rainer5ce_ch03_testbank

docx

School

University of Calgary *

*We aren’t endorsed by this school

Course

317

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

45

Uploaded by UltraDeer378

Report
Rainer, Information System, Fifth Canadian Edition Testbank Package Title: Chapter 3, Testbank Course Title: Rainer, IS 5e Chapter Number: 3 Question type: Multiple Choice 1) Google understands that to attract digital advertising dollars from advertiser, they: . a) Must provide discounts to users b) Must prove that digital ads work c) Must work with customers and offer them loyalty programs d) Must first negotiate with the Canadian Government a regulation to protect privacy Answer: B Difficulty: Easy Section Reference 1: IT’s about Business 3.1 Learning Objective 1: 3.1 Bloomcode: Knowledge Standard: AACSB || Technology 2) Online publishers use tracking code from Google, Facebook, and many other companies to help target their advertising. What is a concern about this for individuals? ________. a) That publishers should share profits with Google, Facebook and others b) Privacy needs to be scrutinized more carefully. c) That publishers should pay to users a fee for using their private information d) That publishers should be careful to display only ads that are of interest to users Answer: B Difficulty: Easy Section Reference 1: IT’s about Business 3.1 Learning Objective 1: 3.1 Bloomcode: Application Standard: AACSB || Technology 3) How does Google protects the privacy of consumers?. a) Through an agreement between Google and sellers b) By using patent-pending mathematical formulas when it matches one of its users with a shopper who makes a purchase in a brick-and-mortar store c) Through Google Attribution d) Through Periscope Data Analysis
Rainer, Information System, Fifth Canadian Edition Testbank Answer: B Difficulty: Easy Section Reference 1: IT’s about Business 3.1 Learning Objective 1: 3.1 Bloomcode: Knowledge Standard: AACSB || Technology 4) In regards to technology used by Google to protect the privacy of consumers, Paul Stephens of Privacy Rights Clearinghouse has asserted that a marketing organization can identify an individual by examining only a few pieces of data. He expressed skepticism about Google’s technology because: a) The Google’s system for guarding the identities of users will stand up to the efforts of hackers b) The Google’s system does not have a strong encryption algorithm c) The Google’s system is too new to be trusted d) The Google’s system is not meant to protect privacy but to share data with partners to increase profits Answer: A Difficulty: Easy Section Reference 1: IT’s about Business 3.1 Learning Objective 1: 3.1 Bloomcode: Knowledge Standard: AACSB || Technology 5) Marc Rotenberg, executive director of the Electronic Privacy Information Center, claims companies are becoming increasingly intrusive in terms of their data collection and are secretive as to how they gather and use those data. He proposed that: a) Government regulators and the U.S. Congress should charge an extra tax to Google and other technology companies that are collecting and using data from their users G b) Government regulators and the U.S. Congress should demand answers about how Google and other technology companies are collecting and using data from their users. c) Government regulators and the U.S. Congress should request to Google and other technology companies that are collecting and using data from their users to give them access to their systems so they can control that they do. d) Government regulators and the U.S. Congress should shut down Google and other technology companies that are collecting and using data from their users Answer: B Difficulty: Easy Section Reference 1: IT’s about Business 3.1Learning Objective 1: 3.1 Bloomcode: Application Standard: AACSB || Technology
Rainer, Information System, Fifth Canadian Edition Testbank 6) The _________ approach states that an ethical action is the one that provides the most good or does the least harm. a) common good b) deontology c) fairness d) rights e) utilitarian Answer: e Difficulty: Easy Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 7) Minimizing the organization’s carbon footprint and otherwise striving for “green IT” is an example of a _________ approach. a) common good b) deontology c) fairness d) rights e) utilitarian Answer: e Difficulty: Hard Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Synthesis, Evaluation Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 8) The _________ approach maintains that an ethical action is the one that best protects and respects the moral rights of the affected parties. a) common good
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Rainer, Information System, Fifth Canadian Edition Testbank b) deontology c) fairness d) rights e) utilitarian Answer: d Difficulty: Easy Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 9) The pursuit of the “American dream” and our ability to choose our religious orientation is a reflection of the _________ approach. a) common good b) deontology c) fairness d) rights e) utilitarian Answer: d Difficulty: Medium Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Application Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 10) The _________ approach posits that ethical actions treat all human beings equally, or, if unequally, then fairly, based on some defensible standard. a) common good b) deontology c) fairness d) rights e) utilitarian Answer: c
Rainer, Information System, Fifth Canadian Edition Testbank Difficulty: Easy Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 11) The debate over CEO salaries being so much higher than other employees is an issue addressed by the _________ approach. a) common good b) deontology c) fairness d) rights e) utilitarian Answer: c Difficulty: Medium Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Analysis Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 12) The _________ approach highlights the interlocking relationships that underlie all societies. a) common good b) deontology c) fairness d) rights e) utilitarian Answer: a Difficulty: Easy Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard 1 : AACSB || Ethics
