Management Information Systems, 13e (Laudon/Laudon) Chapter 4 Ethical and Social Issues in Information Systems
1) Even in today's legal climate, there is little incentive for firms to cooperate with prosecutors investigating financial crimes at their firm. Answer: FALE !iff: " #age $ef: 1"% AA&: (se of information technology technology &AE: &omprehension *+ective: %.1 ") Advances in data storage have made routine violation of individual privacy more difficult. Answer: FALE !iff: 1 #age $ef: 1" AA&: (se of information technology technology &AE: &omprehension *+ective: %.-) he last step in analy/ing an ethical issue should *e to identify the sta0eholderspeople who have a vested interest in the outcome of the decision. Answer: FALE !iff: " #age $ef: 1-2 AA&: Ethical understanding and reasoning a*ilities a*ilities &AE: &omprehension *+ective: %." %) #rofessionals ta0e on special rights and o*ligations *ecause of their special claims to 0nowledge, wisdom, and respect. Answer: $(E !iff: 1 #age $ef: 1-1 AA&: Ethical understanding and reasoning a*ilities a*ilities &AE: &omprehension *+ective: %." ) #rivacy is the right to *e left alone when you want to *e, without surveillance or interference from other individuals or organi/ations. Answer: $(E !iff: 1 #age $ef: 1-" AA&: $eflective thin0ing thin0ing s0ills s0ills &AE: &omprehension *+ective: %.-
1
&opyright 3 "21% #earson Education, 4nc.
5) 6ost American American and European privacy law is *ased on a set of five principles called &##A. &##A. Answer: FALE !iff: " #age $ef: 1-AA&: $eflective thin0ing thin0ing s0ills s0ills &AE: &omprehension *+ective: %.7) pyware is software that comes hidden in downloaded applications and can trac0 your online movements. Answer: $(E !iff: " #age $ef: 1-7 AA&: (se of information technology technology &AE: &omprehension *+ective: %.8) 6ost 4nternet *usinesses do very little to protect the privacy o f their customers. Answer: $(E !iff: " #age $ef: 1-8 AA&: (se of information technology technology &AE: &omprehension *+ective: %.9) !ata gathered *y online *ehavioral trac0ing firms is limited to the user's *ehavior on a single e* site. Answer: FALE !iff: " #age $ef: 1"1 AA&: (se of information technology technology &AE: &omprehension *+ective: %.12) &opyright is the legal protection afforded intellectual property, such as a song, *oo0, or video game. Answer: $(E !iff: " #age $ef: 1%" AA&: $eflective thin0ing thin0ing s0ills s0ills &AE: &omprehension *+ective: %.11) 4n white;collar fraud, information systems are most typically used as a means to hide financial evidence of crimes. Answer: $(E !iff: - #age $ef: 1"% AA&: $eflective thin0ing thin0ing s0ills s0ills &AE: &omprehension *+ective: %.1
2
&opyright 3 "21% #earson Education, 4nc.
1") he &opyright ffice *egan registering software programs in the 1992s. Answer: FALE !iff: " #age $ef: 1%" AA&: $eflective thin0ing thin0ing s0ills s0ills &AE: &omprehension *+ective: %.1-) he draw*ac0 to copyright protection is that the underlying ideas *ehind the wor0 are not protected, only their reproduction in a product. Answer: $(E !iff: " #age $ef: 1%" AA&: $eflective thin0ing thin0ing s0ills s0ills &AE: &omprehension *+ective: %.1%) According to the courts, in the creation of software, uni
3
&opyright 3 "21% #earson Education, 4nc.
