You are on page 1of 27

Chapter 3

Ethics and Privacy

Question type: True/False

1) When you access a website, the site could also have access to your data.

Answer: True

Difficulty: Easy
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe
the four categories of ethical issues related to information technology.
Section Reference: Case 3.1 The Huge Scope of Privacy Issues
AACSB: Information Technology
Bloomcode: Knowledge

2) Property issues involve the ownership and value of information.

Answer: True

Difficulty: Easy
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe
the four categories of ethical issues related to information technology.
Section Reference: 3.1 Ethical Issues
AACSB: Reflective Thinking
Bloomcode: Knowledge

3) An individual or organization faced with an ethical decision is basically considering whether to break
the law.

Answer: False

Difficulty: Easy
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe
the four categories of ethical issues related to information technology.
Section Reference: 3.1 Ethical Issues
AACSB: Ethics
Bloomcode: Knowledge

4) A code of ethics is a collection of principles that are intended to guide decision making by members of
the organization.

Answer: True
Difficulty: Easy
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe
the four categories of ethical issues related to information technology.
Section Reference: 3.1 Ethical Issues
AACSB: Ethics
Bloomcode: Knowledge

5) If something is unethical, that means it is illegal.

Answer: False

Difficulty: Medium
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe
the four categories of ethical issues related to information technology.
Section Reference: 3.1 Ethical Issues
AACSB: Ethics
Bloomcode: Comprehension

6) Improvements in information technologies are leading to a decreasing number of ethical problems.

Answer: False

Difficulty: Easy
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe
the four categories of ethical issues related to information technology.
Section Reference: 3.1 Ethical Issues
AACSB: Ethics
Bloomcode: Evaluation

7) When you interview for a job at a company, it is likely that the company will google you and search
social networking sites for information on you.

Answer: True

Difficulty: Easy
Learning Objective: Identify three places that store personal data, and for each one, discuss at least one
potential threat to the privacy of the data stored there.
Section Reference: 3.2 Privacy
AACSB: Information Technology
Bloomcode: Comprehension

8) The right of privacy is absolute.


Answer: False

Difficulty: Easy
Learning Objective: Identify three places that store personal data, and for each one, discuss at least one
potential threat to the privacy of the data stored there.
Section Reference: 3.2 Privacy
AACSB: Ethics
Bloomcode: Comprehension

9) Most electronic surveillance of employees is legal.


Answer: True

Difficulty: Easy
Learning Objective: Identify three places that store personal data, and for each one, discuss at least one
potential threat to the privacy of the data stored there.
Section Reference: 3.2 Privacy
AACSB: Ethics
Bloomcode: Knowledge

10) Determining whose laws should be followed is a problem related to the international aspects of
privacy.

Answer: True

Difficulty: Easy
Learning Objective: Identify three places that store personal data, and for each one, discuss at least one
potential threat to the privacy of the data stored there.
Section Reference: 3.2 Privacy
AACSB: Analytic
Bloomcode: Knowledge

11) Facebook’s CEO believes privacy is no longer a social norm.

Answer: True

Difficulty: Easy
Learning Objective: Identify three places that store personal data, and for each one, discuss at least one
potential threat to the privacy of the data stored there.
Section Reference: 3.2 Privacy
AACSB: Reflective Thinking
Bloomcode: Knowledge

12) The individual’s right of privacy supersedes the public’s right to know.
Answer: False

Difficulty: Easy
Learning Objective: Identify three places that store personal data, and for each one, discuss at least one
potential threat to the privacy of the data stored there.
Section Reference: 3.2 Privacy
AACSB: Information Technology
Bloomcode: Knowledge

13) In general, employees have high legal protection against surveillance by employers.

Answer: False

Difficulty: Easy
Learning Objective: Identify three places that store personal data, and for each one, discuss at least one
potential threat to the privacy of the data stored there.
Section Reference: 3.2 Privacy
AACSB: Communication
Bloomcode: Knowledge

14) Privacy is the right to be left alone and to be free of unreasonable personal intrusions.

Answer: True

Difficulty: Easy
Learning Objective: Identify three places that store personal data, and for each one, discuss at least one
potential threat to the privacy of the data stored there.
Section Reference: 3.2 Privacy
AACSB: Ethics
Bloomcode: Knowledge

15) The opt-out model of informed consent allows a company to collect personal information until the
customers specifically requests otherwise.

