Management Information Systems, 12e (Laudon) Chapter 4 Ethical and Social Issues in Information Systems
1) Advances in data storage have h ave made routine violation of individual privacy p rivacy more difficult. Answer: FALSE Diff: 1 age !ef: 1"# AA$S%: &se of '( $ASE: $omprehension *+ective: ,.1 ") (he last step in analy-ing an ethical issue should *e to identify the staeholders people who have a vested interest in the outcome of the decision. Answer: FALSE Diff: " age !ef: 1/0 AA$S%: Ethical &nderstanding and !easoning A*ilities A*ilities $ASE: $omprehension *+ective: ,." /) rofessionals tae on special rights and o*ligations *ecause of their special claims to nowledge wisdom and respect. Answer: (!&E Diff: 1 age !ef: 1/1 AA$S%: Ethical &nderstanding and !easoning A*ilities A*ilities $ASE: $omprehension *+ective: ,." ,) rivacy is the right to *e left alone when you want to *e without surveillance or interference from other individuals or organi-ations. Answer: (!&E Diff: 1 age !ef: 1/1 AA$S%: !eflective (hining $ASE: $omprehension *+ective: ,./ 2) 3ost American and European privacy law is *ased on a set o f five principles called $A. Answer: FALSE Diff: " age !ef: 1/" AA$S%: !eflective (hining $ASE: $omprehension *+ective: ,./
1 Copyright © 2012 Pearson Education, Inc.
#) A cooie is a small file containing information a*out you and your 4e* activities that is deposited on your hard dis *y a 4e* site. Answer: (!&E Diff: " age !ef: 1/, AA$S%: &se of '( $ASE: $omprehension *+ective: ,./ 5) Spyware is software that comes hidden in downloaded applications and can trac your online movements. Answer: (!&E Diff: " age !ef: 1/2 AA$S%: &se of '( $ASE: $omprehension *+ective: ,./ 6) 3ost 'nternet *usinesses do very little to protect the privacy of their customers. Answer: (!&E Diff: " age !ef: 1/5 AA$S%: &se of '( $ASE: $omprehension *+ective: ,./ 7) / encrypts or scram*les e8mail or data so that it cannot *e read illicitly. Answer: FALSE Diff: " age !ef: 1/6 AA$S%: &se of '( $ASE: $omprehension *+ective: ,./ 10) rotection for trade secrets is enforced at the federal level. Answer: FALSE Diff: / age !ef: 1/7 AA$S%: !eflective (hining $ASE: $omprehension *+ective: ,./ 11) $opyright is the legal protection afforded intellectual property such as a song *oo or video game. Answer: (!&E Diff: " age !ef: 1/7 AA$S%: !eflective (hining $ASE: $omprehension *+ective: ,./
" Copyright © 2012 Pearson Education, Inc.
1") (rade secret law protects the actual ideas in a wor product not +ust their manifestations. Answer: (!&E Diff: " age !ef: 1/7 AA$S%: !eflective (hining $ASE: $omprehension *+ective: ,./ 1/) (he draw*ac to copyright protection is in passing stringent criteria of nono*viousness. Answer: FALSE Diff: " age !ef: 1,0 AA$S%: !eflective (hining $ASE: $omprehension *+ective: ,./ 1,) According to the courts in the creation of software uni9ue concepts general functional features and even colors are protecta*le *y copyright law. Answer: FALSE Diff: " age !ef: 1,0 AA$S%: !eflective (hining $ASE: $omprehension *+ective: ,./ 12) (he ey concepts in patent law are originality novelty and value. Answer: FALSE Diff: / age !ef: 1,0 AA$S%: !eflective (hining $ASE: $omprehension *+ective: ,./ 1#) Despite the passage of several laws defining and addressing computer crime accessing a computer system without authori-ation is not yet a federal crime. Answer: FALSE Diff: " age !ef: 1,2 AA$S%: !eflective (hining $ASE: $omprehension *+ective: ,./ 15) 'nsofar as software is essentially an intangi*le good produce rs of software cannot *e held lia*le for any damages that their software unintentionally causes. Answer: FALSE Diff: " age !ef: 1," AA$S%: &se of '( $ASE: $omprehension *+ective: ,.,
/ Copyright © 2012 Pearson Education, Inc.
