Deck 7: Ethical, Social, and Political Issues in E-Commerce

Full screen (f)
exit full mode
Question
The FTC's privacy approach is now focused on targeting practices that are likely to cause harm or unwarranted intrusion into consumers' daily lives.
Use Space or
up arrow
down arrow
to flip the card.
Question
Net neutrality refers to Internet backbone owners treating all Internet traffic equally.
Question
The Unlawful Internet Gambling Enforcement Act has eliminated all online gambling in the United States.
Question
Liability is a feature of political systems in which a body of law is in place that permits individuals to recover damages done to them by other actors, systems, or organizations.
Question
Which ethical principle states that, when confronted with an ethical dilemma, individuals should take the action that achieves the greater value for all of society?

A)the Golden Rule
B)Universalism
C)the Collective Utilitarian principle
D)the Social Contract rule
Question
The ethical principle of Universalism states that if an action is not right for all situations, then it is not right for any situation.
Question
Most adult social network participants do not have any expectation of personal privacy when using a social network.
Question
Which ethical principle asks you to consider the impact of your decision if the principles underlying your decision became an organizing principle of the entire society?

A)the Golden Rule
B)Risk Aversion
C)the Slippery Slope
D)the Social Contract rule
Question
Which of the following e-commerce technology dimensions has the potential to reduce cultural diversity in products?

A)richness
B)interactivity
C)information density
D)global reach
Question
It is not necessarily illegal to use someone else's trademark in a metatag.
Question
The opt-in model for informed consent requires an affirmative action by the consumer before a company can collect and use information.
Question
The European Data Protection Directive prohibits the transfer of PII to organizations or countries that do not have similar privacy protection policies.
Question
Which ethical principle states that if an action cannot be taken repeatedly, then it is not right to take at all?

A)Universalism
B)the Slippery Slope
C)the Social Contract rule
D)the Golden Rule
Question
Copyright protection protects against others copying the underlying ideas in a work.
Question
The principle of responsibility means that individuals, organizations, and societies should be held accountable to others for the consequences of their actions.
Question
Which ethical principle asks you to assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise?

A)the Golden Rule
B)the Slippery Slope
C)the Social Contract rule
D)No Free Lunch
Question
Which of the following e-commerce technology dimensions creates greater opportunities for cyberbullying?

A)richness
B)interactivity
C)social technology
D)ubiquity
Question
The Children's Online Privacy Protection Act (COPPA)prohibits Web sites from collecting information on children under the age of 13.
Question
Which ethical principle emphasizes putting oneself into the place of others and thinking of oneself as the object of the decision?

A)the Golden Rule
B)Universalism
C)the Collective Utilitarian principle
D)the Social Contract rule
Question
In Western culture, the basic principles shared by ethical schools of thought are:

A)information rights, property rights, and public safety and welfare.
B)responsibility, liability, and accountability.
C)ubiquity, global reach, and privacy.
D)the Golden Rule and Universalism.
Question
Which of the following is not one of the issues complicating the taxation of e-commerce sales?

A)Taxes raised are used for different government purposes.
B)Sales taxes and policies vary by state and country.
C)Retailers legally only have to charge sales tax if they have operations located in the same state as a consumer.
D)Small online businesses are unable to manage sales taxes to thousands of different jurisdictions.
Question
Which ethical principle tells you that it is wise to assume perfect information markets?

A)the Golden Rule
B)the New York Times test
C)the Social Contract rule
D)the Collective Utilitarian principle
Question
A social consequence of the richness of Internet information is:

A)an increase in shallowness.
B)an increase in the ease of creating misleading information.
C)very persuasive messages might reduce the need for multiple independent sources of information.
D)an increase in vulnerability to hacking attacks.
Question
"Do Not Track" falls under which of the following principles in the FTC's new privacy framework?

A)Privacy by Design
B)Simplified Choice
C)Greater Transparency
D)Scope
Question
Which of the following requires financial institutions to inform consumers of their privacy policies and permits consumers some control over their records?

A)Freedom of Information Act
B)Gramm-Leach-Bliley Act
C)COPPA
D)HIPAA
Question
What is the FTC recommendation regarding choice as it relates to personally identifiable information (PII)?

