Content Frame
Note for screen reader users: There is text between the form elements on this page. To be sure that you do not miss any text, use item by item navigation methods, rather than tabbing from form element to form element.
Skip Breadcrumb Navigation
Home  arrow Chapter 12  arrow Study Guide

Study Guide

Student Objectives

After completing this chapter, you will be able to:

  1. Analyze the relationships among ethical, social, and political issues that are raised by information systems.
  2. Identify the main moral dimensions of an information society and specific principles for conduct that can be used to guide ethical decisions.
  3. Evaluate the impact of contemporary information systems and the Internet on the protection of individual privacy and intellectual property.
  4. Assess how information systems have affected everyday life.


This activity contains 35 questions.

Question 1.
Which moral dimension of the information age involves cultural values and practices?


Open Hint for Question 1 in a new window.
 
End of Question 1


Question 2.
Using computers to combine data from multiple sources and creating electronic dossiers of detailed information on individuals is called


Open Hint for Question 2 in a new window.
 
End of Question 2


Question 3.
Correlating relationships to find obscure hidden connections in disparate databases and other sources is called


Open Hint for Question 3 in a new window.
 
End of Question 3


Question 4.
A basic ethical concept that means mechanisms are in place to determine who took responsible action or who is responsible for certain actions is


Open Hint for Question 4 in a new window.
 
End of Question 4


Question 5.
Most American and European privacy law is based on a regime called


Open Hint for Question 5 in a new window.
 
End of Question 5


Question 6.
Tiny files deposited on a computer hard drive when a user visits certain Web sites are called


Open Hint for Question 6 in a new window.
 
End of Question 6


Question 7.
The ________ model of informed consent permits the collection of personal information until the consumer specifically requests that data not be collected.


Open Hint for Question 7 in a new window.
 
End of Question 7


Question 8.
An intellectual work product used for a business purpose is classified as a ________ provided it is not based on information in the public domain.


Open Hint for Question 8 in a new window.
 
End of Question 8


Question 9.
Which law protects creators of intellectual property for the life of the author plus an additional 70 years after the author's death?


Open Hint for Question 9 in a new window.
 
End of Question 9


Question 10.
Which law grants the owner an exclusive monopoly on the ideas behind an invention for 20 years?


Open Hint for Question 10 in a new window.
 
End of Question 10


Question 11.
The commission of acts involving a computer that may not be illegal but are considered unethical is known as


Open Hint for Question 11 in a new window.
 
End of Question 11


Question 12.
Which of the following is not a principal source of poor system performance?


Open Hint for Question 12 in a new window.
 
End of Question 12


Question 13.
Which of the following makes it illegal to circumvent technology-based protections of copyrighted materials?


Open Hint for Question 13 in a new window.
 
End of Question 13


Question 14.
The single largest source of repetitive stress injuries is


Open Hint for Question 14 in a new window.
 
End of Question 14


Question 15.
The most common kind of computer-related repetitive stress injury is


Open Hint for Question 15 in a new window.
 
End of Question 15


Question 16.
In today's new legal environment, managers who violate the law and are convicted will most likely spend time in prison.


Open Hint for Question 16 in a new window.
   
 
End of Question 16


Question 17.
Information systems don't necessarily threaten existing distributions of power, money, rights, and obligations.


Open Hint for Question 17 in a new window.
   
 
End of Question 17


Question 18.
Political institutions do not require a demonstration of real harm before they develop new laws governing information systems.


Open Hint for Question 18 in a new window.
   
 
End of Question 18


Question 19.
Advances in data storage techniques and rapidly declining storage costs have been responsible for the multiplying databases on individuals.


Open Hint for Question 19 in a new window.
   
 
End of Question 19


Question 20.
Accountability means that you accept the potential costs, duties, and obligations for the decisions you make.


Open Hint for Question 20 in a new window.
   
 
End of Question 20


Question 21.
At present, most U.S. federal privacy laws apply only to the federal government and regulate very few areas of the private sector.


Open Hint for Question 21 in a new window.
   
 
End of Question 21


Question 22.
A safe harbor requires government regulation and enforcement.


Open Hint for Question 22 in a new window.
   
 
End of Question 22


Question 23.
Most Internet businesses do little to protect customer privacy.


Open Hint for Question 23 in a new window.
   
 
End of Question 23


Question 24.
Copyright law protects both the underlying ideas behind a work and the manifestation in a work.


Open Hint for Question 24 in a new window.
   
 
End of Question 24


Question 25.
The Internet has made it much easier to protect intellectual property.


Open Hint for Question 25 in a new window.
   
 
End of Question 25


Question 26.
Internet service providers (ISPs) are required to take down sites of copyright infringers that they are hosting once they are notified of the problem.


Open Hint for Question 26 in a new window.
   
 
End of Question 26


Question 27.
Lower-level employees may be empowered to make minor decisions, but the key policy decisions are still very centralized.


Open Hint for Question 27 in a new window.
   
 
End of Question 27


Question 28.
Simply accessing a computer system without authorization or with intent to do harm, even by accident, is now a federal crime.


Open Hint for Question 28 in a new window.
   
 
End of Question 28


Question 29.
Repetitive stress injuries due to computer use are unavoidable.


Open Hint for Question 29 in a new window.
   
 
End of Question 29


Question 30.
According to experts, humans working continuously with computers come to expect other humans to behave like computers.


Open Hint for Question 30 in a new window.
   
 
End of Question 30


Question 31.




Open Hint for Question 31 in a new window.
 
To create paragraphs in your essay response, type <p> at the beginning of the paragraph, and </p> at the end.

End of Question 31


Question 32.




Open Hint for Question 32 in a new window.
 
To create paragraphs in your essay response, type <p> at the beginning of the paragraph, and </p> at the end.

End of Question 32


Question 33.




Open Hint for Question 33 in a new window.
 
To create paragraphs in your essay response, type <p> at the beginning of the paragraph, and </p> at the end.

End of Question 33


Question 34.




Open Hint for Question 34 in a new window.
 
To create paragraphs in your essay response, type <p> at the beginning of the paragraph, and </p> at the end.

End of Question 34


Question 35.




Open Hint for Question 35 in a new window.
 
To create paragraphs in your essay response, type <p> at the beginning of the paragraph, and </p> at the end.

End of Question 35





Pearson Copyright © 1995 - 2010 Pearson Education . All rights reserved. Pearson Prentice Hall is an imprint of Pearson .
Legal Notice | Privacy Policy | Permissions

Return to the Top of this Page