16) (he European arliament has passed a *an on unsolicited commercial messaging. Answer: (!&E Diff: " age !ef: 1,# AA$S%: !eflective (hining $ASE: $omprehension *+ective: ,., 17) (he most common type of computer8related !S' is $(S. Answer: (!&E Diff: " age !ef: 1,7 AA$S%: &se of '( $ASE: $omprehension *+ective: ,., "0) (echnostress is a computer8related malady whose symptoms include fatigue. Answer: (!&E Diff: " age !ef: ,,/ AA$S%: &se of '( $ASE: $omprehension *+ective: ,., "1) 4hich of the following *est descri*es how new information systems result in legal gray areas A) (hey wor with networed electronic data which are more difficult to control than information stored manually. %) (hey result in new situations that are no t covered *y old laws. $) (hey are implemented *y technicians rather than managers. D) (hey are created from sets of logical and technological rules rather than social o r organi-ational mores. Answer: % Diff: " age !ef: 1",81"2 AA$S%: Ethical &nderstanding and !easoning A*ilities $ASE: Evaluation in terms of assess *+ective: ,.1 "") (he introduction of new information technology has a A) dampening effect on the discourse of *usiness ethics. %) ripple effect raising new ethical social and political issues. $) *eneficial effect for society as a whole while raising dilemmas for consumers. D) waterfall effect in raising ever more comple; ethical issues. Answer: % Diff: " age !ef: 1",81"2 AA$S%: Ethical &nderstanding and !easoning A*ilities $ASE: $omprehension *+ective: ,.1
, Copyright © 2012 Pearson Education, Inc.
"/) 'n the information age the o*ligations that individuals and organi-ations have concerning rights to intellectual property fall within the moral dimension of A) property rights and o*ligations. %) system 9uality. $) accounta*ility and control. D) information rights and o*ligations. Answer: A Diff: 1 age !ef: 1"# AA$S%: Ethical &nderstanding and !easoning A*ilities $ASE: $omprehension *+ective: ,.1 ",) 'n the information age the o*ligations that individuals and organi-ations have regarding the preservation of e;isting values and institutions fall within the moral dimension of A) family and home. %) property rights and o*ligations. $) system 9uality. D) 9uality of life. Answer: D Diff: " age !ef: 1"# AA$S%: Ethical &nderstanding and !easoning A*ilities $ASE: $omprehension *+ective: ,.1 "2) (he four ey technical trends responsi*le for current ethical stresses related to information technology are <1) dou*ling of computer power every 16 months <") data analysis advances ) declining data storage costs and <,) ========. A) advances in wireless networing %) international standards for data protection $) networing advances and the 'nternet D) increased ease in file sharing and copying Answer: $ Diff: 1 age !ef: 1"# AA$S%: !eflective (hining $ASE: $omprehension *+ective: ,.1
2 Copyright © 2012 Pearson Education, Inc.
"#) (he use of computers to com*ine data from multiple sources and create electronic dossiers of detailed information on individuals is called A) profiling. %) phishing. $) spamming. D) targeting. Answer: A Diff: 1 age !ef: 1"5 AA$S%: !eflective (hining $ASE: $omprehension *+ective: ,.1 "5) 4hich of the five moral dimensions of the information age do the central *usiness activities of $hoiceoint raise A) property rights and o*ligations %) system 9uality $) accounta*ility and control D) information rights and o*ligations Answer: D Diff: / age !ef: 1"581"6 AA$S%: Ethical &nderstanding and !easoning A*ilities $ASE: Analysis in terms of appraise *+ective: ,.1 "6) >!A is a A) profiling technology used *y the E&. %) federal privacy law protecting networed data. $) new data analysis technology that finds hidden connections *etween data in disparate sources. D) sentencing guideline adopted in 1765 mandating stiff sentences on *usiness e;ecutives. Answer: $ Diff: " age !ef: 1"6 AA$S%: !eflective (hining $ASE: $omprehension *+ective: ,.1 "7) Accepting the potential costs duties and o*ligations for the decisions you mae is referred to as A) responsi*ility. %) accounta*ility. $) lia*ility. D) due process. Answer: A Diff: " age !ef: 1"7 AA$S%: !eflective (hining $ASE: $omprehension *+ective: ,."