A)Require firms to have consumers affirmatively opt-in before PII is collected.
B)Require firms to allow consumers to opt-out before PII is collected.
C)Make collection of PII illegal.
D)Require robust notice only before PII is collected.
Question
Which of the following situations would not qualify for the fair use exception to United States copyright law?

A)A professor clips a newspaper article just before class and distributes copies of it to his class.
B)A journalist quotes a paragraph from a book in a review of the book.
C)A student copies a photograph of his favorite band from a Web site created by the band's record label and places it on the student's personal Web site.
D)Google posts thumbnail images of books in the Google Book Search Project.
Question
What is the major reason that the Internet has such potential for destroying traditional conceptions and implementations of intellectual property law?

A)the ability to make perfect copies of digital works at little cost
B)the anonymous nature of the Internet
C)the support for instant peer-to-peer communication
D)the use of standards for file formats
Question
Which of the following basic ethical concepts plays an important role in defining privacy?

A)responsibility
B)accountability
C)liability
D)due process
Question
________ is collected data that can be used to identify and locate an individual.

A)A personal profile
B)P3P
C)Anonymous information
D)PII
Question
Which of the following protects original forms of expression in a tangible medium?

A)trade secret law
B)copyright law
C)patent law
D)trademark law
Question
Downloading music tracks owned by record companies without paying for them is an example of a violation of:

A)patent law.
B)copyright law.
C)trademark law.
D)privacy law.
Question
Which of the following can be used to record all keyboard activity of a user?

A)shopping carts
B)trusted computing environments
C)spyware
D)DRM
Question
All of the following are factors that will be considered in determining whether use of copyrighted material is "fair use" except the:

A)nature of the work used.
B)amount of the work used.
C)market effect of the use.
D)free availability of the work on the Web.
Question
Which of the FTC's Fair Information Practices (FIP)principles requires opt-in or opt-out policies to be in place?

A)Notice/Awareness
B)Choice/Consent
C)Access/Participation
D)Security
Question
Which of the FTC's Fair Information Practices (FIP)principles requires identification of the collector of data?

A)Notice/Awareness
B)Choice/Consent
C)Access/Participation
D)Security
Question
The placing of a cookie on a user's hard drive by one site that is then used by another site to sell that user related products without the knowledge of the user is:

A)legal in the United States but illegal in Europe.
B)illegal in the United States but legal in Europe.
C)legal in both the United States and Europe.
D)illegal in both the United States and Europe.
Question
Which ethical principle states that when confronted with an ethical dilemma, an individual should take the action that produces the least harm, or the least potential cost?

A)the Slippery Slope
B)Risk Aversion
C)No Free Lunch
D)the Collective Utilitarian principle
Question
Which of the following tools can companies use to track users' social and political views and activities?

A)cookies
B)digital wallets
C)search engines
D)shopping carts
Question
Which of the following is a core Fair Information Practices (FIP)principle?

A)Choice/Consent
B)Access/Participation
C)Security
D)Enforcement
Question
An ISP basic service plan, allowing 300GB of data transfer per month, with additional data transfer available for $15 for 50GB, is an example of a tiered plan called ________.
Question
Registering the domain name google.com with the intent to divert Web traffic from people misspelling google.com is an example of:

A)cybersquatting.
B)typosquatting.
C)metatagging.
D)linking.
Question
Which case was instrumental in paving the way for Internet business methods patents?

A)Brown Bag v. Symantec
B)State Street Bank & Trust Co. v. Signature Financial Group. Inc.
C)Ford Motor Co. v. Lapertosa
D)Ticketmaster Corp. v. Tickets.com
Question
Registering a domain name similar or identical to trademarks of others to divert Web traffic to their own sites is an example of:

A)cybersquatting.
B)cyberpiracy.
C)framing.
D)metatagging.
Question
Which of the following statements about the Digital Millennium Copyright Act (DMCA)is not true?

A)The DMCA makes it illegal to circumvent technological measures to protect works.
B)The DMCA makes Internet Service Providers (ISPs)responsible and accountable for hosting Web sites or providing services to infringers regardless of whether the ISP is aware of infringement.
C)The DMCA requires search engines to block access to infringing sites.
D)The DMCA allows libraries to make digital copies of works for internal use only.
Question
All of the following are data elements that are often gathered by e-commerce sites except:

A)family member identities.
B)photograph.
C)location.
D)address.
Question
Which of the following is a potential ethical, social, or political implication of richness?