Rainer, Information System, Fifth Canadian Edition Testbank Standard 2 : AACSB || Technology 13) Obamacare was created to address the _________ approach. a) common good b) deontology c) fairness d) rights e) utilitarian Answer: a Difficulty: Hard Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Evaluation Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 14) The _________ approach states that the morality of an action is based on whether the action itself is right or wrong under a series of rules, rather than based on the consequences of that action. a) common good b) deontology c) fairness d) rights e) utilitarian Answer: b Difficulty: Easy Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 15) Suppose that you believe that killing someone is wrong even if it is self-defense. This is an example of the _________ approach.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Rainer, Information System, Fifth Canadian Edition Testbank a) common good b) deontology c) fairness d) rights e) utilitarian Answer: b Difficulty: Medium Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Knowledge, Evaluation Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 16) _________ is the first step in the general framework for ethics. a) Act and reflect on the outcome of your decision b) Evaluate alternative actions c) Get the facts d) Make a decision and test it e) Recognize an ethical issue Answer: e Difficulty: Easy Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 17) _________ is the second step in the general framework for ethics. a) Act and reflect on the outcome of your decision b) Evaluate alternative actions c) Get the facts d) Make a decision and test it e) Recognize an ethical issue Answer: c
Rainer, Information System, Fifth Canadian Edition Testbank Difficulty: Easy Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 18) _________ is the third step in the general framework for ethics. a) Act and reflect on the outcome of your decision b) Evaluate alternative actions c) Get the facts d) Make a decision and test it e) Recognize an ethical issue Answer: b Difficulty: Easy Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 19) _________ is the fourth step in the general framework for ethics. a) Act and reflect on the outcome of your decision b) Evaluate alternative actions c) Get the facts d) Make a decision and test it e) Recognize an ethical issue Answer: d Difficulty: Easy Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology
Rainer, Information System, Fifth Canadian Edition Testbank 20) _________ is the final step in the general framework for ethics. a) Act and reflect on the outcome of your decision b) Evaluate alternative actions c) Get the facts d) Make a decision and test it e) Recognize an ethical issue Answer: a Difficulty: Easy Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 21) _________ means that you accept the consequences of your decisions and actions. a) Accountability b) Answerability c) Liability d) Responsibility Answer: d Difficulty: Easy Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 22) Suppose you only study two hours for your next test. If you understand that means you may not do well on that test and you are willing to accept the lower grade, it means you are taking _________ for your actions. a) accountability b) answerability c) liability d) responsibility
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Rainer, Information System, Fifth Canadian Edition Testbank Answer: d Difficulty: Medium Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Application Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 23) _________ refers to determining who is responsible for actions that were taken. a) Accountability b) Answerability c) Liability d) Responsibility Answer: a Difficulty: Easy Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 24) Suppose you only study two hours for your next test. You fail the test and tell the teacher that he or she obviously did a really terrible job teaching the material. This means you aren’t accepting _________ for your actions. a) accountability b) answerability c) liability d) responsibility Answer: a Difficulty: Medium Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Application
Rainer, Information System, Fifth Canadian Edition Testbank Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 25) _________ is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems. a) Accountability b) Answerability c) Liability d) Responsibility Answer: c Difficulty: Easy Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 26) Suppose you slip in the hallway and break your arm. You sue the school for not properly marking the wet spot that caused you to slip. This is an example of ________. a) accountability b) answerability c) liability d) responsibility Answer: c Difficulty: Medium Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Application Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 27) _________ is the most recent example of ethical misbehavior in organizations. a) Enron b) Tyco
Rainer, Information System, Fifth Canadian Edition Testbank c) Wells Fargo bank d) WorldCom Answer: c Difficulty: Medium Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 28) The Sarbanes-Oxley Act requires publicly held companies to implement _________ controls; it was passed to address the _________ crisis. a) financial; Enron b) financial; Wells Fargo bank c) operational; Enron d) operational; Wells Fargo bank Answer: a Difficulty: Hard Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 29) _________ issues involve collecting, storing, and disseminating information about individuals. a) Accessibility b) Accuracy c) Privacy d) Property Answer: c Difficulty: Easy Section Reference 1: 3.1
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Rainer, Information System, Fifth Canadian Edition Testbank Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 30) _________ issues involve the authenticity, fidelity, and correctness of information that is collected and processed. a) Accessibility b) Accuracy c) Privacy d) Property Answer: b Difficulty: Easy Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 31) You can check your credit report annually for free through TransUnion, Equifax, and Experian. This allows you to catch signs of identity theft early and note any problems in your credit reports. This is an example of an ethical issue that falls into the category of ________. a) accessibility b) accuracy c) privacy d) property Answer: b Difficulty: Hard Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Evaluation Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology
Rainer, Information System, Fifth Canadian Edition Testbank 32) _________ issues involve the ownership and value of information. a) Accessibility b) Accuracy c) Privacy d) Property Answer: d Difficulty: Easy Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 33) _________ issues revolve around who should have access to information and whether they should pay a fee for this access. a) Accessibility b) Accuracy c) Privacy d) Property Answer: a Difficulty: Easy Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 34) Companies like Google and Facebook make their money by selling your information to advertisers. This is an example of an ethical issue that falls into the category of ________. a) accessibility b) accuracy c) privacy d) property Answer: a
Rainer, Information System, Fifth Canadian Edition Testbank Difficulty: Hard Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Evaluation Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 35) Which of the following is a privacy issue? a) How can we ensure that the information will be processed properly and presented accurately to users? b) How should we handle illegally copying copyrighted software? c) What information about oneself should an individual be required to reveal to others? d) What information does a person or an organization have a right to obtain, under what conditions, and with what safeguards? Answer: c Difficulty: Hard Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Analysis Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 36) Which of the following is an accuracy issue? a) How can we ensure that the information will be processed properly and presented accurately to users? b) How should we handle illegally copying copyrighted software? c) What information about oneself should an individual be required to reveal to others? d) What information does a person or an organization have a right to obtain, under what conditions, and with what safeguards? Answer: a Difficulty: Medium Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Analysis
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Rainer, Information System, Fifth Canadian Edition Testbank Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 37) Which of the following is a property issue? a) How can we ensure that the information will be processed properly and presented accurately to users? b) How should we handle illegally copying copyrighted software? c) What information about oneself should an individual be required to reveal to others? d) What information does a person or an organization have a right to obtain, under what conditions, and with what safeguards? Answer: b Difficulty: Medium Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Analysis Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 38) Which of the following is an accessibility issue? a) How can we ensure that the information will be processed properly and presented accurately to users? b) How should we handle illegally copying copyrighted software? c) What information about oneself should an individual be required to reveal to others? d) What information does a person or an organization have a right to obtain, under what conditions, and with what safeguards? Answer: d Difficulty: Medium Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Analysis Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 39) Which of the following is a privacy issue?
Rainer, Information System, Fifth Canadian Edition Testbank a) How can we ensure that errors in databases, data transmissions, and data processing are accidental and not intentional? b) How much should companies charge for permitting access to information in their databases? c) Under what circumstances can one use proprietary databases? d) What information about individuals should be kept in databases, and how secure is the information there? Answer: d Difficulty: Hard Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Analysis Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 40) Which of the following is an accuracy issue? a) How can we ensure that errors in databases, data transmissions, and data processing are accidental and not intentional? b) How much should companies charge for permitting access to information in their databases? c) Under what circumstances can one use proprietary databases? d) What information about individuals should be kept in databases, and how secure is the information there? Answer: a Difficulty: Medium Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Analysis Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 41) Which of the following is a property issue? a) How can we ensure that errors in databases, data transmissions, and data processing are accidental and not intentional? b) How much should companies charge for permitting access to information in their databases? c) Under what circumstances can one use proprietary databases? d) What information about individuals should be kept in databases, and how secure is the information there?
Rainer, Information System, Fifth Canadian Edition Testbank Answer: c Difficulty: Medium Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Analysis Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 42) Which of the following is an accessibility issue? a) How can we ensure that errors in databases, data transmissions, and data processing are accidental and not intentional? b) How much should companies charge for permitting access to information in their databases? c) Under what circumstances can one use proprietary databases? d) What information about individuals should be kept in databases, and how secure is the information there? Answer: b Difficulty: Medium Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Analysis Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 43) ________ can identify which clicks and key words had the largest impact on a consumer’s purchasing decision. a) DoubleClick b) Google Analytics c) Google Attribution d) Periscope Data Analysis Answer: C Difficulty: Easy Section Reference 1: IT’s About Business 3.1 Learning Objective 1: 3.1 Bloomcode: Knowledge Standard: AACSB || Technology