# Copyright © 2012 Pearson Education, Inc.
/0) (he feature of political systems in which a *ody of laws is in place that permits individuals to recover the damages done to them *y other actors systems or organi-ations is referred to as A) accounta*ility. %) responsi*ility. $) due process. D) lia*ility. Answer: D Diff: " age !ef: 1"7 AA$S%: !eflective (hining $ASE: $omprehension *+ective: ,." /1) (he feature of social institutions that means mechanisms are in place to determine responsi*ility for an action is called A) due process. %) accounta*ility. $) the courts of appeal. D) the +udicial system. Answer: % Diff: " age !ef: 1"7 AA$S%: !eflective (hining $ASE: $omprehension *+ective: ,." /") (he process in law8governed societies in w hich laws are nown and understood and there is an a*ility to appeal to higher authorities to ensure that the laws are applied correctly is called A) lia*ility. %) due process. $) the courts of appeal. D) accounta*ility. Answer: % Diff: " age !ef: 1"7 AA$S%: !eflective (hining $ASE: $omprehension *+ective: ,." //) 4hich of the following is not one of the five steps discussed in the chapter as a process for analy-ing an ethical issue A) Assign responsi*ility. %) 'dentify the staeholders. $) 'dentify the options you can reasona*ly tae. D) 'dentify and clearly descri*e the facts. Answer: A Diff: " age !ef: 1"781/0 AA$S%: Ethical &nderstanding and !easoning A*ilities $ASE: $omprehension *+ective: ,." 5 Copyright © 2012 Pearson Education, Inc.
/,) A colleague of yours fre9uently taes for his own personal use small amounts of office supplies noting that the loss to the company is minimal. ?ou counter that if everyone were to tae the office supplies the loss would no longer *e minimal. ?our rationale e;presses which historical ethical principle A) @ants $ategorical 'mperative %) (he Bolden !ule $) (he !is Aversion rinciple D) (he C>o free lunchC rule Answer: A Diff: / age !ef: 1/0 AA$S%: Ethical &nderstanding and !easoning A*ilities $ASE: Analysis in terms of categori-e *+ective: ,." /2) A classic ethical dilemma is the hypothetical case of a man stealing from a grocery store in order to feed his starving family. 'f you used the &tilitarian rinciple to evaluate this situation you might argue that stealing the food is A) accepta*le *ecause the grocer suffers the least harm. %) accepta*le *ecause the higher value is the survival of the family. $) wrong *ecause the man would not want the grocery to steal from him. D) wrong *ecause if everyone were to do this the concept of personal property is defeated. Answer: % Diff: " age !ef: 1/0 AA$S%: Ethical &nderstanding and !easoning A*ilities $ASE: Analysis in terms of categori-e *+ective: ,." /#) 'mmanuel @ants $ategorical 'mperative states that A) if an action cannot *e taen repeatedly then it is not right to *e taen at any time. %) one should tae the action that produces the least harm or incurs the least cost. $) one can put values in ran order and understand the conse9uences of various courses of action. D) if an action is not right for everyone to tae it is not right for anyone to tae. Answer: D Diff: " age !ef: 1/0 AA$S%: Ethical &nderstanding and !easoning A*ilities $ASE: $omprehension *+ective: ,."