A)It increases the likelihood of information crime.
B)It opens up the possibility of intensive invasion of privacy.
C)It reduces cultural diversity in products.
D)It creates potentially very persuasive messages that may reduce reliance on multiple independent sources of information.
Question
Disputes over federal trademarks involve establishing:

A)underlying ideas.
B)intent.
C)piracy.
D)infringement.
Question
Amazon has a patent on:

A)download-based sales.
B)display of third-party advertisements in floating windows.
C)one-click purchasing.
D)hyperlinks.
Question
Which of the following is not a potential ethical, social, or political implication of information density?

A)The possibility of invasion of solitude increases.
B)Presents confusing issues of nexus.
C)The ability of individuals and organization to make sense out of information is limited.
D)Authenticity, accuracy, and completeness of information can be degraded.
Question
Which of the following allows someone to obtain an exclusive monopoly on the ideas behind an invention for 20 years?

A)copyright law
B)trade secret law
C)patent law
D)trademark law
Question
The four major dimensions of e-commerce ethical, social, and political issues are public safety and welfare; property rights; information rights; and ________.
Question
Registering a domain name similar or identical to trademarks of others to extort profits from legitimate holders is an example of:

A)cybersquatting.
B)cyberpiracy.
C)framing.
D)metatagging.
Question
The display of a third-party's Web site or page within your own Web site is called:

A)cybersquatting.
B)metatagging.
C)framing.
D)deep linking.
Question
A 2012 TRUSTe/Harris Interactive survey on privacy found all of the following except:

A)targeted advertising makes the vast majority of those surveyed uncomfortable.
B)more than 75% of those surveyed do not allow companies to share their personal information with a third party.
C)over 90% of those surveyed thought that privacy is an important issue.
D)more than half of those surveyed said online privacy is really important to them.
Question
Which of the following is used to collect and analyze detailed information on page content viewed by users?

A)search engines
B)DRM
C)forms
D)site transaction logs
Question
The ________ of Internet and Web technology can result in work and shopping invading family life.
Question
Over which of the following does ICANN have authority?

A)technical infrastructure
B)domain name system
C)public policy issues
D)standards
Question
Which of the following statements about patents is not true?

A)It is more difficult to obtain a copyright than it is to obtain a patent.
B)The four types of inventions protected by patent law are machines, manmade products, compositions of matter, and processing methods.
C)Computer programs can be patented.
D)In order to be patented, an invention must be nonobvious.
Question
Which of the following was subjected to the largest civil penalty ever levied by the FTC as of August 2012 for privacy violations?

A)Apple
B) Facebook
C)Amazon
D)Google
Question
Describe the purpose of intellectual property law and outline the main types of intellectual property protection.
Question
Explain why the taxation of e-commerce raises governance and jurisdiction issues.
Question
A(n)________ is a private self-regulating policy and enforcement mechanism that meets the objectives of government regulators and legislation, but does not involve government regulation or enforcement.
Question
In trademark law, ________ is defined as any behavior that would weaken the connection between the trademark and the product.
Question
________ involves the creation of digital images that characterize online individual and group behavior.
Question
The issue of ________ pits those who wish that all Internet traffic is given equal backbone access against telephone and cable companies that would like to charge differentiated prices based on bandwidth and fees paid.
Question
Discuss in depth one ethical, social, or political issue that is presently in the news surrounding the Internet and e-commerce.
Question
Under the ________ Act, American intelligence authorities are permitted to tap into whatever Internet traffic they believe is relevant to the campaign against terrorism, in some circumstances without judicial review.
Question
Describe and evaluate the different methods that are being used to protect online privacy. Which of these methods do you think is or could be the most effective?
Question
The doctrine of ________ permits teachers and writers to use copyrighted materials without permission under certain circumstances.
Question
________ information is demographic and behavioral information that does not include any personal identifiers.
Question
Define privacy, information privacy, and informed consent and discuss the ways in which the practices of e-commerce companies, particularly the use of advertising networks, threaten people's privacy.
Question
Single words, pictures, shapes, packaging, and colors used to identify and distinguish goods are protected under ________ law.
Question
________ profiles identify people as belonging to highly specific and targeted groups.
Question
The main stakeholders arguing against net neutrality are ________.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/75
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 7: Ethical, Social, and Political Issues in E-Commerce
1
The FTC's privacy approach is now focused on targeting practices that are likely to cause harm or unwarranted intrusion into consumers' daily lives.
True
2
Net neutrality refers to Internet backbone owners treating all Internet traffic equally.
True
3
The Unlawful Internet Gambling Enforcement Act has eliminated all online gambling in the United States.
False
4
Liability is a feature of political systems in which a body of law is in place that permits individuals to recover damages done to them by other actors, systems, or organizations.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
5
Which ethical principle states that, when confronted with an ethical dilemma, individuals should take the action that achieves the greater value for all of society?

