Deck 3: Ethics and Privacy

ملء الشاشة (f)
exit full mode
سؤال
Privacy is the right to be left alone and to be free of unreasonable personal intrusions.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Facebook's CEO believes privacy is no longer a social norm.
سؤال
Determining whose laws should be followed is a problem related to the international aspects of privacy.
سؤال
The ____________ ethical standard states that an ethical action is the one that provides the most good or does the least harm.

A)Common good
B)Fairness
C)Rights
D)Utilitarian
E)Well-being
سؤال
When you interview for a job at a company, it is likely that the company will google you and search social networking sites for information on you.
سؤال
The opt-out model of informed consent allows a company to collect personal information until the customers specifically requests otherwise.
سؤال
If something is unethical, that means it is illegal.
سؤال
A code of ethics is a collection of principles that are intended to guide decision making by members of the organization.
سؤال
Property issues involve the ownership and value of information.
سؤال
An individual or organization faced with an ethical decision is basically considering whether to break the law.
سؤال
The right of privacy is absolute.
سؤال
The flow of information among countries is called transborder data flows.
سؤال
The Platform for Privacy Preferences automatically communicates privacy policies between a commerce Web site and its visitors to that site.
سؤال
Which of the following allows users to take pictures or record videos that can self-destruct after a set amount of time and send them to a selected recipients?

A)Wickr
B)Burn Note
C)Tapad
D)Snapchat
E)Disconnect
سؤال
When you access a website, the site could also have access to your data.
سؤال
The individual's right of privacy supersedes the public's right to know.
سؤال
Improvements in information technologies are leading to a decreasing number of ethical problems.
سؤال
Which of the following the smartphone apps allows the user to send a video that will be automatically deleted after a limited time without leaving any trace of it?

A)Wickr
B)Burn Note
C)Tapad
D)Silent Circle
E)Disconnect
سؤال
Most electronic surveillance of employees is legal.
سؤال
In general, employees have high legal protection against surveillance by employers.
سؤال
_____________ means accepting the consequences of your decisions and actions.

A)Privacy
B)Responsibility
C)Transferability
D)Accountability
E)Liability
سؤال
____________ means that you accept the consequences of your decisions and actions.

A)Accountability
B)Due process
C)Liability
D)Responsibility
سؤال
The _______________ approach maintains that the most ethical action is the one that provides the most good or does the least harm.

A)Common good
B)Fairness
C)Rights
D)Utilitarian
سؤال
The Sarbanes-Oxley Act in 2002 requires publicly held companies to implement ________ controls.

A)ethical
B)financial
C)security
D)technology
سؤال
_____ issues involve who may obtain information and how much they should pay for this information.

A)Privacy
B)Accuracy
C)Transferability
D)Property
E)Accessibility
سؤال
The _______________ ethical standard states that respect and compassion for all others is the basis for ethical actions.

A)Common good
B)Fairness
C)Rights
D)Utilitarian
E)Well-being
سؤال
The ____________ ethical standard states that an ethical action is the one that best protects and respects the moral rights of the affected parties.

A)Common good
B)Fairness
C)Rights
D)Utilitarian
E)Well-being
سؤال
____________ issues revolve around who should have access to information and whether they should have to pay for this access.

A)Accessibility
B)Accuracy
C)Privacy
D)Property
سؤال
______________ is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems.

A)Privacy
B)Responsibility
C)Transferability
D)Accountability
E)Liability
سؤال
Which of the following is not a step in ethical decision making?

A)Recognize the ethical issue.
B)Get the facts.
C)Evaluate alternative actions.
D)Make a decision and test it.
E)All of these are steps in ethical decision making.
سؤال
_____ issues involve the authenticity and fidelity of information that is collected and processed.

A)Privacy
B)Accuracy
C)Transferability
D)Property
E)Accessibility
سؤال
______________ determines who is responsible for the actions taken.

A)Privacy
B)Responsibility
C)Transferability
D)Accountability
E)Liability
سؤال
Arguing that CEOs make 100 times more than their employees because they have to take more risk than lower-level employees is the ____________ approach.

A)Common good
B)Fairness
C)Rights
D)Utilitarian
سؤال
Various organizations that promote fair and responsible use of information systems often develop a _____.

