You are on page 1of 68

Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues

True / False

1. Anonymous remailers both help protect freedom of speech by keeping communications anonymous and prevent people
from using email for illegal or unethical purposes.
  a.  True
  b.  False
ANSWER:   False
RATIONALE:   Internet users who want to remain anonymous can send email to an anonymous remailer service,
which uses a computer program to strip the originating header and/or IP number from the message. It
then forwards the message to its intended recipient—an individual, a chat room, or a newsgroup—
with either no IP address or a fake one, ensuring that the header information cannot be used to identify
the author. The use of a remailer keeps communications anonymous; what is communicated, and
whether it is ethical or legal, is up to the sender. The use of remailers by people committing unethical
or even illegal acts in some states or countries has spurred controversy.
FEEDBACK:   Correct   The use of a remailer keeps communications anonymous; what is communicated, and
whether it is ethical or legal, is up to the sender.
Incorrect   The use of a remailer keeps communications anonymous; what is communicated, and
whether it is ethical or legal, is up to the sender.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Measures Protecting Freedom of Speech
QUESTION TYPE:  True / False
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.11 - Discuss how the First Amendment and anonymous expression safeguard our freedom
CTIVES:   of speech.
NATIONAL STAND United States - BUSPROG: Legal - Legal
ARDS:  
KEYWORDS:   Bloom's: Remember
DATE CREATED:  11/19/2019 5:54 PM
DATE MODIFIED: 1/2/2020 3:24 PM
 

2. If an activity is defined as legal then it is ethical.


  a.  True
  b.  False
ANSWER:   False
RATIONALE:   Legal acts conform to the law. Ethical acts conform to what an individual believes to be the right
thing to do. Laws can proclaim an act as legal, although many people may consider the act unethical.
Laws may also proclaim an act as illegal, although many people may consider the act ethical.
FEEDBACK:   Correct   Laws can proclaim an act as legal, although many people may consider the act unethical.
Incorrect   Laws can proclaim an act as legal, although many people may consider the act unethical.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Ethical Versus Legal
QUESTION TYPE:  True / False
HAS VARIABLES:  False

Copyright Cengage Learning. Powered by Cognero. Page 1


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
LEARNING OBJE POIS.14e.3.1 - Explain the difference between ethical and legal.
CTIVES:  
NATIONAL STAND United States - BUSPROG: Legal - Legal
ARDS:  
KEYWORDS:   Bloom's: Remember
DATE CREATED:  11/19/2019 5:54 PM
DATE MODIFIED: 1/2/2020 3:30 PM
 

3. Laws and regulations have thoroughly addressed concerns about privacy and data management in private organizations
and federal agencies.
  a.  True
  b.  False
ANSWER:   False
RATIONALE:   Many people object to the data collection policies of governments and businesses on the grounds that
they strip individuals of the power to control their own personal information. For these people, the
existing hodgepodge of privacy laws and practices fails to provide adequate protection. Instead, it
causes confusion that promotes distrust and skepticism, which are further fueled by additional
disclosures of threats to privacy.
FEEDBACK:   Correct   Many people object to the data collection policies of governments and businesses. For
these people, the existing hodgepodge of privacy laws and practices fails to provide
adequate protection.
Incorrect   Many people object to the data collection policies of governments and businesses. For
these people, the existing hodgepodge of privacy laws and practices fails to provide
adequate protection.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Information Systems and Privacy
QUESTION TYPE:  True / False
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.8 - Identify four measures you should take to protect your personal privacy.
CTIVES:  
NATIONAL STAND United States - BUSPROG: Legal - Legal
ARDS:  
KEYWORDS:   Bloom's: Remember
DATE CREATED:  11/19/2019 5:54 PM
DATE MODIFIED: 1/2/2020 3:42 PM
 

4. The GDPR obligates organizations that operate in the European Union to obtain the consent of the people they collect
information about.
  a.  True
  b.  False
ANSWER:   True
RATIONALE:   The General Data Protection Regulation (GDPR) is a set of data privacy requirements that apply
across the European Union including non-EU organizations that market to or process information of
individuals in the European Union. In general, it increases the rights of individuals and gives them

Copyright Cengage Learning. Powered by Cognero. Page 2


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
more control over their information. GDPR places obligations on organizations to obtain the consent
of people they collect information about and to better manage this data. This includes putting in place
a data protection officer and data protection policies, performing data protection assessments,
providing training for employees to ensure that they are aware of their responsibilities related to
personal data, and having written documentation explaining how data is processed.
FEEDBACK:   Correct   GDPR places obligations on organizations to obtain the consent of people they collect
information about and to better manage this data.
Incorrect   GDPR places obligations on organizations to obtain the consent of people they collect
information about and to better manage this data.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Measures Protecting Personal Data
QUESTION TYPE:  True / False
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.6 - Summarize the differences between U.S. and EU fair information practices.
CTIVES:  
NATIONAL STAND United States - BUSPROG: Legal - Legal
ARDS:  
KEYWORDS:   Bloom's: Remember
DATE CREATED:  11/19/2019 5:54 PM
DATE MODIFIED: 1/4/2020 3:12 PM
 

5. In the U.S., there is some debate over privacy between those who favor data collection as a means to increase national
security and those who view such programs as a violation of rights guaranteed by the Constitution and the Bill of Rights.
  a.  True
  b.  False
ANSWER:   True
RATIONALE:   In recent years, new laws addressing government electronic surveillance have been added and old
laws amended in reaction to the development of new communication technologies and a heightened
awareness of potential terrorist threats. The net result is that the scope of government surveillance has
greatly expanded—going from collecting data on as few people as necessary to collecting as much
data as possible on as many people as possible. Many of the resulting surveillance activities are
viewed by some as an unconstitutional violation of the Fourth Amendment, which protects us from
illegal searches and seizures. As a result, there are frequent court challenges to these government
actions, as well as an ongoing public debate about whether such activities make Americans safer or
simply erode our rights to privacy.
FEEDBACK:   Correct   There are frequent court challenges to government surveillance activities, as well as an
ongoing public debate about whether such activities make Americans safer or simply erode
our rights to privacy.
Incorrect   There are frequent court challenges to government surveillance activities, as well as an
ongoing public debate about whether such activities make Americans safer or simply erode
our rights to privacy.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Information Systems and Government Surveillance
QUESTION TYPE:  True / False
HAS VARIABLES:  False
Copyright Cengage Learning. Powered by Cognero. Page 3
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
LEARNING OBJE POIS.14e.3.9 - Discuss the tradeoffs between security and privacy.
CTIVES:  
NATIONAL STAND United States - BUSPROG: Legal - Legal
ARDS:  
KEYWORDS:   Bloom's: Remember
DATE CREATED:  11/19/2019 5:54 PM
DATE MODIFIED: 1/2/2020 3:54 PM
 

6. Some organizations choose to practice a form of Internet censorship by installing Internet filters on their employees'
computers to prevent them from viewing sites containing pornography or other objectionable material.
  a.  True
  b.  False
ANSWER:   True
RATIONALE:   Some organizations choose to install filters on their employees’ computers to prevent them from
viewing sites that contain pornography or other objectionable material. Employees unwillingly
exposed to such material would have a strong case for sexual harassment. The use of filters can also
ensure that employees do not waste their time viewing nonbusiness-related Web sites.
FEEDBACK:   Correct   Some organizations choose to install filters on their employees’ computers to prevent them
from viewing sites that contain pornography or other objectionable material.
Incorrect   Some organizations choose to install filters on their employees’ computers to prevent them
from viewing sites that contain pornography or other objectionable material.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Internet Censorship
QUESTION TYPE:  True / False
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.12 - Describe the impact of censorship on the operation of Internet service providers.
CTIVES:  
NATIONAL STAND United States - BUSPROG: Legal - Legal
ARDS:  
KEYWORDS:   Bloom's: Remember
DATE CREATED:  11/19/2019 5:54 PM
DATE MODIFIED: 1/2/2020 4:03 PM
 

7. Some non-health-care companies offer health and wellness programs that require employee participants to share
personal data. They are required to employ standardized electronic transactions, codes, and identifiers under HIPAA
regulations.
  a.  True
  b.  False
ANSWER:   False
RATIONALE:   The Health Insurance Portability and Accountability Act (HIPAA) requires health care organizations
to employ standardized electronic transactions, codes, and identifiers to enable them to fully digitize
medical records, thus making it possible to exchange medical data over the Internet. HIPPA assigns
responsibility to health care organizations for certifying that their business partners (billing agents,
insurers, debt collectors, research firms, government agencies, and charitable organizations) also
Copyright Cengage Learning. Powered by Cognero. Page 4
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
comply with HIPAA security and privacy rules.
FEEDBACK:   Correct   The Health Insurance Portability and Accountability Act (HIPAA) requires health care
organizations to employ standardized electronic transactions, codes, and identifiers and
assigns responsibility to health care organizations for certifying that their business partners
also comply with HIPAA security and privacy rules.
Incorrect   The Health Insurance Portability and Accountability Act (HIPAA) requires health care
organizations to employ standardized electronic transactions, codes, and identifiers and
assigns responsibility to health care organizations for certifying that their business partners
also comply with HIPAA security and privacy rules.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Measures Protecting Personal Data
QUESTION TYPE:  True / False
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.7 - Identify three subject areas where measures have been taken to protect personal data.
CTIVES:  
NATIONAL STAND United States - BUSPROG: Legal - Legal
ARDS:  
KEYWORDS:   Bloom's: Remember
DATE CREATED:  11/19/2019 5:54 PM
DATE MODIFIED: 1/2/2020 4:20 PM
 

8. U.S. federal law permits employers to prevent viewing of pornography in the workplace by employees. 
  a.  True
  b.  False
ANSWER:   True
RATIONALE:   If an employee sees a coworker viewing porn on a workplace computer, that employee may be able to
claim that the company has created a hostile work environment. Such a claim opens the organization
to a sexual harassment lawsuit that can cost hundreds of thousands of dollars and tie up managers and
executives in endless depositions and court appearances. Many companies believe that they have a
duty to stop the viewing of pornography in the workplace. As long as they can show that they took
reasonable steps and determined actions to prevent it, they have a valid defense if they become the
subject of a sexual harassment lawsuit.
FEEDBACK:   Correct   Many companies believe that they have a duty to stop the viewing of pornography in the
workplace. As long as they can show that they took reasonable steps and determined
actions to prevent it, they have a valid defense if they become the subject of a sexual
harassment lawsuit.
Incorrect   Many companies believe that they have a duty to stop the viewing of pornography in the
workplace. As long as they can show that they took reasonable steps and determined
actions to prevent it, they have a valid defense if they become the subject of a sexual
harassment lawsuit.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Internet Censorship
QUESTION TYPE:  True / False
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.13 - Identify measures taken to address defamation, hate speech, and pornography on the
Copyright Cengage Learning. Powered by Cognero. Page 5
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
CTIVES:   Internet.
NATIONAL STAND United States - BUSPROG: Legal - Legal
ARDS:  
KEYWORDS:   Bloom's: Remember
DATE CREATED:  11/19/2019 5:54 PM
DATE MODIFIED: 1/2/2020 4:33 PM
 

9. Never send sensitive personal data such as credit card numbers, bank account numbers, or passwords via text or IM;
only send them through Web sites that don't begin with https or cause a padlock icon to appear in the Address bar or status
bar.
  a.  True
  b.  False
ANSWER:   False
RATIONALE:   Take extra care when purchasing anything from a Web site. Make sure that you safeguard your credit
card numbers, passwords, and personal information. Do not do business with a site unless you know
that it handles credit card information securely. (Look for a seal of approval from organizations such
as the Better Business Bureau Online or TRUSTe. When you open the Web page where you enter
credit card information or other personal data, make sure that the Web address begins with https and
check to see if a locked padlock icon appears in the Address bar or status bar.)
FEEDBACK:   Correct   When you open the Web page where you enter credit card information or other personal
data, make sure that the Web address begins with https and check to see if a locked
padlock icon appears in the Address bar or status bar.
Incorrect   When you open the Web page where you enter credit card information or other personal
data, make sure that the Web address begins with https and check to see if a locked
padlock icon appears in the Address bar or status bar.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Individual Efforts to Protect Privacy
QUESTION TYPE:  True / False
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.8 - Identify four measures you should take to protect your personal privacy.
CTIVES:  
NATIONAL STAND United States - BUSPROG: Technology
ARDS:  
KEYWORDS:   Bloom's: Remember
DATE CREATED:  11/19/2019 5:54 PM
DATE MODIFIED: 1/2/2020 4:43 PM
 

10. Amy is doing some online research for a term paper. She'd like to access some information on a particular Web site,
but the Web site is asking her to put in her email address before allowing her to view the information. She wonders what
the Web site owner will do with that information, but there is no way for her to know how data collected via a Web site
will be used.
  a.  True
  b.  False
ANSWER:   False

Copyright Cengage Learning. Powered by Cognero. Page 6


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
RATIONALE:   Most organizations feel a strong need to create a privacy policy that describes how it gathers, stores,
shares, and sells data about its visitors.
FEEDBACK:   Correct   Most organizations feel a strong need to create a privacy policy that describes how it
gathers, stores, shares, and sells data about its visitors.
Incorrect   Most organizations feel a strong need to create a privacy policy that describes how it
gathers, stores, shares, and sells data about its visitors.
POINTS:   1
DIFFICULTY:   Moderate
REFERENCES:   Web Site Privacy Policy
QUESTION TYPE:  True / False
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.8 - Identify four measures you should take to protect your personal privacy.
CTIVES:  
NATIONAL STAND United States - BUSPROG: Technology
ARDS:  
KEYWORDS:   Bloom's: Remember
DATE CREATED:  11/19/2019 5:54 PM
DATE MODIFIED: 1/2/2020 4:48 PM
 

11. It's safe for you to input personal data into your Facebook profile because Facebook is not allowed to share this
information with law enforcement officials or third parties for any reason.
  a.  True
  b.  False
ANSWER:   False
RATIONALE:   Downstream (formerly PRISM) is an NSA surveillance program that collects Internet data, such as
search histories; photos sent and received; and the contents of email, file transfers, and voice and
video chats from the servers of AOL, Apple, Facebook, Google, Microsoft, Paltalk, Skype, Yahoo,
and YouTube.
FEEDBACK:   Correct   Downstream (formerly PRISM) is an NSA surveillance program that collects Internet data,
such as search histories; photos sent and received; and the contents of email, file
transfers, and voice and video chats from the servers of AOL, Apple, Facebook, Google,
Microsoft, Paltalk, Skype, Yahoo, and YouTube.
Incorrect   Downstream (formerly PRISM) is an NSA surveillance program that collects Internet data,
such as search histories; photos sent and received; and the contents of email, file
transfers, and voice and video chats from the servers of AOL, Apple, Facebook, Google,
Microsoft, Paltalk, Skype, Yahoo, and YouTube.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Information Systems and Government Surveillance
QUESTION TYPE:  True / False
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.10 - Discuss how three U.S. federal statutes protect citizens from government surveillance
CTIVES:   while at the same time authorize the government to collect data.
NATIONAL STAND United States - BUSPROG: Legal - Legal
ARDS:  
KEYWORDS:   Bloom's: Remember
Copyright Cengage Learning. Powered by Cognero. Page 7
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
DATE CREATED:  11/19/2019 5:54 PM
DATE MODIFIED: 1/2/2020 4:57 PM
 

12. Software developers have created filtering software that blocks children from viewing inappropriate or harmful
Internet sites at home or school, but to date developers have been unsuccessful in creating a similar software for use in the
workplace.
  a.  True
  b.  False
ANSWER:   False
RATIONALE:   An Internet filter is software that can be used to block access to certain Web sites that contain material
deemed inappropriate or offensive. The best Internet filters use a combination of URL, keyword, and
dynamic content filtering. In an attempt to protect children from accessing pornography and other
explicit material online, Congress passed the Children’s Internet Protection Act (CIPA) in 2000. The
act required federally financed schools and libraries to use some form of technological protection
(such as an Internet filter) to block computer access to obscene material, pornography, and anything
else considered harmful to minors. Some organizations choose to install filters on their employees’
computers to prevent them from viewing sites that contain pornography or other objectionable
material.
FEEDBACK:   Correct   An Internet filter is software that can be used to block access to certain Web sites that
contain material deemed inappropriate or offensive. Some organizations choose to install
filters on their employees’ computers to prevent them from viewing sites that contain
pornography or other objectionable material.
Incorrect   An Internet filter is software that can be used to block access to certain Web sites that
contain material deemed inappropriate or offensive. Some organizations choose to install
filters on their employees’ computers to prevent them from viewing sites that contain
pornography or other objectionable material.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Internet Censorship
QUESTION TYPE:  True / False
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.13 - Identify measures taken to address defamation, hate speech, and pornography on the
CTIVES:   Internet.
NATIONAL STAND United States - BUSPROG: Technology
ARDS:  
KEYWORDS:   Bloom's: Remember
DATE CREATED:  11/19/2019 5:54 PM
DATE MODIFIED: 1/2/2020 5:07 PM
 

13. The U.S. Congress has made several attempts to pass and maintain legislation that limits children's exposure to online
pornography, but eventually each of these laws has been ruled out because they were unconstitutional.
  a.  True
  b.  False
ANSWER:   False
RATIONALE:   To date, only a few laws have been implemented to protect children online, and several of these have
been ruled unconstitutional under the First Amendment and its protection of freedom of expression.
Copyright Cengage Learning. Powered by Cognero. Page 8
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
Nonetheless, Congress passed the Children’s Internet Protection Act (CIPA) in 2000. The act required
federally financed schools and libraries to use some form of technological protection (such as an
Internet filter) to block computer access to obscene material, pornography, and anything else
considered harmful to minors.
FEEDBACK:   Correct   Congress passed the Children’s Internet Protection Act (CIPA) in 2000. The act required
federally financed schools and libraries to use some form of technological protection (such
as an Internet filter) to block computer access to obscene material, pornography, and
anything else considered harmful to minors.
Incorrect   Congress passed the Children’s Internet Protection Act (CIPA) in 2000. The act required
federally financed schools and libraries to use some form of technological protection (such
as an Internet filter) to block computer access to obscene material, pornography, and
anything else considered harmful to minors.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Internet Censorship
QUESTION TYPE:  True / False
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.13 - Identify measures taken to address defamation, hate speech, and pornography on the
CTIVES:   Internet.
NATIONAL STAND United States - BUSPROG: Legal - Legal
ARDS:  
KEYWORDS:   Bloom's: Remember
DATE CREATED:  11/19/2019 5:54 PM
DATE MODIFIED: 1/2/2020 5:19 PM
 