Answer: True

Difficulty: Easy
Learning Objective: Identify three places that store personal data, and for each one, discuss at least one
potential threat to the privacy of the data stored there.
Section Reference: 3.2 Privacy
AACSB: Analytic
Bloomcode: Knowledge

16) The Platform for Privacy Preferences automatically communicates privacy policies between a
commerce Web site and its visitors to that site.

Answer: True

Difficulty: Easy
Learning Objective: Identify three places that store personal data, and for each one, discuss at least one
potential threat to the privacy of the data stored there.
Section Reference: 3.2 Privacy
AACSB: Information Technology
Bloomcode: Knowledge

17) The flow of information among countries is called transborder data flows.

Answer: True

Difficulty: Easy
Learning Objective: Identify three places that store personal data, and for each one, discuss at least one
potential threat to the privacy of the data stored there.
Section Reference: 3.2 Privacy
AACSB: Reflective Thinking
Bloomcode: Comprehension

Question type: Multiple Choice

18) Which of the following allows users to take pictures or record videos that can self-destruct after a
set amount of time and send them to a selected recipients?

a) Wickr
b) Burn Note
c) Tapad
d) Snapchat
e) Disconnect

Answer: d

Difficulty: Medium
Learning Objective: Identify three places that store personal data, and for each one, discuss at least one
potential threat to the privacy of the data stored there.
Section Reference: Case 3.2 Protecting Your Privacy
AACSB: Information Technology
Bloomcode: Knowledge

19) Which of the following the smartphone apps allows the user to send a video that will be
automatically deleted after a limited time without leaving any trace of it?
a) Wickr
b) Burn Note
c) Tapad
d) Silent Circle
e) Disconnect

Answer: d

Difficulty: Medium
Learning Objective: Identify three places that store personal data, and for each one, discuss at least one
potential threat to the privacy of the data stored there.
Section Reference: Case 3.2 Protecting Your Privacy
AACSB: Information Technology
Bloomcode: Knowledge

20) The ____________ ethical standard states that an ethical action is the one that provides the most
good or does the least harm.

a) Common good
b) Fairness
c) Rights
d) Utilitarian
e) Well-being

Answer: d

Difficulty: Medium
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe
the four categories of ethical issues related to information technology.
Section Reference: 3.1 Ethical Issues
AACSB: Analytic
Bloomcode: Comprehension

21) The ____________ ethical standard states that an ethical action is the one that best protects and
respects the moral rights of the affected parties.

a) Common good
b) Fairness
c) Rights
d) Utilitarian
e) Well-being

Answer: c

Difficulty: Medium
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe
the four categories of ethical issues related to information technology.
Section Reference: 3.1 Ethical Issues
AACSB: Ethics
Bloomcode: Knowledge

22) The _______________ approach maintains that the most ethical action is the one that provides the
most good or does the least harm.

a) Common good
b) Fairness
c) Rights
d) Utilitarian

Answer: d

Difficulty: Easy
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe
the four categories of ethical issues related to information technology.
Section Reference: 3.1 Ethical Issues
AACSB: Ethics
Bloomcode: Knowledge

23) The _____________ ethical standard states that ethical actions treat all human beings equally.

a) Common good
b) Fairness
c) Rights
d) Utilitarian
e) Well-being

Answer: b

Difficulty: Easy
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe
the four categories of ethical issues related to information technology.
Section Reference: 3.1 Ethical Issues
AACSB: Ethics
Bloomcode: Knowledge

24) The _______________ ethical standard states that respect and compassion for all others is the basis
for ethical actions.

a) Common good
b) Fairness
c) Rights
d) Utilitarian
e) Well-being

Answer: a

Difficulty: Medium
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe
the four categories of ethical issues related to information technology.
Section Reference: 3.1 Ethical Issues
AACSB: Ethics
Bloomcode: Comprehension

25) Arguing that CEOs make 100 times more than their employees because they have to take more risk
than lower-level employees is the ____________ approach.

a) Common good
b) Fairness
c) Rights
d) Utilitarian

Answer: b

Difficulty: Medium
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe
the four categories of ethical issues related to information technology.
Section Reference: 3.1 Ethical Issues
AACSB: Ethics
Bloomcode: Knowledge

26) Which of the following is not a step in ethical decision making?

a) Recognize the ethical issue.


b) Get the facts.
c) Evaluate alternative actions.
d) Make a decision and test it.
e) All of these are steps in ethical decision making.