18) he European #arliament has passed a *an on unsolicited commercial messaging. Answer: $(E !iff: " #age $ef: 1%9 AA&: $eflective thin0ing thin0ing s0ills s0ills &AE: &omprehension *+ective: %.19) he most common type of computer;related $4 is &. Answer: $(E !iff: 1 #age $ef: 1" AA&: (se of information technology technology &AE: &omprehension *+ective: %.% "2) echnostress echnostress is a computer;related malady whose symptoms include fatigue. Answer: $(E !iff: " #age $ef: 1AA&: (se of information technology technology &AE: &omprehension *+ective: %.% "1) he "21" F& report on industry;*est practices for protecting individuals' privacy focused on each of the following topics except A) mo*ile privacy. ) phasing out of self;regulatory codes. &) data *ro0ers. !) large platform providers. Answer: !iff: " #age $ef: 1"" AA&: $eflective thin0ing thin0ing s0ills s0ills &AE: &omprehension *+ective: %." "") hich of the following *est descri*es how new information systems result in legal gray areas= A) hey wor0 with networ0ed, electronic data, which are more difficult to control than information stored manually. manually. ) hey result in new situations that are not covered *y old laws. &) hey are implemented *y technicians rather than managers. !) hey are created from sets of logical and technological rules rather than social or organi/ational mores. Answer: !iff: " #age $ef: 1" AA&: Ethical understanding and reasoning a*ilities a*ilities &AE: Evaluation in terms terms of assess *+ective: %.1
4
&opyright 3 "21% #earson Education, 4nc.
"-) he introduction of new information technology has a A) dampening effect on the discourse of *usiness ethics. ) ripple effect raising new ethical, social, and political issues. &) *eneficial effect for society as a whole, while raising dilemmas for consumers. !) waterfall effect in raising ever more comple> ethical issues. Answer: !iff: " #age $ef: 1" AA&: Ethical understanding and reasoning a*ilities a*ilities &AE: &omprehension *+ective: %.1 "%) 4n the information age, the o*ligations that individuals and organi/ations have concerning rights to intellectual property fall within the moral dimension of A) property rights and o*ligations. ) system isting values and institutions institutions fall within the moral dimension of A) family and home. ) property rights and o*ligations. &) system
5
&opyright 3 "21% #earson Education, 4nc.
"7) he use of computers to com*ine data da ta from multiple sources and create electronic dossiers of detailed information on individuals is called A) profiling. ) phishing. &) spamming. !) targeting. Answer: A !iff: 1 #age $ef: 1"7 AA&: $eflective thin0ing thin0ing s0ills s0ills &AE: &omprehension *+ective: %.1 "8) hich of the five moral dimensions of the information age do the central *usiness activities of &hoice#oint raise= A) property rights and o*ligations ) system ecutives. Answer: & !iff: " #age $ef: 1"8 AA&: $eflective thin0ing thin0ing s0ills s0ills &AE: &omprehension *+ective: %.1 -2) Accepting the potential costs, duties, and o*ligations for the decisions you ma0e is referred to as A) responsi*ility. ) accounta*ility. accounta*ility. &) lia*ility. !) due process. Answer: A !iff: " #age $ef: 1"9 AA&: $eflective thin0ing thin0ing s0ills s0ills &AE: &omprehension *+ective: %."
6
&opyright 3 "21% #earson Education, 4nc.
-1) he process in law;governed societies in which laws are 0nown and understood and there is an a*ility to appeal to higher authorities to ensure that the laws are applied correctly is called A) lia*ility. ) due process. &) the courts of appeal. !) accounta*ility. accounta*ility. Answer: !iff: " #age $ef: 1-2 AA&: $eflective thin0ing thin0ing s0ills s0ills &AE: &omprehension *+ective: %." -") he feature of social institutions that means mechanisms are in place to determine responsi*ility for an action is called A) due process. ) accounta*ility. accounta*ility. &) the courts of appeal. !) the +udicial system. Answer: !iff: " #age $ef: 1-2 AA&: $eflective thin0ing thin0ing s0ills s0ills &AE: &omprehension *+ective: %." --) hich of the following is not one one of the five steps discussed in the chapter as a process for analy/ing an ethical issue= A) Assign responsi*ility. responsi*ility. ) 4dentify the sta0eholders. &) 4dentify the options you can reasona*ly ta0e. !) 4dentify and clearly descri*e the facts. Answer: A !iff: " #age $ef: 1-2 AA&: Ethical understanding and reasoning a*ilities a*ilities &AE: &omprehension *+ective: %."
7
&opyright 3 "21% #earson Education, 4nc.
-%) A colleague of yours frepresses which historical ethical principle= A) ant's &ategorical 4mperative ) the Bolden $ule &) the $is0 Aversion Aversion #rinciple !) the C?o free lunchC rule Answer: A !iff: - #age $ef: 1-1 AA&: Ethical understanding and reasoning a*ilities a*ilities &AE: Analysis in terms of categori/e categori/e *+ective: %." -) 4mmanuel ant's &ategorical 4mperative states that A) if an action cannot *e ta0en repeatedly, repeatedly, then it is not right to *e ta0en at any time. ) one should ta0e the action a ction that produces the least harm or incurs the least cost. &) one can put values in ran0 order and understand the conse
8
&opyright 3 "21% #earson Education, 4nc.
