Preview

Corporate Governance

Satisfactory Essays
Open Document
Open Document
5654 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Corporate Governance
Management Information Systems: Managing the Digital Firm, 11e (Laudon/Laudon)
Chapter 4 Ethical and Social Issues in Information Systems

1) Advances in data storage have made routine violation of individual privacy more difficult.
Answer: FALSE
Diff: 1 Page Ref: 126
AACSB: Use of information technology
CASE: Content
Objective: 4.1

2) Professionals take on special rights and obligations because of their special claims to knowledge, wisdom, and respect.
Answer: TRUE
Diff: 1 Page Ref: 130-131
AACSB: Ethical understanding and reasoning abilities
CASE: Content
Objective: 4.2

3) Privacy is the right to be left alone when you want to be, without surveillance or interference from other individuals or organizations.
Answer: TRUE
Diff: 1 Page Ref: 131
AACSB: Reflective thinking skills
CASE: Content
Objective: 4.3

4) Web sites use "cookies" in order to obtain the names and addresses of their visitors.
Answer: FALSE
Diff: 2 Page Ref: 134
AACSB: Use of information technology
CASE: Content
Objective: 4.3

5) A cookie is a small file containing information about you and your Web activities that is deposited on your hard disk by a Web site.
Answer: TRUE
Diff: 2 Page Ref: 134
AACSB: Use of information technology
CASE: Content
Objective: 4.3

6) Spyware is software that comes hidden in downloaded applications and can track your online movements.
Answer: TRUE
Diff: 2 Page Ref: 135
AACSB: Use of information technology
CASE: Content
Objective: 4.3

7) Most Internet businesses do very little to protect the privacy of their customers.
Answer: TRUE
Diff: 2 Page Ref: 136
AACSB: Use of information technology
CASE: Content
Objective: 4.3

8) P3P encrypts or scrambles e-mail or data so that it cannot be read illicitly.
Answer: FALSE
Diff: 2 Page Ref: 137
AACSB: Use of information technology
CASE: Content
Objective: 4.3

9) Protection for trade secrets is enforced at the federal level.
Answer:

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    4. It is a program in which malicious or harmful code is disguised inside some apparently harmless programming or data.…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Websites are routinely collecting information about customers and visitors to understand and serve their customers better. Personal information is collected and administrated with integrity, responsibility, and security.…

    • 423 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    unit 637

    • 297 Words
    • 2 Pages

    1.2. Explain the legal requirements and agreed ways of working for the security and confidentiality of information.…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The CNC Machinist: Quiz

    • 7255 Words
    • 53 Pages

    _____ is the right to be left alone when one wants to be, to have control over one's own personal possessions, and not to be observed without one's consent. Question options:…

    • 7255 Words
    • 53 Pages
    Powerful Essays
  • Better Essays

    1) You can call the module several times instead of writing it out each time.…

    • 1580 Words
    • 11 Pages
    Better Essays
  • Good Essays

    14fa MIDTERM

    • 882 Words
    • 5 Pages

    3. In your browser, the _________ is the location where you can enter the address of a web page or web site (like http://cnn.com) that you wish to view.…

    • 882 Words
    • 5 Pages
    Good Essays
  • Good Essays

    AIS Chapter 3 P 3-7

    • 416 Words
    • 2 Pages

    Cookies: The CIA Web site not only gives a brief definition of each type of…

    • 416 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Dirt Bike

    • 312 Words
    • 2 Pages

    Dirt Bikes and its Web site visitors? What privacy issues do cookies create for Dirt…

    • 312 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Privacy is the state of being free from intrusion in one’s personal life, or so it used to be. In Simson Garfinkel’s article “Privacy Under Attack” he discusses how technology has invaded people’s privacies over the years and continues to do so. From telephone systems and mail to car computers and surveillance cameras.…

    • 760 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Ais Ch. 11

    • 910 Words
    • 4 Pages

    5. Relatively small programs that infect other application software by attaching to it and disturbing application functioning…

    • 910 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    This website typically collects information either voluntarily-provided by you or automatically collected when you visit our website, which may include cookies, third party tracking technologies and server logs. Voluntarily provided information may include your name, address, email address, billing and credit card information, and are usually obtained when you fill out our contact forms.…

    • 631 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Privacy: You have the right to privacy, and to keep and use your personal belongings and property as long as it doesn't interfere with the rights,…

    • 1536 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    8. B. The web browser asks for the one object identified by the web address, and the web server automatically sends the rest of the objects to the browser.…

    • 483 Words
    • 2 Pages
    Powerful Essays
  • Good Essays

    In today’s online market, some of the best companies do not make that much money off of their products. Instead, they make money off of gathering information about their clients/customers. People may ask, “How do they do this?” But the answer is simple, they track your cookies that you leave behind when you browse a website. Have you ever noticed that you went to look up a product, and you decided not to buy it that same day? But then, you go online, then next day and see ads all over websites with the product that you were thinking of buying. They call this cookie proliferation, and the Executive Editor of PCWorld, Melissa Riofrio, wrote an online article “The 5 Biggest Online Privacy Threats of 2013,” in which she says that “It’s totally invisible to users. They have no idea what’s happening” (Riofrio para 9). Meaning…

    • 756 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Data Breach Research Paper

    • 1510 Words
    • 7 Pages

    These types of trackers are known as web trackers, and are utilized on almost every website on the web. Web tracking is important to look at because Americans do express concern over internet cookies and web tracking. A poll of 1017 Americans done by Craig Newmark, Rad Campaign and Lincoln Park Strategies found, “72% are concerned about ‘Tracking Cookies’ placed on computers without consent” (Newmark). Web tracking is a process that involves a consumer as well as a website and other third parties. A consumer visits a website and then a web cookie from that site is downloaded onto the computer of the user. Third party advertisers also download a cookie that stores information about a machine. These cookies provide a unique identifier to the computer and the user. Then, if the consumer visits other websites with the same third party, or web owner, they will also know that this consumer visited another one of their pages. Tracking cookies have become extremely prominent on web pages. Keynote Systems did a report in 2012 and found “ 86% of the sites place one or more third-party tracking cookies on their visitors” (Messmer). As discussed earlier, this compromises a person's privacy information because the third-party trackers can discover which other sites a person may have been on, and considering most sites have them, a third-party cookie could nearly know every website that a person…

    • 1510 Words
    • 7 Pages
    Good Essays

Related Topics