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Rainer, Information System, Fifth Canadian Edition Testbank 44) What does recent data from the U.S. Census Bureau indicate about consumer habits? a) The majority of shopping takes place online at retailers such as Amazon and Alibaba. b) The majority of shopping takes place offline, in brick-and-mortar stores. c) Online versus offline shopping habits remain relatively evenly distributed. d) The rise in popularity for consumer-to-consumer selling, such as Facebook Marketplace and Craigslist, has made it difficult to get accurate data about consumer shopping habits. Answer: B Difficulty: Medium Section Reference 1: IT’s About Business 3.1 Learning Objective 1: 3.1 Bloomcode: Application Standard: AACSB || Technology 45) What is considered to be the “holy grail” of online advertising? a) Being able to determine repeat customers to an online retailer b) Being able to determine exact spending habits of the 18-35 year old demographic c) Being able to determine which Web browsers elicit the most ad revenue d) Being able to determine purchases generated by online ad campaigns Answer: D Difficulty: Easy Section Reference 1: IT’s About Business 3.1 Learning Objective 1: 3.1 Bloomcode: Comprehension Standard: AACSB || Technology 46) _______ is a mobile, Web-based study application used by half of all high school students and one-third of all college students in the United States. a) Brainly b) Dropbox c) Google Docs d) Quizlet Answer: D Difficulty: Easy Section Reference 1: IT’s About Business 3.2 Learning Objective 1: 3.1
Rainer, Information System, Fifth Canadian Edition Testbank Bloomcode: Knowledge Standard: AACSB || Technology 47) The issues that came up in the Quizlet/Texas Christian University cheating scandal in 2018 highlighted the need for ____________. a) more Web-based study tools to be available to students of all socioeconomic backgrounds. b) universities to adapt to the changing nature of technology as it pertains to the ways in which students are learning. c) widespread reform in terms of Internet access on college campuses. d) colleges to revise their Codes of Conduct to eliminate the ambiguity in students using opensource study tools. Answer: B Difficulty: Medium Section Reference 1: IT’s About Business 3.2 Learning Objective 1: 3.1 Bloomcode: Application Standard: AACSB || Technology 48) _________ is NOT an example of a data aggregator. a) Acxiom b) ChoicePoint c) Google d) LexisNexis Answer: c Difficulty: Easy Section Reference 1: 3.2 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 49) Companies purchase digital dossiers to ________. a) create customer intimacy b) engage in electronic surveillance c) evaluate the competition
Rainer, Information System, Fifth Canadian Edition Testbank d) track their own reputations Answer: a Difficulty: Medium Section Reference 1: 3.2 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 50) Photo tagging is a type of _________ technology. a) facial recognition b) GPS c) information privacy d) RFID Answer: a Difficulty: Easy Section Reference 1: 3.2 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 51) The _________ model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected. a) opt-in b) opt-out c) sign-up d) sign-out Answer: b Difficulty: Easy Section Reference 1: 3.2 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Knowledge
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Rainer, Information System, Fifth Canadian Edition Testbank Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 52) The _________ model of informed consent prohibits an organization from collecting any personal information unless the customer specifically authorizes it. a) opt-in b) opt-out c) sign-up d) sign-out Answer: a Difficulty: Easy Section Reference 1: 3.2 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 53) Companies prefer the _________ model of informed consent. a) opt-in b) opt-out c) sign-up d) sign-out Answer: b Difficulty: Hard Section Reference 1: 3.2 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Evaluation Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 54) Europeans and privacy advocates prefer the _________ model of informed consent. a) opt-in b) opt-out c) sign-up
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Rainer, Information System, Fifth Canadian Edition Testbank d) sign-out Answer: a Difficulty: Hard Section Reference 1: 3.2 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Evaluation Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 55) License plate reader companies maintain that only two groups can use their software to find the owner of a car: law enforcement agencies and ______ companies. a) advertising b) insurance c) loan d) repossession Answer: D Difficulty: Easy Section Reference 1: IT’s About Business 3.3 Learning Objective 1: 3.2 Bloomcode: Knowledge Standard: AACSB || Technology 56) While law enforcement officials, insurance companies, and automakers might be proponents of LPR companies and the technology they use, private citizens are largely concerned with _______. a) issues of privacy b) elimination of certain jobs that the technology replaces c) increased costs of things like municipal fees and fines and insurance premiums d) the Department of Motor Vehicles’ access to this information Answer: A Difficulty: Medium Section Reference 1: IT’s About Business 3.3 Learning Objective 1: 3.2 Bloomcode: Application Standard: AACSB || Technology
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Rainer, Information System, Fifth Canadian Edition Testbank 57) Aadhaar is a _______ database. a) biometric b) credit card c) password d) security Answer: A Difficulty: Easy Section Reference 1: IT’s About Business 3.4 Learning Objective 1: 3.2 Bloomcode: Knowledge Standard: AACSB || Technology 58) ________ implemented a biometric database to better serve its poor citizens. a) Australia b) China c) India d) Russia Answer: C Difficulty: Easy Section Reference 1: IT’s About Business 3.4 Learning Objective 1: 3.2 Bloomcode: Knowledge Standard: AACSB || Technology 59) Which is NOT a current negative consequence of Aadhaar? a) People were unfairly dropped from food subsidiary lists. b) People have been dropped from life insurance programs. c) Millions of users’ information has been leaked to non-government entities. d) Government agencies have wrongfully published welfare beneficiaries’ information. Answer: B Difficulty: Easy Section Reference 1: IT’s About Business 3.4 Learning Objective 1: 3.2 Bloomcode: Comprehension Standard: AACSB || Technology 60) Some are concerned that the use of Aadhaar’s information will further impede _________.