A)the Golden Rule
B)Universalism
C)the Collective Utilitarian principle
D)the Social Contract rule
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
6
The ethical principle of Universalism states that if an action is not right for all situations, then it is not right for any situation.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
7
Most adult social network participants do not have any expectation of personal privacy when using a social network.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
8
Which ethical principle asks you to consider the impact of your decision if the principles underlying your decision became an organizing principle of the entire society?

A)the Golden Rule
B)Risk Aversion
C)the Slippery Slope
D)the Social Contract rule
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following e-commerce technology dimensions has the potential to reduce cultural diversity in products?

A)richness
B)interactivity
C)information density
D)global reach
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
10
It is not necessarily illegal to use someone else's trademark in a metatag.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
11
The opt-in model for informed consent requires an affirmative action by the consumer before a company can collect and use information.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
12
The European Data Protection Directive prohibits the transfer of PII to organizations or countries that do not have similar privacy protection policies.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
13
Which ethical principle states that if an action cannot be taken repeatedly, then it is not right to take at all?

A)Universalism
B)the Slippery Slope
C)the Social Contract rule
D)the Golden Rule
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
14
Copyright protection protects against others copying the underlying ideas in a work.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
15
The principle of responsibility means that individuals, organizations, and societies should be held accountable to others for the consequences of their actions.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
16
Which ethical principle asks you to assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise?

A)the Golden Rule
B)the Slippery Slope
C)the Social Contract rule
D)No Free Lunch
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following e-commerce technology dimensions creates greater opportunities for cyberbullying?

A)richness
B)interactivity
C)social technology
D)ubiquity
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
18
The Children's Online Privacy Protection Act (COPPA)prohibits Web sites from collecting information on children under the age of 13.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
19
Which ethical principle emphasizes putting oneself into the place of others and thinking of oneself as the object of the decision?

A)the Golden Rule
B)Universalism
C)the Collective Utilitarian principle
D)the Social Contract rule
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
20
In Western culture, the basic principles shared by ethical schools of thought are:

A)information rights, property rights, and public safety and welfare.
B)responsibility, liability, and accountability.
C)ubiquity, global reach, and privacy.
D)the Golden Rule and Universalism.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
21
Which of the following is not one of the issues complicating the taxation of e-commerce sales?

A)Taxes raised are used for different government purposes.
B)Sales taxes and policies vary by state and country.
C)Retailers legally only have to charge sales tax if they have operations located in the same state as a consumer.
D)Small online businesses are unable to manage sales taxes to thousands of different jurisdictions.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
22
Which ethical principle tells you that it is wise to assume perfect information markets?

A)the Golden Rule
B)the New York Times test
C)the Social Contract rule
D)the Collective Utilitarian principle
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
23
A social consequence of the richness of Internet information is:

A)an increase in shallowness.
B)an increase in the ease of creating misleading information.
C)very persuasive messages might reduce the need for multiple independent sources of information.
D)an increase in vulnerability to hacking attacks.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
24
"Do Not Track" falls under which of the following principles in the FTC's new privacy framework?

A)Privacy by Design
B)Simplified Choice
C)Greater Transparency
D)Scope
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
25
Which of the following requires financial institutions to inform consumers of their privacy policies and permits consumers some control over their records?

A)Freedom of Information Act
B)Gramm-Leach-Bliley Act
C)COPPA
D)HIPAA
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
26
What is the FTC recommendation regarding choice as it relates to personally identifiable information (PII)?

A)Require firms to have consumers affirmatively opt-in before PII is collected.
B)Require firms to allow consumers to opt-out before PII is collected.
C)Make collection of PII illegal.
D)Require robust notice only before PII is collected.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
27
Which of the following situations would not qualify for the fair use exception to United States copyright law?