A)Code of ethics
B)Strategic plan
C)Mission statement
D)Responsibility charter
E)Goals outline
سؤال
_____ issues involve collecting, storing, and disseminating information about individuals.

A)Privacy
B)Accuracy
C)Transferability
D)Property
E)Accessibility
سؤال
Which of the following is NOT a drawback of photo tagging and geotagging:

A)It is easier for everyone to gather information about you.
B)You are forced to manually un-tag yourself.
C)It is easier to lie about where you've been or what you've been doing.
D)You may experience a certain lack of control over your information.
سؤال
Which of the following is NOT a benefit of photo tagging and geotagging:

A)It is easier for police to track criminals.
B)Criminals can be identified more quickly and accurately.
C)Our purchase history can be tracked so that billboards are more customized.
D)Digital sensors are more efficient so that home security is easier to implement.
سؤال
What is _____ is not necessarily _____.

A)Illegal, unethical
B)Ethical, illegal
C)Unethical, illegal
D)Unethical, legal
E)Ethical, legal
سؤال
Which of the following is not an ethical issue related to IT?

A)Privacy
B)Accuracy
C)Accountability
D)Property (such as intellectual property)
E)Accessibility to information
سؤال
The _____________ ethical standard states that ethical actions treat all human beings equally.

A)Common good
B)Fairness
C)Rights
D)Utilitarian
E)Well-being
سؤال
Shelli runs a small boutique in Tel Aviv. Her intern just came to her with a new design for her Web site. Shelli really likes the design, and she informs the intern that he is quite the artist. The intern responds that he found the design on the Internet. Shelli replies that they can't use it. Her decision reflects which ethical issue related to IT?

A)Privacy
B)Accuracy
C)Accountability
D)Property (such as intellectual property)
E)Accessibility to information
سؤال
Shelli runs a small boutique in Tel Aviv. She accepts credit cards and writes the number on her copy of the receipt in case there is a problem later. This practice involves which ethical issue related to IT?

A)Privacy
B)Accuracy
C)Accountability
D)Property (such as intellectual property)
E)Accessibility to information
سؤال
_____________ is the tracking of people's activities, online or offline, with the aid of computers.

A)Computer spying
B)Data aggregation
C)Electronic surveillance
D)Profiling
سؤال
The public's right to know is ___________ to the individual's right of privacy.

A)equal
B)inferior
C)superior
D)undecided
سؤال
Shelli runs a small boutique in Tel Aviv. She has built up a very nice client base and regularly sends her clients a newsletter. A new bakery business down the block wants to buy Shelli's client list from her. If Shelli does sell the list, which ethical issue related to IT would be involved?

A)Privacy
B)Accuracy
C)Accountability
D)Property (such as intellectual property)
سؤال
The __________ permits the company to collect personal information until the customer specifically requests that the data not be collected.

A)opt-in model
B)opt-out model
C)government
D)privacy code
سؤال
Which of the following statements is correct?

A)An individual's right to privacy is absolute.
B)Determining and enforcing privacy regulations can be difficult.
C)An individual's right to privacy supersedes the needs of society.
D)Advances in information technologies have not affected individual privacy.
E)The Internet has increased individuals' privacy.
سؤال
Shelli runs a small boutique in Tel Aviv. Her intern was checking the boutique's Facebook page and noticed some negative comments. He deleted them. At the end of the day, when they were closing up, he told Shelli about the comments and what he had done. Shelli was not pleased, and she told him so. Why wasn't Shelli pleased?

A)She didn't like hearing anything negative about her store.
B)People are free to say what they wish.
C)She thought he should ask her before he deleted them.
D)He wasn't supposed to be checking Facebook.
E)All of these are reasons for Shelli's not being pleased.
سؤال
Data aggregators sell digital dossiers to companies that want to know their customers better. This practice is called ________.

A)Customer relationships
B)Customer profiling
C)Customer intimacy
D)Customer knowledge
E)Spying
سؤال
Privacy advocates prefer which model of informed consent?

A)Opt-in
B)Opt-out
C)Either A or B
D)Neither A nor B
سؤال
Shelli runs a small boutique in Tel Aviv. She has built up a very nice client base and regularly sends her clients a newsletter. She keeps all her client data on her laptop in a password-protected file. Her decision to protect the file reflects which ethical issue related to IT?