Answer: e

Difficulty: Medium
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe
the four categories of ethical issues related to information technology.
Section Reference: 3.1 Ethical Issues
AACSB: Ethics
Bloomcode: Knowledge
27) ____________ means that you accept the consequences of your decisions and actions.

a) Accountability
b) Due process
c) Liability
d) Responsibility

Answer: d

Difficulty: Easy
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe
the four categories of ethical issues related to information technology.
Section Reference: 3.1 Ethical Issues
AACSB: Ethics
Bloomcode: Analysis

28) Various organizations that promote fair and responsible use of information systems often develop a
_____.

a) Code of ethics
b) Strategic plan
c) Mission statement
d) Responsibility charter
e) Goals outline

Answer: a

Difficulty: Easy
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe
the four categories of ethical issues related to information technology.
Section Reference: 3.1 Ethical Issues
AACSB: Ethics
Bloomcode: Knowledge

29) The Sarbanes-Oxley Act in 2002 requires publicly held companies to implement ________ controls.

a) ethical
b) financial
c) security
d) technology

Answer: b

Difficulty: Easy
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe
the four categories of ethical issues related to information technology.
Section Reference: 3.1 Ethical Issues
AACSB: Ethics
Bloomcode: Knowledge

30) ____________ issues revolve around who should have access to information and whether they
should have to pay for this access.

a) Accessibility
b) Accuracy
c) Privacy
d) Property

Answer: a

Difficulty: Easy
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe
the four categories of ethical issues related to information technology.
Section Reference: 3.1 Ethical Issues
AACSB: Ethics
Bloomcode: Knowledge

31) Which of the following is NOT a drawback of photo tagging and geotagging:

a) It is easier for everyone to gather information about you.


b) You are forced to manually un-tag yourself.
c) It is easier to lie about where you’ve been or what you’ve been doing.
d) You may experience a certain lack of control over your information.

Answer: c

Difficulty: Medium
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe
the four categories of ethical issues related to information technology.
Section Reference: 3.2 Privacy
AACSB: Information Technology
Bloomcode: Knowledge

32) Which of the following is NOT a benefit of photo tagging and geotagging:

a) It is easier for police to track criminals.


b) Criminals can be identified more quickly and accurately.
c) Our purchase history can be tracked so that billboards are more customized.
d) Digital sensors are more efficient so that home security is easier to implement.
Answer: c

Difficulty: Medium
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe
the four categories of ethical issues related to information technology.
Section Reference: 3.2 Privacy
AACSB: Analytic
Bloomcode: Comprehension

33) What is _____ is not necessarily _____.

a) Illegal, unethical
b) Ethical, illegal
c) Unethical, illegal
d) Unethical, legal
e) Ethical, legal

Answer: c

Difficulty: Medium
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe
the four categories of ethical issues related to information technology.
Section Reference: 3.1 Ethical Issues
AACSB: Ethics
Bloomcode: Knowledge

34) _____ issues involve collecting, storing, and disseminating information about individuals.

a) Privacy
b) Accuracy
c) Transferability
d) Property
e) Accessibility

Answer: a

Difficulty: Easy
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe
the four categories of ethical issues related to information technology.
Section Reference: 3.1 Ethical Issues
AACSB: Ethics
Bloomcode: Knowledge

35) _____ issues involve the authenticity and fidelity of information that is collected and processed.
a) Privacy
b) Accuracy
c) Transferability
d) Property
e) Accessibility

Answer: b

Difficulty: Easy
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe
the four categories of ethical issues related to information technology.
Section Reference: 3.1 Ethical Issues
AACSB: Ethics
Bloomcode: Comprehension

36) _____ issues involve who may obtain information and how much they should pay for this
information.

a) Privacy
b) Accuracy
c) Transferability
d) Property
e) Accessibility

Answer: e

Difficulty: Easy
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe
the four categories of ethical issues related to information technology.
Section Reference: 3.1 Ethical Issues
AACSB: Reflective Thinking
Bloomcode: Knowledge

37) _____________ means accepting the consequences of your decisions and actions.