14. The American Recovery and Reinvestment Act Title XIII helped establish the National Fraud Alert system to help
prevent identity theft.
  a.  True
  b.  False
ANSWER:   False
RATIONALE:   The Fair and Accurate Credit Transactions Act was passed in 2003 as an amendment to the Fair
Credit Reporting Act, and it allows consumers to request and obtain a free credit report once each
year from each of the three primary consumer credit reporting companies (Equifax, Experian, and
TransUnion). The act also helped establish the National Fraud Alert system to help prevent identity
theft.
FEEDBACK:   Correct   The Fair and Accurate Credit Transactions Act helped establish the National Fraud Alert
system to help prevent identity theft.
Incorrect   The Fair and Accurate Credit Transactions Act helped establish the National Fraud Alert
system to help prevent identity theft.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Measures Protecting Personal Data
QUESTION TYPE:  True / False
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.7 - Identify three subject areas where measures have been taken to protect personal data.
CTIVES:  

Copyright Cengage Learning. Powered by Cognero. Page 9


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
NATIONAL STAND United States - BUSPROG: Legal - Legal
ARDS:  
KEYWORDS:   Bloom's: Remember
DATE CREATED:  11/19/2019 5:54 PM
DATE MODIFIED: 1/2/2020 5:24 PM
 

15. The term ethics refers to the set of principles about what is right and wrong that individuals use to make choices,
whereas the term law refers to a system of rules that tells us what we can and cannot do.
  a.  True
  b.  False
ANSWER:   True
RATIONALE:   Ethics is the set of principles about what is right and wrong that individuals use to make choices to
guide their decisions. Law is a system of rules that tells us what we can and cannot do.
FEEDBACK:   Correct   Ethics is the set of principles about what is right and wrong that individuals use to make
choices to guide their decisions. Law is a system of rules that tells us what we can and
cannot do.
Incorrect   Ethics is the set of principles about what is right and wrong that individuals use to make
choices to guide their decisions. Law is a system of rules that tells us what we can and
cannot do.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Ethical Versus Legal
QUESTION TYPE:  True / False
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.1 - Explain the difference between ethical and legal.
CTIVES:  
NATIONAL STAND United States - BUSPROG: Legal - Legal
ARDS:  
KEYWORDS:   Bloom's: Remember
DATE CREATED:  11/19/2019 5:54 PM
DATE MODIFIED: 1/2/2020 5:36 PM
 

16. The pages on a university's website are maintained by individual departments and organizational units. It is a useful
policy to require that every change a user makes to his department pages be reviewed and approved.  

  a.  True
  b.  False
ANSWER:   True
RATIONALE:   Reviewing changes made to department Web pages can help protect the university and its employees
from legal action. In a 1909 ruling (United States v. New York Central & Hudson River Railroad Co.),
the U.S. Supreme Court established that an employer can be held responsible for the acts of its
employees even if the employees act in a manner contrary to corporate policy and their employer’s
directions. The principle established is called respondeat superior, or “let the master answer.”
FEEDBACK:   Correct   Reviewing changes made to department Web pages can help protect the university and its
employees from legal action in light of the legal principle called respondeat superior, or “let
the master answer.”
Copyright Cengage Learning. Powered by Cognero. Page 10
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
Incorrect   Reviewing changes made to department Web pages can help protect the university and its
employees from legal action in light of the legal principle called respondeat superior, or “let
the master answer.”
POINTS:   1
DIFFICULTY:   Moderate
REFERENCES:   Fostering Corporate Social Responsibility and Good Business Ethics
QUESTION TYPE:  True / False
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.2 - Identify five reasons for an organization to promote a work environment where
CTIVES:   employees are encouraged to act ethically.
NATIONAL STAND United States - BUSPROG: Legal - Legal
ARDS:  
KEYWORDS:   Bloom's: Remember
DATE CREATED:  11/19/2019 5:54 PM
DATE MODIFIED: 1/2/2020 5:44 PM
 

17. If you use Google, the NSA can access your search history data without obtaining a court order.
  a.  True
  b.  False
ANSWER:   True
RATIONALE:   Downstream (formerly PRISM) is an NSA surveillance program that collects Internet data, such as
search histories; photos sent and received; and the contents of email, file transfers, and voice and
video chats from the servers of AOL, Apple, Facebook, Google, Microsoft, Paltalk, Skype, Yahoo,
and YouTube.
FEEDBACK:   Correct   Downstream (formerly PRISM) is an NSA surveillance program that collects Internet data,
such as search histories; photos sent and received; and the contents of email, file
transfers, and voice and video chats from the servers of AOL, Apple, Facebook, Google,
Microsoft, Paltalk, Skype, Yahoo, and YouTube.
Incorrect   Downstream (formerly PRISM) is an NSA surveillance program that collects Internet data,
such as search histories; photos sent and received; and the contents of email, file
transfers, and voice and video chats from the servers of AOL, Apple, Facebook, Google,
Microsoft, Paltalk, Skype, Yahoo, and YouTube.
POINTS:   1
DIFFICULTY:   Moderate
REFERENCES:   Information Systems and Government Surveillance
QUESTION TYPE:  True / False
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.10 - Discuss how three U.S. federal statutes protect citizens from government surveillance
CTIVES:   while at the same time authorize the government to collect data.
NATIONAL STAND United States - BUSPROG: Legal - Legal
ARDS:  
KEYWORDS:   Bloom's: Remember
DATE CREATED:  11/19/2019 5:54 PM
DATE MODIFIED: 1/2/2020 5:49 PM
 

Copyright Cengage Learning. Powered by Cognero. Page 11


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
Multiple Choice

18. _____ involves publishing an intentionally false written statement that is damaging to a person's or an organization's
reputation.
  a.  Vishing b.  Slander
  c.  Libel d.  Phishing
ANSWER:   c
RATIONALE:   Making either an oral or a written statement of alleged fact that is false and that harms another person
is defamation. The harm is often of a financial nature, in that it reduces a person’s ability to earn a
living, work in a profession, or run for an elected office, for example. An oral defamatory statement is
slander, and a written defamatory statement is libel.
FEEDBACK:     a. Making a written statement of alleged fact that is false and that harms another person is a
form of defamation known as libel.
  b. Making a written statement of alleged fact that is false and that harms another person is a
form of defamation known as libel.
  c. Making a written statement of alleged fact that is false and that harms another person is a
form of defamation known as libel.
  d. Making a written statement of alleged fact that is false and that harms another person is a
form of defamation known as libel.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Internet Censorship
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.13 - Identify measures taken to address defamation, hate speech, and pornography on the
CTIVES:   Internet.
NATIONAL STAND United States - BUSPROG: Legal - Legal
ARDS:  
KEYWORDS:   Bloom's: Remember
DATE CREATED:  11/19/2019 5:54 PM
DATE MODIFIED: 1/3/2020 2:53 PM
 

19. The _____ requires telephone companies to hold customer telephone records and Internet metadata and to respond to
queries about from the National Security Agency if the agency can prove that the records are relevant to a terrorism
investigation.
  a.  Foreign Intelligence Surveillance Act b.  Right to Financial Privacy Act
  c.  USA PATRIOT Act of 2001 d.  USA Freedom Act of 2015
ANSWER:   d
RATIONALE:   The USA Freedom Act terminated the bulk collection of telephone records and Internet metadata by
the NSA. Instead, telecommunications providers are now required to hold the data and respond to
NSA queries on the data. The bill authorizes the government to collect from the phone companies up
to “two hops” of call records related to a target—provided the government can prove it has reasonable
suspicion that the target is linked to a terrorist organization.
FEEDBACK:     a. The USA Freedom Act requires telecommunications providers to hold customer data and
respond to NSA queries on the data, providing up to “two hops” of call records related to
a target—provided the government can prove it has reasonable suspicion that the target
is linked to a terrorist organization.

Copyright Cengage Learning. Powered by Cognero. Page 12


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
  b. The USA Freedom Act requires telecommunications providers to hold customer data and
respond to NSA queries on the data, providing up to “two hops” of call records related to
a target—provided the government can prove it has reasonable suspicion that the target
is linked to a terrorist organization.
  c. The USA Freedom Act requires telecommunications providers to hold customer data and
respond to NSA queries on the data, providing up to “two hops” of call records related to
a target—provided the government can prove it has reasonable suspicion that the target
is linked to a terrorist organization.
  d. The USA Freedom Act requires telecommunications providers to hold customer data and
respond to NSA queries on the data, providing up to “two hops” of call records related to
a target—provided the government can prove it has reasonable suspicion that the target
is linked to a terrorist organization.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Federal Statutes That Protect Citizens from Government Surveillance
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.10 - Discuss how three U.S. federal statutes protect citizens from government surveillance
CTIVES:   while at the same time authorize the government to collect data.
NATIONAL STAND United States - BUSPROG: Legal - Legal
ARDS:  
KEYWORDS:   Bloom's: Remember
DATE CREATED:  11/19/2019 5:54 PM
DATE MODIFIED: 1/3/2020 3:12 PM
 

20. A professional _____ states the principles and core values that an organization wishes to develop in its leaders and
members and therefore defines desired behavior in these individuals.
  a.  code of ethics b.  code of conduct
  c.  code of civil procedure d.  code of norms
ANSWER:   a
RATIONALE:   A professional code of ethics states the principles and core values that an organization wishes to
develop in its leaders and members. The primary intent of a code of ethics is to define desired
behavior.
FEEDBACK:     a. A professional code of ethics states the principles and core values that an organization
wishes to develop in its leaders and members.
  b. A professional code of ethics states the principles and core values that an organization
wishes to develop in its leaders and members.
  c. A professional code of ethics states the principles and core values that an organization
wishes to develop in its leaders and members.
  d. A professional code of ethics states the principles and core values that an organization
wishes to develop in its leaders and members.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Professional Code of Ethics
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.4 - Define the primary intent and two key elements of an effective code of ethics.
Copyright Cengage Learning. Powered by Cognero. Page 13
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
CTIVES:  
NATIONAL STAND United States - BUSPROG: Legal - Legal
ARDS:  
KEYWORDS:   Bloom's: Remember
DATE CREATED:  11/19/2019 5:54 PM
DATE MODIFIED: 1/3/2020 3:23 PM
 

21. Which legislation helps to combat the growing crime of identity theft?


  a.  E-Government Act of 2002 b.  USA Freedom Act of 2015
  c.  USA Patriot Act of 2001 d.  Fair and Accurate Credit Transactions Act of 2003
ANSWER:   d
RATIONALE:   The Fair and Accurate Credit Transactions Act was passed in 2003 as an amendment to the Fair
Credit Reporting Act, and it allows consumers to request and obtain a free credit report once each
year from each of the three primary consumer credit reporting companies (Equifax, Experian, and
TransUnion). The act also helped establish the National Fraud Alert system to help prevent identity
theft. Under this system, consumers who suspect that they have been or may become a victim of
identity theft can place an alert on their credit files.
FEEDBACK:     a. The Fair and Accurate Credit Transactions Act helped establish the National Fraud Alert
system to help prevent identity theft.
  b. The Fair and Accurate Credit Transactions Act helped establish the National Fraud Alert
system to help prevent identity theft.
  c. The Fair and Accurate Credit Transactions Act helped establish the National Fraud Alert
system to help prevent identity theft.
  d. The Fair and Accurate Credit Transactions Act helped establish the National Fraud Alert
system to help prevent identity theft.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Measures Protecting Personal Data
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.7 - Identify three subject areas where measures have been taken to protect personal data.
CTIVES:  
NATIONAL STAND United States - BUSPROG: Legal - Legal
ARDS:  
KEYWORDS:   Bloom's: Remember
DATE CREATED:  11/19/2019 5:54 PM
DATE MODIFIED: 1/3/2020 3:28 PM
 

22. Harold is thinking about setting up profiles on Facebook and Twitter. Which of the following information should he
avoid sharing on these social media platforms?
  a.  his professional credentials b.  his photograph
  c.  his favorite movies d.  his place of birth
ANSWER:   d
RATIONALE:   Be careful when you share information about yourself. Keep personal information such as your birth
date, place of birth, home address, and phone number off social networks.
Copyright Cengage Learning. Powered by Cognero. Page 14
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
FEEDBACK:     a. Keep personal information such as your birth date, place of birth, home address, and
phone number off social networks.
  b. Keep personal information such as your birth date, place of birth, home address, and
phone number off social networks.
  c. Keep personal information such as your birth date, place of birth, home address, and
phone number off social networks.
  d. Keep personal information such as your birth date, place of birth, home address, and
phone number off social networks.
POINTS:   1
DIFFICULTY:   Moderate
REFERENCES:   Individual Efforts to Protect Privacy
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.8 - Identify four measures you should take to protect your personal privacy.
CTIVES:  
NATIONAL STAND United States - BUSPROG: Technology
ARDS:  
KEYWORDS:   Bloom's: Remember
DATE CREATED:  11/19/2019 5:54 PM
DATE MODIFIED: 1/3/2020 3:44 PM
 

23. Anne and Jordan have two preteen sons and they're concerned about what their kids might see and share on the
Internet. They should probably invest in _______.
  a.  Internet licensing b.  filtering software
  c.  security passwords d.  privacy screening
ANSWER:   b
RATIONALE:   An Internet filter is software that can be used to block access to certain Web sites that contain material
deemed inappropriate or offensive. The best Internet filters use a combination of URL, keyword, and
dynamic content filtering.
FEEDBACK:     a. An Internet filter is software that can be used to block access to certain Web sites that
contain material deemed inappropriate or offensive.
  b. An Internet filter is software that can be used to block access to certain Web sites that
contain material deemed inappropriate or offensive.
  c. An Internet filter is software that can be used to block access to certain Web sites that
contain material deemed inappropriate or offensive.
  d. An Internet filter is software that can be used to block access to certain Web sites that
contain material deemed inappropriate or offensive.
POINTS:   1
DIFFICULTY:   Moderate
REFERENCES:   Internet Censorship
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.13 - Identify measures taken to address defamation, hate speech, and pornography on the
CTIVES:   Internet.
NATIONAL STAND United States - BUSPROG: Technology
ARDS:  
Copyright Cengage Learning. Powered by Cognero. Page 15
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
KEYWORDS:   Bloom's: Remember
DATE CREATED:  11/19/2019 5:54 PM
DATE MODIFIED: 1/3/2020 3:55 PM
 

24. Although Roberta had signed a form preventing her doctor from sharing her personal medical records with the
company she worked for, she later discovered that the doctor's office had, in fact, shared her data with her health
insurance provider and her employer, which caused her to be terminated. Because the doctor's practice violated its own
privacy policy, she was able to file a lawsuit under the ________.
  a. Health Insurance Portability and Accountability Act b. Health and Medical Records Privacy Act
  c. Gramm-Leach-Bliley Act d. none of these answers
ANSWER:   a
RATIONALE:   The Health Insurance Portability and Accountability Act (HIPAA) requires health care organizations
to employ standardized electronic transactions, codes, and identifiers to enable them to fully digitize
medical records, thus making it possible to exchange medical data over the Internet. Under the
HIPAA provisions, health care providers must obtain written consent from patients prior to disclosing
any information in their medical records. In addition, health care providers are required to keep track
of everyone who receives information from a patient’s medical file.
FEEDBACK:     a. Under Health Insurance Portability and Accountability Act (HIPAA) provisions, health care
providers must obtain written consent from patients prior to disclosing any information in
their medical records.
  b. Under Health Insurance Portability and Accountability Act (HIPAA) provisions, health care
providers must obtain written consent from patients prior to disclosing any information in
their medical records.
  c. Under Health Insurance Portability and Accountability Act (HIPAA) provisions, health care
providers must obtain written consent from patients prior to disclosing any information in
their medical records.
  d. Under Health Insurance Portability and Accountability Act (HIPAA) provisions, health care
providers must obtain written consent from patients prior to disclosing any information in
their medical records.
POINTS:   1
DIFFICULTY:   Moderate
REFERENCES:   Measures Protecting Personal Data
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.7 - Identify three subject areas where measures have been taken to protect personal data.
CTIVES:  
NATIONAL STAND United States - BUSPROG: Legal - Legal
ARDS:  
KEYWORDS:   Bloom's: Remember
DATE CREATED:  11/19/2019 5:54 PM
DATE MODIFIED: 1/3/2020 4:01 PM
 

25. The Better Business Bureau recommends that an organization publish a privacy notice on its Web site that addresses
all of the following elements EXCEPT ________.
  a.  choice b.  selling
  c.  access d.  redress

Copyright Cengage Learning. Powered by Cognero. Page 16


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
ANSWER:   b
RATIONALE:   The Better Business Bureau recommends that a privacy notice should be based on the following five
elements:

 Notice (what personal information is being collected on the site)


 Choice (what options the customer has about how/whether personal data is collected and
used)
 Access (how a customer can see what data has been collected and change/correct it if
necessary)
 Security (state how any data that is collected is stored/protected)
 Redress (what customer can do if privacy policy is not met)

FEEDBACK:     a. The Better Business Bureau recommends that a privacy notice should be based on the
following five elements: notice, choice, access, security, and redress.
  b. The Better Business Bureau recommends that a privacy notice should be based on the
following five elements: notice, choice, access, security, and redress.
  c. The Better Business Bureau recommends that a privacy notice should be based on the
following five elements: notice, choice, access, security, and redress.
  d. The Better Business Bureau recommends that a privacy notice should be based on the
following five elements: notice, choice, access, security, and redress.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Web Site Privacy Policy
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.7 - Identify three subject areas where measures have been taken to protect personal data.
CTIVES:  
NATIONAL STAND United States - BUSPROG: Technology
ARDS:  
KEYWORDS:   Bloom's: Remember
DATE CREATED:  11/19/2019 5:54 PM
DATE MODIFIED: 1/3/2020 4:11 PM
 

26. Graydon noticed Jack, his friend and classmate, cheating on a physics exam and now he is trying to decide what to do
about it. He knows he could keep quiet about it, but that would violate his moral values, plus the school's code of ethics
requires students to report incidents of cheating. On the other hand, if he reports the incident, both his friend and probably
all of their other friends will be mad at him. In which phase of the ethical decision-making process is Graydon? 
  a.  gathering information b.  developing a problem statement
  c.  identifying alternatives d.  choosing an alternative
ANSWER:   d
RATIONALE:   Choose an alternative: Once a set of alternatives has been identified, the group must evaluate them
based on numerous criteria, such as effectiveness of addressing the issue, the extent of risk associated
with each alternative, cost, and time to implement. As part of the evaluation process, weigh various
laws, guidelines, and principles that may apply. You certainly do not want to violate a law that can
lead to a fine or imprisonment for yourself or others. Consider the likely consequences of each
alternative from several perspectives.
FEEDBACK:     a. Choose an alternative. As part of the evaluation process, weigh various laws, guidelines,
and principles that may apply.
Copyright Cengage Learning. Powered by Cognero. Page 17
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
  b. Choose an alternative. As part of the evaluation process, weigh various laws, guidelines,
and principles that may apply.
  c. Choose an alternative. As part of the evaluation process, weigh various laws, guidelines,
and principles that may apply.
  d. Choose an alternative. As part of the evaluation process, weigh various laws, guidelines,
and principles that may apply.
POINTS:   1
DIFFICULTY:   Moderate
REFERENCES:   Including Ethical Considerations in Decision Making
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.3 - Outline a five-step ethical decision-making process.
CTIVES:  
NATIONAL STAND United States - BUSPROG: Ethics
ARDS:  
KEYWORDS:   Bloom's: Remember
DATE CREATED:  11/19/2019 5:54 PM
DATE MODIFIED: 1/3/2020 4:53 PM
 