6 Copyright © 2012 Pearson Education, Inc.
/5) (he ethical Cno free lunchC rule states that A) if an action cannot *e taen repeatedly then it is not right to *e taen at any time. %) one should tae the action that produces the least harm or incurs the least cost. $) one can put values in ran order and understand the conse9uences of various courses of action. D) everything is owned *y someone else and that the creator wants compensation for this wor. Answer: D Diff: " age !ef: 1/0 AA$S%: Ethical &nderstanding and !easoning A*ilities $ASE: $omprehension *+ective: ,." /6) According to the ======== you should tae the action that produces the least harm. A) $ategorical 'mperative %) !is Aversion rinciple $) &tilitarian rinciple D) Bolden !ule Answer: % Diff: " age !ef: 1/0 AA$S%: Ethical &nderstanding and !easoning A*ilities $ASE: $omprehension *+ective: ,." /7) 4hich &.S. act restricts the information the federal government can collect and regulates what they can do with the information A) rivacy Act of 175, %) Bramm8Leach8%liley Act of 1777 $) Freedom of 'nformation Act D) 'AA of 177# Answer: A Diff: " age !ef: 1/" AA$S%: !eflective (hining $ASE: $omprehension *+ective: ,./ ,0) F' principles are *ased on the notion of the A) accounta*ility of the record holder. %) responsi*ility of the record holder. $) mutuality of interest *etween the record holder and the individual. D) privacy of the individual. Answer: $ Diff: " age !ef: 1/" AA$S%: !eflective (hining $ASE: $omprehension *+ective: ,./
7 Copyright © 2012 Pearson Education, Inc.
,1) (he Federal (rade $ommission F' principle of >oticeAwareness states that A) customers must *e allowed to choose how their information will *e used for secondary purposes other than the supporting transaction. %) data collectors must tae responsi*le steps to assure that consumer information is accurate and secure from unauthori-ed use. $) there is a mechanism in place to enforce F' principles. D) 4e* sites must disclose their information practices *efore collecting data. Answer: D Diff: " age !ef: 1// AA$S%: !eflective (hining $ASE: $omprehension *+ective: ,./ ,") 4hich of the following &.S. laws gives patients access to personal medical records and the right to authori-e how this information can *e used or disclosed A) 'AA %) Bramm8Leach8%liley Act $) rivacy rotection Act D) Freedom of 'nformation Act Answer: A Diff: " age !ef: 1// AA$S%: !eflective (hining $ASE: $omprehension *+ective: ,./ ,/) European privacy protection is ======== than in the &nited States. A) less far8reaching %) less lia*le to laws $) much less stringent D) much more stringent Answer: D Diff: " age !ef: 1/, AA$S%: !eflective (hining $ASE: $omprehension *+ective: ,./
10 Copyright © 2012 Pearson Education, Inc.
,,) (he 'nternet has made the protection of intellectual property A) more difficult *ecause of the lac of enforca*le regulations. %) easier *ecause of the proliferation of creative and professional software. $) more difficult *ecause of the ease of copying and transmitting digiti-ed media. D) easier *ecause of the a*ility to trac user *ehavior and visits to 4e* sites and file8sharing services. Answer: $ Diff: 1 age !ef: 1,1 AA$S%: !eflective (hining $ASE: $omprehension *+ective: ,./ ,2) (he &.S. Department of $ommerce developed a ======== framewor in order to ena*le &.S. *usinesses to legally use personal data from E& countries. A) $A %) / $) B D) safe8har*or Answer: D Diff: " age !ef: 1/, AA$S%: !eflective (hining $ASE: $omprehension *+ective: ,./ ,#) 4hen a cooie is created during a 4e* site visit it is stored A) on the 4e* site computer. %) on the visitors computer. $) on the 'Ss computer. D) in a 4e* directory. Answer: % Diff: " age !ef: 1/, AA$S%: &se of '( $ASE: $omprehension *+ective: ,./ ,5) A