a) Privacy
b) Responsibility
c) Transferability
d) Accountability
e) Liability

Answer: b

Difficulty: Easy
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe
the four categories of ethical issues related to information technology.
Section Reference: 3.1 Ethical Issues
AACSB: Communication, Ethics, Analytic, Information Technology, Diversity, Reflective Thinking
Bloomcode: Knowledge, Comprehension, Application, Analysis, Synthesis, Evaluation

38) ______________ determines who is responsible for the actions taken.

a) Privacy
b) Responsibility
c) Transferability
d) Accountability
e) Liability

Answer: d

Difficulty: Easy
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe
the four categories of ethical issues related to information technology.
Section Reference: 3.1 Ethical Issues
AACSB: Ethics
Bloomcode: Comprehension

39) Which of the following is not an ethical issue related to IT?

a) Privacy
b) Accuracy
c) Accountability
d) Property (such as intellectual property)
e) Accessibility to information

Answer: c

Difficulty: Easy
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe
the four categories of ethical issues related to information technology.
Section Reference: 3.1 Ethical Issues
AACSB: Reflective Thinking
Bloomcode: Knowledge

40) ______________ is a legal concept that gives individuals the right to recover the damages done to
them by other individuals, organizations, or systems.

a) Privacy
b) Responsibility
c) Transferability
d) Accountability
e) Liability

Answer: e

Difficulty: Easy
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe
the four categories of ethical issues related to information technology.
Section Reference: 3.1 Ethical Issues
AACSB: Reflective Thinking
Bloomcode: Knowledge

41) Shelli runs a small boutique in Tel Aviv. She accepts credit cards and writes the number on her copy
of the receipt in case there is a problem later. This practice involves which ethical issue related to IT?

a) Privacy
b) Accuracy
c) Accountability
d) Property (such as intellectual property)
e) Accessibility to information

Answer: a

Difficulty: Medium
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe
the four categories of ethical issues related to information technology.
Section Reference: 3.1 Ethical Issues
AACSB: Ethics
Bloomcode: Application

42) Shelli runs a small boutique in Tel Aviv. She has built up a very nice client base and regularly sends
her clients a newsletter. A new bakery business down the block wants to buy Shelli’s client list from her.
If Shelli does sell the list, which ethical issue related to IT would be involved?

a) Privacy
b) Accuracy
c) Accountability
d) Property (such as intellectual property)

Answer: a

Difficulty: Medium
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe
the four categories of ethical issues related to information technology.
Section Reference: 3.1 Ethical Issues
AACSB: Ethics
Bloomcode: Comprehension

43) Shelli runs a small boutique in Tel Aviv. She has built up a very nice client base and regularly sends
her clients a newsletter. She keeps all her client data on her laptop in a password-protected file. Her
decision to protect the file reflects which ethical issue related to IT?

a) Privacy
b) Accuracy
c) Accountability
d) Property (such as intellectual property)
e) Accessibility to information

Answer: e

Difficulty: Medium
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe
the four categories of ethical issues related to information technology.
Section Reference: 3.1 Ethical Issues
AACSB: Ethics
Bloomcode: Analysis

44) Shelli runs a small boutique in Tel Aviv. She has built up a very nice client base and regularly sends
her clients a newsletter. Clients fill out a form to join her mailing list. Shelli indicates on the form that
client information will not be shared without permission. This policy illustrates which ethical issue
related to IT?

a) Privacy
b) Accuracy
c) Accountability
d) Property (such as intellectual property)
e) Accessibility to information

Answer: a

Difficulty: Medium
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe
the four categories of ethical issues related to information technology.
Section Reference: 3.1 Ethical Issues
AACSB: Ethics
Bloomcode: Knowledge

45) Shelli runs a small boutique in Tel Aviv. Her intern just came to her with a new design for her Web
site. Shelli really likes the design, and she informs the intern that he is quite the artist. The intern
responds that he found the design on the Internet. Shelli replies that they can’t use it. Her decision
reflects which ethical issue related to IT?
a) Privacy
b) Accuracy
c) Accountability
d) Property (such as intellectual property)
e) Accessibility to information

Answer: d

Difficulty: Medium
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe
the four categories of ethical issues related to information technology.
Section Reference: 3.1 Ethical Issues
AACSB: Ethics
Bloomcode: Evaluation

46) Shelli runs a small boutique in Tel Aviv. Her intern was checking the boutique’s Facebook page and
noticed some negative comments. He deleted them. At the end of the day, when they were closing up,
he told Shelli about the comments and what he had done. Shelli was not pleased, and she told him so.
Why wasn’t Shelli pleased?

a) She didn’t like hearing anything negative about her store.


b) People are free to say what they wish.
c) She thought he should ask her before he deleted them.
d) He wasn’t supposed to be checking Facebook.
e) All of these are reasons for Shelli’s not being pleased.