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Rainer, Information System, Fifth Canadian Edition Testbank a) tax collection b) access to the Internet c) social mobility d) government transparency Answer: C Difficulty: Easy Section Reference 1: IT’s About Business 3.4 Learning Objective 1: 3.2 Bloomcode: Comprehension Standard: AACSB || Technology 61) The Facebook and Cambridge Analytica scandal occurred in ______; the problem started in ______. a) 2016; 2010 b) 2016; 2017 c) 2018; 2010 d) 2018; 2017 Answer: C Difficulty: Easy Section Reference 1: IT’s About Business 3.5 Learning Objective 1: 3.2 Bloomcode: Knowledge Standard: AACSB || Technology 62) The Cambridge Analytica scandal involved ______ user data. a) Amazon b) Facebook c) Google d) Twitter Answer: B Difficulty: Easy Section Reference 1: IT’s About Business 3.5 Learning Objective 1: 3.2 Bloomcode: Knowledge Standard: AACSB || Technology
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Rainer, Information System, Fifth Canadian Edition Testbank 63) Cambridge Analytica’s data collection of Facebook users has been used to impact and affect which area the most? a) Politics b) Retail c) Banking and finance d) Education Answer: A Difficulty: Easy Section Reference 1: IT’s About Business 3.5 Learning Objective 1: 3.2 Bloomcode: Comprehension Standard: AACSB || Technology Question type: True/False 64) When a patient is admitted to a hospital emergency room, the physician may have never seen them before, and must diagnose their problem quickly. If the physician knew the patient’s medical history, then the examination and subsequent diagnosis would be faster. To address this problem, the Government of Canada created Canada Health Infoway. Answer: True Difficulty: Easy Section Reference 1: Closing Case Learning Objective 1: 3.2 Bloomcode: Knowledge Standard: AACSB || Technology Question type: Multiple Choice 65) In Canada. Doctors across the country now use electronic medical records to access patient information online. Medical data is private, confidential data. There are three provinces that had privacy laws that are considered similar enough to PIPEDA to be used instead: . a) Alberta, British Columbia, and Ontario b) Alberta, British Columbia, and Quebec c) Alberta, British Columbia, and Manitoba d) Alberta, Quebec, and Nova Scotia Answer: B Difficulty: Easy Section Reference 1: Closing Case Learning Objective 1: 3.2
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Rainer, Information System, Fifth Canadian Edition Testbank Bloomcode: Knowledge Standard: AACSB || Technology 66) One source of data used for medical and pharmaceutical research is anonymized health data. IQVIA Biotech (www.iqviabiotech.com) is a company that sells data to pharmaceutical industry when physicians and clinics have given permission and patient’s data is striped of names and other personal information. Why is this legal and does not violate Canadian legislation? a) Such anonymized data is not covered by privacy legislation. b) Because physicians and clinics are giving permission c) Once data is collected by Doctors, they own the data and not patients d) Privacy laws do not apply to a clinic’s data Answer: A Difficulty: Easy Section Reference 1: Closing Case Learning Objective 1: 3.2 Bloomcode: Knowledge Standard: AACSB || Technology 67) What was the result of E-Health Saskatchewan tracking access to the health records for the privacy of the victims of the Humboldt Broncos junior hockey team bus crash of April 2018? a) Several Doctors lost their license as a result of this tracking effort. . b) Clinics were charged for selling private medical records to insurance companies. c) Several doctors and an office manager were charged with inappropriately accessing the team’s medical records during April and May 2018. d) E-Health Saskatchewan was charged with invasion of privacy by Doctors and Clinics. Answer: C Difficulty: Medium Section Reference 1: Closing Case Learning Objective 1: 3.2 Bloomcode: Application Standard: AACSB || Technology 68) Besides doctors and medical clinics that are gathering electronic health information, who else is gathering health information?. a) The manufactures of smartphones, tablets, and personal technology such as Fitbit b) Gyms gather information on users c) Car manufacturers gather health information of drivers d) Walmart monitors and gathers health of information of consumers
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Rainer, Information System, Fifth Canadian Edition Testbank Answer: A Difficulty: Medium Section Reference 1: Closing Case Learning Objective 1: 3.2 Bloomcode: Application Standard: AACSB || Technology Question type: True/False 69) When you use an Internet app, the app could also have access to your data Answer: True Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Define ethics and explain its three fundamental tenets and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard: AACSB || Technology 70) When you use your email, or an Internet browser, the advertisements change rapidly in response to your searches in Google. Answer: True Difficulty: Easy Section Reference 1: Opening Case Learning Objective 1: Define ethics and explain its three fundamental tenets and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard: AACSB || Technology 71) Deciding what is right or wrong is always easy and clear-cut. Answer: False Difficulty: Easy Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard 1 : AACSB || Ethics
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Rainer, Information System, Fifth Canadian Edition Testbank Standard 2 : AACSB || Technology 72) What is unethical is not necessarily illegal. Answer: True Difficulty: Easy Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 73) If it is unethical, it is illegal. Answer: False Difficulty: Easy Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 74) All unethical actions are illegal in the United States. Answer: False Difficulty: Easy Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 75) All employees have a responsibility to encourage ethical uses of information and information technology. Answer: True