-7) he ethical Cno free lunchC rule states that A) if an action cannot *e ta0en repeatedly, repeatedly, then it is not right to *e ta0en at any time. ) one should ta0e the action a ction that produces the least harm or incurs the least cost. &) one can put values in ran0 order and understand the conse
9
&opyright 3 "21% #earson Education, 4nc.
%1) he Federal Fed eral rade &ommission F4# principle of ?oticeAwareness ?oticeAwareness states that A) customers must *e allowed to choose how their information will *e used for secondary purposes other than the supporting transaction. ) data collectors must ta0e responsi*le steps to assure that consumer information is accurate and secure from unauthori/ed use. &) there is a mechanism in place to enforce F4# principles. !) e* e* sites must disclose their information practices *efore collecting data. Answer: ! !iff: " #age $ef: 1-AA&: $eflective thin0ing thin0ing s0ills s0ills &AE: &omprehension *+ective: %." %") hich of the following is not one one of the practices added in "212 *y the F# to its framewor0 for privacy= A) Firms should *uild products and services that protect privacy. ) Firms should increase the transparency of their data c ollection. &) Firms should re months or less. Answer: ! !iff: - #age $ef: 1-% AA&: $eflective thin0ing thin0ing s0ills s0ills &AE: &omprehension *+ective: %.%-) hich of the following (.. laws gives patients access to personal medical records and the right to authori/e how this information can *e used or disclosed= A) 4#AA ) Bramm;Leach;liley Act &) #rivacy #rotection Act !) Freedom of 4nformation Act Answer: A !iff: " #age $ef: 1-% AA&: $eflective thin0ing thin0ing s0ills s0ills &AE: &omprehension *+ective: %.%%) European privacy protection is DDDDDDDD than in the (nited tates. A) less far;reaching ) less lia*le to laws &) much less stringent !) much more strict Answer: ! !iff: " #age $ef: 1- AA&: $eflective thin0ing thin0ing s0ills s0ills &AE: &omprehension *+ective: %.10
&opyright 3 "21% #earson Education, 4nc.
%) (.. *usinesses are allowed to use pe rsonal data from E( countries if they A) have informed consent. ) create a safe har*or. &) develop e
11
&opyright 3 "21% #earson Education, 4nc.
%9) he nline #rivacy Alliance A) encourages self;regulation to develop a set of privacy guidelines for its mem*ers. ) protects user privacy during interactions with e* e* sites. &) has esta*lished technical guidelines for ensuring privacy. !) is a government agency regulating the use of customer information. Answer: A !iff: " #age $ef: 1-8 AA&: $eflective thin0ing thin0ing s0ills s0ills &AE: &omprehension *+ective: %.2) AGn) DDDDDDDD model of informed consent permits the collection of personal information until the consumer specifically re
A) &onstitutional guarantees of freedom of speech and association. ) #rivacy Act of 197%. &) Fourth Amendment protections against unreasona*le search and sei/ure. !) &## & ##A. A. Answer: ! !iff: " #age $ef: 1-" AA&: $eflective thin0ing thin0ing s0ills s0ills &AE: &omprehension *+ective: %.") hich of the following statements a*out trade secrets is not true= true= A) rade secret protections vary from state to state. ) Any intellectual intellectual product, regardless of its purpose, can *e classified as a trade secret. &) oftware that contains uni
12
&opyright 3 "21% #earson Education, 4nc.