Answer: b

Difficulty: Medium
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe
the four categories of ethical issues related to information technology.
Section Reference: 3.1 Ethical Issues
AACSB: Reflective Thinking
Bloomcode: Synthesis

47) Which of the following statements is correct?

a) An individual’s right to privacy is absolute.


b) Determining and enforcing privacy regulations can be difficult.
c) An individual’s right to privacy supersedes the needs of society.
d) Advances in information technologies have not affected individual privacy.
e) The Internet has increased individuals’ privacy.

Answer: b
Difficulty: Medium
Learning Objective: Identify three places that store personal data, and for each one, discuss at least one
potential threat to the privacy of the data stored there.
Section Reference: 3.2 Privacy
AACSB: Ethics
Bloomcode: Comprehension

48) The public’s right to know is ___________ to the individual’s right of privacy.

a) equal
b) inferior
c) superior
d) undecided

Answer: c

Difficulty: Easy
Learning Objective: Identify three places that store personal data, and for each one, discuss at least one
potential threat to the privacy of the data stored there.
Section Reference: 3.2 Privacy
AACSB: Communication, Ethics, Analytic, Information Technology, Diversity, Reflective Thinking
Bloomcode: Knowledge, Comprehension, Application, Analysis, Synthesis, Evaluation

49) Privacy rights apply to ______________.

a) groups
b) individuals
c) institutions
d) all of the above

Answer: d

Difficulty: Easy
Learning Objective: Identify three places that store personal data, and for each one, discuss at least one
potential threat to the privacy of the data stored there.
Section Reference: 3.2 Privacy
AACSB: Ethics
Bloomcode: Knowledge

50) _____________ is the tracking of people’s activities, online or offline, with the aid of computers.

a) Computer spying
b) Data aggregation
c) Electronic surveillance
d) Profiling
Answer: c

Difficulty: Easy
Learning Objective: Identify three places that store personal data, and for each one, discuss at least one
potential threat to the privacy of the data stored there.
Section Reference: 3.2 Privacy
AACSB: Reflective Thinking
Bloomcode: Knowledge

51) Customer intimacy is a(n) __________ outcome of profiling.

a) positive
b) negative
c) neutral
d) inevitable

Answer: a

Difficulty: Medium
Learning Objective: Identify three places that store personal data, and for each one, discuss at least one
potential threat to the privacy of the data stored there.
Section Reference: 3.2 Privacy
AACSB: Ethics
Bloomcode: Knowledge

52) The __________ permits the company to collect personal information until the customer specifically
requests that the data not be collected.

a) opt-in model
b) opt-out model
c) government
d) privacy code

Answer: b

Difficulty: Easy
Learning Objective: Identify three places that store personal data, and for each one, discuss at least one
potential threat to the privacy of the data stored there.
Section Reference: 3.2 Privacy
AACSB: Ethics
Bloomcode: Knowledge

53) Which of the following is a correct argument on the pros and cons of conveniently sharing
information and protecting privacy?
a) We have quick and easy access to our contacts on social networking sites, but it is much easier for
stalking to occur.
b) Protecting our privacy is difficult and complicated, even if securing our information makes us feel
more comfortable with using the Internet.
c) We need to be careful about what we post online, particularly since it may be difficult to ensure the
security of our information on the Internet.
d) All of the above are correct.

Answer: d

Difficulty: Medium
Learning Objective: Identify three places that store personal data, and for each one, discuss at least one
potential threat to the privacy of the data stored there.
Section Reference: 3.2 Privacy
AACSB: Ethics
Bloomcode: Evaluation

54) The process of profiling:

a) Increases individual privacy.


b) Decreases individual privacy.
c) Has no effect on individual privacy.
d) Is illegal in more than half of the states.
e) Is legal but unethical.

Answer: b

Difficulty: Medium
Learning Objective: Identify three places that store personal data, and for each one, discuss at least one
potential threat to the privacy of the data stored there.
Section Reference: 3.2 Privacy
AACSB: Ethics
Bloomcode: Knowledge

55) What is the relationship between advances in information technology and the practice of profiling?

a) Advances in IT make it more difficult to profile individuals.


b) Advances in IT have no impact on profiling.
c) Advances in IT make it more expensive to profile individuals.
d) Advances in IT make it easier to profile individuals.

