Management Information Systems 3Rd Edition Rainer Test Bank Full Chapter PDF
Management Information Systems 3Rd Edition Rainer Test Bank Full Chapter PDF
Management Information Systems 3Rd Edition Rainer Test Bank Full Chapter PDF
Answer: False
Answer: False
Answer: True
4) The utilitarian approach to ethics states that an ethical action is the one that provides the
most good or does the least harm.
Answer: true
5) The fairness approach maintains that an ethical action is one that best protects and respects
the moral rights of the affected parties.
Answer: False
Answer: False
Answer: True
8) When you interview for a job at a company, it is likely that the company will Google you and
search social networking sites for information on you.
Answer: True
Answer: False
10) The individual’s right of privacy supersedes the public’s right to know.
Answer: False
11) In general, employees have high legal protection against surveillance by employers.
Answer: False
12) The opt-out model of informed consent allows a company to collect personal information
until the customers specifically requests otherwise.
Answer: True
13) The Platform for Privacy Preferences automatically communicates privacy policies between
a commerce Web site and its visitors.
Answer: True
14) The flow of information among countries is called transborder data flows.
Answer: True
15) The “safe harbor” framework details how the European Union exports data about U.S.
citizens.
Answer: False
16) Refer to Opening Case – Tapad Can Track You Across Devices: A digital cookie can track
____ device(s).
a) one
b) two
c) three
d) many
Answer: a
17) Refer to Opening Case - Tapad Can Track You Across Devices: Which of the following is
not a correct statement about Tapad?
Answer: a
18) The ____________ ethical standard states that an ethical action is the one that provides the
most good or does the least harm.
a) Common good
b) Fairness
c) Rights
d) Utilitarian
e) Well-being
Answer: d
19) The ____________ ethical standard states that an ethical action is the one that best
protects and respects the moral rights of the affected parties.
a) Common good
b) Fairness
c) Rights
d) Utilitarian
e) Well-being
Answer: c
20) The _____________ ethical standard states that ethical actions treat all human beings
equally.
a) Common good
b) Fairness
c) Rights
d) Utilitarian
e) Well-being
Answer: b
21) The _______________ ethical standard states that respect and compassion for all others is
the basis for ethical actions.
a) Common good
b) Fairness
c) Rights
d) Utilitarian
e) Well-being
Answer: a
Answer: e
23) Various organizations that promote fair and responsible use of information systems often
develop a _____.
a) Code of ethics
b) Strategic plan
c) Mission statement
d) Responsibility charter
e) Goals outline
Answer: A
24) Refer to IT’s About Business 6.1 – Cheating is Risky for Business Students: Which of the
following statements is TurnItIn is not correct?
Answer: a
a) Illegal, unethical
b) Ethical, illegal
c) Unethical, illegal
d) Unethical, legal
e) Ethical, legal
Answer: c
26) _____ issues involve collecting, storing, and disseminating information about individuals.
a) Privacy
b) Accuracy
c) Transferability
d) Property
e) Accessibility
Answer: a
27) _____ issues involve the authenticity and fidelity of information that is collected and
processed.
a) Privacy
b) Accuracy
c) Transferability
d) Property
e) Accessibility
Answer: b
28) _____ issues involve who may obtain information and how much they should pay for this
information.
a) Privacy
b) Accuracy
c) Transferability
d) Property
e) Accessibility
Answer: e
29) _____________ means accepting the consequences of your decisions and actions.
a) Privacy
b) Responsibility
c) Transferability
d) Accountability
e) Liability
Answer: b
a) Privacy
b) Responsibility
c) Transferability
d) Accountability
e) Liability
Answer: d
a) Privacy
b) Accuracy
c) Accountability
d) Property (such as intellectual property)
e) Accessibility to information
Answer: c
32) ______________ is a legal concept that gives individuals the right to recover the damages
done to them by other individuals, organizations, or systems.
a) Privacy
b) Responsibility
c) Transferability
d) Accountability
e) Liability
Answer: e
Answer: c
34) Shelli runs a small boutique in Tel Aviv. She accepts credit cards and writes the number on
her copy of the receipt in case there is a problem later. This practice involves which ethical
issue related to IT?
a) Privacy
b) Accuracy
c) Accountability
d) Property (such as intellectual property)
e) Accessibility to information
Answer: a
35) Shelli runs a small boutique in Tel Aviv. She has built up a very nice client base and
regularly sends her clients a newsletter. A new bakery business down the block wants to buy
Shelli’s client list from her. If Shelli does sell the list, which ethical issue related to IT would be
involved?
a) Privacy
b) Accuracy
c) Accountability
d) Property (such as intellectual property)
e) Accessibility to information
Answer: a
36) Shelli runs a small boutique in Tel Aviv. She has built up a very nice client base and
regularly sends her clients a newsletter. She keeps all her client data on her laptop in a
password-protected file. Her decision to protect the file reflects which ethical issue related to IT?
a) Privacy
b) Accuracy
c) Accountability
d) Property (such as intellectual property)
e) Accessibility to information
Answer: e
37) Shelli runs a small boutique in Tel Aviv. She has built up a very nice client base and
regularly sends her clients a newsletter. Clients fill out a form to join her mailing list. Shelli
indicates on the form that client information will not be shared without permission. This policy
illustrates which ethical issue related to IT?
a) Privacy
b) Accuracy
c) Accountability
d) Property (such as intellectual property)
e) Accessibility to information
Answer: a
a) Privacy
b) Accuracy
c) Accountability
d) Property (such as intellectual property)
e) Accessibility to information
Answer: d
39) Shelli runs a small boutique in Tel Aviv. Her intern was checking the boutique’s Facebook
page and noticed some negative comments. He deleted them. At the end of the day, when they
were closing up, he told Shelli about the comments and what he had done. Shelli was not
pleased, and she told him so. Why wasn’t Shelli pleased?