-) 4ntellectual property can *est *e descri*ed as A) intangi*le property created *y individuals or corporations. ) unipression of an intangi*le idea. Answer: A !iff: - #age $ef: 1-9 AA&: $eflective thin0ing thin0ing s0ills s0ills &AE: &omprehension *+ective: %.%) hat legal mechanism protects the owners of intellectual property from having their wor0 copied *y others= A) patent protection ) intellectual property law &) copyright law !) Fair (se !octrine Answer: & !iff: " #age $ef: 1%" AA&: $eflective thin0ing thin0ing s0ills s0ills &AE: &omprehension *+ective: %.) CLoo0 and feelC copyright c opyright infringement lawsuits are concerned with A) the distinction *etween tangi*le and intangi*le ideas. ) the distinction *etween an idea and its e>pression. &) using the graphical elements of another product. !) using the creative elements of another product. Answer: !iff: " #age $ef: 1%" AA&: $eflective thin0ing thin0ing s0ills s0ills &AE: &omprehension *+ective: %.5) he strength of patent protection is that it A) puts the strength of law *ehind copyright. ) allows protection from 4nternet theft of ideas put forth pu*licly. &) is easy to define. !) grants a monopoly on underlying concepts and ideas. Answer: ! !iff: - #age $ef: 1%" AA&: $eflective thin0ing thin0ing s0ills s0ills &AE: &omprehension *+ective: %.-
13
&opyright 3 "21% #earson Education, 4nc.
7) ne of the difficulties of patent protection is A) that only the underlying ideas are protected. ) digital media cannot *e patented. &) preventing the ideas from falling into pu*lic do main. !) the years of waiting to receive it. Answer: ! !iff: - #age $ef: 1%";1%AA&: $eflective thin0ing thin0ing s0ills s0ills &AE: &omprehension *+ective: %.8) hich of the following ad+usts copyright laws to the 4nternet age *y ma0ing it illegal to circumvent technology;*ased protections of copyrighted materials= A) !igital 6illennium &opyright Act ) #rivacy Act &) Freedom of 4nformation Act !) Electronic &ommunications #rivacy Act Answer: A !iff: - #age $ef: 1%% AA&: $eflective thin0ing thin0ing s0ills s0ills &AE: &omprehension *+ective: %.9) 4n general, it is very difficult to hold software producers lia*le for their software products when those products are considered to *e A) part of a machine. ) similar to *oo0s. &) services. !) artistic e>pressions. Answer: !iff: " #age $ef: 1% AA&: $eflective thin0ing thin0ing s0ills s0ills &AE: &omprehension *+ective: %.1 52) DDDDDDDD are not held lia*le for the messages they transmit. A) $egulated common carriers ) #rivate individuals &) rgani/ations and *usinesses !) Elected officials Answer: A !iff: " #age $ef: 1% AA&: $eflective thin0ing thin0ing s0ills s0ills &AE: &omprehension *+ective: %.1
14
&opyright 3 "21% #earson Education, 4nc.
51) 4t is not feasi*le for companies to produce error;free software *ecause A) any programming code co de is suscepti*le to error. error. ) it is too e>pensive to create perfect p erfect software. &) errors can *e introduced in the maintenance stage of development. !) any software of any comple>ity will have errors. Answer: !iff: " #age $ef: 1%5 AA&: $eflective thin0ing thin0ing s0ills s0ills &AE: &omprehension *+ective: %.1 5") he most common source of *usiness system failure is A) software *ugs. ) software errors. &) hardware or facilities failures. !) data pensive and can reach so many people. Answer: ! !iff: " #age $ef: 1%9 AA&: $eflective thin0ing thin0ing s0ills s0ills &AE: &omprehension *+ective: %.%
15
&opyright 3 "21% #earson Education, 4nc.
5) hich of the five moral dimensions of the information age does spamming raise= A)
16
&opyright 3 "21% #earson Education, 4nc.
59) hich two of the following issues are privacy advocates and advertising industry most in conflict over= Gelect two of the following.) A) an opt;in policy reistence of laws that permit individuals to recover damages done to them *y other actors, systems, or organi/ations. Answer: Lia*ility !iff: " #age $ef: 1-2 AA&: $eflective thin0ing thin0ing s0ills s0ills &AE: &omprehension *+ective: %." 7-) he ethical principle called DDDDDDDD as0s you to put yourself in the place of others, and thin0 of yourself as the o*+ect of the decision. Answer: the Bolden $ule !iff: - #age $ef: 1-1 AA&: Ethical understanding and reasoning a*ilities a*ilities &AE: &omprehension *+ective: %." 17
&opyright 3 "21% #earson Education, 4nc.