Answer: d

Difficulty: Medium
Learning Objective: Identify three places that store personal data, and for each one, discuss at least one
potential threat to the privacy of the data stored there.
Section Reference: 3.2 Privacy
AACSB: Ethics
Bloomcode: Knowledge

56) Which of the following statements is not correct?

a) Employees have limited protection against surveillance by employers.


b) The large majority of organizations monitor employee Internet usage.
c) The large majority of organizations use URL filtering.
d) As with normal first-class mail, employers cannot read employee e-mail.
e) Employees should be aware that surveillance is legal.

Answer: d

Difficulty: Medium
Learning Objective: Identify three places that store personal data, and for each one, discuss at least one
potential threat to the privacy of the data stored there.
Section Reference: 3.2 Privacy
AACSB: Analytic
Bloomcode: Evaluation

57) How does society keep owners of electronic bulletin boards from disseminating offensive or untrue
content? This is a difficult question because it involves the conflict between _____ on the one hand and
_____ on the other.

a) The public, the individual


b) The public, ethics
c) Freedom of speech, privacy
d) The individual, freedom of speech
e) Ethics, security

Answer: c

Difficulty: Hard
Learning Objective: Identify three places that store personal data, and for each one, discuss at least one
potential threat to the privacy of the data stored there.
Section Reference: 3.2 Privacy
AACSB: Ethics
Bloomcode: Knowledge

58) Privacy advocates prefer which model of informed consent?

a) Opt-in
b) Opt-out
c) Either A or B
d) Neither A nor B

Answer: a

Difficulty: Easy
Learning Objective: Identify three places that store personal data, and for each one, discuss at least one
potential threat to the privacy of the data stored there.
Section Reference: 3.2 Privacy
AACSB: Ethics
Bloomcode: Knowledge

59) Which of the following statements is correct?

a) International privacy and security laws are very consistent.


b) Consistent international privacy and security laws help companies with their regulatory requirements
from country to country.
c) Consistent international privacy and security laws enable information to flow freely among countries.
d) The absence of consistent international privacy and security laws has led to a complex global legal
framework.
e) Consistent international privacy and security laws are followed by all countries.

Answer: d

Difficulty: Medium
Learning Objective: Identify three places that store personal data, and for each one, discuss at least one
potential threat to the privacy of the data stored there.
Section Reference: 3.2 Privacy
AACSB: Ethics
Bloomcode: Knowledge

60) Data aggregators sell digital dossiers to companies that want to know their customers better. This
practice is called ________.

a) Customer relationships
b) Customer profiling
c) Customer intimacy
d) Customer knowledge
e) Spying

Answer: c

Difficulty: Medium
Learning Objective: Identify three places that store personal data, and for each one, discuss at least one
potential threat to the privacy of the data stored there.
Section Reference: 3.2 Privacy
AACSB: Ethics
Bloomcode: Knowledge

61) Which of the following tracks the same consumer across multiple devices as he/she changes devices
continuously?

a) Wickr
b) Burn Note
c) Tapad
d) TigerText
e) Disconnect

Answer: c

Difficulty: Medium
Learning Objective: Identify three places that store personal data, and for each one, discuss at least one
potential threat to the privacy of the data stored there.
Section Reference: Case 3.2 Protecting Your Privacy
AACSB: Information Technology
Bloomcode: Knowledge

62) Which of the following allows users to send military-grade encrypted texts, photos, and videos to
other users?

a) Wickr
b) Burn Note
c) Tapad
d) TigerText
e) Disconnect

Answer: a

Difficulty: Medium
Learning Objective: Identify three places that store personal data, and for each one, discuss at least one
potential threat to the privacy of the data stored there.
Section Reference: Case 3.2 Protecting Your Privacy
AACSB: Information Technology
Bloomcode: Knowledge

63) Which of the following allows users to send encrypted notes that self-destruct after a set amount of
time?

a) Wickr
b) Burn Note
c) Tapad
d) TigerText
e) Disconnect

Answer: b

Difficulty: Medium
Learning Objective: Identify three places that store personal data, and for each one, discuss at least one
potential threat to the privacy of the data stored there.
Section Reference: Case 3.2 Protecting Your Privacy
AACSB: Information Technology
Bloomcode: Knowledge