11 Copyright © 2012 Pearson Education, Inc.
,6) (he nline rivacy Alliance A) encourages self8regulation to develop a set of privacy guidelines for its mem*ers. %) protects user privacy during interactions with 4e* sites. $) has esta*lished technical guidelines for ensuring privacy. D) is a government agency regulating the use of customer information. Answer: A Diff: " age !ef: 1/5 AA$S%: !eflective (hining $ASE: $omprehension *+ective: ,./ ,7) (he ro*otics startup you wor for has developed an A'8controlled ro*otic nurse intended to care for end8of8life patients who are often unconscious. 4hich of the five moral dimensions does this raise A) system 9uality %) 9uality of life $) accounta*ility and control D) property rights and o*ligations Answer: % Diff: " age !ef: 1"281"# AA$S%: Ethical &nderstanding and !easoning A*ilities $ASE: Analysis in terms of e;amine *+ective: ,.1 20) (he / standard is concerned with A) controlling pop8up ads *ased on user profiles and preventing ads from collecting or sending information. %) allowing users to surf the 4e* anonymously. $) scram*ling data so that it cant *e read. D) *locing or limiting cooies. Answer: D Diff: " age !ef: 1/6 AA$S%: !eflective (hining $ASE: $omprehension *+ective: ,./ 21) 'ntellectual property can *est *e descri*ed as A) intangi*le property created *y individuals or corporations. %) the e;pression of an intangi*le idea. $) uni9ue creative wor or ideas. D) tangi*le or intangi*le property created from a uni9ue idea. Answer: A Diff: / age !ef: 1/681/7 AA$S%: !eflective (hining $ASE: $omprehension *+ective: ,./
1" Copyright © 2012 Pearson Education, Inc.
2") A limitation of trade secret protection for software is that A) it does not protect against copying the underlying ideas *ehind the software. %) it is difficult to compare one piece of software to another. $) it is difficult to prevent the ideas in the wor from falling into the pu*lic domain. D) few software programs contain truly uni9ue elements. Answer: $ Diff: " age !ef: 1/7 AA$S%: Analytic Sills $ASE: Analysis in terms of appraise *+ective: ,./ 2/) 4hat legal mechanism protects the owners of intellectual property from having their wor copied *y others A) patent protection %) intellectual property law $) copyright law D) fair use doctrine Answer: $ Diff: " age !ef: 1/7 AA$S%: !eflective (hining $ASE: $omprehension *+ective: ,./ 2,) CLoo and feelC copyright infringement lawsuits are concerned with A) the distinction *etween tangi*le and intangi*le ideas. %) the distinction *etween an idea and its e;pression. $) using the graphical elements of another product. D) using the creative elements of another product. Answer: % Diff: " age !ef: 1,0 AA$S%: !eflective (hining $ASE: $omprehension *+ective: ,./ 22) (he strength of patent protection is that it A) puts the strength of law *ehind copyright. %) allows protection from 'nternet theft of ideas put forth pu*licly. $) is easy to define. D) grants a monopoly on underlying concepts and ideas. Answer: D Diff: / age !ef: 1,0 AA$S%: !eflective (hining $ASE: $omprehension *+ective: ,./
1/ Copyright © 2012 Pearson Education, Inc.
2#) ne of the difficulties of patent protection is A) that only the underlying ideas are protected. %) digital media cannot *e patented. $) preventing the ideas from falling into pu*lic domain. D) the years of waiting to receive it. Answer: D Diff: / age !ef: 1,0 AA$S%: !eflective (hining $ASE: $omprehension *+ective: ,./ 25) 4hich of the following ad+usts copyright laws to the 'nternet age *y maing it illegal to circumvent technology8*ased protections of copyrighted materials A) Digital 3illennium $opyright Act %) rivacy Act $) Freedom of 'nformation Act D) Electronic $ommunications rivacy Act Answer: A Diff: / age !ef: 1,1 AA$S%: !eflective (hining $ASE: $omprehension *+ective: ,./ 26) 'n general it is very difficult to hold software producers lia*le for their software products when those products are considered to *e A) part of a machine. %) similar to *oos. $) services. D) artistic e;pressions. Answer: % Diff: " age !ef: 1," AA$S%: !eflective (hining $ASE: $omprehension *+ective: ,., 27) 't is not feasi*le for companies to produce error8free software *ecause A) any programming code is suscepti*le to error. %) it is too e;pensive to create perfect software. $) errors can *e introduced in the maintenance stage of development. D) any software of any comple;ity will have errors. Answer: % Diff: " age !ef: 1,/ AA$S%: !eflective (hining $ASE: $omprehension *+ective: ,.,
1, Copyright © 2012 Pearson Education, Inc.