7%) !escartes' rule of change, that if an action cannot *e ta0en repeatedly, repeatedly, it is not right to ta0e at all, is also 0nown as the DDDDDDDD rule. Answer: slippery;slope !iff: " #age $ef: 1-1 AA&: Ethical understanding and reasoning a*ilities a*ilities &AE: &omprehension *+ective: %." 7) DDDDDDDD is permission given with 0nowledge of all the facts needed to ma0e a rational decision. Answer: 4nformed consent !iff: " #age $ef: 1- AA&: $eflective thin0ing thin0ing s0ills s0ills &AE: &omprehension *+ective: %." 75) A wide disparity in the a*ility of different social groups to access computers and the 4nternet is referred to as DDDDDDDD. Answer: digital divide, divide, the digital digital divide !iff: " #age $ef: 1-7 AA&: $eflective thin0ing thin0ing s0ills s0ills &AE: &omprehension *+ective: %.% 77) Advertisers use DDDDDDDD targeting in order to display more relevant ads *ased on user's search and *rowsing history. history. Answer: *ehavioral !iff: " #age $ef: 1-7 AA&: $eflective thin0ing thin0ing s0ills s0ills &AE: &omprehension *+ective: %.78) he DDDDDDDD model prohi*its an organi/ation o rgani/ation from collecting any personal information unless the individual specifically ta0es action to approve information collection and use. Answer: opt;in !iff: " #age $ef: 1-8 AA&: $eflective thin0ing thin0ing s0ills s0ills &AE: &omprehension *+ective: %.79) AGn) DDDDDDDD grants the owner an e>clusive monopoly o n the ideas *ehind an invention for "2 years. Answer: patent !iff: " #age $ef: 1%" AA&: $eflective thin0ing thin0ing s0ills s0ills &AE: &omprehension *+ective: %.18
&opyright 3 "21% #earson Education, 4nc.
82) he commission of acts involving the use of a computer that may not *e illegal *ut *u t are considered unethical is called computer DDDDDDDD. Answer: a*use !iff: " #age $ef: 1%9 AA&: $eflective thin0ing thin0ing s0ills s0ills &AE: &omprehension *+ective: %.1 81) ne of the capa*ilities of 4nternet communication is the a*ility of the individual to appear essentially anonymous *y using made;up user names. n ames. 4s anonymity the same thing as privacy, and should it *e a right= hat ethical issues are raised *y increased anonymity= Answer: tudent answers will vary, vary, *ut should include a definition of privacy and an attempt to differentiate *etween anonymity and privacy, as well as an understanding that anonymity can result in a *rea0down of clear accounta*ility or responsi*ility for actions. A sample answer is: #rivacy is the claim to *e left alone, free from surveillance. his is different from anon ymity, ymity, in which no*ody 0nows who you are or what actions you ta0e even in a pu*lic arena. ome individuals, if they feel they are anonymous, may have lapses in ethical *ehavior *ecause anonymity means they are no longer accounta*le for their actions. 4 don't 0now if anonymity should *e a right, *ut perhaps anonymity should not *e permissi*le for some types of communication. !iff: - #age $ef: 1";1-% AA&: Ethical understanding and reasoning a*ilities a*ilities &AE: Evaluation in terms terms of assess *+ective: %.1 8") List and descri*e the five moral dimensions that are involved in political, social, and ethical issues. hich do you thin0 will *e the most difficult for society to deal with= up port your opinion. Answer: he five moral dimensions are: 1. 4nformation rights and o*ligations. hat rights do individuals and organi/ations organi/ations have with respect to information pertaining to them= ". #roperty rights. ow can intellectual property rights *e protected when it it is so easy to copy digital materials= -. Accounta*ili Accounta*ility ty and control. control. ho will will *e held accounta*le accounta*le and lia*le lia*le for the harm harm done to individual and collective information and property rights= %. ystem
&opyright 3 "21% #earson Education, 4nc.