A)Privacy
B)Accuracy
C)Accountability
D)Property (such as intellectual property)
E)Accessibility to information
سؤال
Which of the following statements is not correct?

A)Employees have limited protection against surveillance by employers.
B)The large majority of organizations monitor employee Internet usage.
C)The large majority of organizations use URL filtering.
D)As with normal first-class mail, employers cannot read employee e-mail.
E)Employees should be aware that surveillance is legal.
سؤال
What is the relationship between advances in information technology and the practice of profiling?

A)Advances in IT make it more difficult to profile individuals.
B)Advances in IT have no impact on profiling.
C)Advances in IT make it more expensive to profile individuals.
D)Advances in IT make it easier to profile individuals.
سؤال
Which of the following statements is correct?

A)International privacy and security laws are very consistent.
B)Consistent international privacy and security laws help companies with their regulatory requirements from country to country.
C)Consistent international privacy and security laws enable information to flow freely among countries.
D)The absence of consistent international privacy and security laws has led to a complex global legal framework.
E)Consistent international privacy and security laws are followed by all countries.
سؤال
Privacy rights apply to ______________.

A)groups
B)individuals
C)institutions
D)all of the above
سؤال
How does society keep owners of electronic bulletin boards from disseminating offensive or untrue content? This is a difficult question because it involves the conflict between _____ on the one hand and _____ on the other.

A)The public, the individual
B)The public, ethics
C)Freedom of speech, privacy
D)The individual, freedom of speech
E)Ethics, security
سؤال
Customer intimacy is a(n)__________ outcome of profiling.

A)positive
B)negative
C)neutral
D)inevitable
سؤال
The process of profiling:

A)Increases individual privacy.
B)Decreases individual privacy.
C)Has no effect on individual privacy.
D)Is illegal in more than half of the states.
E)Is legal but unethical.
سؤال
Which of the following is a correct argument on the pros and cons of conveniently sharing information and protecting privacy?

A)We have quick and easy access to our contacts on social networking sites, but it is much easier for stalking to occur.
B)Protecting our privacy is difficult and complicated, even if securing our information makes us feel more comfortable with using the Internet.
C)We need to be careful about what we post online, particularly since it may be difficult to ensure the security of our information on the Internet.
D)All of the above are correct.
سؤال
Shelli runs a small boutique in Tel Aviv. She has built up a very nice client base and regularly sends her clients a newsletter. Clients fill out a form to join her mailing list. Shelli indicates on the form that client information will not be shared without permission. This policy illustrates which ethical issue related to IT?

A)Privacy
B)Accuracy
C)Accountability
D)Property (such as intellectual property)
E)Accessibility to information
سؤال
Which of the following can speedup web surfing ability by blocking any web site that requests for your personal data?

A)Wickr
B)Burn Note
C)Tapad
D)TigerText
E)Disconnect
سؤال
Which of the following allows senders to retrieve messages that they have already sent?

A)Wickr
B)Burn Note
C)Tapad
D)TigerText
E)Disconnect
سؤال
Which of the following provides a secure messaging service?

A)Wickr
B)Burn Note
C)Tapad
D)TigerText
E)Disconnect
سؤال
Discuss the fundamental tenants of ethics: responsibility, accountability, and liability.
سؤال
Explain why something that is unethical might not necessarily be illegal.
سؤال
Which of the following tracks the same consumer across multiple devices as he/she changes devices continuously?

A)Wickr
B)Burn Note
C)Tapad
D)TigerText
E)Disconnect
سؤال
Discuss the two rules of privacy: The right of privacy is not absolute, and the public's right to know supersedes the individual's right to privacy.
سؤال
Which of the following allows users to send encrypted notes that self-destruct after a set amount of time?

A)Wickr
B)Burn Note
C)Tapad
D)TigerText
E)Disconnect
سؤال
Identify and analyze the fundamental ethical issues involved with information technology.
سؤال
Discuss the international aspects of privacy. How do these aspects impact transborder data flows?
سؤال
Compare and contrast the four widely used stands for ethics: utilitarian, rights, fairness, and common good.
سؤال
Which of the following allows users to send military-grade encrypted texts, photos, and videos to other users?