27. While giving her students a physics exam, Professor Thompson noticed that Jack, one of her students who has been
struggling with the course material, appeared to be copying answers from Graydon, one of the best students in the class.
She decides that she should compare their answers when the class period is over before deciding what to do about the
situation. In which phase of the ethical decision-making process is Professor Thompson? 
  a.  developing a problem statement b.  implementing the decision
  c.  identifying alternatives d.  choosing an alternative
ANSWER:   a
RATIONALE:   A problem statement is a clear, concise description of the issue that needs to be addressed. You must
gather and analyze facts to develop a good problem statement. Seek information and opinions from a
variety of people (include those who experience the problem first hand and those who will be affected
by any changes) to broaden your frame of reference. During this process, you must be extremely
careful not to make assumptions about the situation and carefully check key facts for validity.
FEEDBACK:     a.  You must gather and analyze facts to develop a good problem statement.
  b.  You must gather and analyze facts to develop a good problem statement.
  c.  You must gather and analyze facts to develop a good problem statement.
  d.  You must gather and analyze facts to develop a good problem statement.
POINTS:   1
DIFFICULTY:   Moderate
REFERENCES:   Including Ethical Considerations in Decision Making
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.3 - Outline a five-step ethical decision-making process.
CTIVES:  
NATIONAL STAND United States - BUSPROG: Ethics
ARDS:  
KEYWORDS:   Bloom's: Remember
Copyright Cengage Learning. Powered by Cognero. Page 18
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
DATE CREATED:  11/19/2019 5:54 PM
DATE MODIFIED: 1/4/2020 2:12 PM
 

28. Which of the following legislation is directed at Web sites catering to children and requires Web site owners to obtain
parental consent before they collect any personal information from children under 13 years old?
  a.  Children's Internet Protection Act
  b.  American Recovery and Reinvestment Act
  c.  Children's Online Privacy Protection Act
  d.  Family Educational Rights and Privacy Act
ANSWER:   c
RATIONALE:   According to Children’s Online Privacy Protection Act (COPPA), any Web site that caters to children
must offer comprehensive privacy policies, notify parents or guardians about its data collection
practices, and receive parental consent before collecting any personal information from children under
13 years of age. COPPA was implemented in 1998 to give parents more control over the collection,
use, and disclosure of their children’s personal information; it does not cover the dissemination of
information to children.
FEEDBACK:     a. According to Children’s Online Privacy Protection Act (COPPA), any Web site that caters
to children must offer comprehensive privacy policies, notify parents or guardians about
its data collection practices, and receive parental consent before collecting any personal
information from children under 13 years of age.
  b. According to Children’s Online Privacy Protection Act (COPPA), any Web site that caters
to children must offer comprehensive privacy policies, notify parents or guardians about
its data collection practices, and receive parental consent before collecting any personal
information from children under 13 years of age.
  c. According to Children’s Online Privacy Protection Act (COPPA), any Web site that caters
to children must offer comprehensive privacy policies, notify parents or guardians about
its data collection practices, and receive parental consent before collecting any personal
information from children under 13 years of age.
  d. According to Children’s Online Privacy Protection Act (COPPA), any Web site that caters
to children must offer comprehensive privacy policies, notify parents or guardians about
its data collection practices, and receive parental consent before collecting any personal
information from children under 13 years of age.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Measures Protecting Personal Data
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.7 - Identify three subject areas where measures have been taken to protect personal data.
CTIVES:  
KEYWORDS:   Bloom's: Remember
DATE CREATED:  1/4/2020 2:38 PM
DATE MODIFIED: 1/4/2020 2:42 PM
 

29. Which of the following legislation protects Facebook, Twitter, and other social networking organizations from
defamation suits in connection with posts made by their users?
  a.  Section 230 of the Communications Decency Act
  b.  Children's Internet Protection Act
Copyright Cengage Learning. Powered by Cognero. Page 19
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
  c.  Network Enforcement Act
  d.  Fake News Censorship Act
ANSWER:   a
RATIONALE:   Title V of the Telecommunications Act was the Communications Decency Act (CDA), aimed at
protecting children from pornography. Section 230 of the CDA, which was not ruled unconstitutional,
provides immunity to an Internet service provider (ISP) that publishes user-generated content,
provided its actions do not rise to the level of a content provider. It states that “No provider or user of
an interactive computer service shall be treated as the publisher or speaker of any information
provided by another information content provider” (47 U.S.C. § 230). This portion of the CDA
protects social networking companies such as Facebook and Twitter from defamation suits in
connection with user postings that appear on their sites.
FEEDBACK:     a. Section 230 of the CDA protects social networking companies such as Facebook and
Twitter from defamation suits in connection with user postings that appear on their sites.
  b. Section 230 of the CDA protects social networking companies such as Facebook and
Twitter from defamation suits in connection with user postings that appear on their sites.
  c. Section 230 of the CDA protects social networking companies such as Facebook and
Twitter from defamation suits in connection with user postings that appear on their sites.
  d. Section 230 of the CDA protects social networking companies such as Facebook and
Twitter from defamation suits in connection with user postings that appear on their sites.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Internet Censorship
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.13 - Identify measures taken to address defamation, hate speech, and pornography on the
CTIVES:   Internet.
KEYWORDS:   Bloom's: Remember
DATE CREATED:  1/4/2020 2:53 PM
DATE MODIFIED: 1/4/2020 2:58 PM
 

30. Fair information practices is a term for _____.


  a.  a system of rules enforced by a set of institutions that tells us what we can and cannot do
  b.  a set of guidelines that govern the collection and use of personal data
  c.  a set of guidelines for fostering good business practices and avoiding bad publicity
  d.  a set of principles about what is right and wrong that individuals use to make choices
ANSWER:   b
RATIONALE:   Fair information practices is a term for a set of guidelines that govern the collection and use of
personal data. Various organizations as well as countries have developed their own set of such
guidelines and call them by different names. The overall goal of such guidelines is to stop the
unlawful storage of personal data, eliminate the storage of inaccurate personal data, and prevent the
abuse or unauthorized disclosure of such data.
FEEDBACK:     a. Fair information practices is a term for a set of guidelines that govern the collection and
use of personal data.
  b. Fair information practices is a term for a set of guidelines that govern the collection and
use of personal data.
  c. Fair information practices is a term for a set of guidelines that govern the collection and
use of personal data.
Copyright Cengage Learning. Powered by Cognero. Page 20
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
  d. Fair information practices is a term for a set of guidelines that govern the collection and
use of personal data.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Measures Protecting Personal Data
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.6 - Summarize the differences between U.S. and EU fair information practices.
CTIVES:  
KEYWORDS:   Bloom's: Remember
DATE CREATED:  1/4/2020 3:04 PM
DATE MODIFIED: 1/4/2020 3:10 PM
 

31. A candidate for political office makes a campaign promise that she will work to stop the unlawful storage of personal
data, eliminate the storage of inaccurate personal data, and prevent the abuse or unauthorized disclosure of such data. She
is promising to promote _____.
  a.  protection of safety-critical systems
  b.  corporate social responsibility
  c.  our First Amendment rights
  d.  fair information practices
ANSWER:   d
RATIONALE:   Fair information practices is a term for a set of guidelines that govern the collection and use of
personal data. Various organizations as well as countries have developed their own set of such
guidelines and call them by different names. The overall goal of such guidelines is to stop the
unlawful storage of personal data, eliminate the storage of inaccurate personal data, and prevent the
abuse or unauthorized disclosure of such data.
FEEDBACK:     a. The overall goal of fair information practices guidelines is to stop the unlawful storage of
personal data, eliminate the storage of inaccurate personal data, and prevent the abuse
or unauthorized disclosure of such data.
  b. The overall goal of fair information practices guidelines is to stop the unlawful storage of
personal data, eliminate the storage of inaccurate personal data, and prevent the abuse
or unauthorized disclosure of such data.
  c. The overall goal of fair information practices guidelines is to stop the unlawful storage of
personal data, eliminate the storage of inaccurate personal data, and prevent the abuse
or unauthorized disclosure of such data.
  d. The overall goal of fair information practices guidelines is to stop the unlawful storage of
personal data, eliminate the storage of inaccurate personal data, and prevent the abuse
or unauthorized disclosure of such data.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Measures Protecting Personal Data
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.6 - Summarize the differences between U.S. and EU fair information practices.
CTIVES:  
KEYWORDS:   Bloom's: Remember

Copyright Cengage Learning. Powered by Cognero. Page 21


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
DATE CREATED:  1/4/2020 3:16 PM
DATE MODIFIED: 1/4/2020 3:36 PM
 

32. How do fair information practices in the United States and the European Union differ?
  a. Unlike the EU, the U.S. has no single, overarching national data privacy policy.
  b. Unlike the U.S., the EU has implemented numerous data privacy laws.
  c. Unlike the EU, the U.S. addresses potential abuses by private industry but not by the government.
  d. Unlike the U.S., the EU divides their data privacy laws into three ares: financial, health related, and child
specific.
ANSWER:   a
RATIONALE:   The situation in regards to fair information practices in the United States is much different than in the
European Union. Although numerous laws have been implemented over time, no single, overarching
national data privacy policy has been developed in the United States. Nor is there an established
advisory agency that recommends acceptable privacy practices to businesses. Instead, there are laws
that address potential abuses by the government, with little restrictions for private industry.
Legislation that protects people from data privacy abuses by corporations is almost nonexistent. The
various major federal laws that govern data privacy can be divided into the following topics: financial
data, health information, and children’s personal data.
FEEDBACK:     a. Although numerous laws have been implemented over time, no single, overarching
national data privacy policy has been developed in the United States.
  b. Although numerous laws have been implemented over time, no single, overarching
national data privacy policy has been developed in the United States.
  c. Although numerous laws have been implemented over time, no single, overarching
national data privacy policy has been developed in the United States.
  d. Although numerous laws have been implemented over time, no single, overarching
national data privacy policy has been developed in the United States.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Measures Protecting Personal Data
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.6 - Summarize the differences between U.S. and EU fair information practices.
CTIVES:  
KEYWORDS:   Bloom's: Remember
DATE CREATED:  1/4/2020 3:37 PM
DATE MODIFIED: 1/4/2020 3:47 PM
 

33. In the United States, legislation that protects people from data privacy abuses by corporations _____.
  a.  was passed only recently
  b.  is quite similar to the EU's General Data Protection Regulation
  c.  requires firms to respond within one month to data requests from individuals
  d.  is almost nonexistent
ANSWER:   d
RATIONALE:   The situation in regards to fair information practices in the United States is much different than in the
European Union. Although numerous laws have been implemented over time, no single, overarching
Copyright Cengage Learning. Powered by Cognero. Page 22
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
national data privacy policy has been developed in the United States. Nor is there an established
advisory agency that recommends acceptable privacy practices to businesses. Instead, there are laws
that address potential abuses by the government, with little restrictions for private industry.
Legislation that protects people from data privacy abuses by corporations is almost nonexistent. The
various major federal laws that govern data privacy can be divided into the following topics: financial
data, health information, and children’s personal data.
FEEDBACK:     a. Legislation that protects people from data privacy abuses by corporations is almost
nonexistent.
  b. Legislation that protects people from data privacy abuses by corporations is almost
nonexistent.
  c. Legislation that protects people from data privacy abuses by corporations is almost
nonexistent.
  d. Legislation that protects people from data privacy abuses by corporations is almost
nonexistent.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Measures Protecting Personal Data
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.6 - Summarize the differences between U.S. and EU fair information practices.
CTIVES:  
KEYWORDS:   Bloom's: Remember
DATE CREATED:  1/4/2020 3:59 PM
DATE MODIFIED: 1/4/2020 4:07 PM
 

34. Vincent holds an executive position within an organization that processes individual customers' information. If those
customers live in the European Union, Vincent _____.
  a.  must audit and document his team's compliance with the Right to Financial Privacy Act
  b.  must ensure his team maintains data protection policies and employs a data protection officer
  c.  has fewer obligations related to fair information practices than if they lived in the United States
  d.  is not subject to an established advisory agency or legally defined acceptable privacy practices
ANSWER:   b
RATIONALE:   The General Data Protection Regulation (GDPR) is a set of data privacy requirements that apply
across the European Union including non-EU organizations that market to or process information of
individuals in the European Union. GDPR places obligations on organizations to obtain the consent of
people they collect information about and to better manage this data. This includes putting in place a
data protection officer and data protection policies, performing data protection assessments, providing
training for employees to ensure that they are aware of their responsibilities related to personal data,
and having written documentation explaining how data is processed. The situation in regards to fair
information practices in the United States is much different. Although numerous laws have been
implemented over time, no single, overarching national data privacy policy has been developed in the
United States. Nor is there an established advisory agency that recommends acceptable privacy
practices to businesses.
FEEDBACK:     a. In the European Union, GDPR places obligations on organizations to obtain the consent
of people they collect information about and to better manage this data. This includes
putting in place a data protection officer and data protection policies.
  b. In the European Union, GDPR places obligations on organizations to obtain the consent
of people they collect information about and to better manage this data. This includes
Copyright Cengage Learning. Powered by Cognero. Page 23
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
putting in place a data protection officer and data protection policies.
  c. In the European Union, GDPR places obligations on organizations to obtain the consent
of people they collect information about and to better manage this data. This includes
putting in place a data protection officer and data protection policies.
  d. In the European Union, GDPR places obligations on organizations to obtain the consent
of people they collect information about and to better manage this data. This includes
putting in place a data protection officer and data protection policies.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Measures Protecting Personal Data
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.6 - Summarize the differences between U.S. and EU fair information practices.
CTIVES:  
KEYWORDS:   Bloom's: Remember
DATE CREATED:  1/4/2020 4:08 PM
DATE MODIFIED: 1/4/2020 4:22 PM
 

35. Which federal statute protects individuals against unreasonable searches and seizures by requiring warrants to be
issued only upon probable cause?
  a.  Foreign Intelligence Surveillance Act
  b.  First Amendment
  c.  Fourth Amendment
  d.  USA Freedom Act
ANSWER:   c
RATIONALE:   The Fourth Amendment reads as follows: "The right of the people to be secure in their persons,
houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no
Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly
describing the place to be searched, and the persons or things to be seized."
FEEDBACK:     a. The Fourth Amendment reads as follows: "The right of the people to be secure in their
persons, houses, papers, and effects, against unreasonable searches and seizures, shall
not be violated, and no Warrants shall issue, but upon probable cause, supported by
Oath or affirmation, and particularly describing the place to be searched, and the persons
or things to be seized."
  b. The Fourth Amendment reads as follows: "The right of the people to be secure in their
persons, houses, papers, and effects, against unreasonable searches and seizures, shall
not be violated, and no Warrants shall issue, but upon probable cause, supported by
Oath or affirmation, and particularly describing the place to be searched, and the persons
or things to be seized."
  c. The Fourth Amendment reads as follows: "The right of the people to be secure in their
persons, houses, papers, and effects, against unreasonable searches and seizures, shall
not be violated, and no Warrants shall issue, but upon probable cause, supported by
Oath or affirmation, and particularly describing the place to be searched, and the persons
or things to be seized."
  d. The Fourth Amendment reads as follows: "The right of the people to be secure in their
persons, houses, papers, and effects, against unreasonable searches and seizures, shall
not be violated, and no Warrants shall issue, but upon probable cause, supported by
Oath or affirmation, and particularly describing the place to be searched, and the persons
or things to be seized."
Copyright Cengage Learning. Powered by Cognero. Page 24
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Information Systems and Government Surveillance
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.10 - Discuss how three U.S. federal statutes protect citizens from government surveillance
CTIVES:   while at the same time authorize the government to collect data.
KEYWORDS:   Bloom's: Remember
DATE CREATED:  1/4/2020 4:31 PM
DATE MODIFIED: 1/4/2020 4:33 PM
 

36. It is not against the law for Ethel to possess an automatic weapon, but she believes possessing one is the wrong thing
to do. For Ethel, possessing an automatic weapon is _____.
  a.  illegal but ethical
  b.  illegal and unethical
  c.  legal but unethical
  d.  legal and ethical
ANSWER:   c
RATIONALE:   Legal acts conform to the law. Ethical acts conform to what an individual believes to be the right
thing to do. Laws can proclaim an act as legal, although many people may consider the act unethical.
Examples of this include abortion or possession of an automatic weapon. Laws may also proclaim an
act as illegal, although many people may consider the act ethical. Examples of this include using
marijuana to relieve stress and nausea for people undergoing chemotherapy treatment for cancer.
FEEDBACK:     a. Laws can proclaim an act as legal, although many people may consider the act unethical.
Examples of this include abortion or possession of an automatic weapon.
  b. Laws can proclaim an act as legal, although many people may consider the act unethical.
Examples of this include abortion or possession of an automatic weapon.
  c. Laws can proclaim an act as legal, although many people may consider the act unethical.
Examples of this include abortion or possession of an automatic weapon.
  d. Laws can proclaim an act as legal, although many people may consider the act unethical.
Examples of this include abortion or possession of an automatic weapon.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Ethical Versus Legal
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.1 - Explain the difference between ethical and legal.
CTIVES:  
KEYWORDS:   Bloom's: Remember
DATE CREATED:  1/5/2020 7:50 AM
DATE MODIFIED: 1/5/2020 7:56 AM
 

37. Robin Hood famously steals from the rich to give to the poor. Robin considers this his moral responsibility because he
believes it is unjust for a few wealthy people to live in luxury while many others struggle to meet their basic needs. Given
that it is against the law to steal, for Robin, his activities are _____.
Copyright Cengage Learning. Powered by Cognero. Page 25
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
  a.  illegal but ethical
  b.  illegal and unethical
  c.  legal but unethical
  d.  legal and ethical
ANSWER:   a
RATIONALE:   Legal acts conform to the law. Ethical acts conform to what an individual believes to be the right
thing to do. Laws can proclaim an act as legal, although many people may consider the act unethical.
Examples of this include abortion or possession of an automatic weapon. Laws may also proclaim an
act as illegal, although many people may consider the act ethical. Examples of this include using
marijuana to relieve stress and nausea for people undergoing chemotherapy treatment for cancer.
FEEDBACK:     a. Legal acts conform to the law. Ethical acts conform to what an individual believes to be
the right thing to do.
  b. Legal acts conform to the law. Ethical acts conform to what an individual believes to be
the right thing to do.
  c. Legal acts conform to the law. Ethical acts conform to what an individual believes to be
the right thing to do.
  d. Legal acts conform to the law. Ethical acts conform to what an individual believes to be
the right thing to do.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Ethical Versus Legal
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.1 - Explain the difference between ethical and legal.
CTIVES:  
KEYWORDS:   Bloom's: Remember
DATE CREATED:  1/5/2020 7:57 AM
DATE MODIFIED: 1/5/2020 8:03 AM
 