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Rainer, Information System, Fifth Canadian Edition Testbank Difficulty: Medium Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 76) You check your credit report annually to ensure your identity hasn’t been stolen. This is an example of a property issue. Answer: False Difficulty: Medium Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Analysis Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 77) Google and Facebook collect, store, and disseminate a great deal of information about the people who use their websites. This is an example of an accuracy issue. Answer: False Difficulty: Medium Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Application Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 78) Telemarketing and ads on Google are examples of accessibility issues. Answer: True Difficulty: Hard Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Rainer, Information System, Fifth Canadian Edition Testbank Bloomcode: Evaluation Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 79) Google can analyze offline purchase activity even when consumers deactivate location tracking on their smartphones. Answer: True Difficulty: Easy Section Reference 1: IT’s About Business 3.1 Learning Objective 1: Define ethics and explain its three fundamental tenets and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard: AACSB || Technology 80) Privacy experts agree with Google that Google’s double-blind encryption ensures the privacy and security of consumer information. Answer: False Difficulty: Medium Section Reference 1: IT’s About Business 3.1 Learning Objective 1: Define ethics and explain its three fundamental tenets and the four categories of ethical issues related to information technology. Bloomcode: Comprehension Standard: AACSB || Technology 81) Credit card data is only helpful to online retailers and publishers if those cards are used for purchasing items online; they do not provide relevant information for brick-and-mortar purchases. Answer: False Difficulty: Medium Section Reference 1: IT’s About Business 3.1 Learning Objective 1: Define ethics and explain its three fundamental tenets and the four categories of ethical issues related to information technology. Bloomcode: Comprehension Standard: AACSB || Technology
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Rainer, Information System, Fifth Canadian Edition Testbank 82) The suspended Texas Christian University (TCU) students won their battle against TCU because there was not enough evidence to prove they had cheated using Quizlet. Answer: True Difficulty: Medium Section Reference 1: IT’s About Business 3.2 Learning Objective 1: Define ethics and explain its three fundamental tenets and the four categories of ethical issues related to information technology. Bloomcode: Comprehension Standard: AACSB || Technology 83) Quizlet’s community guidelines explicitly prohibit cheating. Answer: True Difficulty: Easy Section Reference 1: IT’s About Business 3.2 Learning Objective 1: Define ethics and explain its three fundamental tenets and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard: AACSB || Technology 84) One thing that the popularity of open source and online studying resources has uncovered is that what learning looks like in many areas of study has drastically changed. Answer: True Difficulty: Easy Section Reference 1: IT’s About Business 3.2 Learning Objective 1: Define ethics and explain its three fundamental tenets and the four categories of ethical issues related to information technology. Bloomcode: Comprehension Standard: AACSB || Technology 85) Privacy rights apply only to individuals. Answer: False Difficulty: Medium Section Reference 1: 3.2 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Knowledge
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Rainer, Information System, Fifth Canadian Edition Testbank Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 86) Privacy rights apply to individuals, groups, and institutions. Answer: True Difficulty: Easy Section Reference 1: 3.2 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 87) The right to privacy is recognized today in all the US states and by the federal government, either by statute or in common law. Answer: True Difficulty: Hard Section Reference 1: 3.2 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 88) The right of privacy is absolute. Answer: False Difficulty: Medium Section Reference 1: 3.2 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 89) The right of privacy is not absolute.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Rainer, Information System, Fifth Canadian Edition Testbank Answer: True Difficulty: Medium Section Reference 1: 3.2 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 90) Privacy must be balanced against the needs of society. Answer: True Difficulty: Medium Section Reference 1: 3.2 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 91) The public’s right to know supersedes the individual’s right of privacy. Answer: True Difficulty: Medium Section Reference 1: 3.2 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 92) The public’s right to know isn’t as important as the individual’s right of privacy. Answer: True Difficulty: Medium Section Reference 1: 3.2 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Knowledge
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Rainer, Information System, Fifth Canadian Edition Testbank Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 93) Advancements in information technology make privacy harder to manage. Answer: True Difficulty: Medium Section Reference 1: 3.2 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Analysis Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 94) Data aggregators can collect public and non-public information to create digital dossiers. Answer: True Difficulty: Medium Section Reference 1: 3.2 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 95) Smartphones are sensors that can be used for electronic surveillance. Answer: True Difficulty: Easy Section Reference 1: 3.2 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 96) The United Nations ensures privacy laws are consistent across countries so that it is easier to do business in multiple countries.