978-0134238241 Chapter 4 Part 2

subject Type Homework Help
subject Pages 9
subject Words 2170
subject Authors Jane P. Laudon, Kenneth C. Laudon

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
11
36) Which of the following gives patients access to personal medical records and the right to
authorize how this information can be used or disclosed?
A) HIPAA
B) Gramm-Leach-Bliley Act
C) Privacy Protection Act
D) Freedom of Information Act
E) Fair Information Practices Act
AACSB: Application of Knowledge
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
37) Which of the following is not a U.S. federal law affecting private institutions?
A) COPPA
B) HIPAA
C) Gramm-Leach-Bliley Act
D) Video Privacy Protection Act
E) Computer Matching and Privacy Protection Act
AACSB: Application of Knowledge
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
38) All of the following laws apply to actions by the federal government except:
A) the Freedom of Information Act.
B) the Privacy Act.
C) the Computer Security Act.
D) the Children's Online Privacy Protection Act.
E) the E-Government Act.
AACSB: Application of Knowledge
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
page-pf2
12
39) When a cookie is created during a website visit, it is stored:
A) on the website computer.
B) on the hard drive of the visitor's computer.
C) on the ISP's computer.
D) in a web directory.
E) in the cloud.
AACSB: Information Technology
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
40) The U.S. Department of Commerce developed a(n) ________ framework in order to enable
U.S. businesses to legally use personal data from EU countries.
A) COPPA
B) P3P
C) PGP
D) safe harbor
E) FIP
AACSB: Application of Knowledge
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
41) The Online Privacy Alliance:
A) encourages self-regulation to develop a set of privacy guidelines for its members.
B) protects user privacy during interactions with websites.
C) has established technical guidelines for ensuring privacy.
D) is a government agency regulating the use of customer information.
E) is a safe harbor program established by the U.S. government.
AACSB: Application of Knowledge
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
page-pf3
13
42) A(n) ________ model of informed consent permits the collection of personal information
until the consumer specifically requests that the data not be collected.
A) opt-in
B) opt-out
C) P3P
D) PGP
E) safe harbor
AACSB: Application of Knowledge
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
43) What percent of global Internet users use Google Search and other Google services?
A) Less than 10 percent
B) Around 25 percent
C) About 50 percent
D) Nearly 80 percent
E) Over 90 percent
AACSB: Information Technology
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
44) TRUSTe is an example of which of the following?
A) Web beacon
B) Behavioral targeting program
C) Opt-out program
D) Spyware
E) Online seal program
AACSB: Application of Knowledge
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
page-pf4
14
45) Which of the following forms of protection of intellectual property requires that the property
be the subject of a nondisclosure agreement?
B) Patent
C) All forms of intellectual property protection
D) Trademark
E) Trade secret
AACSB: Application of Knowledge
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
46) All of the following are technical solutions to protecting user privacy except:
A) email encryption.
B) anonymous surfing.
C) anonymous email.
D) preventing client computers from accepting cookies.
E) data use policies.
AACSB: Application of Knowledge
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
47) Which of the following protects the authors of a book from having their work copied by
others?
A) Patent protection
B) Due process
D) Fair Use Doctrine
E) Trade secrets
AACSB: Application of Knowledge
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
page-pf5
15
Copyright © 2017 Pearson Education, Inc.
48) "Look and feel" copyright infringement lawsuits are concerned with:
A) the distinction between tangible and intangible ideas.
B) the distinction between an idea and its expression.
C) using the graphical elements of another product.
D) using the creative elements of another product.
E) violation of a monopoly on the ideas behind a product.
AACSB: Application of Knowledge
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
49) The NAI is an industry association formed to help with which of the following?
B) Online privacy issues
C) Patent protection
D) Trademark protection
E) Trade secret protection
AACSB: Application of Knowledge
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
A) Musical compositions
B) Motion pictures
C) Maps
D) Artwork
E) Machines
AACSB: Application of Knowledge
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
page-pf6
16
Copyright © 2017 Pearson Education, Inc.