Answer: b
40) Shelli runs a small boutique in Tel Aviv. She only has two part time employees and keeps all
of their information (social security number, payroll deductions, etc.) in the back of the top
drawer in your filing cabinet. Which ethical issue does this raise?
a) Privacy
b) Accuracy
c) Accountability
d) Property (such as intellectual property)
e) Accessibility to information
Answer: e
41) Shelli runs a small boutique in Tel Aviv. She only has two part time employees and keeps all
of their information (social security number, payroll deductions, etc.) in a Word document on her
laptop. The file is password protected. Which ethical issue is Shelli considering?
a) Privacy
b) Accuracy
c) Accountability
d) Property (such as intellectual property)
e) Accessibility to information
Answer: e
Answer: b
43) Refer to IT’s About Business 6.2 – Those Mannequins Are Watching You: EyeSee is
designed to___________
a) Provide a better platform for marketing and displaying cloths and other products.
b) Provide product information to store customers.
c) Collect customer demographic information such as customer age and sex.
d) Act as a customer kiosk.
Answer: c
Answer: b
45) What is the relationship between advances in information technology and the practice of
profiling?
Answer: d
Answer: d
47) You just started to work in a branch of your local bank. Over lunch in the break room you
find out that the bank has been concerned that employees are stealing from the bank. Which of
the following statements is false?
Answer: d
48) You just started to work in a branch of your local bank. The bank is dealing with the privacy
standards that exist for transferring data to banks in other countries. This flow of information is
called __________.
a) information passing.
b) transborder data flows.
c) normal business practice.
d) data processing.
e) privacy issues.
Answer: b
Title: Testbank Question 6.48
Learning Objective 1: LO 6.2 Identify three places that store personal data, and for each one,
discuss at least one potential threat to the privacy of the data stored there. Discuss potential
threats to the privacy of personal data stored in different locations.
Section Reference 1: 6.2 Privacy
Difficulty: Easy
Bloom’s Taxonomy: Application
49) How does society keep owners of electronic bulletin boards from disseminating offensive or
untrue content? This is a difficult question because it involves the conflict between _____ on
the one hand and _____ on the other.
Answer: c
50) Refer to IT’s About Business 6.3 – Google Glass: Big Brother Really Is Watching You:
Google Glass is a(n) ___________.
Answer: a
51) Refer to IT’s About Business 6.3 – Google Glass: Big Brother Really Is Watching You:
Which of the following is not a correct statement about Google Glasses?
a) Can perform Internet search for questions asked of it.
b) Can perform language translations for user.
c) Can digitally capture every moment of every individual around the person wearing them.
d) Restaurants like Google glass users because other can see what they and others are eating.
Answer: d
a) Opt-in
b) Opt-out
c) Either A or B
d) Neither A nor B
Answer: a
53) Shelli runs a small boutique in Tel Aviv. She has built up a very nice client base and
regularly sends her clients a newsletter. Clients fill out a form to join her mailing list. Shelli has a
box on the form that the customer checks to indicate they have read her policies which are on
the form. This check box is an example of ____________.
a) Privacy
b) Profiling
c) Opting-out
d) Opting-in
Answer: d
Answer: d
55) Data aggregators sell digital dossiers to companies that want to know their customers
better, which is a process called ________.
a) Customer relationships
b) Customer profiling
c) Customer intimacy
d) Customer knowledge
e) Spying
Answer: c
56) Shelli runs a small boutique in Tel Aviv. Shelli wants to purchase digital dossiers on her
customers from a data aggregator. Using such dossiers is an example of _____________.
a) Customer relationships
b) Customer profiling
c) Customer intimacy
d) Customer knowledge
e) Spying
Answer: c
57) Shelli runs a small boutique in Tel Aviv. Shelli wants to purchase digital dossiers on her
customers from a data aggregator. Creating such dossiers is an example of __________.
a) Customer relationships
b) Customer profiling
c) Customer intimacy
d) Customer knowledge
e) Spying
Answer: b
58) Refer to Closing Case 1 – The National Security Agency’s Surveillance Programs: Edward
Snowden _________.
a) developed PRISM.
b) leaked classified NSA documents.
c) is an FBI agent specializing in data security.
d) helped develop Google Docs.
Answer: b
59) Refer to Closing Case 1 – The National Security Agency’s Surveillance Programs: Which of
the following statements about the NSA is not correct?
Answer: a
60) Refer to Closing Case 2 – Protecting Your Privacy: Concerning the security applications
listed in the case, which one requires a secure messaging system and permits sender to
retrieve messages they already sent?
a) Wickr
b) Snapchat
c) Silent Circle
d) TigerText
Answer: d
61) Identify and analyze the fundamental ethical issues involved with information technology.
62) Discuss the fundamental tenants of ethics: responsibility, accountability, and liability.
63) Explain why something that is unethical might not necessarily be illegal.
65) Compare and contrast the four widely used stands for ethics: utilitarian, rights, fairness, and
common good.
66) Discuss the two rules of privacy: The right of privacy is not absolute, and the public’s right to
know supersedes the individual’s right to privacy.
67) Compare and contrast the two informed consent models: opt-in and opt-out. Why do
companies prefer one over the other? Why do privacy advocates prefer one over the other?
68) Discuss the international aspects of privacy. How do these aspects impact transborder data
flows?