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Rainer, Information System, Fifth Canadian Edition Testbank Answer: False Difficulty: Easy Section Reference 1: 3.2 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 97) The European Union has stricter data protection laws than the US. Answer: True Difficulty: Medium Section Reference 1: 3.2 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 98) The city of Boston suspended its license plate reader program because it accidently revealed information to a newspaper. Answer: True Difficulty: Easy Section Reference 1: IT’s About Business 3.3 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Knowledge Standard: AACSB || Technology 99) Vigilant makes money by charging police departments for license plate readers and access to its databases. Answer: False Difficulty: Easy Section Reference 1: IT’s About Business 3.3 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Rainer, Information System, Fifth Canadian Edition Testbank Bloomcode: Knowledge Standard: AACSB || Technology 100) The Driver’s Privacy Protection Act of 1994 does not limit who can access information about automobile registrations and drivers, only what information can be used for. Answer: False Difficulty: Medium Section Reference 1: IT’s About Business 3.3 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Analysis Standard: AACSB || Technology 101) Critics view Aadhaar as a step toward a surveillance state. Answer: True Difficulty: Easy Section Reference 1: IT’s About Business 3.4 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Knowledge Standard: AACSB || Technology 102) As anticipated by Aadhaar’s opponents, the Supreme Court found that Aadhaar violates privacy rights. Answer: False Difficulty: Easy Section Reference 1: IT’s About Business 3.4 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Knowledge Standard: AACSB || Technology 103) The origination of Aadhaar was from a benevolent place: identifying impoverished Indians so that they could be documented and therefore receive government benefits.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Rainer, Information System, Fifth Canadian Edition Testbank Answer: True Difficulty: Easy Section Reference 1: IT’s About Business 3.4 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Comprehension Standard: AACSB || Technology 104) According to Facebook executives, the Facebook and Cambridge Analytica scandal occurred because hackers got access to the database by stealing key passwords from users. Answer: False Difficulty: Easy Section Reference 1: IT’s About Business 3.5 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Knowledge Standard: AACSB || Technology 105) Facebook’s main legal battles are against Russia. Answer: False Difficulty: Easy Section Reference 1: IT’s About Business 3.5 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Knowledge Standard: AACSB || Technology 106) Much of the discovery of the ways in which Cambridge Analytica and Facebook were misusing user data came from the Pew Research Center. Answer: False Difficulty: Easy Section Reference 1: IT’s About Business 3.5 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Comprehension Standard: AACSB || Technology
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Rainer, Information System, Fifth Canadian Edition Testbank 107) Facebook has been harshly fined and has undergone massive restructuring as a result of the discovery of the Cambridge Analytica scandal. Answer: False Difficulty: Medium Section Reference 1: IT’s About Business 3.5 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Application Standard: AACSB || Technology Question type: Text Entry 108) _____ refers to the principles of right and wrong that individuals use to make choices that guide their behavior. Answer: Ethics Difficulty: Easy Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 109) The utilitarian approach states that an ethical action is the one that provides the most ___ or does the least ___. Answer 1: good Answer 2: harm Difficulty: Easy Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Rainer, Information System, Fifth Canadian Edition Testbank 110) The fairness approach posits that ethical actions treat all human beings equally, or, if unequally, then fairly, based on some ___. Answer: defensible standard Difficulty: Medium Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 111) The common good approach highlights the ___ relationships that underlie all societies. Answer: interlocking Difficulty: Medium Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 112) The deontology approach states that the morality of an action is based on whether that action itself is right or wrong under a series of rules, rather than based on the ___ of that action. Answer: consequences Difficulty: Easy Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 113) ___ is the right to be left alone and to be free of unreasonable personal intrusions. Answer: Privacy
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Rainer, Information System, Fifth Canadian Edition Testbank Difficulty: Easy Section Reference 1: 3.2 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 114) Privacy is the right to be ___ and to be free of unreasonable personal intrusions. Answer: left alone Difficulty: Medium Section Reference 1: 3.2 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 115) Information privacy is the right to determine when, and to what extent, ___ about you can be gathered or communicated to others. Answer: information Difficulty: Medium Section Reference 1: 3.2 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 116) ___ is the right to determine when, and to what extent, information about you can be gathered or communicated to others. Answer: Information privacy Difficulty: Easy Section Reference 1: 3.2 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Knowledge