51) Which of the following adjusts copyright laws to the Internet age by making it illegal to
circumvent technology-based protections of copyrighted materials?
A) Digital Millennium Copyright Act
B) Privacy Act
C) Freedom of Information Act
D) Electronic Communications Privacy Act
E) Fair Information Practices Act
AACSB: Application of Knowledge
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
52) Which of the following is not a difficulty in establishing patent protection?
A) Length of time required to receive protection
B) The requirement that the work reflect some special understanding and contibution
C) The requirement that the work must be original
D) The requirement that the work must be novel
E) The requirement that the work must be a secret
AACSB: Application of Knowledge
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
53) ________ are not held liable for the messages they transmit.
A) Regulated common carriers
B) Private individuals
C) Organizations and businesses
D) Elected officials
E) European ISPs
AACSB: Application of Knowledge
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
page-pf7
17
54) Which of the following statements about Flash cookies is not true?
A) Flash cookies are installed only at the user's request.
B) Flash cookies are stored on the user's computer.
C) Flash cookies cannot be easily detected or deleted.
D) Flash cookies are sometimes called super cookies.
E) Flash cookies can be installed whenever a person clicks a Flash video.
AACSB: Information Technology
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
55) Advertisers use ________ in order to display more relevant ads based on a user's search and
browsing history.
A) behavioral targeting
B) web bugs
C) NORA
D) intelligent agents
E) FIP principles
AACSB: Application of Knowledge
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
56) _________ prohibits an organization from collecting any personal information unless the
individual specifically takes action to approve information collection and use.
A) A safe harbor
B) The opt-in model
C) FIP principles
D) P3P
E) The opt-out model
AACSB: Application of Knowledge
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
page-pf8
18
57) ________ grants the owner an exclusive monopoly on the ideas behind an invention for 20
years.
B) Trademark law
C) Patent law
D) Trade secret law
E) Intellectual property law
AACSB: Application of Knowledge
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
58) Digital media differs from a physical book in all of the following ways except:
A) ease of replication.
B) ease of alteration.
C) ease of transmission.
D) ease of global distribution.
E) ease of establishing uniqueness.
AACSB: Application of Knowledge
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
59) Which of the following is not a file-sharing service?
A) The Pirate Bay
B) Megaupload
C) Morpheus
D) Pandora
E) Grokster
AACSB: Application of Knowledge
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
page-pf9
19
60) Which of the following were involved in what has been called the patent trial of the century?
A) Apple and Microsoft
B) Apple and Hewlett-Packard
C) Microsoft and Symantec
D) Microsoft and Facebook
E) Apple and Samsung
AACSB: Application of Knowledge
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
61) According to a Wall Street Journal study, all of the following websites installed tracking
files on visitor computers except:
A) Google
B) Comcast
C) Wikipedia
D) Dictionary.com
E) MSN
AACSB: Application of Knowledge
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
62) Which of the following is not true about the changes to EU data protection rules proposed in
2012?
A) The new rules would require Internet companies to obtain explicit consent from consumers
for the use of their personal data.
B) The new rules would require Internet companies to delete information at the user's request.
C) The new rules would require Internet companies to retain information only as long as
absolutely necessary.
D) The new rules would reject the right to be forgotten.
E) The new rules would apply only to all companies providing services in Europe.
AACSB: Application of Knowledge
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
63) Privacy is the right to be left alone when you want to be, without surveillance or interference
from other individuals or organizations.
AACSB: Application of Knowledge
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
page-pfa
20
64) Spyware is software that comes hidden in downloaded applications and can track your online
movements.
AACSB: Information Technology
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
65) Most Internet businesses do very little to protect the privacy of their customers.
AACSB: Information Technology
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
66) The rate of global piracy is approximately 20%.
AACSB: Application of Knowledge
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
67) Protections for trade secrets vary from state to state.
AACSB: Application of Knowledge
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
game.
AACSB: Application of Knowledge
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
AACSB: Application of Knowledge
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.