#0) (he most common source of *usiness system failure is A) software *ugs. %) software errors. $) hardware or facilities failures. D) data 9uality. Answer: D Diff: " age !ef: 1,/ AA$S%: !eflective (hining $ASE: $omprehension *+ective: ,., #1) Software presents lia*ility pro*lems in terms of legal protections for users *ecause A) of the difficulty in classifying its role as a machine a service or a *oo. %) of the ina*ility to review the actual programming *ehind the software. $) of its inherent similarity to *oos and periodicals and therefore it is protected *y the First Amendment. D) there are so many parties involved in its creation and distri*ution. Answer: A Diff: " age !ef: 1," AA$S%: Analytic Sills $ASE: Analysis in terms of appraise *+ective: ,., #") (wo of the three principal sources of poor system performance are A) software *ugs and errors and outdated standards. %) hardware or facility failures and malware. $) hardware or facility failures and poor input data 9uality. D) poor input data 9uality and insufficient integration with legacy systems. Answer: $ Diff: " age !ef: 1,/ AA$S%: !eflective (hining $ASE: $omprehension *+ective: ,., #/) (he Cdo anything anywhereC computing environment can A) mae wor environments much more pleasant. %) create economies of efficiency. $) centrali-e power at corporate head9uarters. D) *lur the traditional *oundaries *etween wor and family time. Answer: D Diff: " age !ef: 1,, AA$S%: !eflective (hining $ASE: $omprehension *+ective: ,.,
12 Copyright © 2012 Pearson Education, Inc.
#,) (he practice of spamming has *een growing *ecause A) telephone solicitation is no longer legal. %) it is good advertising practice and *rings in many new customers. $) it helps pay for the 'nternet. D) it is so ine;pensive and can reach so many people. Answer: D Diff: " age !ef: 1,2 AA$S%: !eflective (hining $ASE: $omprehension *+ective: ,., #2) (he &.S. $A>8SA3 Act of "00/ A) maes spamming illegal. %) re9uires spammers to identify themselves. $) has dramatically cut down spamming. D) does not override state anti8spamming laws. Answer: % Diff: " age !ef: 1,# AA$S%: !eflective (hining $ASE: $omprehension *+ective: ,., ##) 4hich of the five moral dimensions of the information age does spamming raise A) 9uality of life %) system 9uality $) accounta*ility and control D) information rights and o*ligations Answer: A Diff: " age !ef: 1,281,# AA$S%: Ethical &nderstanding and !easoning A*ilities $ASE: Evaluation in terms of assess *+ective: ,., #5) !e8designing and automating *usiness processes can *e seen as a dou*le8edged sword *ecause A) increases in efficiency may *e accompanied *y +o* losses. %) increases in efficiency may *e accompanied *y poor data 9uality. $) support for middle8management decision maing may *e offset *y poor data 9uality. D) reliance on technology results in the loss of hands8on nowledge. Answer: A Diff: " age !ef: 1,# AA$S%: Ethical &nderstanding and !easoning A*ilities $ASE: Evaluation in terms of assess *+ective: ,.,
1# Copyright © 2012 Pearson Education, Inc.