38. Which statement about ethics and laws is true?


  a.  Laws are static, whereas ethics are constantly modified.
  b.  Laws provide a complete guide to behavior, whereas ethics merely raise issues.
  c.  All legal acts are ethical, but not all ethical acts are legal.
  d.  Legal acts conform to the law, whereas ethical acts conform to an individual's beliefs.
ANSWER:   d
RATIONALE:   Laws are not static; new laws are constantly being introduced and existing laws repealed or modified.
As a result, the precise meaning of a particular law may be different in the future from what it is
today. Legal acts conform to the law. Ethical acts conform to what an individual believes to be the
right thing to do. Laws can proclaim an act as legal, although many people may consider the act
unethical. Laws raise important and complex issues concerning equality, fairness, and justice, but do
not provide a complete guide to ethical behavior.
FEEDBACK:     a. Legal acts conform to the law. Ethical acts conform to what an individual believes to be
the right thing to do.
  b. Legal acts conform to the law. Ethical acts conform to what an individual believes to be
the right thing to do.
  c. Legal acts conform to the law. Ethical acts conform to what an individual believes to be
Copyright Cengage Learning. Powered by Cognero. Page 26
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
the right thing to do.
  d. Legal acts conform to the law. Ethical acts conform to what an individual believes to be
the right thing to do.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Ethical Versus Legal
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.1 - Explain the difference between ethical and legal.
CTIVES:  
KEYWORDS:   Bloom's: Remember
DATE CREATED:  1/5/2020 8:05 AM
DATE MODIFIED: 1/5/2020 8:12 AM
 

39. Corporate social responsibility activities such as philanthropy benefit for-profit organizations because they _____.
  a.  improve consistency of operations
  b.  gain the goodwill of the community
  c.  foster good business practices
  d.  provide protection from legal action
ANSWER:   b
RATIONALE:   Although organizations exist primarily to earn profits or provide services to customers, they also have
some fundamental responsibilities to society. Companies often declare these responsibilities in
specific corporate social responsibility (CSR) goals. Philanthropy is one way in which an organization
can demonstrate its values in action and make a positive connection with its customers, employees,
suppliers, business partners, and other parties. The goodwill that CSR activities generate can make it
easier for corporations to conduct their business.
FEEDBACK:     a. Philanthropy is one way in which an organization can demonstrate its values in action
and make a positive connection with its customers, employees, suppliers, business
partners, and other parties.
  b. Philanthropy is one way in which an organization can demonstrate its values in action
and make a positive connection with its customers, employees, suppliers, business
partners, and other parties.
  c. Philanthropy is one way in which an organization can demonstrate its values in action
and make a positive connection with its customers, employees, suppliers, business
partners, and other parties.
  d. Philanthropy is one way in which an organization can demonstrate its values in action
and make a positive connection with its customers, employees, suppliers, business
partners, and other parties.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Fostering Corporate Social Responsibility and Good Business Ethics
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.2 - Identify five reasons for an organization to promote a work environment where
CTIVES:   employees are encouraged to act ethically.
KEYWORDS:   Bloom's: Remember
Copyright Cengage Learning. Powered by Cognero. Page 27
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
DATE CREATED:  1/5/2020 8:14 AM
DATE MODIFIED: 1/5/2020 8:20 AM
 

40. Using the values held by his organization, Don has defined an ethical approach for dealing with the needs of his team
members and their customers that he has implemented within his department. His team members know what is expected
of them, and their customers know what to expect from the organization. The primary benefit of this approach for Don's
department is _____.
  a.  avoiding publicity
  b.  consistent operation
  c.  protection from legal action
  d.  fostering good business practices
ANSWER:   b
RATIONALE:   Organizations develop and abide by values to create an organizational culture and to define a
consistent approach for dealing with the needs of their stakeholders. Stakeholders include
shareholders, employees, customers, suppliers, and the community. Such consistency ensures that
employees know what is expected of them and can employ the organization’s values to help them in
their decision making. Consistency also means that shareholders, customers, suppliers, and the
community know what they can expect of the organization.
FEEDBACK:     a. Organizations develop and abide by values to define a consistent approach for dealing
with the needs of their stakeholders. Such consistency ensures that employees know
what is expected of them and shareholders, customers, suppliers, and the community
know what they can expect of the organization.
  b. Organizations develop and abide by values to define a consistent approach for dealing
with the needs of their stakeholders. Such consistency ensures that employees know
what is expected of them and shareholders, customers, suppliers, and the community
know what they can expect of the organization.
  c. Organizations develop and abide by values to define a consistent approach for dealing
with the needs of their stakeholders. Such consistency ensures that employees know
what is expected of them and shareholders, customers, suppliers, and the community
know what they can expect of the organization.
  d. Organizations develop and abide by values to define a consistent approach for dealing
with the needs of their stakeholders. Such consistency ensures that employees know
what is expected of them and shareholders, customers, suppliers, and the community
know what they can expect of the organization.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Fostering Corporate Social Responsibility and Good Business Ethics
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.2 - Identify five reasons for an organization to promote a work environment where
CTIVES:   employees are encouraged to act ethically.
KEYWORDS:   Bloom's: Remember
DATE CREATED:  1/6/2020 2:39 PM
DATE MODIFIED: 1/6/2020 3:45 PM
 

41. Ethical business practices _____.


  a.  create a negative discrepancy between employee and organizational values
Copyright Cengage Learning. Powered by Cognero. Page 28
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
  b.  increase employee turnover when workers feel their actions are overly restricted
  c.  are usually more expensive for a business over the long term than unethical ones
  d.  often raise an organization's priority with suppliers and other business partners
ANSWER:   d
RATIONALE:   Companies that produce safe and effective products avoid costly recalls and lawsuits. Companies that
develop and maintain strong employee relations enjoy lower turnover rates and better employee
morale. Suppliers and other business partners often place a priority on working with companies that
operate in a fair and ethical manner. All these factors tend to increase revenue and profits while
decreasing expenses.
 
Bad ethics can have a negative impact on employees, many of whom may develop negative attitudes
if they perceive a difference between their own values and those stated or implied by an
organization’s actions. When such a discrepancy between employee and organizational ethics occurs,
it destroys employee commitment to organizational goals and objectives, creates low morale, fosters
poor performance, erodes employee involvement in organizational improvement initiatives, and
builds indifference to the organization’s needs.
FEEDBACK:     a. Suppliers and other business partners often place a priority on working with companies
that operate in a fair and ethical manner.
  b. Suppliers and other business partners often place a priority on working with companies
that operate in a fair and ethical manner.
  c. Suppliers and other business partners often place a priority on working with companies
that operate in a fair and ethical manner.
  d. Suppliers and other business partners often place a priority on working with companies
that operate in a fair and ethical manner.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Fostering Corporate Social Responsibility and Good Business Ethics
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.2 - Identify five reasons for an organization to promote a work environment where
CTIVES:   employees are encouraged to act ethically.
KEYWORDS:   Bloom's: Remember
DATE CREATED:  1/6/2020 3:46 PM
DATE MODIFIED: 1/6/2020 3:56 PM
 

42. Felicity, who works at a bank, opens multiple credit card accounts for customers without their authorization in order to
improve her customer sales, and thus her apparent job performance. This behavior is explicitly forbidden by bank policies
and the instructions her manager gave her. Which statement is true in this situation?
  a.  The bank can be held responsible for Felicity's behavior despite its ethical policies.
  b. The bank cannot be held responsible for Felicity's actions since they were contrary to bank policies.
  c.  This situation demonstrates how bad organizational ethics can lead to bad business results.
  d. The principle called respondeat superior, meaning "let the master answer," does not apply.
ANSWER:   a
RATIONALE:   In a 1909 ruling (United States v. New York Central & Hudson River Railroad Co.), the U.S. Supreme
Court established that an employer can be held responsible for the acts of its employees even if the
employees act in a manner contrary to corporate policy and their employer’s directions. The principle
established is called respondeat superior, or “let the master answer.”
Copyright Cengage Learning. Powered by Cognero. Page 29
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
FEEDBACK:     a. The U.S. Supreme Court established that an employer can be held responsible for the
acts of its employees even if the employees act in a manner contrary to corporate policy
and their employer’s directions.
  b. The U.S. Supreme Court established that an employer can be held responsible for the
acts of its employees even if the employees act in a manner contrary to corporate policy
and their employer’s directions.
  c. The U.S. Supreme Court established that an employer can be held responsible for the
acts of its employees even if the employees act in a manner contrary to corporate policy
and their employer’s directions.
  d. The U.S. Supreme Court established that an employer can be held responsible for the
acts of its employees even if the employees act in a manner contrary to corporate policy
and their employer’s directions.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Fostering Corporate Social Responsibility and Good Business Ethics
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.2 - Identify five reasons for an organization to promote a work environment where
CTIVES:   employees are encouraged to act ethically.
KEYWORDS:   Bloom's: Remember
DATE CREATED:  1/6/2020 3:58 PM
DATE MODIFIED: 1/6/2020 4:09 PM
 

43. A social networking service loses a lot of business from ad buyers and marketers after the media reveal that it has
published misleading statistics about the average viewing time of video ads on its platform. Building a strong ethics
program would have prevented this loss of sales by _____.
  a.  promoting consistent operations
  b.  gaining community goodwill
  c.  avoiding unfavorable publicity
  d.  fostering good business practices
ANSWER:   c
RATIONALE:   The public reputation of a company strongly influences the value of its stock, how consumers regard
its products and services, the degree of oversight it receives from government agencies, and the
amount of support and cooperation it receives from its business partners. Thus, many organizations
are motivated to build a strong ethics program to avoid negative publicity. If an organization is
perceived as operating ethically, customers, business partners, shareholders, consumer advocates,
financial institutions, and regulatory bodies will usually regard it more favorably. Prominent ad
buyers and marketers are angry with Facebook after finding out that the world’s largest online social
network service greatly exaggerated the average viewing time of video ads on its platform.
FEEDBACK:     a. Many organizations are motivated to build a strong ethics program to avoid negative
publicity.
  b. Many organizations are motivated to build a strong ethics program to avoid negative
publicity.
  c. Many organizations are motivated to build a strong ethics program to avoid negative
publicity.
  d. Many organizations are motivated to build a strong ethics program to avoid negative
publicity.
POINTS:   1
Copyright Cengage Learning. Powered by Cognero. Page 30
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
DIFFICULTY:   Easy
REFERENCES:   Fostering Corporate Social Responsibility and Good Business Ethics
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.2 - Identify five reasons for an organization to promote a work environment where
CTIVES:   employees are encouraged to act ethically.
KEYWORDS:   Bloom's: Remember
DATE CREATED:  1/6/2020 4:10 PM
DATE MODIFIED: 1/6/2020 4:19 PM
 

44. Which of the following is a good problem statement with which to begin the ethical decision-making process?
  a. Better systems for approving time off requests and assigning work tasks should be implemented to improve
employee morale.
  b. Our employees require training to correct their misconceptions regarding the time off request and work
scheduling procedures.
  c. Employee morale has declined by 15% based on survey data, and the reported cause is favoritism in granting
time off requests and assigning work tasks.
  d. Employee morale seems worse lately.
ANSWER:   c
RATIONALE:   A problem statement is a clear, concise description of the issue that needs to be addressed. A good
problem statement answers the following questions: What do people observe that causes them to think
there is a problem? Who is directly affected by the problem? Is anyone else affected? How often does
the problem occur? What is the impact of the problem? How serious is the problem? You must gather
and analyze facts to develop a good problem statement. A possible solution is not a problem
statement.
FEEDBACK:     a. A problem statement is a clear, concise description of the issue that needs to be
addressed. You must gather and analyze facts to develop a good problem statement. A
possible solution is not a problem statement.
  b. A problem statement is a clear, concise description of the issue that needs to be
addressed. You must gather and analyze facts to develop a good problem statement. A
possible solution is not a problem statement.
  c. A problem statement is a clear, concise description of the issue that needs to be
addressed. You must gather and analyze facts to develop a good problem statement. A
possible solution is not a problem statement.
  d. A problem statement is a clear, concise description of the issue that needs to be
addressed. You must gather and analyze facts to develop a good problem statement. A
possible solution is not a problem statement.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Including Ethical Considerations in Decision Making
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.3 - Outline a five-step ethical decision-making process.
CTIVES:  
KEYWORDS:   Bloom's: Remember
DATE CREATED:  1/6/2020 4:21 PM

Copyright Cengage Learning. Powered by Cognero. Page 31


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
DATE MODIFIED: 1/6/2020 4:53 PM
 

45. In which step of the ethical decision-making process is it essential to communicate well with all stakeholders and have
someone they trust and respect explain why things are changing and how this will benefit them?
  a.  evaluate the results
  b.  implement the decision
  c.  choose an alternative
  d.  identify alternatives
ANSWER:   b
RATIONALE:   Once an alternative is selected, it should be implemented in an efficient, effective, and timely manner.
This is often much easier said than done, because people tend to resist change. In fact, the bigger the
change, the greater is the resistance to it. Communication is the key to helping people accept a
change. It is imperative that someone whom the stakeholders trust and respect answer the following
questions:

 Why are we doing this?


 What is wrong with the current way we do things?
 How will the change benefit us?

FEEDBACK:     a. Communication is the key to helping people accept a change as a result of implementing
a decision. It is imperative that someone whom the stakeholders trust and respect answer
the following questions: Why are we doing this? What is wrong with the current way we
do things? How will the change benefit us?
  b. Communication is the key to helping people accept a change as a result of implementing
a decision. It is imperative that someone whom the stakeholders trust and respect answer
the following questions: Why are we doing this? What is wrong with the current way we
do things? How will the change benefit us?
  c. Communication is the key to helping people accept a change as a result of implementing
a decision. It is imperative that someone whom the stakeholders trust and respect answer
the following questions: Why are we doing this? What is wrong with the current way we
do things? How will the change benefit us?
  d. Communication is the key to helping people accept a change as a result of implementing
a decision. It is imperative that someone whom the stakeholders trust and respect answer
the following questions: Why are we doing this? What is wrong with the current way we
do things? How will the change benefit us?
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Including Ethical Considerations in Decision Making
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.3 - Outline a five-step ethical decision-making process.
CTIVES:  
KEYWORDS:   Bloom's: Remember
DATE CREATED:  1/6/2020 4:55 PM
DATE MODIFIED: 1/6/2020 5:05 PM
 

46. Which of the following outlines what an organization aspires to become and lists its rules and principles?
  a.  professional code of ethics
Copyright Cengage Learning. Powered by Cognero. Page 32
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
  b.  ethical decision-making process
  c.  fair information practices
  d.  corporate legal system
ANSWER:   a
RATIONALE:   A professional code of ethics states the principles and core values that an organization wishes to
develop in its leaders and members. Most codes of ethics created by professional organizations have
two main parts: The first outlines what the organization aspires to become, and the second typically
lists rules and principles by which members of the organization are expected to abide.
FEEDBACK:     a. Most codes of ethics created by professional organizations have two main parts: The first
outlines what the organization aspires to become, and the second typically lists rules and
principles by which members of the organization are expected to abide.
  b. Most codes of ethics created by professional organizations have two main parts: The first
outlines what the organization aspires to become, and the second typically lists rules and
principles by which members of the organization are expected to abide.
  c. Most codes of ethics created by professional organizations have two main parts: The first
outlines what the organization aspires to become, and the second typically lists rules and
principles by which members of the organization are expected to abide.
  d. Most codes of ethics created by professional organizations have two main parts: The first
outlines what the organization aspires to become, and the second typically lists rules and
principles by which members of the organization are expected to abide.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Professional Code of Ethics
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.4 - Define the primary intent and two key elements of an effective code of ethics.
CTIVES:  
KEYWORDS:   Bloom's: Remember
DATE CREATED:  1/6/2020 5:07 PM
DATE MODIFIED: 1/7/2020 7:32 AM
 

47. The 2,000-year-old Hippocratic oath, which medical schools offer as an affirmation to their graduating classes, is
considered an example of _____.
  a.  a professional code of ethics
  b.  a set of fair information practices
  c.  a safety-critical guideline
  d.  an ethical decision
ANSWER:   a
RATIONALE:   A professional code of ethics states the principles and core values that an organization wishes to
develop in its leaders and members. The primary intent of a code of ethics is to define desired
behavior. For example, doctors adhere to varying versions of the 2,000-year-old Hippocratic oath,
which medical schools offer as an affirmation to their graduating classes.
FEEDBACK:     a. The primary intent of a code of ethics is to define desired behavior. For example, doctors
adhere to varying versions of the 2,000-year-old Hippocratic oath.
  b. The primary intent of a code of ethics is to define desired behavior. For example, doctors
adhere to varying versions of the 2,000-year-old Hippocratic oath.
  c. The primary intent of a code of ethics is to define desired behavior. For example, doctors
Copyright Cengage Learning. Powered by Cognero. Page 33
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
adhere to varying versions of the 2,000-year-old Hippocratic oath.
  d. The primary intent of a code of ethics is to define desired behavior. For example, doctors
adhere to varying versions of the 2,000-year-old Hippocratic oath.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Professional Code of Ethics
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.4 - Define the primary intent and two key elements of an effective code of ethics.
CTIVES:  
KEYWORDS:   Bloom's: Remember
DATE CREATED:  1/7/2020 7:34 AM
DATE MODIFIED: 1/7/2020 7:58 AM
 

48. Because Marigold wants to join CompTIA (the Computer Technology Industry Association), she agrees to adhere to
this organization's professional code of ethics. This means that she _____.
  a.  believes CompTIA has provided answers to every ethical dilemma she might face
  b.  has promised to behave in a way that CompTIA has defined as desirable
  c.  is prioritizing CompTIA's principles of right and wrong over her own
  d.  wants to rely on CompTIA's guidelines primarily to avoid violating the law
ANSWER:   b
RATIONALE:   A professional code of ethics states the principles and core values that an organization wishes to
develop in its leaders and members. The primary intent of a code of ethics is to define desired
behavior.
FEEDBACK:     a.  The primary intent of a code of ethics is to define desired behavior.
  b.  The primary intent of a code of ethics is to define desired behavior.
  c.  The primary intent of a code of ethics is to define desired behavior.
  d.  The primary intent of a code of ethics is to define desired behavior.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Professional Code of Ethics
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.4 - Define the primary intent and two key elements of an effective code of ethics.
CTIVES:  
KEYWORDS:   Bloom's: Remember
DATE CREATED:  1/7/2020 7:42 AM
DATE MODIFIED: 1/7/2020 7:59 AM
 