64) Which of the following allows senders to retrieve messages that they have already sent?

a) Wickr
b) Burn Note
c) Tapad
d) TigerText
e) Disconnect

Answer: d

Difficulty: Medium
Learning Objective: Identify three places that store personal data, and for each one, discuss at least one
potential threat to the privacy of the data stored there.
Section Reference: Case 3.2 Protecting Your Privacy
AACSB: Information Technology
Bloomcode: Knowledge

65) Which of the following provides a secure messaging service?

a) Wickr
b) Burn Note
c) Tapad
d) TigerText
e) Disconnect

Answer: d

Difficulty: Medium
Learning Objective: Identify three places that store personal data, and for each one, discuss at least one
potential threat to the privacy of the data stored there.
Section Reference: Case 3.2 Protecting Your Privacy
AACSB: Information Technology
Bloomcode: Knowledge
66) Which of the following can speedup web surfing ability by blocking any web site that requests for
your personal data?

a) Wickr
b) Burn Note
c) Tapad
d) TigerText
e) Disconnect

Answer: e

Difficulty: Medium
Learning Objective: Identify three places that store personal data, and for each one, discuss at least one
potential threat to the privacy of the data stored there.
Section Reference: Case 3.2 Protecting Your Privacy
AACSB: Information Technology
Bloomcode: Knowledge

Question type: Essay

67) Identify and analyze the fundamental ethical issues involved with information technology.

Difficulty: Medium
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe
the four categories of ethical issues related to information technology.
Section Reference: 3.1 Ethical Issues
AACSB: Ethics
Bloomcode: Knowledge

68) Discuss the fundamental tenants of ethics: responsibility, accountability, and liability.

Difficulty: Medium
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe
the four categories of ethical issues related to information technology.
Section Reference: 3.1 Ethical Issues
AACSB: Analytic
Bloomcode: Knowledge

69) Explain why something that is unethical might not necessarily be illegal.

Difficulty: Medium
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe
the four categories of ethical issues related to information technology.
Section Reference: 3.1 Ethical Issues
AACSB: Ethics
Bloomcode: Comprehension

70) Discuss the two rules of privacy: The right of privacy is not absolute, and the public’s right to know
supersedes the individual’s right to privacy.

Difficulty: Medium
Learning Objective: Identify three places that store personal data, and for each one, discuss at least one
potential threat to the privacy of the data stored there.
Section Reference: 3.2 Privacy
AACSB: Ethics
Bloomcode: Comprehension

71) Compare and contrast the two informed consent models: opt-in and opt-out. Why do companies
prefer one over the other? Why do privacy advocates prefer one over the other?

Difficulty: Medium
Learning Objective: Identify three places that store personal data, and for each one, discuss at least one
potential threat to the privacy of the data stored there.
Section Reference: 3.2 Privacy
AACSB: Ethics
Bloomcode: Knowledge

72) Discuss the relationship between surveillance and privacy.

Difficulty: Hard
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe
the four categories of ethical issues related to information technology.
Section Reference: 3.1 Ethical Issues
AACSB: Ethics
Bloomcode: Knowledge

73) Compare and contrast the four widely used stands for ethics: utilitarian, rights, fairness, and
common good.

Difficulty: Medium
Learning Objective: Define ethics, list and describe the three fundamental tenets of ethics, and describe
the four categories of ethical issues related to information technology.
Section Reference: 3.1 Ethical Issues
AACSB: Ethics
Bloomcode: Knowledge
74) Discuss the international aspects of privacy. How do these aspects impact transborder data flows?

Difficulty: Medium
Learning Objective: Identify three places that store personal data, and for each one, discuss at least one
potential threat to the privacy of the data stored there.
Section Reference: 3.2 Privacy
AACSB: Analytic
Bloomcode: Comprehension
Legal Notice

Copyright © 2016 by John Wiley & Sons Canada, Ltd. or related companies. All rights reserved.

The data contained in these files are protected by copyright. This manual is furnished under licence and
may be used only in accordance with the terms of such licence.

The material provided herein may not be downloaded, reproduced, stored in a retrieval system,
modified, made available on a network, used to create derivative works, or transmitted in any form or
by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise without the prior
written permission of John Wiley & Sons Canada, Ltd.

You might also like