#6) (he term C======== divideC refers to large disparities in access to computers and the 'nternet among different social groups and different locations. A) computer %) technology $) digital D) electronic Answer: $ Diff: 1 age !ef: 1,6 AA$S%: !eflective (hining $ASE: $omprehension *+ective: ,., #7) ======== can *e induced *y tens of thousands of repetitions under low8impact loads. A) $(S %) $S $) !S' D) (echnostress Answer: $ Diff: " age !ef: 1,7 AA$S%: !eflective (hining $ASE: $omprehension *+ective: ,., 50) $S refers to A) eyestrain related to computer display screen use. %) carpal vision syndrome. $) wrist in+uries *rought a*out *y incorrect hand position when using a ey*oard. D) stress induced *y technology. Answer: A Diff: " age !ef: 1,7 AA$S%: !eflective (hining $ASE: $omprehension *+ective: ,., 51) (he principles of right and wrong that can *e used *y individuals acting as free moral agents to mae choices to guide their *ehavior are called ========. Answer: ethics Diff: 1 age !ef: 1", AA$S%: !eflective (hining $ASE: $omprehension *+ective: ,.1
15 Copyright © 2012 Pearson Education, Inc.
5") (he moral dimension of ======== is concerned with the standards that data and systems should achieve in order to protect individual rights and the safety of society. Answer: system 9uality Diff: " age !ef: 1"# AA$S%: Ethical &nderstanding and !easoning A*ilities $ASE: $omprehension *+ective: ,.1 5/) ======== refers to the e;istence of laws that permit individuals to recover damages done to them *y other actors systems or organi-ations. Answer: Lia*ility Diff: " age !ef: 1"7 AA$S%: !eflective (hining $ASE: $omprehension *+ective: ,.1 5,) Descartes rule of change that if an action cannot *e taen repeatedly it is not right to tae at all is also nown as the ======== rule. Answer: slippery8slope Diff: " age !ef: 1/0 AA$S%: Ethical &nderstanding and !easoning A*ilities $ASE: $omprehension *+ective: ,.1 52) (he ethical principle called ======== ass you to put yourself in the place of others and thin of yourself as the o*+ect of the decision. Answer: the Bolden !ule Diff: / age !ef: 1/0 AA$S%: Ethical &nderstanding and !easoning A*ilities $ASE: $omprehension *+ective: ,.1 5#) ======== is permission given with nowledge of all the facts needed to mae a rational decision. Answer: 'nformed consent Diff: " age !ef: 1/, AA$S%: !eflective (hining $ASE: $omprehension *+ective: ,./ 55) 4e* ======== are em*edded in e8mails and 4e* pages to monitor user *ehavior at the 4e* site or sending e8mail. Answer: *eacons *ugs Diff: " age !ef: 1/2 AA$S%: !eflective (hining $ASE: $omprehension *+ective: ,./ 16 Copyright © 2012 Pearson Education, Inc.
56) (he ======== model prohi*its an organi-ation from collecting any p ersonal information unless the individual specifically taes action to approve information collection and use. Answer: opt8in Diff: " age !ef: 1/5 AA$S%: !eflective (hining $ASE: $omprehension *+ective: ,./ 57) A