49. Which of the following is least likely to be included in a professional code of ethics?


  a.  a description of what its leaders should become
  b.  a list of rules and principles
  c.  an outline of legal censures and fines
Copyright Cengage Learning. Powered by Cognero. Page 34
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
  d.  a commitment to continuing education
ANSWER:   c
RATIONALE:   Most codes of ethics created by professional organizations have two main parts: The first outlines
what the organization aspires to become, and the second typically lists rules and principles by which
members of the organization are expected to abide. Many codes also include a commitment to
continuing education for those who practice the profession.
FEEDBACK:     a. Most codes of ethics created by professional organizations have two main parts: The first
outlines what the organization aspires to become, and the second typically lists rules and
principles by which members of the organization are expected to abide. Many codes also
include a commitment to continuing education for those who practice the profession.
  b. Most codes of ethics created by professional organizations have two main parts: The first
outlines what the organization aspires to become, and the second typically lists rules and
principles by which members of the organization are expected to abide. Many codes also
include a commitment to continuing education for those who practice the profession.
  c. Most codes of ethics created by professional organizations have two main parts: The first
outlines what the organization aspires to become, and the second typically lists rules and
principles by which members of the organization are expected to abide. Many codes also
include a commitment to continuing education for those who practice the profession.
  d. Most codes of ethics created by professional organizations have two main parts: The first
outlines what the organization aspires to become, and the second typically lists rules and
principles by which members of the organization are expected to abide. Many codes also
include a commitment to continuing education for those who practice the profession.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Professional Code of Ethics
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.4 - Define the primary intent and two key elements of an effective code of ethics.
CTIVES:  
KEYWORDS:   Bloom's: Remember
DATE CREATED:  1/7/2020 8:06 AM
DATE MODIFIED: 1/7/2020 8:13 AM
 

50. Following a professional code of ethics can improve ethical decision making because _____.
  a.  it allows practitioners to compromise to meet day-to-day pressures
  b.  it guarantees trust and respect from the general public
  c.  it avoids the need for continual self-assessment among practitioners
  d.  it provides a common set of core values practitioners can use as a guideline
ANSWER:   d
RATIONALE:   Following a professional code of ethics can produce four key benefits for an individual, a profession,
and society as a whole. One is that it canimprove ethical decision making. Adherence to a
professional code of ethics means that practitioners use a common set of core values and beliefs as a
guideline for ethical decision making.
FEEDBACK:     a. Following a professional code of ethics can improve ethical decision making. Adherence
to a professional code of ethics means that practitioners use a common set of core
values and beliefs as a guideline for ethical decision making.
  b. Following a professional code of ethics can improve ethical decision making. Adherence
to a professional code of ethics means that practitioners use a common set of core
Copyright Cengage Learning. Powered by Cognero. Page 35
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
values and beliefs as a guideline for ethical decision making.
  c. Following a professional code of ethics can improve ethical decision making. Adherence
to a professional code of ethics means that practitioners use a common set of core
values and beliefs as a guideline for ethical decision making.
  d. Following a professional code of ethics can improve ethical decision making. Adherence
to a professional code of ethics means that practitioners use a common set of core
values and beliefs as a guideline for ethical decision making.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Professional Code of Ethics
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.5 - Identify four benefits of following a professional code of ethics.
CTIVES:  
KEYWORDS:   Bloom's: Remember
DATE CREATED:  1/7/2020 8:18 AM
DATE MODIFIED: 1/7/2020 8:27 AM
 

51. Sean's boss tries to pressure him to cut corners to reduce development time and costs. Sean objects, stating that this
would be unethical and citing the code of ethics for the professional organization of which they are both members. Sean's
boss agrees with him and allows him to proceed as he was. Which benefit of following a professional code of ethics does
this best demonstrate?
  a.  improve ethical decision making
  b.  provide an evaluation benchmark
  c.  set high standards of practice and ethical behavior
  d.  engender trust and respect from the general public
ANSWER:   c
RATIONALE:   Following a professional code of ethics can produce four key benefits for an individual, a profession,
and society as a whole. One is that it sets high standards of practice and ethical behavior. Adherence
to a code of ethics reminds professionals of the responsibilities and duties that they may be tempted to
compromise to meet the pressures of day-to-day business. The code also defines acceptable and
unacceptable behaviors to guide professionals in their interactions with others.
FEEDBACK:     a. Following a professional code of ethics sets high standards of practice and ethical
behavior. Adherence to a code of ethics reminds professionals of the responsibilities and
duties that they may be tempted to compromise to meet the pressures of day-to-day
business.
  b. Following a professional code of ethics sets high standards of practice and ethical
behavior. Adherence to a code of ethics reminds professionals of the responsibilities and
duties that they may be tempted to compromise to meet the pressures of day-to-day
business.
  c. Following a professional code of ethics sets high standards of practice and ethical
behavior. Adherence to a code of ethics reminds professionals of the responsibilities and
duties that they may be tempted to compromise to meet the pressures of day-to-day
business.
  d. Following a professional code of ethics sets high standards of practice and ethical
behavior. Adherence to a code of ethics reminds professionals of the responsibilities and
duties that they may be tempted to compromise to meet the pressures of day-to-day
business.

Copyright Cengage Learning. Powered by Cognero. Page 36


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Professional Code of Ethics
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.5 - Identify four benefits of following a professional code of ethics.
CTIVES:  
KEYWORDS:   Bloom's: Remember
DATE CREATED:  1/7/2020 12:11 PM
DATE MODIFIED: 1/7/2020 12:25 PM
 

52. Brown's Auto Repair Shop is the most popular business of its kind in the community thanks to good word of mouth
from past customers. The employees there follow a professional code of ethics that requires them to tell customers the
truth, including which less costly repair options are available, and warn them of any possible future issues associated with
each option. The popularity of Brown's best demonstrates how following a professional code of ethics _____.
  a.  improves ethical decision making
  b.  engenders trust and respect from the general public
  c.  sets high standards of practice and ethical behavior
  d.  provides an evaluation benchmark
ANSWER:   b
RATIONALE:   Following a professional code of ethics can produce four key benefits for an individual, a profession,
and society as a whole. One is that it engenders trust and respect from the general public. Public trust
is built on the expectation that a professional will behave ethically. People must often depend on the
integrity and good judgment of a professional to tell the truth, abstain from giving self-serving advice,
and offer warnings about the potential negative side effects of their actions. Thus, adherence to a code
of ethics enhances trust and respect for professionals and their profession.
FEEDBACK:     a. Following a professional code of ethics engenders trust and respect from the general
public. Public trust is built on the expectation that a professional will behave ethically: tell
the truth, abstain from giving self-serving advice, and offer warnings about the potential
negative side effects of their actions.
  b. Following a professional code of ethics engenders trust and respect from the general
public. Public trust is built on the expectation that a professional will behave ethically: tell
the truth, abstain from giving self-serving advice, and offer warnings about the potential
negative side effects of their actions.
  c. Following a professional code of ethics engenders trust and respect from the general
public. Public trust is built on the expectation that a professional will behave ethically: tell
the truth, abstain from giving self-serving advice, and offer warnings about the potential
negative side effects of their actions.
  d. Following a professional code of ethics engenders trust and respect from the general
public. Public trust is built on the expectation that a professional will behave ethically: tell
the truth, abstain from giving self-serving advice, and offer warnings about the potential
negative side effects of their actions.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Professional Code of Ethics
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:  False

Copyright Cengage Learning. Powered by Cognero. Page 37


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
LEARNING OBJE POIS.14e.3.5 - Identify four benefits of following a professional code of ethics.
CTIVES:  
KEYWORDS:   Bloom's: Remember
DATE CREATED:  1/7/2020 12:26 PM
DATE MODIFIED: 1/7/2020 12:39 PM
 

53. A code of professional ethics can be used to assess one's own performance or, more formally, to decide when an
organization should either reward or reprimand its members for their actions. This is because a code of ethics _____.
  a.  improves ethical decision making
  b.  sets high standards of practice and ethical behavior
  c.  engenders trust and respect from the general public
  d.  provides an evaluation benchmark
ANSWER:   d
RATIONALE:   Following a professional code of ethics can produce four key benefits for an individual, a profession,
and society as a whole. One is that it provides an evaluation benchmark that a professional can use as
a means of self-assessment. Peers of the professional can also use the code for recognition or censure.
FEEDBACK:     a. Following a professional code of ethics provides an evaluation benchmark that a
professional can use as a means of self-assessment. Peers of the professional can also
use the code for recognition or censure.
  b. Following a professional code of ethics provides an evaluation benchmark that a
professional can use as a means of self-assessment. Peers of the professional can also
use the code for recognition or censure.
  c. Following a professional code of ethics provides an evaluation benchmark that a
professional can use as a means of self-assessment. Peers of the professional can also
use the code for recognition or censure.
  d. Following a professional code of ethics provides an evaluation benchmark that a
professional can use as a means of self-assessment. Peers of the professional can also
use the code for recognition or censure.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Professional Code of Ethics
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.5 - Identify four benefits of following a professional code of ethics.
CTIVES:  
KEYWORDS:   Bloom's: Remember
DATE CREATED:  1/7/2020 12:40 PM
DATE MODIFIED: 1/7/2020 12:46 PM
 

54. Which of the following statements about professional organizations for information systems professionals is true?
  a. Many codes of ethics have been developed by IS professional organizations and can be accessed on their
Web sites.
  b. The merged Computer Technology Industry Association and Association of Information Technology
Professionals has emerged as the preeminent IS professional organization.
  c. There is a universal code of ethics that all IS professional organizations recommend.

Copyright Cengage Learning. Powered by Cognero. Page 38


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
  d. IS professional organizations offer few opportunities for networking compared with similar organizations in
other fields.
ANSWER:   a
RATIONALE:   No one information systems professional organization has emerged as preeminent, so there is no
universal code of ethics for IS workers. However, the existence of such organizations is useful in a
field that is rapidly growing and changing. To stay on top of the many new developments in their
field, IS workers need to network with others, seek out new ideas, and continually build on their
personal skills and expertise. Membership in an organization of IS workers enables you to associate
with others of similar work experience, develop working relationships, and exchange ideas. These
organizations disseminate information through email, periodicals, Web sites, social media, meetings,
and conferences. Furthermore, in recognition of the need for professional standards of competency
and conduct, many of these organizations have developed codes of ethics which can be found at their
Web site.
FEEDBACK:     a. No one information systems professional organization has emerged as preeminent, so
there is no universal code of ethics for IS workers. Membership in an organization of IS
workers enables you to associate with others of similar work experience, develop working
relationships, and exchange ideas. Many of these organizations have developed codes of
ethics which can be found at their Web site.
  b. No one information systems professional organization has emerged as preeminent, so
there is no universal code of ethics for IS workers. Membership in an organization of IS
workers enables you to associate with others of similar work experience, develop working
relationships, and exchange ideas. Many of these organizations have developed codes of
ethics which can be found at their Web site.
  c. No one information systems professional organization has emerged as preeminent, so
there is no universal code of ethics for IS workers. Membership in an organization of IS
workers enables you to associate with others of similar work experience, develop working
relationships, and exchange ideas. Many of these organizations have developed codes of
ethics which can be found at their Web site.
  d. No one information systems professional organization has emerged as preeminent, so
there is no universal code of ethics for IS workers. Membership in an organization of IS
workers enables you to associate with others of similar work experience, develop working
relationships, and exchange ideas. Many of these organizations have developed codes of
ethics which can be found at their Web site.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Professional Code of Ethics
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.5 - Identify four benefits of following a professional code of ethics.
CTIVES:  
KEYWORDS:   Bloom's: Remember
DATE CREATED:  1/7/2020 12:47 PM
DATE MODIFIED: 1/7/2020 1:00 PM
 

55. What can you obtain for free once a year from three key agencies in order to find out what is stored about you in
existing databases?
  a.  privacy policy
  b.  credit report
  c.  credit score
Copyright Cengage Learning. Powered by Cognero. Page 39
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
  d.  Freedom of Information Act report
ANSWER:   b
RATIONALE:   Find out what is stored about you in existing databases. Call the major credit bureaus to get a copy of
your credit report. You are entitled to a free credit report every 12 months from each of the three
major consumer reporting agencies (Equifax, Experian, and TransUnion).
FEEDBACK:     a. Find out what is stored about you in existing databases. You are entitled to a free credit
report every 12 months from each of the three major consumer reporting agencies
(Equifax, Experian, and TransUnion).
  b. Find out what is stored about you in existing databases. You are entitled to a free credit
report every 12 months from each of the three major consumer reporting agencies
(Equifax, Experian, and TransUnion).
  c. Find out what is stored about you in existing databases. You are entitled to a free credit
report every 12 months from each of the three major consumer reporting agencies
(Equifax, Experian, and TransUnion).
  d. Find out what is stored about you in existing databases. You are entitled to a free credit
report every 12 months from each of the three major consumer reporting agencies
(Equifax, Experian, and TransUnion).
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Individual Efforts to Protect Privacy
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.8 - Identify four measures you should take to protect your personal privacy.
CTIVES:  
KEYWORDS:   Bloom's: Remember
DATE CREATED:  1/7/2020 1:38 PM
DATE MODIFIED: 1/7/2020 1:45 PM
 

56. Which of the following actions will likely endanger rather than protect someone's personal privacy?
  a.  filling out a change-of-address form with the U.S. Postal Service
  b.  obtaining an unlisted phone number
  c.  shredding credit card statements before disposing of them
  d.  visiting the Direct Marketing Association Web site
ANSWER:   a
RATIONALE:   Be proactive in protecting your privacy. You can get an unlisted phone number and ask the phone
company to block caller ID systems from reading your phone number. If you change your address,
don’t fill out a change-of-address form with the U.S. Postal Service; you can notify the people and
companies that you want to have your new address. Destroy copies of your charge card bills and shred
monthly statements before disposing of them in the garbage. You can also cut down on the junk mail
and telemarketing calls you receive by visiting the Direct Marketing Association Web site
(www.thedma.org). Go to the site and look under Consumer Help-Remove Name from Lists.
FEEDBACK:     a. If you change your address, don’t fill out a change-of-address form with the U.S. Postal
Service; you can notify the people and companies that you want to have your new
address.
  b. If you change your address, don’t fill out a change-of-address form with the U.S. Postal
Service; you can notify the people and companies that you want to have your new
address.

Copyright Cengage Learning. Powered by Cognero. Page 40


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
  c. If you change your address, don’t fill out a change-of-address form with the U.S. Postal
Service; you can notify the people and companies that you want to have your new
address.
  d. If you change your address, don’t fill out a change-of-address form with the U.S. Postal
Service; you can notify the people and companies that you want to have your new
address.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Individual Efforts to Protect Privacy
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.8 - Identify four measures you should take to protect your personal privacy.
CTIVES:  
KEYWORDS:   Bloom's: Remember
DATE CREATED:  1/7/2020 1:46 PM
DATE MODIFIED: 1/7/2020 1:54 PM
 

57. MYSTIC, Downstream, Upstream, the Secure Flight Program, and Stingray are all examples of _____.
  a.  fair information practices
  b.  safety-critical systems
  c.  privacy-related legislation
  d.  government surveillance systems
ANSWER:   d
RATIONALE:   Government surveillance systems (listed in Table 3.1) include MYSTIC, Downstream, Upstream, the
Secure Flight Program, and Stingray.
FEEDBACK:     a. Government surveillance systems include MYSTIC, Downstream, Upstream, the Secure
Flight Program, and Stingray.
  b. Government surveillance systems include MYSTIC, Downstream, Upstream, the Secure
Flight Program, and Stingray.
  c. Government surveillance systems include MYSTIC, Downstream, Upstream, the Secure
Flight Program, and Stingray.
  d. Government surveillance systems include MYSTIC, Downstream, Upstream, the Secure
Flight Program, and Stingray.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Information Systems and Government Surveillance
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
LEARNING OBJEC POIS.14e.3.9 - Discuss the tradeoffs between security and privacy.
TIVES:  
KEYWORDS:   Bloom's: Remember
DATE CREATED:   1/7/2020 2:04 PM
DATE MODIFIED:  1/7/2020 2:08 PM

58. In recent years, laws have been added or amended to expand the scope of government surveillance in reaction to
_____.
Copyright Cengage Learning. Powered by Cognero. Page 41
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
  a.  several U.S. Supreme Court rulings
  b.  the public debate regarding safety versus privacy
  c.  technological developments and potential terrorists threats
  d.  major data breaches and media revelations about surveillance
ANSWER:   c
RATIONALE:   In recent years, new laws addressing government electronic surveillance have been added and old
laws amended in reaction to the development of new communication technologies and a heightened
awareness of potential terrorist threats. The net result is that the scope of government surveillance has
greatly expanded—going from collecting data on as few people as necessary to collecting as much
data as possible on as many people as possible.
FEEDBACK:     a. In recent years, new laws addressing government electronic surveillance have been
added and old laws amended in reaction to the development of new communication
technologies and a heightened awareness of potential terrorist threats.
  b. In recent years, new laws addressing government electronic surveillance have been
added and old laws amended in reaction to the development of new communication
technologies and a heightened awareness of potential terrorist threats.
  c. In recent years, new laws addressing government electronic surveillance have been
added and old laws amended in reaction to the development of new communication
technologies and a heightened awareness of potential terrorist threats.
  d. In recent years, new laws addressing government electronic surveillance have been
added and old laws amended in reaction to the development of new communication
technologies and a heightened awareness of potential terrorist threats.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Information Systems and Government Surveillance
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.9 - Discuss the tradeoffs between security and privacy.
CTIVES:  
KEYWORDS:   Bloom's: Remember
DATE CREATED:  1/7/2020 2:21 PM
DATE MODIFIED: 1/7/2020 2:35 PM
 

59. Some people believe that government electronic surveillance activities represent unreasonable searches and seizures,
meaning that they violate the _____.
  a.  USA PATRIOT Act
  b.  USA Freedom Act
  c.  First Amendment
  d.  Fourth Amendment
ANSWER:   d
RATIONALE:   Many of the recently-initiated government surveillance activities are viewed by some as an
unconstitutional violation of the Fourth Amendment, which protects us from illegal searches and
seizures.
FEEDBACK:     a. Many of the recently-initiated government surveillance activities are viewed by some as
an unconstitutional violation of the Fourth Amendment, which protects us from illegal
searches and seizures.
  b. Many of the recently-initiated government surveillance activities are viewed by some as
Copyright Cengage Learning. Powered by Cognero. Page 42
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
an unconstitutional violation of the Fourth Amendment, which protects us from illegal
searches and seizures.
  c. Many of the recently-initiated government surveillance activities are viewed by some as
an unconstitutional violation of the Fourth Amendment, which protects us from illegal
searches and seizures.
  d. Many of the recently-initiated government surveillance activities are viewed by some as
an unconstitutional violation of the Fourth Amendment, which protects us from illegal
searches and seizures.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Information Systems and Government Surveillance
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.9 - Discuss the tradeoffs between security and privacy.
CTIVES:  
KEYWORDS:   Bloom's: Remember
DATE CREATED:  1/7/2020 2:38 PM
DATE MODIFIED: 1/7/2020 2:43 PM
 

60. Americans who are in favor of expanded government surveillance programs argue that _____.
  a.  the U.S. government is obligated to do all that it can to ensure citizens' security
  b.  the violation of any of the rights designed to protect citizens' privacy is unacceptable
  c.  even citizens who aren't doing anything "wrong" are negatively affected by it
  d.  they do not threaten anyone's privacy or freedom of expression and association
ANSWER:   a
RATIONALE:   Many Americans feel that the U.S. government is obligated to do all that it can do to provide for the
security of its citizens, even it means violating some of the rights designed to protect our privacy.
After all, they argue, if you are not doing anything “wrong” you should have no concerns.
FEEDBACK:     a. Many Americans feel that the U.S. government is obligated to do all that it can do to
provide for the security of its citizens, even it means violating some of the rights designed
to protect our privacy.
  b. Many Americans feel that the U.S. government is obligated to do all that it can do to
provide for the security of its citizens, even it means violating some of the rights designed
to protect our privacy.
  c. Many Americans feel that the U.S. government is obligated to do all that it can do to
provide for the security of its citizens, even it means violating some of the rights designed
to protect our privacy.
  d. Many Americans feel that the U.S. government is obligated to do all that it can do to
provide for the security of its citizens, even it means violating some of the rights designed
to protect our privacy.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Information Systems and Government Surveillance
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.9 - Discuss the tradeoffs between security and privacy.
CTIVES:  
Copyright Cengage Learning. Powered by Cognero. Page 43
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
KEYWORDS:   Bloom's: Remember
DATE CREATED:  1/7/2020 2:46 PM
DATE MODIFIED: 1/7/2020 4:10 PM
 

61. Which statement about the Foreign Intelligence Surveillance Act (FISA) is true?
  a.  FISA does not allow any surveillance of communications to which a U.S. citizen is a party.
  b.  FISA allows U.S. intelligence to target U.S. citizens outside the U.S. without a court order.
  c.  FISA created a court that meets in secret to hear applications for surveillance orders in the U.S.
  d.  FISA prohibits the use of surveillance assistance from communications common carriers.
ANSWER:   c
RATIONALE:   FISA, passed by Congress in 1978, describes procedures for the electronic surveillance and collection
of foreign intelligence information in communications (e.g., phone calls, emails) between foreign
powers and the agents of foreign powers. The act allows surveillance, without court order, within the
United States for up to a year unless the “surveillance will acquire the contents of any communication
to which a U.S. person is a party.” If a U.S. citizen is involved, judicial authorization is required
within 72 hours after surveillance begins. The act also specifies that the U.S. attorney general may
request a specific communications common carrier (a company that provides communications
transmission services to the public) to furnish information, facilities, or technical assistance to
accomplish the electronic surveillance.
 
