threat to the privacy of the data stored there.
Section Reference 1: 6.2 Privacy
Difficulty: Medium
Bloom’s Taxonomy: Comprehension

56) Shelli runs a small boutique in Tel Aviv. Shelli wants to purchase digital dossiers on her
customers from a data aggregator. Using such dossiers is an example of _____________.

a) Customer relationships
b) Customer profiling
c) Customer intimacy
d) Customer knowledge
e) Spying
Answer: c

Title: Testbank Question 6.56


Learning Objective 1: LO 6.2 Identify three places that store personal data, and for each one,
discuss at least one potential threat to the privacy of the data stored there.
Section Reference 1: 6.2 Privacy
Difficulty: Medium
Bloom’s Taxonomy: Application

57) Shelli runs a small boutique in Tel Aviv. Shelli wants to purchase digital dossiers on her
customers from a data aggregator. Creating such dossiers is an example of __________.

a) Customer relationships
b) Customer profiling
c) Customer intimacy
d) Customer knowledge
e) Spying

Answer: b

Title: Testbank Question 6.57


Learning Objective 1: LO 6.2 Identify three places that store personal data, and for each one,
discuss at least one potential threat to the privacy of the data stored there.
Section Reference 1: 6.2 Privacy
Difficulty: Medium
Bloom’s Taxonomy: Application

58) Refer to Closing Case 1 – The National Security Agency’s Surveillance Programs: Edward
Snowden _________.

a) developed PRISM.
b) leaked classified NSA documents.
c) is an FBI agent specializing in data security.
d) helped develop Google Docs.

Answer: b

Title: Testbank Question 6.58


Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of
ethics, and describe the four categories of ethical issues related to information technology.
Section Reference 1: Closing Case 1 – The National Security Agency’s Surveillance Programs
Difficulty: Easy
Bloom’s Taxonomy: Knowledge

59) Refer to Closing Case 1 – The National Security Agency’s Surveillance Programs: Which of
the following statements about the NSA is not correct?

a) Possesses broad legal authority to spy on US citizens.


b) Has created a surveillance network that covers Internet communications.
c) NSA’s surveillance program is not limited to citizens.
d) Filters communications that either originate or end abroad.

Answer: a

Title: Testbank Question 6.59


Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of
ethics, and describe the four categories of ethical issues related to information technology.
Section Reference 1: Closing Case 1 – The National Security Agency’s Surveillance Programs
Difficulty: Medium
Bloom’s Taxonomy: Comprehension

60) Refer to Closing Case 2 – Protecting Your Privacy: Concerning the security applications
listed in the case, which one requires a secure messaging system and permits sender to
retrieve messages they already sent?

a) Wickr
b) Snapchat
c) Silent Circle
d) TigerText

Answer: d

Title: Testbank Question 6.60


Learning Objective 1: LO 6.2 Identify three places that store personal data, and for each one,
discuss at least one potential threat to the privacy of the data stored there
Section Reference 1: Closing Case 2 – Protecting Your Privacy
Difficulty: Medium
Bloom’s Taxonomy: Comprehension

Question Type: Essay

61) Identify and analyze the fundamental ethical issues involved with information technology.

Title: Testbank Question 6.61


Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of
ethics, and describe the four categories of ethical issues related to information technology.
Section Reference 1: 6.1 Ethical Issues
Difficulty: Medium
Bloom’s Taxonomy: Analysis

62) Discuss the fundamental tenants of ethics: responsibility, accountability, and liability.

Title: Testbank Question 6.62


Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of
ethics, and describe the four categories of ethical issues related to information technology.
Section Reference 1: 6.1 Ethical Issues
Difficulty: Medium
Bloom’s Taxonomy: Synthesis

63) Explain why something that is unethical might not necessarily be illegal.

Title: Testbank Question 6.63


Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of
ethics, and describe the four categories of ethical issues related to information technology.
Section Reference 1: 6.1 Ethical Issues
Difficulty: Medium
Bloom’s Taxonomy: Synthesis

64) Discuss the relationship between surveillance and privacy.

Title: Testbank Question 6.64


Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of
ethics, and describe the four categories of ethical issues related to information technology.
Section Reference 1: 6.1 Ethical Issues
Difficulty: Hard
Bloom’s Taxonomy: Synthesis

65) Compare and contrast the four widely used stands for ethics: utilitarian, rights, fairness, and
common good.

Title: Testbank Question 6.65


Learning Objective 1: LO 6.1 Define ethics, list and describe the three fundamental tenets of
ethics, and describe the four categories of ethical issues related to information technology.
Section Reference 1: 6.1 Ethical Issues
Difficulty: Medium
Bloom’s Taxonomy: Evaluation

66) Discuss the two rules of privacy: The right of privacy is not absolute, and the public’s right to
know supersedes the individual’s right to privacy.

Title: Testbank Question 6.66


Learning Objective 1: LO 6.2 Identify three places that store personal data, and for each one,
discuss at least one potential threat to the privacy of the data stored there.
Section Reference 1: 6.2 Privacy
Difficulty: Medium
Bloom’s Taxonomy: Evaluation

67) Compare and contrast the two informed consent models: opt-in and opt-out. Why do
companies prefer one over the other? Why do privacy advocates prefer one over the other?

Title: Testbank Question 6.67


Learning Objective 1: LO 6.2 Identify three places that store personal data, and for each one,
discuss at least one potential threat to the privacy of the data stored there.
Section Reference 1: 6.2 Privacy
Difficulty: Medium
Bloom’s Taxonomy: Evaluation

68) Discuss the international aspects of privacy. How do these aspects impact transborder data
flows?

Title: Testbank Question 6.68


Learning Objective 1: LO 6.2 Identify three places that store personal data, and for each one,
discuss at least one potential threat to the privacy of the data stored there.
Section Reference 1: 6.2 Privacy
Difficulty: Medium
Bloom’s Taxonomy: Evaluation

You might also like