A)Wickr
B)Burn Note
C)Tapad
D)TigerText
E)Disconnect
سؤال
Discuss the relationship between surveillance and privacy.
سؤال
Compare and contrast the two informed consent models: opt-in and opt-out. Why do companies prefer one over the other? Why do privacy advocates prefer one over the other?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/74
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 3: Ethics and Privacy
1
Privacy is the right to be left alone and to be free of unreasonable personal intrusions.
True
2
Facebook's CEO believes privacy is no longer a social norm.
True
3
Determining whose laws should be followed is a problem related to the international aspects of privacy.
True
4
The ____________ ethical standard states that an ethical action is the one that provides the most good or does the least harm.

A)Common good
B)Fairness
C)Rights
D)Utilitarian
E)Well-being
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
5
When you interview for a job at a company, it is likely that the company will google you and search social networking sites for information on you.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
6
The opt-out model of informed consent allows a company to collect personal information until the customers specifically requests otherwise.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
7
If something is unethical, that means it is illegal.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
8
A code of ethics is a collection of principles that are intended to guide decision making by members of the organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
9
Property issues involve the ownership and value of information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
10
An individual or organization faced with an ethical decision is basically considering whether to break the law.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
11
The right of privacy is absolute.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
12
The flow of information among countries is called transborder data flows.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
13
The Platform for Privacy Preferences automatically communicates privacy policies between a commerce Web site and its visitors to that site.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
14
Which of the following allows users to take pictures or record videos that can self-destruct after a set amount of time and send them to a selected recipients?

A)Wickr
B)Burn Note
C)Tapad
D)Snapchat
E)Disconnect
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
15
When you access a website, the site could also have access to your data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
16
The individual's right of privacy supersedes the public's right to know.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
17
Improvements in information technologies are leading to a decreasing number of ethical problems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
18
Which of the following the smartphone apps allows the user to send a video that will be automatically deleted after a limited time without leaving any trace of it?

A)Wickr
B)Burn Note
C)Tapad
D)Silent Circle
E)Disconnect
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
19
Most electronic surveillance of employees is legal.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
20
In general, employees have high legal protection against surveillance by employers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
21
_____________ means accepting the consequences of your decisions and actions.

A)Privacy
B)Responsibility
C)Transferability
D)Accountability
E)Liability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
22
____________ means that you accept the consequences of your decisions and actions.

A)Accountability
B)Due process
C)Liability
D)Responsibility
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
23
The _______________ approach maintains that the most ethical action is the one that provides the most good or does the least harm.

A)Common good
B)Fairness
C)Rights
D)Utilitarian
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
24
The Sarbanes-Oxley Act in 2002 requires publicly held companies to implement ________ controls.

A)ethical
B)financial
C)security
D)technology
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
25
_____ issues involve who may obtain information and how much they should pay for this information.

A)Privacy
B)Accuracy
C)Transferability
D)Property
E)Accessibility
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
26
The _______________ ethical standard states that respect and compassion for all others is the basis for ethical actions.

A)Common good
B)Fairness
C)Rights
D)Utilitarian
E)Well-being
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
27
The ____________ ethical standard states that an ethical action is the one that best protects and respects the moral rights of the affected parties.

A)Common good
B)Fairness
C)Rights
D)Utilitarian
E)Well-being
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
28
____________ issues revolve around who should have access to information and whether they should have to pay for this access.

A)Accessibility
B)Accuracy
C)Privacy
D)Property
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
29
______________ is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems.

A)Privacy
B)Responsibility
C)Transferability
D)Accountability
E)Liability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
30
Which of the following is not a step in ethical decision making?

A)Recognize the ethical issue.
B)Get the facts.
C)Evaluate alternative actions.
D)Make a decision and test it.
E)All of these are steps in ethical decision making.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
31
_____ issues involve the authenticity and fidelity of information that is collected and processed.

A)Privacy
B)Accuracy
C)Transferability
D)Property
E)Accessibility
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
32
______________ determines who is responsible for the actions taken.

A)Privacy
B)Responsibility
C)Transferability
D)Accountability
E)Liability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
33
Arguing that CEOs make 100 times more than their employees because they have to take more risk than lower-level employees is the ____________ approach.

A)Common good
B)Fairness
C)Rights
D)Utilitarian
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
34
Various organizations that promote fair and responsible use of information systems often develop a _____.