FISA requires the government to obtain an individualized court order before it can intentionally target
a U.S. person anywhere in the world to collect the content of his/her communications. The FISA act
also created the Foreign Intelligence Surveillance Act (FISA) court, which meets in secret to hear
applications for orders approving electronic surveillance anywhere within the United States.
FEEDBACK:     a. The FISA act created the Foreign Intelligence Surveillance Act (FISA) court, which meets
in secret to hear applications for orders approving electronic surveillance anywhere within
the United States.
  b. The FISA also created the Foreign Intelligence Surveillance Act (FISA) court, which
meets in secret to hear applications for orders approving electronic surveillance
anywhere within the United States.
  c. The FISA act created the Foreign Intelligence Surveillance Act (FISA) court, which meets
in secret to hear applications for orders approving electronic surveillance anywhere within
the United States.
  d. The FISA act created the Foreign Intelligence Surveillance Act (FISA) court, which meets
in secret to hear applications for orders approving electronic surveillance anywhere within
the United States.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Federal Statutes That Protect Citizens from Government Surveillance
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.10 - Discuss how three U.S. federal statutes protect citizens from government surveillance
CTIVES:   while at the same time authorize the government to collect data.
KEYWORDS:   Bloom's: Remember
DATE CREATED:  1/7/2020 4:19 PM
DATE MODIFIED: 1/7/2020 4:35 PM
 

Copyright Cengage Learning. Powered by Cognero. Page 44


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
62. Which of the following is a provision of the USA PATRIOT Act?
  a.  termination of the bulk collection of telephone records and Internet metadata
  b.  authorization of "snack and peak warrants" for law enforcement agencies
  c.  gathering of foreign intelligence from non-Americans outside the U.S.
  d.  requirement for judicial authorization within 72 hours after surveillance of U.S. citizens begins
ANSWER:   b
RATIONALE:   Title II of the Patriot Act amended FISA and greatly expanded the scope of surveillance permitted
under U.S. law. Foreign intelligence could now be gathered from both U.S. citizens and foreigners,
government agencies no longer needed to prove that a target is an agent of a foreign power, and the
maximum duration of surveillance and investigations was lengthened. In addition, law enforcement
agencies were authorized to break into and enter premises without the owner’s consent and stealthily
search the premises using so-called sneak and peak warrants. Roving wiretaps were allowed so that
anyone who comes into contact with a suspected terrorist can be wiretapped.
FEEDBACK:     a. Under Title II of the Patriot Act, law enforcement agencies were authorized to break into
and enter premises without the owner’s consent and stealthily search the premises using
so-called sneak and peak warrants.
  b. Under Title II of the Patriot Act, law enforcement agencies were authorized to break into
and enter premises without the owner’s consent and stealthily search the premises using
so-called sneak and peak warrants.
  c. Under Title II of the Patriot Act, law enforcement agencies were authorized to break into
and enter premises without the owner’s consent and stealthily search the premises using
so-called sneak and peak warrants.
  d. Under Title II of the Patriot Act, law enforcement agencies were authorized to break into
and enter premises without the owner’s consent and stealthily search the premises using
so-called sneak and peak warrants.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Federal Statutes That Protect Citizens from Government Surveillance
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.10 - Discuss how three U.S. federal statutes protect citizens from government surveillance
CTIVES:   while at the same time authorize the government to collect data.
KEYWORDS:   Bloom's: Remember
DATE CREATED:  1/7/2020 4:37 PM
DATE MODIFIED: 1/7/2020 4:50 PM
 

63. American's rights to freedom of religion, freedom of expression, and freedom to assemble peaceably are protected by
the _____.
  a.  Fourth Amendment
  b.  First Amendment
  c.  COPPA
  d.  HIPAA
ANSWER:   b
RATIONALE:   The First Amendment protects Americans’ rights to freedom of religion, freedom of expression, and
freedom to assemble peaceably.
FEEDBACK:     a. The First Amendment protects Americans’ rights to freedom of religion, freedom of
expression, and freedom to assemble peaceably.
Copyright Cengage Learning. Powered by Cognero. Page 45
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
  b. The First Amendment protects Americans’ rights to freedom of religion, freedom of
expression, and freedom to assemble peaceably.
  c. The First Amendment protects Americans’ rights to freedom of religion, freedom of
expression, and freedom to assemble peaceably.
  d. The First Amendment protects Americans’ rights to freedom of religion, freedom of
expression, and freedom to assemble peaceably.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Measures Protecting Freedom of Speech
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:   False
LEARNING OBJEC POIS.14e.3.11 - Discuss how the First Amendment and anonymous expression safeguard our freedom
TIVES:   of speech.
KEYWORDS:   Bloom's: Remember
DATE CREATED:   1/7/2020 4:52 PM
DATE MODIFIED: 1/7/2020 4:58 PM
 

64. The Bill of Rights protects many forms of expression, but the Supreme Court has ruled that it does NOT protect
_____.
  a.  sedition
  b.  flag burning
  c.  dance movements
  d.  hand gestures
ANSWER:   a
RATIONALE:   Numerous court decisions have broadened the definition of speech to include nonverbal, visual, and
symbolic forms of expression, such as flag burning, dance movements, and hand gestures. The
Supreme Court has held that the following types of speech are not protected by the First Amendment
and may be forbidden by the government: perjury, fraud, defamation, obscene speech, incitement of
panic, incitement to crime, “fighting words,” and sedition (incitement of discontent or rebellion
against a government).
FEEDBACK:     a. Numerous court decisions have broadened the definition of speech to include nonverbal,
visual, and symbolic forms of expression, such as flag burning, dance movements, and
hand gestures.
  b. Numerous court decisions have broadened the definition of speech to include nonverbal,
visual, and symbolic forms of expression, such as flag burning, dance movements, and
hand gestures.
  c. Numerous court decisions have broadened the definition of speech to include nonverbal,
visual, and symbolic forms of expression, such as flag burning, dance movements, and
hand gestures.
  d. Numerous court decisions have broadened the definition of speech to include nonverbal,
visual, and symbolic forms of expression, such as flag burning, dance movements, and
hand gestures.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Measures Protecting Freedom of Speech
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:  False
Copyright Cengage Learning. Powered by Cognero. Page 46
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
LEARNING OBJE POIS.14e.3.11 - Discuss how the First Amendment and anonymous expression safeguard our freedom
CTIVES:   of speech.
KEYWORDS:   Bloom's: Remember
DATE CREATED:  1/7/2020 5:00 PM
DATE MODIFIED: 1/7/2020 5:06 PM
 

65. During the early formation of the United States, many influential writings criticizing British rule were published
without the real names of their authors. These publications represented a form of _____.
  a.  slander
  b.  First Amendment expression
  c.  incitement to crime
  d.  anonymous expression
ANSWER:   d
RATIONALE:   Anonymous expression is the expression of opinions by people who do not reveal their identity.
Anonymous political expression played an important role in the early formation of the United States.
Before and during the American Revolution, patriots who dissented against British rule often used
anonymous pamphlets and leaflets to express their opinions. Thomas Paine was an influential writer,
philosopher, and statesman of the Revolutionary War era. He published a pamphlet called Common
Sense, in which he criticized the British monarchy and urged the colonies to become independent by
establishing a republican government of their own. Published anonymously in 1776, the pamphlet
sold more than 500,000 copies, at a time when the population of the colonies was estimated to have
been less than 4 million; it provided a stimulus to produce the Declaration of Independence six
months later.
FEEDBACK:     a. Anonymous expression is the expression of opinions by people who do not reveal their
identity. Anonymous political expression played an important role in the early formation of
the United States.
  b. Anonymous expression is the expression of opinions by people who do not reveal their
identity. Anonymous political expression played an important role in the early formation of
the United States.
  c. Anonymous expression is the expression of opinions by people who do not reveal their
identity. Anonymous political expression played an important role in the early formation of
the United States.
  d. Anonymous expression is the expression of opinions by people who do not reveal their
identity. Anonymous political expression played an important role in the early formation of
the United States.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Measures Protecting Freedom of Speech
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.11 - Discuss how the First Amendment and anonymous expression safeguard our freedom
CTIVES:   of speech.
KEYWORDS:   Bloom's: Remember
DATE CREATED:  1/7/2020 5:07 PM
DATE MODIFIED: 1/7/2020 5:18 PM
 

Copyright Cengage Learning. Powered by Cognero. Page 47


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
66. The Supreme Court has ruled that the right to anonymous expression is protected by _____.
  a.  numerous legal precedents
  b.  the Declaration of Independence
  c.  the First Amendment
  d.  the Fourth Amendment
ANSWER:   c
RATIONALE:   The Supreme Court has ruled that the First Amendment protects the right to speak anonymously as
part of the guarantee of free speech.
FEEDBACK:     a. The Supreme Court has ruled that the First Amendment protects the right to speak
anonymously as part of the guarantee of free speech.
  b. The Supreme Court has ruled that the First Amendment protects the right to speak
anonymously as part of the guarantee of free speech.
  c. The Supreme Court has ruled that the First Amendment protects the right to speak
anonymously as part of the guarantee of free speech.
  d. The Supreme Court has ruled that the First Amendment protects the right to speak
anonymously as part of the guarantee of free speech.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Measures Protecting Freedom of Speech
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.11 - Discuss how the First Amendment and anonymous expression safeguard our freedom
CTIVES:   of speech.
KEYWORDS:   Bloom's: Remember
DATE CREATED:  1/7/2020 5:19 PM
DATE MODIFIED: 1/7/2020 5:24 PM
 

67. Anonymous expression _____.


  a.  on the Internet is equally important to and advocated by all computer users
  b. is specifically mentioned as a right of all Americans within the Bill of Rights
  c.  through email messages is impossible, even when a remailer is used
  d. is an important right of a democratic society because it protects people from reprisals for their opinions
ANSWER:   d
RATIONALE:   Anonymous expression is the expression of opinions by people who do not reveal their identity. The
freedom to express an opinion without fear of reprisal is an important right of a democratic society.
Maintaining anonymity on the Internet is important to some computer users. Other Internet users,
however, would prefer to ban Web anonymity because they think its use increases the risks of
defamation, fraud, and libel, as well as the exploitation of children. The use of a remailer keeps
communications anonymous.
FEEDBACK:     a. Anonymous expression is the expression of opinions by people who do not reveal their
identity. The freedom to express an opinion without fear of reprisal is an important right of
a democratic society.
  b. Anonymous expression is the expression of opinions by people who do not reveal their
identity. The freedom to express an opinion without fear of reprisal is an important right of
a democratic society.
  c. Anonymous expression is the expression of opinions by people who do not reveal their
Copyright Cengage Learning. Powered by Cognero. Page 48
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
identity. The freedom to express an opinion without fear of reprisal is an important right of
a democratic society.
  d. Anonymous expression is the expression of opinions by people who do not reveal their
identity. The freedom to express an opinion without fear of reprisal is an important right of
a democratic society.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Measures Protecting Freedom of Speech
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.11 - Discuss how the First Amendment and anonymous expression safeguard our freedom
CTIVES:   of speech.
KEYWORDS:   Bloom's: Remember
DATE CREATED:  1/7/2020 5:25 PM
DATE MODIFIED: 1/7/2020 5:32 PM
 

68. Which intermediary in the process of speaking on the Internet often receives defamation or copyright infringement
claims from government authorities or copyright holders who demand that material be taken down?
  a.  Internet service provider
  b.  upstream Internet service provider
  c.  Web host server
  d.  domain name service
ANSWER:   c
RATIONALE:   Internet censorship is the control or suppression of the publishing or accessing of information on the
Internet. Speech on the Internet requires a series of intermediaries to reach its audience with each
intermediary vulnerable to some degree to pressure from those who want to silence the speaker. Web
hosting services are often the recipients of defamation or copyright infringement claims by
government authorities or copyright holders, demanding the immediate takedown of hosted material
that is deemed inappropriate or illegal.
FEEDBACK:     a. Web hosting services are often the recipients of defamation or copyright infringement
claims by government authorities or copyright holders, demanding the immediate
takedown of hosted material that is deemed inappropriate or illegal.
  b. Web hosting services are often the recipients of defamation or copyright infringement
claims by government authorities or copyright holders, demanding the immediate
takedown of hosted material that is deemed inappropriate or illegal.
  c. Web hosting services are often the recipients of defamation or copyright infringement
claims by government authorities or copyright holders, demanding the immediate
takedown of hosted material that is deemed inappropriate or illegal.
  d. Web hosting services are often the recipients of defamation or copyright infringement
claims by government authorities or copyright holders, demanding the immediate
takedown of hosted material that is deemed inappropriate or illegal.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Internet Censorship
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.12 - Describe the impact of censorship on the operation of Internet service providers.
Copyright Cengage Learning. Powered by Cognero. Page 49
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
CTIVES:  
KEYWORDS:   Bloom's: Remember
DATE CREATED:  1/8/2020 9:39 AM
DATE MODIFIED: 1/8/2020 9:46 AM
 

69. Government entities may pressure upstream Internet service providers to _____.


  a.  immediately take down particular hosted material
  b.  track and monitor the Internet activities of individuals
  c.  deregister domains because of their hosted content
  d.  accept defamation or copyright infringement claims
ANSWER:   b
RATIONALE:   Internet censorship is the control or suppression of the publishing or accessing of information on the
Internet. Speech on the Internet requires a series of intermediaries to reach its audience with each
intermediary vulnerable to some degree to pressure from those who want to silence the speaker.
Government entities may pressure “upstream” Internet service providers to limit access to certain
Web sites, allow access to only some content or modified content at certain Web sites, reject the use
of certain keywords in search engine searches, and track and monitor the Internet activities of
individuals.
FEEDBACK:     a. Government entities may pressure “upstream” Internet service providers to limit access to
certain Web sites, allow access to only some content or modified content at certain Web
sites, reject the use of certain keywords in search engine searches, and track and
monitor the Internet activities of individuals.
  b. Government entities may pressure “upstream” Internet service providers to limit access to
certain Web sites, allow access to only some content or modified content at certain Web
sites, reject the use of certain keywords in search engine searches, and track and
monitor the Internet activities of individuals.
  c. Government entities may pressure “upstream” Internet service providers to limit access to
certain Web sites, allow access to only some content or modified content at certain Web
sites, reject the use of certain keywords in search engine searches, and track and
monitor the Internet activities of individuals.
  d. Government entities may pressure “upstream” Internet service providers to limit access to
certain Web sites, allow access to only some content or modified content at certain Web
sites, reject the use of certain keywords in search engine searches, and track and
monitor the Internet activities of individuals.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Internet Censorship
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.12 - Describe the impact of censorship on the operation of Internet service providers.
CTIVES:  
KEYWORDS:   Bloom's: Remember
DATE CREATED:  1/8/2020 9:48 AM
DATE MODIFIED: 1/8/2020 9:57 AM
 

70. In countries with "three strikes" laws, what action may Internet service providers be required to take?
  a.  terminate the Internet connections of users who have repeatedly been caught posting illegal content
Copyright Cengage Learning. Powered by Cognero. Page 50
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
  b. pursue defamation or copyright infringement claims against their customers
  c.  require users to enter certain keywords in search engine searches
  d. convert human-readable host and domain names into machine-readable, Internet Protocol addresses
ANSWER:   a
RATIONALE:   Several countries have enacted so-called three strikes laws that require ISPs to terminate a user’s
Internet connection once that user has received a number of notifications of posting of content deemed
inappropriate or illegal.
FEEDBACK:     a. Several countries have enacted so-called three strikes laws that require ISPs to terminate
a user’s Internet connection once that user has received a number of notifications of
posting of content deemed inappropriate or illegal.
  b. Several countries have enacted so-called three strikes laws that require ISPs to terminate
a user’s Internet connection once that user has received a number of notifications of
posting of content deemed inappropriate or illegal.
  c. Several countries have enacted so-called three strikes laws that require ISPs to terminate
a user’s Internet connection once that user has received a number of notifications of
posting of content deemed inappropriate or illegal.
  d. Several countries have enacted so-called three strikes laws that require ISPs to terminate
a user’s Internet connection once that user has received a number of notifications of
posting of content deemed inappropriate or illegal.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Internet Censorship
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.12 - Describe the impact of censorship on the operation of Internet service providers.
CTIVES:  
KEYWORDS:   Bloom's: Remember
DATE CREATED:  1/8/2020 11:18 AM
DATE MODIFIED: 1/8/2020 11:24 AM
 

