1) Even in today's legal climate, there is little incentive for firms to cooperate with prosecutors investigating financial crimes at their firm.
FALSE
2) Advances in data storage have made routine violation of individual privacy more difficult.
FALSE
3) The last step in analyzing an ethical issue should be to identify the stakeholders—people who have a vested interest in the outcome of the decision.

FALSE
4.) Professionals take on special rights and obligations because of their special claims to knowledge, wisdom, and respect.
TRUE
5) Privacy is the right to be left alone when you want to be, without surveillance or interference from other individuals or organizations.
TRUE
6) Most American and European privacy law is based on a set of five principles called COPPA.

FALSE
7) Spyware is software that comes hidden in downloaded applications and can track your online movements.
TRUE
8) Most Internet businesses do very little to protect the privacy of their customers.
TRUE
9) Data gathered by online behavioral tracking firms is limited to the user's behavior on a single Web site.
FALSE
10) Copyright is the legal protection afforded intellectual property, such as a song, book, or video game.

TRUE
11) In white-collar fraud, information systems are most typically used as a means to hide financial evidence of crimes.
TRUE
12) The Copyright Office began registering software programs in the 1990s
FALSE
13) The drawback to copyright protection is that the underlying ideas behind the work are not protected, only their reproduction in a product.
TRUE
14) According to the courts, in the creation of software, unique concepts, general functional features, and even colors are protectable by copyright law.
FALSE
15) The key concepts in patent law are originality, novelty, and value.
FALSE
16) Despite the passage of several laws defining and addressing computer crime, accessing a computer system without authorization is not yet a federal crime.

FALSE
17) Any unsolicited e-mail is legally considered spam.
FALSE
18) The European Parliament has passed a ban on unsolicited commercial messaging.
TRUE
Cryptography is the science & art of designing ciphers/codes
TRUE
Crypto-Currency is a digital/virtual currency that uses cryptography methods for security, thus increasing the difficulty associated with counterfeiting measures.
TRUE
21) The 2012 FTC report on industry-best practices for protecting individuals' privacy focused on each of the following topics exceptA) mobile privacy.B) phasing out of self-regulatory codes.

C) data brokers.D) large platform providers.

B
22) Which of the following best describes how new information systems result in legal gray areas?A) They work with networked, electronic data, which are more difficult to control than information stored manually.B) They result in new situations that are not covered by old laws.C) They are implemented by technicians rather than managers.

D) They are created from sets of logical and technological rules rather than social or organizational mores.

B
23) The introduction of new information technology has aA) dampening effect on the discourse of business ethics.B) ripple effect raising new ethical, social, and political issues.C) beneficial effect for society as a whole, while raising dilemmas for consumers.D) waterfall effect in raising ever more complex ethical issues.
B
24) In the information age, the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension ofA) property rights and obligations.

B) system quality.C) accountability and control.D) information rights and obligations.

A
25) In the information age, the obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within the moral dimension ofA) family and home.B) property rights and obligations.

C) system quality.D) quality of life.

D
26) All of the following are current key technology trends raising ethical issues exceptA) data storage improvements.B) data analysis advancements.

C) increase in multimedia quality.D) increase in use of mobile devices.

C
27) The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is calledA) profiling.B) phishing.C) spamming.

D) targeting.

A
28) Which of the five moral dimensions of the information age do the central business activities of ChoicePoint raise? A) property rights and obligationsB) system qualityC) accountability and controlD) information rights and obligations
D
29) NORA is aA) profiling technology used by the EU.B) federal privacy law protecting networked data.C) data analysis technology that finds hidden connections between data in disparate sources.D) sentencing guideline adopted in 1987 mandating stiff sentences on business executives.

C
30) Accepting the potential costs, duties, and obligations for the decisions you make is referred to asA) responsibility.B) accountability.C) liability.D) due process.
A
31) The process in law-governed societies in which laws are known and understood and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly is calledA) liability.B) due process.

C) the courts of appeal.D) accountability.

B
32) The feature of social institutions that means mechanisms are in place to determine responsibility for an action is calledA) due process.B) accountability.

C) the courts of appeal.D) the judicial system.