A)Code of ethics
B)Strategic plan
C)Mission statement
D)Responsibility charter
E)Goals outline
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
35
_____ issues involve collecting, storing, and disseminating information about individuals.

A)Privacy
B)Accuracy
C)Transferability
D)Property
E)Accessibility
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
36
Which of the following is NOT a drawback of photo tagging and geotagging:

A)It is easier for everyone to gather information about you.
B)You are forced to manually un-tag yourself.
C)It is easier to lie about where you've been or what you've been doing.
D)You may experience a certain lack of control over your information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
37
Which of the following is NOT a benefit of photo tagging and geotagging:

A)It is easier for police to track criminals.
B)Criminals can be identified more quickly and accurately.
C)Our purchase history can be tracked so that billboards are more customized.
D)Digital sensors are more efficient so that home security is easier to implement.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
38
What is _____ is not necessarily _____.

A)Illegal, unethical
B)Ethical, illegal
C)Unethical, illegal
D)Unethical, legal
E)Ethical, legal
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
39
Which of the following is not an ethical issue related to IT?

A)Privacy
B)Accuracy
C)Accountability
D)Property (such as intellectual property)
E)Accessibility to information
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
40
The _____________ ethical standard states that ethical actions treat all human beings equally.

A)Common good
B)Fairness
C)Rights
D)Utilitarian
E)Well-being
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
41
Shelli runs a small boutique in Tel Aviv. Her intern just came to her with a new design for her Web site. Shelli really likes the design, and she informs the intern that he is quite the artist. The intern responds that he found the design on the Internet. Shelli replies that they can't use it. Her decision reflects which ethical issue related to IT?

A)Privacy
B)Accuracy
C)Accountability
D)Property (such as intellectual property)
E)Accessibility to information
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
42
Shelli runs a small boutique in Tel Aviv. She accepts credit cards and writes the number on her copy of the receipt in case there is a problem later. This practice involves which ethical issue related to IT?

A)Privacy
B)Accuracy
C)Accountability
D)Property (such as intellectual property)
E)Accessibility to information
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
43
_____________ is the tracking of people's activities, online or offline, with the aid of computers.

A)Computer spying
B)Data aggregation
C)Electronic surveillance
D)Profiling
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
44
The public's right to know is ___________ to the individual's right of privacy.

A)equal
B)inferior
C)superior
D)undecided
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
45
Shelli runs a small boutique in Tel Aviv. She has built up a very nice client base and regularly sends her clients a newsletter. A new bakery business down the block wants to buy Shelli's client list from her. If Shelli does sell the list, which ethical issue related to IT would be involved?

A)Privacy
B)Accuracy
C)Accountability
D)Property (such as intellectual property)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
46
The __________ permits the company to collect personal information until the customer specifically requests that the data not be collected.

A)opt-in model
B)opt-out model
C)government
D)privacy code
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
47
Which of the following statements is correct?

A)An individual's right to privacy is absolute.
B)Determining and enforcing privacy regulations can be difficult.
C)An individual's right to privacy supersedes the needs of society.
D)Advances in information technologies have not affected individual privacy.
E)The Internet has increased individuals' privacy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
48
Shelli runs a small boutique in Tel Aviv. Her intern was checking the boutique's Facebook page and noticed some negative comments. He deleted them. At the end of the day, when they were closing up, he told Shelli about the comments and what he had done. Shelli was not pleased, and she told him so. Why wasn't Shelli pleased?

A)She didn't like hearing anything negative about her store.
B)People are free to say what they wish.
C)She thought he should ask her before he deleted them.
D)He wasn't supposed to be checking Facebook.
E)All of these are reasons for Shelli's not being pleased.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
49
Data aggregators sell digital dossiers to companies that want to know their customers better. This practice is called ________.

A)Customer relationships
B)Customer profiling
C)Customer intimacy
D)Customer knowledge
E)Spying
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
50
Privacy advocates prefer which model of informed consent?

A)Opt-in
B)Opt-out
C)Either A or B
D)Neither A nor B
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
51
Shelli runs a small boutique in Tel Aviv. She has built up a very nice client base and regularly sends her clients a newsletter. She keeps all her client data on her laptop in a password-protected file. Her decision to protect the file reflects which ethical issue related to IT?

A)Privacy
B)Accuracy
C)Accountability
D)Property (such as intellectual property)
E)Accessibility to information
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
52
Which of the following statements is not correct?