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Rainer, Information System, Fifth Canadian Edition Testbank Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology 117) The process of forming a digital dossier is called ___. Answer: profiling Difficulty: Easy Section Reference 1: 3.2 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Knowledge Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology Question type: Essay 118) What is ethics? Is an ethical decision easy and clear-cut? Why or why not? List and describe the five widely used ethical standards/frameworks. Evaluate a SINGLE ethical scenario with all five approaches. Answer: Difficulty: Hard Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Synthesis, Evaluation Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology Standard 3 : AACSB || Communication Standard 4 : AACSB || Analytic Standard 5 : AACSB || Reflective Thinking Solution: Ethics – principles of right and wrong that individuals use to make choices that guide their behavior No because an answer could be different based on the approach chosen 1) Utilitarian approach states that an ethical action is the one that provides the most good or does the least harm; a policeman killing a person who is holding others hostage is best for those being held hostage 2) Rights approach maintains that an ethical action is the one that best protects and respects the moral rights of the affected parties; nobody should be killed because everyone has the right to live 3) Fairness approach posits that ethical actions treat all human beings equally, or, if unequally,
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Rainer, Information System, Fifth Canadian Edition Testbank then fairly, based on some defensible standard; killing someone who is holding others hostage is fair because people know it isn’t right to threaten the lives of others 4) Common good approach highlights the interlocking relationships that underlie all societies; the police being on-scene is for the best of everyone – they have the right to kill under these circumstances 5) Deontology approach states that the morality of an action is based on whether than action itself is right or wrong under a series of rules, rather than based on the consequences of that action; it is never OK to kill a person even if they are being “bad” 119) The concept of “green IT” is an ethical decision every company needs to make. Using the five steps in the general framework for ethical decision-making, how would you handle the situation if you were the CEO? Answer: Difficulty: Medium Section Reference 1: 3.1 Learning Objective 1: Define ethics, its three fundamental tenets, and the four categories of ethical issues related to information technology. Bloomcode: Application Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology Standard 3 : AACSB || Communication Standard 4 : AACSB || Reflective Thinking Solution: 1) Recognize an ethical issue – could not being green damage the environment? What are the good and bad alternatives for being green? Are there legal requirements for being green (energy consumption, pollution, etc.) ? 2) Get the facts – what area will be hurt by non-green activities (water, air, land)? Sufficient information? Who has a stake (environmental groups, customers, suppliers)? Have I consulted those people? 3) Evaluate alternative actions – 5 approaches – utilitarian, rights, fairness, common good, deontology 4) Make a decision and test it – pick an option 5) Act and reflect on the outcome of your decision – am I taking better care of the environment? 120) Describe five ways a digital dossier is created. Describe a potential profile that has been created for your life. Answer: Difficulty: Hard Section Reference 1: 3.2 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Rainer, Information System, Fifth Canadian Edition Testbank Bloomcode: Synthesis Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology Standard 3 : AACSB || Communication Standard 4 : AACSB || Reflective Thinking Solution: Surveillance cameras on roads or in buildings, credit card transactions, telephone calls, banking transactions, queries to search engines, government records Potential profile – many schools have cameras and many towns have cameras at intersections to record what students are doing at school or on the road (students may also have ID badges that are required to get into buildings) ; many students already have credit cards so purchases are tracked, all activity on phones can be tracked including phone calls and text messages, many students are already doing online banking, all Internet searching is tracked, students may also talk about traveling, Facebook activity (photo tagging) , etc., basically, everything we do can be tracked 121) Who conducts electronic surveillance? What types of electronic surveillance impact your life? Are you paranoid about this? If not, should you be? Explain why or why not for these last two questions. Answer: Difficulty: Medium Section Reference 1: 3.2 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Application Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology Standard 3 : AACSB || Communication Standard 4 : AACSB || Reflective Thinking Solution: Cameras at many public venues, digital sensors everywhere (smartphones have many capabilities now), ID cards, webcams, video-game motion sensors, satellite photos, biometric readers, GPS, facial recognition technology (and photo tagging), in-store digital billboards that watch activity, drones, URL filtering, etc. 122) How does the Internet create a conflict between free speech and privacy? Answer: Difficulty: Medium Section Reference 1: 3.2 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Analysis
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Rainer, Information System, Fifth Canadian Edition Testbank Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology Standard 3 : AACSB || Communication Standard 4 : AACSB || Reflective Thinking Solution: Easy to be anonymous and derogatory with no basis of fact and no recourse; companies can check the Internet on potential and current employees, but people may not be able to defend themselves (could harm chances of getting hired or could result in getting fired). 123) Given the global nature of our economy, what are the international aspects of privacy that we need to consider in our business dealings? Answer: Difficulty: Easy Section Reference 1: 3.2 Learning Objective 1: Discuss at least one potential threat to the privacy of the data stored in each of three places that store personal data. Bloomcode: Comprehension Standard 1 : AACSB || Ethics Standard 2 : AACSB || Technology Standard 3 : AACSB || Communication Solution: 50 countries have data protection laws Some countries have stricter laws (Europe) No consistent or uniform standards for privacy and security – obstructs flow of information among countries (transborder data flows) Privacy issues – whose laws do you follow? Come up with “safe harbor” frameworks for regulation
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help