B
33) Which of the following is not one of the five steps discussed in the chapter as a process for analyzing an ethical issue? A) Assign responsibility.B) Identify the stakeholders.C) Identify the options you can reasonably take.

D) Identify and clearly describe the facts.

A
34) A colleague of yours frequently takes for his own personal use small amounts of office supplies, noting that the loss to the company is minimal. You counter that if everyone were to take the office supplies, the loss would no longer be minimal. Your rationale expresses which historical ethical principle?A) Kant's Categorical ImperativeB) the Golden RuleC) the Risk Aversion PrincipleD) the "No free lunch" rule
A
35) Immanuel Kant's Categorical Imperative states thatA) if an action cannot be taken repeatedly, then it is not right to be taken at any time.B) one should take the action that produces the least harm or incurs the least cost.C) one can put values in rank order and understand the consequences of various courses of action.

D) if an action is not right for everyone to take, it is not right for anyone to take.

D
36) A classic ethical dilemma is the hypothetical case of a man stealing from a grocery store in order to feed his starving family. If you used the Utilitarian Principle to evaluate this situation, you might argue that stealing the food isA) acceptable, because the grocer suffers the least harm.B) acceptable, because the higher value is the survival of the family.C) wrong, because the man would not want the grocer to steal from him.

D) wrong, because if everyone were to do this, the concept of personal property is defeated.

B
37) The ethical "no free lunch" rule states thatA) if an action cannot be taken repeatedly, then it is not right to be taken at any time.B) one should take the action that produces the least harm or incurs the least cost.C) one can put values in rank order and understand the consequences of various courses of action.

D) everything is owned by someone else, and that the creator wants compensation for this work.

D
38) According to the ________, you should take the action that produces the least harm.A) Categorical ImperativeB) Risk Aversion PrincipleC) Utilitarian PrincipleD) Golden Rule.
B
39) Which U.S. act restricts the information the federal government can collect and regulates what they can do with the information? A) Privacy Act of 1974B) Gramm-Leach-Bliley Act of 1999C) Freedom of Information ActD) HIPAA of 1996
A
40) FIP principles are based on the notion of theA) accountability of the record holder.

B) responsibility of the record holder.C) mutuality of interest between the record holder and the individual.D) privacy of the individual.

C
41) The Federal Trade Commission FIP principle of Notice/Awareness states thatA) customers must be allowed to choose how their information will be used for secondary purposes other than the supporting transaction.B) data collectors must take responsible steps to assure that consumer information is accurate and secure from unauthorized use.

C) there is a mechanism in place to enforce FIP principles.D) Web sites must disclose their information practices before collecting data.

D
42) Which of the following is not one of the practices added in 2010 by the FTP to its framework for privacy?A) Firms should build products and services that protect privacy.B) Firms should increase the transparency of their data collection.C) Firms should require consumer consent and provide clear options to opt out of data collection.

D) Firms should limit the length of time that any personal data is stored to six months or less.

D
43) Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed?A) HIPAAB) Gramm-Leach-Bliley ActC) Privacy Protection ActD) Freedom of Information Act
A
44) European privacy protection is ________ than in the United States. A) less far-reachingB) less liable to lawsC) much less stringentD) much more strict
D
45) U.

S. businesses are allowed to use personal data from EU countries if theyA) have informed consent. B) create a safe harbor.C) develop equivalent privacy protection policies.

D) make their privacy protection policies publicly available.

C
46) The U.S. Department of Commerce developed a ________ framework in order to enable U.

S. businesses to legally use personal data from EU countries.A) COPPAB) P3PC) PGPD) safe-harbor

D
47) When a cookie is created during a Web site visit, it is storedA) on the Web site computer.B) on the visitor's computer.C) on the ISP's computer.D) in a Web directory.

B
48) Flash cookies are different from ordinary cookies in that theyA) are installed only at the user's request.B) are not stored on the user's computer.C) cannot be easily detected or deleted.D) monitor the user's behavior at a Web site.
C
49) The Online Privacy AllianceA) encourages self-regulation to develop a set of privacy guidelines for its members.B) protects user privacy during interactions with Web sites.

C) has established technical guidelines for ensuring privacy.D) is a government agency regulating the use of customer information.