A)Employees have limited protection against surveillance by employers.
B)The large majority of organizations monitor employee Internet usage.
C)The large majority of organizations use URL filtering.
D)As with normal first-class mail, employers cannot read employee e-mail.
E)Employees should be aware that surveillance is legal.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
53
What is the relationship between advances in information technology and the practice of profiling?

A)Advances in IT make it more difficult to profile individuals.
B)Advances in IT have no impact on profiling.
C)Advances in IT make it more expensive to profile individuals.
D)Advances in IT make it easier to profile individuals.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
54
Which of the following statements is correct?

A)International privacy and security laws are very consistent.
B)Consistent international privacy and security laws help companies with their regulatory requirements from country to country.
C)Consistent international privacy and security laws enable information to flow freely among countries.
D)The absence of consistent international privacy and security laws has led to a complex global legal framework.
E)Consistent international privacy and security laws are followed by all countries.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
55
Privacy rights apply to ______________.

A)groups
B)individuals
C)institutions
D)all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
56
How does society keep owners of electronic bulletin boards from disseminating offensive or untrue content? This is a difficult question because it involves the conflict between _____ on the one hand and _____ on the other.

A)The public, the individual
B)The public, ethics
C)Freedom of speech, privacy
D)The individual, freedom of speech
E)Ethics, security
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
57
Customer intimacy is a(n)__________ outcome of profiling.

A)positive
B)negative
C)neutral
D)inevitable
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
58
The process of profiling:

A)Increases individual privacy.
B)Decreases individual privacy.
C)Has no effect on individual privacy.
D)Is illegal in more than half of the states.
E)Is legal but unethical.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
59
Which of the following is a correct argument on the pros and cons of conveniently sharing information and protecting privacy?

A)We have quick and easy access to our contacts on social networking sites, but it is much easier for stalking to occur.
B)Protecting our privacy is difficult and complicated, even if securing our information makes us feel more comfortable with using the Internet.
C)We need to be careful about what we post online, particularly since it may be difficult to ensure the security of our information on the Internet.
D)All of the above are correct.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
60
Shelli runs a small boutique in Tel Aviv. She has built up a very nice client base and regularly sends her clients a newsletter. Clients fill out a form to join her mailing list. Shelli indicates on the form that client information will not be shared without permission. This policy illustrates which ethical issue related to IT?

A)Privacy
B)Accuracy
C)Accountability
D)Property (such as intellectual property)
E)Accessibility to information
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
61
Which of the following can speedup web surfing ability by blocking any web site that requests for your personal data?

A)Wickr
B)Burn Note
C)Tapad
D)TigerText
E)Disconnect
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
62
Which of the following allows senders to retrieve messages that they have already sent?

A)Wickr
B)Burn Note
C)Tapad
D)TigerText
E)Disconnect
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
63
Which of the following provides a secure messaging service?

A)Wickr
B)Burn Note
C)Tapad
D)TigerText
E)Disconnect
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
64
Discuss the fundamental tenants of ethics: responsibility, accountability, and liability.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
65
Explain why something that is unethical might not necessarily be illegal.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
66
Which of the following tracks the same consumer across multiple devices as he/she changes devices continuously?

A)Wickr
B)Burn Note
C)Tapad
D)TigerText
E)Disconnect
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
67
Discuss the two rules of privacy: The right of privacy is not absolute, and the public's right to know supersedes the individual's right to privacy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
68
Which of the following allows users to send encrypted notes that self-destruct after a set amount of time?

A)Wickr
B)Burn Note
C)Tapad
D)TigerText
E)Disconnect
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
69
Identify and analyze the fundamental ethical issues involved with information technology.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
70
Discuss the international aspects of privacy. How do these aspects impact transborder data flows?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
71
Compare and contrast the four widely used stands for ethics: utilitarian, rights, fairness, and common good.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
72
Which of the following allows users to send military-grade encrypted texts, photos, and videos to other users?

A)Wickr
B)Burn Note
C)Tapad
D)TigerText
E)Disconnect
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
73
Discuss the relationship between surveillance and privacy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
74
Compare and contrast the two informed consent models: opt-in and opt-out. Why do companies prefer one over the other? Why do privacy advocates prefer one over the other?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 74 في هذه المجموعة.