A)A professor clips a newspaper article just before class and distributes copies of it to his class.
B)A journalist quotes a paragraph from a book in a review of the book.
C)A student copies a photograph of his favorite band from a Web site created by the band's record label and places it on the student's personal Web site.
D)Google posts thumbnail images of books in the Google Book Search Project.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
28
What is the major reason that the Internet has such potential for destroying traditional conceptions and implementations of intellectual property law?

A)the ability to make perfect copies of digital works at little cost
B)the anonymous nature of the Internet
C)the support for instant peer-to-peer communication
D)the use of standards for file formats
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
29
Which of the following basic ethical concepts plays an important role in defining privacy?

A)responsibility
B)accountability
C)liability
D)due process
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
30
________ is collected data that can be used to identify and locate an individual.

A)A personal profile
B)P3P
C)Anonymous information
D)PII
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
31
Which of the following protects original forms of expression in a tangible medium?

A)trade secret law
B)copyright law
C)patent law
D)trademark law
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
32
Downloading music tracks owned by record companies without paying for them is an example of a violation of:

A)patent law.
B)copyright law.
C)trademark law.
D)privacy law.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
33
Which of the following can be used to record all keyboard activity of a user?

A)shopping carts
B)trusted computing environments
C)spyware
D)DRM
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
34
All of the following are factors that will be considered in determining whether use of copyrighted material is "fair use" except the:

A)nature of the work used.
B)amount of the work used.
C)market effect of the use.
D)free availability of the work on the Web.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
35
Which of the FTC's Fair Information Practices (FIP)principles requires opt-in or opt-out policies to be in place?

A)Notice/Awareness
B)Choice/Consent
C)Access/Participation
D)Security
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
36
Which of the FTC's Fair Information Practices (FIP)principles requires identification of the collector of data?

A)Notice/Awareness
B)Choice/Consent
C)Access/Participation
D)Security
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
37
The placing of a cookie on a user's hard drive by one site that is then used by another site to sell that user related products without the knowledge of the user is:

A)legal in the United States but illegal in Europe.
B)illegal in the United States but legal in Europe.
C)legal in both the United States and Europe.
D)illegal in both the United States and Europe.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
38
Which ethical principle states that when confronted with an ethical dilemma, an individual should take the action that produces the least harm, or the least potential cost?

A)the Slippery Slope
B)Risk Aversion
C)No Free Lunch
D)the Collective Utilitarian principle
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
39
Which of the following tools can companies use to track users' social and political views and activities?

A)cookies
B)digital wallets
C)search engines
D)shopping carts
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
40
Which of the following is a core Fair Information Practices (FIP)principle?

A)Choice/Consent
B)Access/Participation
C)Security
D)Enforcement
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
41
An ISP basic service plan, allowing 300GB of data transfer per month, with additional data transfer available for $15 for 50GB, is an example of a tiered plan called ________.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
42
Registering the domain name google.com with the intent to divert Web traffic from people misspelling google.com is an example of:

A)cybersquatting.
B)typosquatting.
C)metatagging.
D)linking.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
43
Which case was instrumental in paving the way for Internet business methods patents?

A)Brown Bag v. Symantec
B)State Street Bank & Trust Co. v. Signature Financial Group. Inc.
C)Ford Motor Co. v. Lapertosa
D)Ticketmaster Corp. v. Tickets.com
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
44
Registering a domain name similar or identical to trademarks of others to divert Web traffic to their own sites is an example of:

A)cybersquatting.
B)cyberpiracy.
C)framing.
D)metatagging.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
45
Which of the following statements about the Digital Millennium Copyright Act (DMCA)is not true?

A)The DMCA makes it illegal to circumvent technological measures to protect works.
B)The DMCA makes Internet Service Providers (ISPs)responsible and accountable for hosting Web sites or providing services to infringers regardless of whether the ISP is aware of infringement.
C)The DMCA requires search engines to block access to infringing sites.
D)The DMCA allows libraries to make digital copies of works for internal use only.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
46
All of the following are data elements that are often gathered by e-commerce sites except:

A)family member identities.
B)photograph.
C)location.
D)address.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
47
Which of the following is a potential ethical, social, or political implication of richness?