A
50) A(n) ________ model of informed consent permits the collection of personal information until the consumer specifically requests that the data not be collected. A) opt-inB) opt-outC) P3PD) PGP
B
51) In the United States, the claim to privacy is protected primarily by each of the following exceptA) Constitutional guarantees of freedom of speech and association.

B) Privacy Act of 1974.C) Fourth Amendment protections against unreasonable search and seizure.D) COPPA.

D
52) Which of the following statements about trade secrets is not true?A) Trade secret protections vary from state to state.B) Any intellectual product, regardless of its purpose, can be classified as a trade secret.

C) Software that contains unique elements can be claimed as a trade secret.D) Trade secret law protects the actual ideas in a product.

B
53) Intellectual property can best be described asA) intangible property created by individuals or corporations.B) unique creative work or ideas.C) tangible or intangible property created from a unique idea.

D) the expression of an intangible idea.

A
54) What legal mechanism protects the owners of intellectual property from having their work copied by others? A) patent protectionB) intellectual property lawC) copyright lawD) Fair Use Doctrine
C
55) "Look and feel" copyright infringement lawsuits are concerned withA) the distinction between tangible and intangible ideas.B) the distinction between an idea and its expression.C) using the graphical elements of another product.D) using the creative elements of another product.

B
56) The strength of patent protection is that itA) puts the strength of law behind copyright.B) allows protection from Internet theft of ideas put forth publicly.C) is easy to define.D) grants a monopoly on underlying concepts and ideas.

D
57) One of the difficulties of patent protection isA) that only the underlying ideas are protected.B) digital media cannot be patented.C) preventing the ideas from falling into public domain.D) the years of waiting to receive it.
D
58) Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials? A) Digital Millennium Copyright ActB) Privacy ActC) Freedom of Information ActD) Electronic Communications Privacy Act
A
59) In general, it is very difficult to hold software producers liable for their software products when those products are considered to beA) part of a machine.B) similar to books.

C) services.D) artistic expressions.

B
60) ________ are not held liable for the messages they transmit. A) Regulated common carriersB) Private individualsC) Organizations and businessesD) Elected officials
A
61) It is not feasible for companies to produce error-free software becauseA) any programming code is susceptible to error.

B) it is too expensive to create perfect software. C) errors can be introduced in the maintenance stage of development.D) any software of any complexity will have errors.

B
62) The most common source of business system failure isA) software bugs.B) software errors.C) hardware or facilities failures.D) data quality.
D
63) The "do anything anywhere" computing environment canA) make work environments much more pleasant.B) create economies of efficiency.C) centralize power at corporate headquarters.D) blur the traditional boundaries between work and family time.
D
64) The practice of spamming has been growing becauseA) telephone solicitation is no longer legal.B) it is good advertising practice and brings in many new customers.C) it helps pay for the Internet.D) it is so inexpensive and can reach so many people.
D
65) Which of the five moral dimensions of the information age does spamming raise? A) quality of lifeB) system qualityC) accountability and controlD) information rights and obligations
A
66) The Do-Not-Track Act of 2011A) allows firms to track customers if default given is opt-in.B) requires firms to notify customers that they are being tracked.C) allows firms to track customers if they do not sell the information to third parties.D) requires firms to get customer sign-off before tracking them.
B
67) Re-designing and automating business processes can be seen as a double-edged sword becauseA) increases in efficiency may be accompanied by job losses.B) increases in efficiency may be accompanied by poor data quality.C) support for middle-management decision making may be offset by poor data quality.D) reliance on technology results in the loss of hands-on knowledge.
A
68) A tiny software object embedded in a Web page and used by tracking programs to monitor online user behavior is calledA) spyware.B) a super cookie.C) a Web beacon.D) a cookie.
C
69) Which two of the following issues are privacy advocates and advertising industry most in conflict over? (Select two of the following.)A) an opt-in policy required at all sitesB) a national Do-Not-Track listC) an opt-out policy required at all sitesD) disclosure and transparency in the use of Flash or super cookies
A & B
70) ________ can be induced by tens of thousands of repetitions under low-impact loads.A) CTSB) CVSC) RSID) Technostress
C