8-) !iscuss at least three 0ey technology trends that raise ethical issues. Bive an e>ample of an ethical or moral impact connected to each one. Answer: ey technology trends trends include the following: 1. &omputer &omputer power dou*ling dou*ling every 18 months: months: ethical ethical impact*e impact*ecause cause more more organi/atio organi/ations ns depend on computer systems for critical operations, these systems are vulnera*le to computer crime and computer a*useJ ". !ata storage storage costs are rapidly rapidly declining: declining: ethical ethical impactit impactit is easy to maintain maintain detailed detailed data*ases on individualswho has access to and control of these data*ases=J -. !ata analysis advances: ethical impactvast data*ases full of individual individual information may *e used to develop detailed profiles of individual *ehaviorJ and %. ?etwor0ing ?etwor0ing advances advances and the 4nternet: 4nternet: ethical ethical impact impactit it is easy to copy data data from one location to another. ho owns data= ow can ownership *e protected= !iff: " #age $ef: 1"5;1"9 AA&: Analytic s0ills &AE: ynthesis in terms of applying *+ective: %.1 8%) !efine the *asic * asic concepts of responsi*ility, responsi*ility, accounta*ility, and lia*ility as applied to ethical decisions. ow are these concepts related= Answer: $esponsi*ility is the first 0ey element element of ethical action. $esponsi*ility $esponsi*ility means that an individual, group, or organi/ation accepts the potential costs, duties, and o*ligations for decisions made. Accounta*ility is a feature of systems and social institutions. 4t means that mechanisms are in place to determine who too0 responsi*le actionJ i.e., who is responsi*le for the action. Lia*ility is a feature of political systems in which a *ody of law is in place that permits individuals to recover the damages done to them *y others. hese concepts are related as follows: 4 will assume the *lame or *enefit for the actions 4 ta0e Gresponsi*ility)J this *lame or *enefit accrues to me through the replain why 4 have ta0en the actions 4 have Gaccounta*ility) for actions tracea*le to me *y defined mechanisms in the organi/ation, and if those actions result in harm to another, 4 will *e held *y law to reparations for those actions Glia*ility). !iff: - #age $ef: 1"9;1-2 AA&: Ethical understanding and reasoning a*ilities a*ilities &AE: Analysis in terms of e>amine e>amine *+ective: %." 8) hat are the steps in conducting an ethical analysis= Answer: he steps are: 1. identify and descri*e clearly clearly the factsJ ". define the conflict conflict or dilemma and identify the higher;order values involvedJ -. identi identify fy the the sta0eho sta0eholde ldersJ rsJ %. identify identify the the options options that that you can reasona*l reasona*ly y ta0eJ and . identify identify the the potentia potentiall conse
&opyright 3 "21% #earson Education, 4nc.
85) List and define the si> ethical principles d iscussed in your te>t. Answer: he si> ethical principles are the Bolden $ule, ant's &ategorical &ategorical 4mperative, !escartes' rule of change Gslippery slope), the (tilitarian #rinciple, the $is0 Aversion Aversion #rinciple, and the Cno free lunchC rule. he Bolden $ule proposes: do unto others as you would have them do unto you. 4mmanuel ant's &ategorical 4mperative proposes, if an action is not right for everyone to ta0e, it is not right for anyone. !escartes' rule of change says: 4f an action cannot *e ta0en repeatedly, it is not right to ta0e at all. he (tilitarian #rinciple is: a0e a0e the action that achieves the higher or greater value. he $is0 Aversion Aversion #rinciple is: a0e a0e the action that produces the least harm or the least potential cost. he ethical no free lunch rule says: Assume that virtually all tangi*le and intangi*le o*+ects are owned *y someone else unless there is a specific declaration otherwise. !iff: " #age $ef: 1-1 AA&: Ethical understanding and reasoning a*ilities a*ilities &AE: Analysis in terms of summari/e summari/e *+ective: %." 87) hat are the ma+or issues concerning privacy in the information age= !o you *elieve the need for homeland security should overrule some of the personal privacy and information rights we have previously ta0en for granted= hy or why not= Answer: ne answer might *e that we should depend upon the Federal rade rade &ommission Fair 4nformation #ractice #rinciples and that as long as these principles are not ignored or overset, personal privacy does not conflict with homeland security. security. his is a wea0 argument. ther issues issues involve online privacy, employee monitoring, tradeoffs *etween security and privacy and good *usiness results versus privacy. privacy. !iff: " #age $ef: 1-";1-9 AA&: Ethical understanding and reasoning a*ilities a*ilities &AE: Evaluation in terms terms of assess *+ective: %.88) ow does a coo0ie wor0= Answer: A coo0ie wor0s as follows: A user opens a e* e* *rowser and selects a site to visit. he user's computer sends a re
21
&opyright 3 "21% #earson Education, 4nc.
89) hat do you consider to *e the primary ethical, social, and political issues regarding the
22
&opyright 3 "21% #earson Education, 4nc.