A)It increases the likelihood of information crime.
B)It opens up the possibility of intensive invasion of privacy.
C)It reduces cultural diversity in products.
D)It creates potentially very persuasive messages that may reduce reliance on multiple independent sources of information.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
48
Disputes over federal trademarks involve establishing:

A)underlying ideas.
B)intent.
C)piracy.
D)infringement.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
49
Amazon has a patent on:

A)download-based sales.
B)display of third-party advertisements in floating windows.
C)one-click purchasing.
D)hyperlinks.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
50
Which of the following is not a potential ethical, social, or political implication of information density?

A)The possibility of invasion of solitude increases.
B)Presents confusing issues of nexus.
C)The ability of individuals and organization to make sense out of information is limited.
D)Authenticity, accuracy, and completeness of information can be degraded.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
51
Which of the following allows someone to obtain an exclusive monopoly on the ideas behind an invention for 20 years?

A)copyright law
B)trade secret law
C)patent law
D)trademark law
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
52
The four major dimensions of e-commerce ethical, social, and political issues are public safety and welfare; property rights; information rights; and ________.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
53
Registering a domain name similar or identical to trademarks of others to extort profits from legitimate holders is an example of:

A)cybersquatting.
B)cyberpiracy.
C)framing.
D)metatagging.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
54
The display of a third-party's Web site or page within your own Web site is called:

A)cybersquatting.
B)metatagging.
C)framing.
D)deep linking.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
55
A 2012 TRUSTe/Harris Interactive survey on privacy found all of the following except:

A)targeted advertising makes the vast majority of those surveyed uncomfortable.
B)more than 75% of those surveyed do not allow companies to share their personal information with a third party.
C)over 90% of those surveyed thought that privacy is an important issue.
D)more than half of those surveyed said online privacy is really important to them.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
56
Which of the following is used to collect and analyze detailed information on page content viewed by users?

A)search engines
B)DRM
C)forms
D)site transaction logs
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
57
The ________ of Internet and Web technology can result in work and shopping invading family life.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
58
Over which of the following does ICANN have authority?

A)technical infrastructure
B)domain name system
C)public policy issues
D)standards
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
59
Which of the following statements about patents is not true?

A)It is more difficult to obtain a copyright than it is to obtain a patent.
B)The four types of inventions protected by patent law are machines, manmade products, compositions of matter, and processing methods.
C)Computer programs can be patented.
D)In order to be patented, an invention must be nonobvious.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
60
Which of the following was subjected to the largest civil penalty ever levied by the FTC as of August 2012 for privacy violations?

A)Apple
B) Facebook
C)Amazon
D)Google
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
61
Describe the purpose of intellectual property law and outline the main types of intellectual property protection.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
62
Explain why the taxation of e-commerce raises governance and jurisdiction issues.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
63
A(n)________ is a private self-regulating policy and enforcement mechanism that meets the objectives of government regulators and legislation, but does not involve government regulation or enforcement.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
64
In trademark law, ________ is defined as any behavior that would weaken the connection between the trademark and the product.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
65
________ involves the creation of digital images that characterize online individual and group behavior.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
66
The issue of ________ pits those who wish that all Internet traffic is given equal backbone access against telephone and cable companies that would like to charge differentiated prices based on bandwidth and fees paid.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
67
Discuss in depth one ethical, social, or political issue that is presently in the news surrounding the Internet and e-commerce.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
68
Under the ________ Act, American intelligence authorities are permitted to tap into whatever Internet traffic they believe is relevant to the campaign against terrorism, in some circumstances without judicial review.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
69
Describe and evaluate the different methods that are being used to protect online privacy. Which of these methods do you think is or could be the most effective?
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
70
The doctrine of ________ permits teachers and writers to use copyrighted materials without permission under certain circumstances.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
71
________ information is demographic and behavioral information that does not include any personal identifiers.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
72
Define privacy, information privacy, and informed consent and discuss the ways in which the practices of e-commerce companies, particularly the use of advertising networks, threaten people's privacy.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
73
Single words, pictures, shapes, packaging, and colors used to identify and distinguish goods are protected under ________ law.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
74
________ profiles identify people as belonging to highly specific and targeted groups.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
75
The main stakeholders arguing against net neutrality are ________.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 75 flashcards in this deck.