17 Copyright © 2012 Pearson Education, Inc.
6") Discuss at least three ey technology trends that raise ethical issues. Bive an e;ample of an ethical or moral impact connected to each one. Answer: @ey technology trends include the following: <1) $omputer power dou*ling every 16 months: ethical impact *ecause more organi-ations depend on computer systems for critical operations these systems are vulnera*le to computer crime an d computer a*useH <") Data storage costs are rapidly declining: ethical impact it is easy to maintain detailed data*ases on individuals who has access to and control of these data*asesH ) Data analysis advances: ethical impact vast data*ases full of individual information may *e used to develop detailed profiles of individual *ehaviorH and <2) >etworing advances and the 'nternet: ethical impact it is easy to copy data from one location to another. 4ho owns data ow can ownership *e protected Diff: " age !ef: 1"# AA$S%: Analytic Sills $ASE: Synthesis in terms of applying *+ective: ,.1 6/) Define the *asic concepts of responsi*ility accounta*ility and lia*ility as applied to ethical decisions. ow are these concepts related Answer: !esponsi*ility is the first ey element of ethical action. !esponsi*ility means that an individual group or organi-ation accepts the potential costs duties and o*ligations for decisions made. Accounta*ility is a feature of systems and social institutions. 't means that mechanisms are in place to determine who too responsi*le actionH i.e. who is responsi*le for the action. Lia*ility is a feature of political systems in which a *ody of law is in place that permits individuals to recover the damages done to them *y others. (hese concepts are related as follows: ' will assume the *lame or *enefit for the actions ' tae
"0 Copyright © 2012 Pearson Education, Inc.
62) List and define the si; ethical principles discussed in your te;t. Answer: (he si; ethical principles are the Bolden !ule @ants $ategorical 'mperative Descartes rule of change
"1 Copyright © 2012 Pearson Education, Inc.
66) ow does a cooie wor Answer: A cooie wors as follows: A user opens a 4e* *rowser and selects a site to visit. (he users computer sends a re9uest for information to the computer running at the 4e* site. (he 4e* site computer is called the server since it allows the users computer to display the 4e* site. At the same time it sends a cooie I a data file containing information lie an encrypted user 'D and information a*out when the user visited and what he did on the site. (he users computer receives the cooie and places it in a file on the hard drive. 4henever the user goes *ac to the 4e* site the server running the site retrieves the cooie to help identify the user. Diff: " age !ef: 1/,81/2 AA$S%: Analytic Sills $ASE: Analysis in terms of summari-e *+ective: ,./ 67) 4hat do you consider to *e the primary ethical social and political issues regarding information system 9uality Answer: (he central 9uality8related ethical issue that information systems raise is at what point should ' release software or services for consumption *y o thers At what point can ' conclude that my software or service achieves an economically and technologically ade9uate level of 9uality 4hat am ' o*ligated to now a*out the 9uality of my software its procedures for testing and its operational characteristics (he leading 9uality8related social issue deals with e;pectations: As a society do we want to encourage people to *elieve that systems are infalli*le that data errors are impossi*le %y heightening awareness of system failure do we inhi*it the development of all systems which in the end contri*ute to social well8*eing (he leading 9uality8related political issue concerns the laws of responsi*ility and accounta*ility what the y should *e and how they should *e applied. Diff: " age !ef: 1,/ AA$S%: Ethical &nderstanding and !easoning A*ilities $ASE: Synthesis in terms of propose *+ective: ,.,
"" Copyright © 2012 Pearson Education, Inc.
70) ow does the use of electronic voting machines act as a Cdou*le8edged swordC 4hat moral dimensions are raised *y this use of information technology Answer: Electronic voting machines can *e seen as *eneficial *y maing voting easy to accomplish and ta*ulate. owever it may *e easier to tamper with electronic voting machines than with counta*le paper *allots. 'n terms of information rights it seems possi*le that methods could *e set up to determine how an individual has voted and to store and disseminate this nowledge. 3anufacturers of voting machines claim property rights to the voting software which means that if the software is protected from inspection there is no regulation in how the software operates or how accurate it is. 'n terms o f accounta*ility and control if an electronic voting system malfunctions will it *e the responsi*ility of the government of the company manufacturing the machines or software or the progra mmers who programmed the software (he dimension of system 9uality raises 9uestions of how the level of accuracy of the machines is to *e +udged and what level is accepta*le 'n terms of 9uality of life while it may mae voting easier and 9uicer does the vulnera*ility to a*use of these systems pose a threat to the democratic principle of one person one vote Diff: / age !ef: 1"281"# AA$S%: Ethical &nderstanding and !easoning A*ilities $ASE: Synthesis in terms of applying *+ective: ,.,
"/ Copyright © 2012 Pearson Education, Inc.