71. Which country has both the largest online population and probably the most rigorous Internet censorship in the world?
  a.  China
  b.  India
  c.  United States
  d.  Brazil
ANSWER:   a
RATIONALE:   China has the largest online population in the world, with over 772 million Internet users (see Table
3.2, which depicts the top 12 countries in terms of number of Internet users). Note, however, that
Internet censorship in China is perhaps the most rigorous in the world. The Chinese government
blocks access to Web sites that discuss any of a long list of topics that are considered objectionable.
FEEDBACK:     a. China has the largest online population in the world, yet Internet censorship in China is
perhaps the most rigorous in the world.
  b. China has the largest online population in the world, yet Internet censorship in China is
perhaps the most rigorous in the world.
  c. China has the largest online population in the world, yet Internet censorship in China is
perhaps the most rigorous in the world.
  d. China has the largest online population in the world, yet Internet censorship in China is
Copyright Cengage Learning. Powered by Cognero. Page 51
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
perhaps the most rigorous in the world.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Internet Censorship
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.12 - Describe the impact of censorship on the operation of Internet service providers.
CTIVES:  
KEYWORDS:   Bloom's: Remember
DATE CREATED:  1/8/2020 11:26 AM
DATE MODIFIED: 1/8/2020 11:36 AM
 

72. A high-quality software system _____.


  a.  negatively affects productivity
  b.  is easy to learn and use
  c.  is the same as a safety-critical system
  d.  reduces sales over the long term
ANSWER:   b
RATIONALE:   High-quality software systems are systems that are easy to learn and use because they perform quickly
and efficiently; they meet their users’ needs; and they operate safely and reliably so that system
downtime is kept to a minimum. A safety-critical system is one whose failure may cause human
injury or death.
FEEDBACK:     a. High-quality software systems are systems that are easy to learn and use because they
perform quickly and efficiently; they meet their users’ needs; and they operate safely and
reliably so that system downtime is kept to a minimum.
  b. High-quality software systems are systems that are easy to learn and use because they
perform quickly and efficiently; they meet their users’ needs; and they operate safely and
reliably so that system downtime is kept to a minimum.
  c. High-quality software systems are systems that are easy to learn and use because they
perform quickly and efficiently; they meet their users’ needs; and they operate safely and
reliably so that system downtime is kept to a minimum.
  d. High-quality software systems are systems that are easy to learn and use because they
perform quickly and efficiently; they meet their users’ needs; and they operate safely and
reliably so that system downtime is kept to a minimum.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Ethical Issues in Developing Quality Software
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.14 - Distinguish between a high-quality software system and safety-critical system.
CTIVES:  
KEYWORDS:   Bloom's: Remember
DATE CREATED:  1/8/2020 2:01 PM
DATE MODIFIED: 1/8/2020 2:11 PM
 

Copyright Cengage Learning. Powered by Cognero. Page 52


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
73. Which of the following is a defining feature of a safety-critical software system?
  a.  performs quickly and efficiently
  b.  minimum system downtime
  c.  defects could result in human injury
  d.  meets users' needs completely
ANSWER:   c
RATIONALE:   A safety-critical system is one whose failure may cause human injury or death.
FEEDBACK:     a.  A safety-critical system is one whose failure may cause human injury or death.
  b.  A safety-critical system is one whose failure may cause human injury or death.
  c.  A safety-critical system is one whose failure may cause human injury or death.
  d.  A safety-critical system is one whose failure may cause human injury or death.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Ethical Issues in Developing Quality Software
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
LEARNING OBJECTIVES:  POIS.14e.3.14 - Distinguish between a high-quality software system and safety-critical
system.
KEYWORDS:   Bloom's: Remember
DATE CREATED:   1/8/2020 2:11 PM
DATE MODIFIED:   1/8/2020 2:17 PM

74. Which of the following will prevent a product from being rated as a high-quality software system?
  a.  thorough testing
  b.  slow development
  c.  high cost
  d.  software defects
ANSWER:   d
RATIONALE:   High-quality software systems are systems that are easy to learn and use because they perform quickly
and efficiently; they meet their users’ needs; and they operate safely and reliably so that system
downtime is kept to a minimum. A software defect is any error that, if not removed, could cause a
software system to fail to meet its users’ needs or provide an open door for a cyberattacker.
FEEDBACK:     a. A software defect is any error that, if not removed, could cause a software system to fail
to meet its users’ needs and therefore not quality as high-quality software.
  b. A software defect is any error that, if not removed, could cause a software system to fail
to meet its users’ needs and therefore not quality as high-quality software.
  c. A software defect is any error that, if not removed, could cause a software system to fail
to meet its users’ needs and therefore not quality as high-quality software.
  d. A software defect is any error that, if not removed, could cause a software system to fail
to meet its users’ needs and therefore not quality as high-quality software.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Ethical Issues in Developing Quality Software
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:  False
Copyright Cengage Learning. Powered by Cognero. Page 53
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
LEARNING OBJE POIS.14e.3.14 - Distinguish between a high-quality software system and safety-critical system.
CTIVES:  
KEYWORDS:   Bloom's: Remember
DATE CREATED:  1/8/2020 2:18 PM
DATE MODIFIED: 1/8/2020 2:26 PM
 

75. Fiat Chrysler recalled over a million trucks due to a software defect related to at least one fatality. This software defect
was found in a _____.
  a.  safety-critical software system
  b.  high-quality software system
  c.  pre-market software evaluation
  d.  cybersecurity assessment
ANSWER:   a
RATIONALE:   A software defect is any error that, if not removed, could cause a software system to fail to meet its
users’ needs or provide an open door for a cyberattacker. A safety-critical system is one whose failure
may cause human injury or death.
FEEDBACK:     a.  A safety-critical system is one whose failure may cause human injury or death.
  b.  A safety-critical system is one whose failure may cause human injury or death.
  c.  A safety-critical system is one whose failure may cause human injury or death.
  d.  A safety-critical system is one whose failure may cause human injury or death.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Ethical Issues in Developing Quality Software
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.14 - Distinguish between a high-quality software system and safety-critical system.
CTIVES:  
KEYWORDS:   Bloom's: Remember
DATE CREATED:  1/8/2020 2:27 PM
DATE MODIFIED: 1/8/2020 2:31 PM
 

76. The process of building software for safety-critical systems _____.


  a.  is less expensive than that for high-quality systems
  b.  is just as expensive as that for high-quality systems
  c.  takes much longer than that for high-quality systems
  d.  takes much less time than that for high-quality systems
ANSWER:   c
RATIONALE:   The process of building software for safety critical systems takes much longer and is much more
expensive than for high-quality systems.
FEEDBACK:     a. The process of building software for safety critical systems takes much longer and is
much more expensive than for high-quality systems.
  b. The process of building software for safety critical systems takes much longer and is
much more expensive than for high-quality systems.

Copyright Cengage Learning. Powered by Cognero. Page 54


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
  c. The process of building software for safety critical systems takes much longer and is
much more expensive than for high-quality systems.
  d. The process of building software for safety critical systems takes much longer and is
much more expensive than for high-quality systems.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Safety-Critical Systems
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.15 - Give three reasons why developing a safety-critical system takes longer and is more
CTIVES:   expensive.
KEYWORDS:   Bloom's: Remember
DATE CREATED:  1/8/2020 2:43 PM
DATE MODIFIED: 1/8/2020 2:47 PM
 

77. JoAnn is a developer hired to help code the software that will control a nuclear power plant reactor. Compared with
her previous project, which involved software for sophisticated video games for PCs and home game consoles, JoAnn's
current project will most likely _____.
  a.  have a much smaller budget and a much shorter development schedule
  b.  have a much larger budget and a much shorter development schedule
  c.  have a much smaller budget and a much longer development schedule
  d.  have a much larger budget and a much longer development schedule
ANSWER:   d
RATIONALE:   A safety-critical system is one whose failure may cause human injury or death. The safe operation of
many safety-critical systems relies on the performance of software. Such systems control an ever-
increasing array of products and applications, including antilock brakes, adaptive cruise control
functionality, and a myriad of other safety-related features found in automobiles; nuclear power plant
reactors; aircraft flight control; military weapons; and a wide range of medical devices. The process of
building software for safety critical systems takes much longer and is much more expensive than for
high-quality systems.
FEEDBACK:     a. The process of building software for safety critical systems takes much longer and is
much more expensive than for high-quality systems.
  b. The process of building software for safety critical systems takes much longer and is
much more expensive than for high-quality systems.
  c. The process of building software for safety critical systems takes much longer and is
much more expensive than for high-quality systems.
  d. The process of building software for safety critical systems takes much longer and is
much more expensive than for high-quality systems.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Safety-Critical Systems
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.15 - Give three reasons why developing a safety-critical system takes longer and is more
CTIVES:   expensive.
KEYWORDS:   Bloom's: Remember
Copyright Cengage Learning. Powered by Cognero. Page 55
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
DATE CREATED:  1/9/2020 10:59 AM
DATE MODIFIED: 1/9/2020 11:10 AM
 

78. Why do software developers assigned to write code for a safety-critical system need to work closely with safety and
systems engineers?
  a.  Such systems typically include little hardware or other equipment.
  b.  Software is typically only one of many components in such a system.
  c.  Developers working on such systems must be experienced professionals.
  d.  The software is often less essential than other components of such a system.
ANSWER:   b
RATIONALE:   The process of building software for safety-critical systems takes much longer and is much more
expensive than for high-quality systems. One reason is that software developers working on a safety-
critical system must be highly trained and experienced professionals who recognize that the software
is only one component of the system; other components typically include system users or operators,
hardware, and other equipment. Software developers need to work closely with safety and systems
engineers to ensure that the entire system, not just the software, operates in a safe manner.
FEEDBACK:     a. Software developers working on a safety-critical system must be highly trained and
experienced professionals who recognize that the software is only one component of the
system; other components typically include system users or operators, hardware, and
other equipment.
  b. Software developers working on a safety-critical system must be highly trained and
experienced professionals who recognize that the software is only one component of the
system; other components typically include system users or operators, hardware, and
other equipment.
  c. Software developers working on a safety-critical system must be highly trained and
experienced professionals who recognize that the software is only one component of the
system; other components typically include system users or operators, hardware, and
other equipment.
  d. Software developers working on a safety-critical system must be highly trained and
experienced professionals who recognize that the software is only one component of the
system; other components typically include system users or operators, hardware, and
other equipment.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Safety-Critical Systems
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.15 - Give three reasons why developing a safety-critical system takes longer and is more
CTIVES:   expensive.
KEYWORDS:   Bloom's: Remember
DATE CREATED:  1/9/2020 11:11 AM
DATE MODIFIED: 1/9/2020 11:20 AM
 

79. Developing safety-critical systems is more expensive than developing high-quality systems because _____.
  a.  more thorough documentation is required for high-quality systems
  b.  less extreme measures are taken to remove software defects from high-quality systems
  c.  the tasks involved in developing high-quality systems require additional steps
Copyright Cengage Learning. Powered by Cognero. Page 56
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
  d.  high-quality systems usually involve more non-software components
ANSWER:   b
RATIONALE:   The process of building software for safety-critical systems takes much longer and is much more
expensive than for high-quality systems. One reason is that extreme measures must be taken to
identify and remove software defects from safety-critical systems starting at the very earliest stages of
software development—requirements definition and all the way through final testing. All tasks—
including requirements definition, systems analysis, design, coding, fault analysis, testing,
implementation, and change control—require additional steps, more thorough documentation, and
vigilant checking and rechecking.
FEEDBACK:     a. Extreme measures must be taken to identify and remove software defects from safety-
critical systems starting at the very earliest stages of software development—
requirements definition and all the way through final testing. All tasks—including
requirements definition, systems analysis, design, coding, fault analysis, testing,
implementation, and change control—require additional steps, more thorough
documentation, and vigilant checking and rechecking.
  b. Extreme measures must be taken to identify and remove software defects from safety-
critical systems starting at the very earliest stages of software development—
requirements definition and all the way through final testing. All tasks—including
requirements definition, systems analysis, design, coding, fault analysis, testing,
implementation, and change control—require additional steps, more thorough
documentation, and vigilant checking and rechecking.
  c. Extreme measures must be taken to identify and remove software defects from safety-
critical systems starting at the very earliest stages of software development—
requirements definition and all the way through final testing. All tasks—including
requirements definition, systems analysis, design, coding, fault analysis, testing,
implementation, and change control—require additional steps, more thorough
documentation, and vigilant checking and rechecking.
  d. Extreme measures must be taken to identify and remove software defects from safety-
critical systems starting at the very earliest stages of software development—
requirements definition and all the way through final testing. All tasks—including
requirements definition, systems analysis, design, coding, fault analysis, testing,
implementation, and change control—require additional steps, more thorough
documentation, and vigilant checking and rechecking.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Safety-Critical Systems
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.15 - Give three reasons why developing a safety-critical system takes longer and is more
CTIVES:   expensive.
KEYWORDS:   Bloom's: Remember
DATE CREATED:  1/9/2020 11:20 AM
DATE MODIFIED: 1/9/2020 11:33 AM
 

80. Cade's team is developing a safety-critical system so they _____.


  a.  can expect the project to move forward quickly and within a tight budget
  b.  are largely inexperienced and require additional training for success
  c.  must invest a great deal of effort in risk aversion, mitigation, and detection
  d.  should spend more time improving ease of use than identifying problems
Copyright Cengage Learning. Powered by Cognero. Page 57
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
ANSWER:   c
RATIONALE:   The process of building software for safety-critical systems takes much longer and is much more
expensive than for high-quality systems. One reason is that a great deal of effort must be put into
identifying what can go wrong, the likelihood and consequences of such occurrences, and how these
risks can be averted, mitigated, or detected so the users can be warned.
FEEDBACK:     a. For safety-critical systems, a great deal of effort must be put into identifying what can go
wrong, the likelihood and consequences of such occurrences, and how these risks can
be averted, mitigated, or detected so the users can be warned.
  b. For safety-critical systems, a great deal of effort must be put into identifying what can go
wrong, the likelihood and consequences of such occurrences, and how these risks can
be averted, mitigated, or detected so the users can be warned.
  c. For safety-critical systems, a great deal of effort must be put into identifying what can go
wrong, the likelihood and consequences of such occurrences, and how these risks can
be averted, mitigated, or detected so the users can be warned.
  d. For safety-critical systems, a great deal of effort must be put into identifying what can go
wrong, the likelihood and consequences of such occurrences, and how these risks can
be averted, mitigated, or detected so the users can be warned.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Safety-Critical Systems
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.15 - Give three reasons why developing a safety-critical system takes longer and is more
CTIVES:   expensive.
KEYWORDS:   Bloom's: Remember
DATE CREATED:  1/9/2020 11:34 AM
DATE MODIFIED: 1/9/2020 11:43 AM
 

81. What feature of the creation of safety-critical software often draws developers into ethical dilemmas?
  a.  level of experience required
  b.  nature of industries involved
  c.  increased time and expense
  d.  coordination with other teams
ANSWER:   c
RATIONALE:   The increased time and expense of completing safety-critical software can draw developers into
ethical dilemmas.
FEEDBACK:     a. The increased time and expense of completing safety-critical software can draw
developers into ethical dilemmas.
  b. The increased time and expense of completing safety-critical software can draw
developers into ethical dilemmas.
  c. The increased time and expense of completing safety-critical software can draw
developers into ethical dilemmas.
  d. The increased time and expense of completing safety-critical software can draw
developers into ethical dilemmas.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Safety-Critical Systems
Copyright Cengage Learning. Powered by Cognero. Page 58
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
QUESTION TYPE:   Multiple Choice
HAS VARIABLES:   False
LEARNING OBJECT POIS.14e.3.16 - Identify two ethical dilemmas that software developers face when building high-
IVES:   quality or safety-critical systems.
KEYWORDS:   Bloom's: Remember
DATE CREATED:   1/9/2020 11:59 AM
DATE MODIFIED:   1/9/2020 12:07 PM

82. One example of an ethical dilemma related to safety-critical systems is whether to risk making the product more
expensive, and potentially less appealing to customers, by _____.
  a.  including hardware mechanisms to back up or verify software functions
  b.  reducing redundancy in hardware and software components
  c.  increasing its ease of operation
  d.  copying a competitor's product
ANSWER:   a
RATIONALE:   The increased time and expense of completing safety-critical software can draw developers into
ethical dilemmas. They must carefully weigh cost and ease of use issues in developing a system that is
safe and that also appeals to customers. For example, the use of hardware mechanisms or redundant
software to back up or verify critical software functions can help ensure safe operation. However,
such hardware or redundancy may make the final product more expensive to manufacture or harder
for the user to operate—potentially making the product less attractive than a competitor’s.
FEEDBACK:     a. The use of hardware mechanisms or redundant software to back up or verify critical
software functions can help ensure safe operation but may make the final product more
expensive to manufacture, potentially making the product less attractive than a
competitor’s.
  b. The use of hardware mechanisms or redundant software to back up or verify critical
software functions can help ensure safe operation but may make the final product more
expensive to manufacture, potentially making the product less attractive than a
competitor’s.
  c. The use of hardware mechanisms or redundant software to back up or verify critical
software functions can help ensure safe operation but may make the final product more
expensive to manufacture, potentially making the product less attractive than a
competitor’s.
  d. The use of hardware mechanisms or redundant software to back up or verify critical
software functions can help ensure safe operation but may make the final product more
expensive to manufacture, potentially making the product less attractive than a
competitor’s.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Safety-Critical Systems
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.16 - Identify two ethical dilemmas that software developers face when building high-
CTIVES:   quality or safety-critical systems.
KEYWORDS:   Bloom's: Remember
DATE CREATED:  1/9/2020 12:08 PM
DATE MODIFIED: 1/9/2020 12:15 PM
 
Copyright Cengage Learning. Powered by Cognero. Page 59
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
83. One example of a common and significant ethical dilemma related to safety-critical systems is deciding _____.
  a.  how much software testing is sufficient
  b.  how much skill users can be assumed to have
  c.  how much documentation is necessary
  d.  how many software engineers are needed
ANSWER:   a
RATIONALE:   The increased time and expense of completing safety-critical software can draw developers into
ethical dilemmas. One key issue is deciding when sufficient software testing has been performed.
How much testing is enough when you are building a product whose failure could cause loss of
human life? At some point, software developers must determine that they have completed sufficient
testing and then sign off to indicate their approval to release the product. Determining how much
testing is sufficient demands careful decision making.
FEEDBACK:     a. One key issue when developing safety-critical software is deciding when sufficient
software testing has been performed.
  b. One key issue when developing safety-critical software is deciding when sufficient
software testing has been performed.
  c. One key issue when developing safety-critical software is deciding when sufficient
software testing has been performed.
  d. One key issue when developing safety-critical software is deciding when sufficient
software testing has been performed.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Safety-Critical Systems
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.16 - Identify two ethical dilemmas that software developers face when building high-
CTIVES:   quality or safety-critical systems.
KEYWORDS:   Bloom's: Remember
DATE CREATED:  1/9/2020 12:17 PM
DATE MODIFIED: 1/9/2020 12:24 PM
 

84. A key ethical question related specifically to safety-critical software development is:
  a. What is the impact on you, your organization, other stakeholders, and the environment?
  b. Do any corporate policies or guidelines apply?
  c. What is wrong with the current way we do things?
  d. How much testing is enough when you are building a product whose failure could cause loss of human life?
ANSWER:   d
RATIONALE:   The increased time and expense of completing safety-critical software can draw developers into
ethical dilemmas. One key issue is deciding when sufficient software testing has been performed.
How much testing is enough when you are building a product whose failure could cause loss of
human life? At some point, software developers must determine that they have completed sufficient
testing and then sign off to indicate their approval to release the product. Determining how much
testing is sufficient demands careful decision making.
FEEDBACK:     a. One key issue when developing safety-critical software is deciding when sufficient
software testing has been performed.
  b. One key issue when developing safety-critical software is deciding when sufficient
Copyright Cengage Learning. Powered by Cognero. Page 60
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
software testing has been performed.
  c. One key issue when developing safety-critical software is deciding when sufficient
software testing has been performed.
  d. One key issue when developing safety-critical software is deciding when sufficient
software testing has been performed.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Safety-Critical Systems
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.16 - Identify two ethical dilemmas that software developers face when building high-
CTIVES:   quality or safety-critical systems.
KEYWORDS:   Bloom's: Remember
DATE CREATED:  1/9/2020 12:24 PM
DATE MODIFIED: 1/9/2020 12:31 PM
 

85. Walter is a developer and part of a team that develops safety-critical systems. He often finds it an ethical challenge to
_____.
  a.  make the final product more expensive to manufacture or harder to use
  b.  choose between hardware mechanisms or redundant software to back up critical functions
  c.  identify what can go wrong and the likelihood and consequences of such occurrences
  d.  weigh cost and ease of use issues while keeping the system safe and appealing
ANSWER:   d
RATIONALE:   The increased time and expense of completing safety-critical software can draw developers into
ethical dilemmas. They must carefully weigh cost and ease of use issues in developing a system that is
safe and that also appeals to customers. For example, the use of hardware mechanisms or redundant
software to back up or verify critical software functions can help ensure safe operation. However,
such hardware or redundancy may make the final product more expensive to manufacture or harder
for the user to operate—potentially making the product less attractive than a competitor’s.
FEEDBACK:     a. Developers working on safety-critical software must carefully weigh cost and ease of use
issues in developing a system that is safe and that also appeals to customers.
  b. Developers working on safety-critical software must carefully weigh cost and ease of use
issues in developing a system that is safe and that also appeals to customers.
  c. Developers working on safety-critical software must carefully weigh cost and ease of use
issues in developing a system that is safe and that also appeals to customers.
  d. Developers working on safety-critical software must carefully weigh cost and ease of use
issues in developing a system that is safe and that also appeals to customers.
POINTS:   1
DIFFICULTY:   Easy
REFERENCES:   Safety-Critical Systems
QUESTION TYPE:  Multiple Choice
HAS VARIABLES:  False
LEARNING OBJE POIS.14e.3.16 - Identify two ethical dilemmas that software developers face when building high-
CTIVES:   quality or safety-critical systems.
KEYWORDS:   Bloom's: Remember
DATE CREATED:  1/9/2020 12:31 PM
Copyright Cengage Learning. Powered by Cognero. Page 61
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
DATE MODIFIED: 1/9/2020 12:41 PM
 

Essay

86. Imagine that you are faced with an ethical dilemma at work, and you must determine the "right," or ethical, course of
action. List the five steps you will go through to make this decision, including some of the questions you'll ask yourself at
each step in the process.
ANSWER:   Most of us have developed a decision-making process that we execute automatically, without thinking
about the steps we go through. For many of us, the process generally follows these steps: (1) develop
problem statement, (2) identify alternatives, (3) choose an alternative, (4) implement the decision, and
(5) evaluate the results.
 
(1) Develop a Problem Statement
A problem statement is a clear, concise description of the issue that needs to be addressed. A good
problem statement answers the following questions: What do people observe that causes them to think
there is a problem? Who is directly affected by the problem? Is anyone else affected? How often does
the problem occur? What is the impact of the problem? How serious is the problem?
 
(2) Identify Alternatives
During this stage of decision making, it is ideal to enlist the help of others to identify several
alternative solutions to the problem. You will especially want to enlist the help of those with first-
hand knowledge of the situation or those who will be affected by the decision. Brainstorming with
others will increase your chances of identifying a broad range of alternatives and determining the best
solution.
 
(3) Choose an Alternative
Once a set of alternatives has been identified, you must evaluate them based on numerous criteria,
such as effectiveness of addressing the issue, the extent of risk associated with each alternative, cost,
and time to implement. 
 
As part of the evaluation process, weigh various laws, guidelines, and principles that may apply. You
certainly do not want to violate a law that can lead to a fine or imprisonment for yourself or others. Do
any corporate policies or guidelines apply? Does the organizational code of ethics offer guidance? Do
any of your own ethics apply?
 
Consider the likely consequences of each alternative from several perspectives: What is the impact on
you, your organization, other stakeholders (including your suppliers and customers), and the
environment? Does this alternative do less harm than other alternatives?
 
(4) Implement the Decision
Once an alternative is selected, it should be implemented in an efficient, effective, and timely manner.
This is often much easier said than done, because people tend to resist change. In fact, the bigger the
change, the greater is the resistance to it. Communication is the key to helping people accept a
change. It is imperative that someone whom the stakeholders trust and respect answer the following
questions: Why are we doing this? What is wrong with the current way we do things? How will the
change benefit us?
 
(5) Evaluate the Results
After the solution to the problem has been implemented, monitor the results to see if the desired effect
was achieved, and observe its impact on the organization and the various stakeholders. Were the
success criteria fully met? Were there any unintended consequences? Was the implementation poorly

Copyright Cengage Learning. Powered by Cognero. Page 62


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
executed? This evaluation may indicate that further refinements are needed. If so, return to the
problem development step, refine the problem statement as necessary, and work through the process
again.
RATIONALE:   Most of us have developed a decision-making process that we execute automatically, without thinking
about the steps we go through. For many of us, the process generally follows these steps: (1) develop
problem statement, (2) identify alternatives, (3) choose an alternative, (4) implement the decision, and
(5) evaluate the results.
(1) Develop a Problem Statement
A problem statement is a clear, concise description of the issue that needs to be addressed. A good
problem statement answers the following questions: What do people observe that causes them to think
there is a problem? Who is directly affected by the problem? Is anyone else affected? How often does
the problem occur? What is the impact of the problem? How serious is the problem?
(2) Identify Alternatives
During this stage of decision making, it is ideal to enlist the help of others to identify several
alternative solutions to the problem. You will especially want to enlist the help of those with first-
hand knowledge of the situation or those who will be affected by the decision. Brainstorming with
others will increase your chances of identifying a broad range of alternatives and determining the best
solution.
(3) Choose an Alternative
Once a set of alternatives has been identified, you must evaluate them based on numerous criteria,
such as effectiveness of addressing the issue, the extent of risk associated with each alternative, cost,
and time to implement. 
As part of the evaluation process, weigh various laws, guidelines, and principles that may apply. You
certainly do not want to violate a law that can lead to a fine or imprisonment for yourself or others. Do
any corporate policies or guidelines apply? Does the organizational code of ethics offer guidance? Do
any of your own ethics apply?
Consider the likely consequences of each alternative from several perspectives: What is the impact on
you, your organization, other stakeholders (including your suppliers and customers), and the
environment? Does this alternative do less harm than other alternatives?
(4) Implement the Decision
Once an alternative is selected, it should be implemented in an efficient, effective, and timely manner.
This is often much easier said than done, because people tend to resist change. In fact, the bigger the
change, the greater is the resistance to it. Communication is the key to helping people accept a
change. It is imperative that someone whom the stakeholders trust and respect answer the following
questions: Why are we doing this? What is wrong with the current way we do things? How will the
change benefit us?
(5) Evaluate the Results
After the solution to the problem has been implemented, monitor the results to see if the desired effect
was achieved, and observe its impact on the organization and the various stakeholders. Were the
success criteria fully met? Were there any unintended consequences? Was the implementation poorly
executed? This evaluation may indicate that further refinements are needed. If so, return to the
problem development step, refine the problem statement as necessary, and work through the process
again.
POINTS:   1
RUBRIC:   0 1 2 3 4
Criteria          
Failure Below Expectations Developing Competent Mastery
Correctly identifies          
the five steps of the
         
ethical decision-
making process
Describes each step,          
including appropriate
         
self-directed
questions
Copyright Cengage Learning. Powered by Cognero. Page 63
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
DIFFICULTY:   Moderate
REFERENCES:   Including Ethical Considerations in Decision Making
QUESTION TYPE:  Essay
HAS VARIABLES:  False
STUDENT ENTRY  Basic
MODE:  
LEARNING OBJE POIS.14e.3.3 - Outline a five-step ethical decision-making process.
CTIVES:  
NATIONAL STAND United States - BUSPROG: Ethics
ARDS:  
KEYWORDS:   Bloom's: Remember
DATE CREATED:  11/19/2019 5:54 PM
DATE MODIFIED: 1/5/2020 7:39 AM
 

87. Define Internet censorship and explain how it can be imposed at several different points between the speaker and his
or her audience.
ANSWER:   Internet censorship is the control or suppression of the publishing or accessing of information on the
Internet. Speech on the Internet requires a series of intermediaries to reach its audience with each
intermediary vulnerable to some degree to pressure from those who want to silence the speaker. Web
hosting services are often the recipients of defamation or copyright infringement claims by
government authorities or copyright holders, demanding the immediate takedown of hosted material
that is deemed inappropriate or illegal. Government entities may pressure “upstream” Internet service
providers to limit access to certain Web sites, allow access to only some content or modified content
at certain Web sites, reject the use of certain keywords in search engine searches, and track and
monitor the Internet activities of individuals.
 
Several countries have enacted so called three strikes laws that require ISPs to terminate a user’s
Internet connection once that user has received a number of notifications of posting of content deemed
inappropriate or illegal. Censorship efforts may also focus on Domain Name System (DNS) servers,
which convert human-readable host and domain names into the machine-readable, numeric Internet
Protocol (IP) addresses that are used to point computers and other devices toward the correct servers
on the Internet. Where authorities have control over DNS servers, officials can “deregister” a domain
that hosts content that is deemed inappropriate or illegal so that the Web site is effectively invisible to
users seeking access to the site.
RATIONALE:   Internet censorship is the control or suppression of the publishing or accessing of information on the
Internet. Speech on the Internet requires a series of intermediaries to reach its audience with each
intermediary vulnerable to some degree to pressure from those who want to silence the speaker. Web
hosting services are often the recipients of defamation or copyright infringement claims by
government authorities or copyright holders, demanding the immediate takedown of hosted material
that is deemed inappropriate or illegal. Government entities may pressure “upstream” Internet service
providers to limit access to certain Web sites, allow access to only some content or modified content
at certain Web sites, reject the use of certain keywords in search engine searches, and track and
monitor the Internet activities of individuals.
 
Several countries have enacted so called three strikes laws that require ISPs to terminate a user’s
Internet connection once that user has received a number of notifications of posting of content deemed
inappropriate or illegal. Censorship efforts may also focus on Domain Name System (DNS) servers,
which convert human-readable host and domain names into the machine-readable, numeric Internet
Protocol (IP) addresses that are used to point computers and other devices toward the correct servers
Copyright Cengage Learning. Powered by Cognero. Page 64
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
on the Internet. Where authorities have control over DNS servers, officials can “deregister” a domain
that hosts content that is deemed inappropriate or illegal so that the Web site is effectively invisible to
users seeking access to the site.
POINTS:   1
RUBRIC:   0 1 2 3 4
Criteria          
Failure Below Expectations Developing Competent Mastery
Defines Internet          
         
censorship
Names the          
intermediaries
involved in Internet
         
speech (Web host
server, upstream ISP,
DNS, and ISP)
Provides examples of          
how censorship is
imposed through          
each of these
intermediaries

DIFFICULTY:   Moderate
REFERENCES:   Internet Censorship
QUESTION TYPE:  Essay
HAS VARIABLES:  False
STUDENT ENTRY  Basic
MODE:  
LEARNING OBJE POIS.14e.3.12 - Describe the impact of censorship on the operation of Internet service providers.
CTIVES:  
KEYWORDS:   Bloom's: Remember
DATE CREATED:  1/8/2020 11:38 AM
DATE MODIFIED: 1/8/2020 11:42 AM
 

88. Define the terms high-quality software system and safety-critical system. How are these types of software related?
ANSWER:   A high-quality software system is a system that is easy to learn and use because it performs quickly
and efficiently; it meets its users’ needs; and it operates safely and reliably so that system downtime is
kept to a minimum. A safety-critical system is one whose failure may cause human injury or
death. The safe operation of many safety-critical systems relies on the performance of software.
 
They are related in that it is essential that safety-critical software systems be free of software defects--
meaning that they should be high-quality software systems. A software defect is any error that, if not
removed, could cause a software system to fail to meet its users’ needs or provide an open door for a
cyberattacker.
RATIONALE:   A high-quality software system is a system that is easy to learn and use because it performs quickly
and efficiently; it meets its users’ needs; and it operates safely and reliably so that system downtime is
kept to a minimum. A safety-critical system is one whose failure may cause human injury or
death. The safe operation of many safety-critical systems relies on the performance of software.
They are related in that it is essential that safety-critical software systems be free of software defects--
meaning that they should be high-quality software systems. A software defect is any error that, if
not removed, could cause a software system to fail to meet its users’ needs or provide an open door
for a cyberattacker.
POINTS:   1

Copyright Cengage Learning. Powered by Cognero. Page 65


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
RUBRIC:   0 1 2 3 4
Criteria          
Failure Below Expectations Developing Competent Mastery
Defines high-quality          
software system and          
safety-critical system
Explains how they          
         
are related

DIFFICULTY:   Moderate
REFERENCES:   Ethical Issues in Developing Quality Software
QUESTION TYPE:  Essay
HAS VARIABLES:  False
STUDENT ENTRY  Basic
MODE:  
LEARNING OBJE POIS.14e.3.14 - Distinguish between a high-quality software system and safety-critical system.
CTIVES:  
KEYWORDS:   Bloom's: Remember
DATE CREATED:  1/8/2020 2:32 PM
DATE MODIFIED: 1/8/2020 2:39 PM
 

89. Why does the process of building software for safety-critical systems take much longer and cost much more than
building software for high-quality systems?
ANSWER:   The process of building software for safety-critical systems takes much longer and is much more
expensive than for high-quality systems for the following reasons:

 Software developers working on a safety-critical system must be highly trained and


experienced professionals who recognize that the software is only one component of the
system; other components typically include system users or operators, hardware, and other
equipment. Software developers need to work closely with safety and systems engineers to
ensure that the entire system, not just the software, operates in a safe manner.
 Extreme measures must be taken to identify and remove software defects from safety-critical
systems starting at the very earliest stages of software development—requirements definition
and all the way through final testing. All tasks—including requirements definition, systems
analysis, design, coding, fault analysis, testing, implementation, and change control—require
additional steps, more thorough documentation, and vigilant checking and rechecking. As a
result, safety-critical software takes much longer to complete and is much more expensive to
develop.
 A great deal of effort must be put into identifying what can go wrong, the likelihood and
consequences of such occurrences, and how these risks can be averted, mitigated, or detected
so the users can be warned.

RATIONALE:   The process of building software for safety-critical systems takes much longer and is much more
expensive than for high-quality systems for the following reasons:

 Software developers working on a safety-critical system must be highly trained and


experienced professionals who recognize that the software is only one component of the
system; other components typically include system users or operators, hardware, and other
equipment. Software developers need to work closely with safety and systems engineers to
ensure that the entire system, not just the software, operates in a safe manner.
 Extreme measures must be taken to identify and remove software defects from safety-critical
systems starting at the very earliest stages of software development—requirements definition

Copyright Cengage Learning. Powered by Cognero. Page 66


Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
and all the way through final testing. All tasks—including requirements definition, systems
analysis, design, coding, fault analysis, testing, implementation, and change control—require
additional steps, more thorough documentation, and vigilant checking and rechecking. As a
result, safety-critical software takes much longer to complete and is much more expensive to
develop.
 A great deal of effort must be put into identifying what can go wrong, the likelihood and
consequences of such occurrences, and how these risks can be averted, mitigated, or detected
so the users can be warned.

POINTS:   1
RUBRIC:   0 1 2 3 4
Criteria          
Failure Below Expectations Developing Competent Mastery
Describes three          
reasons why safety-
critical systems take          
longer and are more
expensive to build

DIFFICULTY:   Moderate
REFERENCES:   Safety-Critical Systems
QUESTION TYPE:  Essay
HAS VARIABLES:  False
STUDENT ENTRY  Basic
MODE:  
LEARNING OBJE POIS.14e.3.15 - Give three reasons why developing a safety-critical system takes longer and is more
CTIVES:   expensive.
KEYWORDS:   Bloom's: Remember
DATE CREATED:  1/9/2020 11:45 AM
DATE MODIFIED: 1/9/2020 11:48 AM
 

90. Describe two ethical dilemmas that often confront developers working on safety-critical software.
ANSWER:   The increased time and expense of completing safety-critical software can draw developers into
ethical dilemmas. They must carefully weigh cost and ease of use issues in developing a system that is
safe and that also appeals to customers. For example, the use of hardware mechanisms or redundant
software to back up or verify critical software functions can help ensure safe operation. However,
such hardware or redundancy may make the final product more expensive to manufacture or harder
for the user to operate—potentially making the product less attractive than a competitor’s.
 
Another key issue is deciding when sufficient software testing has been performed. How much testing
is enough when you are building a product whose failure could cause loss of human life? At some
point, software developers must determine that they have completed sufficient testing and then sign
off to indicate their approval to release the product. Determining how much testing is sufficient
demands careful decision making.
RATIONALE:   The increased time and expense of completing safety-critical software can draw developers into
ethical dilemmas. They must carefully weigh cost and ease of use issues in developing a system that is
safe and that also appeals to customers. For example, the use of hardware mechanisms or redundant
software to back up or verify critical software functions can help ensure safe operation. However,
such hardware or redundancy may make the final product more expensive to manufacture or harder
for the user to operate—potentially making the product less attractive than a competitor’s.
 
Another key issue is deciding when sufficient software testing has been performed. How much testing
Copyright Cengage Learning. Powered by Cognero. Page 67
Chapter 03 - Corporate and Individual Accountability: Ethical, Legal, and Social Issues
is enough when you are building a product whose failure could cause loss of human life? At some
point, software developers must determine that they have completed sufficient testing and then sign
off to indicate their approval to release the product. Determining how much testing is sufficient
demands careful decision making.
POINTS:   1
RUBRIC:   0 1 2 3 4
Criteria          
Failure Below Expectations Developing Competent Mastery
Describes two ethical          
dilemmas specific to
safety-critical          
software
development

DIFFICULTY:   Moderate
REFERENCES:   Safety-Critical Systems
QUESTION TYPE:  Essay
HAS VARIABLES:  False
STUDENT ENTRY  Basic
MODE:  
LEARNING OBJE POIS.14e.3.16 - Identify two ethical dilemmas that software developers face when building high-
CTIVES:   quality or safety-critical systems.
KEYWORDS:   Bloom's: Remember
DATE CREATED:  1/9/2020 12:42 PM
DATE MODIFIED: 1/9/2020 12:44 PM
 

Copyright Cengage Learning. Powered by Cognero. Page 68

You might also like