All Questions
Filter by:
Question 1
Free
Multiple Choice

TJX's handling of its serious data breach is consistent with which one of the following?

Choose correct answer/s
A

Stakeholder theory

B

Stockholder theory

C

Social normative

D

Social contract theory

E

Corporate social responsibility

Check answer
Question 2
Free
Multiple Choice

Which normative theory of business ethics would TJX have displayed if it had informed customers as soon as the breach was corrected and told other retailers how to prevent future security breaches?

Choose correct answer/s
A

Stakeholder

B

Stockholder

C

Social contract

D

Investor

E

Corporate social responsibility

Check answer
Question 3
Free
Multiple Choice

This is the term used to describe ethical dilemmas that arise with the development and application of IT.

Choose correct answer/s
A

Stockholder theory

B

PAPA principles

C

Information ethics

D

Normative theories

E

IT dilemmas

Check answer
Question 4
Free
Multiple Choice

All of the following are examples of green computing EXCEPT:

Choose correct answer/s
A

Virtualization

B

Cloud computing

C

Tidal powered servers

D

Server workloads moved to off-peak hours

E

Cookies

Check answer
Question 5
Free
Multiple Choice

Green computing is often associated with supporting the triple bottom line known as:

Choose correct answer/s
A

Economic, environmental and social

B

Stockholder, stakeholder and society

C

People, Privacy and Property

D

Google, Facebook and Microsoft

E

Data, information and knowledge

Check answer
Question 6
Multiple Choice

This is a text message that is stored on a user's computer by a Web server that helps trace the user's browsing habits.

Choose correct answer/s
A
Script
B
Cookie
C
Id theft
D
Firewall
E
Data file
To unlock the question
Question 7
Multiple Choice

In the chapter, there is the statement, "Internet companies are in business for the money and hence they really would prefer to keep their customers in the dark about how their personal data is being used to generate profits". Assuming this statement is true, with which ethical theory would you say these Internet companies are most aligned?

Choose correct answer/s
A
Stockholder theory
B
Stakeholder theory
C
Property theory
D
Fiduciary theory
E
Normative theory
To unlock the question
Question 8
Multiple Choice

"Who owns information?" and "What are the just and fair prices for its exchange?" are part of this ethical issue:

Choose correct answer/s
A
Privacy
B
Accuracy
C
Ownership
D
Property
E
Accessibility
To unlock the question
Question 9
Multiple Choice

What principles, developed in 2000 by the US Department of Commerce (DOC) in consultation with the European Commission, allow U.S. companies to be placed on a list maintained by the DOC?

Choose correct answer/s
A
Safe Harbor framework
B
Approved Business framework
C
PAPA framework
D
Property Harbor framework
E
Safe Business framework
To unlock the question
Question 10
Multiple Choice

The European Union Directive on Data Protection does all of the following EXCEPT:

Choose correct answer/s
A
Expect accurate and up-to-date data on collected personal information
B
Allow companies to only keep data as long as necessary
C
Set standards for the collection, storage and processing of personal information
D
Regulate data standards for publically traded companies
E
Prohibit the transfer of personal data to non-European Union nations that do not meet certain standards
To unlock the question
Question 11
Multiple Choice

Questions like "Who is responsible for the reliability of information?" and "Who will be accountable for errors in the information?" are part of this ethical issue.

Choose correct answer/s
A
Privacy
B
Accuracy
C
Authenticity
D
Perfection
E
Purpose
To unlock the question
Question 12
Multiple Choice

The question "What information does a person or an organization have a right or a privilege to obtain?" is part of this ethical issue.

Choose correct answer/s
A
Privacy
B
Accuracy
C
Accessibility
D
Perfection
E
Property
To unlock the question
Question 13
Multiple Choice

In today's digital word, individuals can control their privacy through choice, ______ , and correction.

Choose correct answer/s
A
Protection
B
Consent
C
Property
D
Communication
E
Consideration
To unlock the question
Question 14
Multiple Choice

A company should examine this area of the control of information if it wants to determine what data it has the right to monitor and capture from its employees.

Choose correct answer/s
A
Privacy
B
Accuracy
C
Accessibility
D
Perfection
E
Property
To unlock the question
Question 15
Multiple Choice

Today's managers must ensure that information about their employees and customers is only available to those who have a right to see it and use it, an issue referred to as:

Choose correct answer/s
A
Screening
B
Accuracy
C
Accessibility
D
Perfection
E
Property
To unlock the question
Question 16
Multiple Choice

A manager who primarily focuses on the shareholders of the corporation rather than all of the vested parties in the businesses operations and activities is practicing which theory of normative business ethics?

Choose correct answer/s
A
Stakeholder theory
B
Investor theory
C
Stockholder theory
D
Shareholder theory
E
Social contract theory
To unlock the question
Question 17
Multiple Choice

This theory of normative business ethics seeks to create value for people in a manner that is just and nondiscriminatory.

Choose correct answer/s
A
Stakeholder theory
B
Investor theory
C
Social contract theory
D
Shareholder theory
E
Stockholder theory
To unlock the question
Question 18
Multiple Choice

This act of 1996 is designed to safeguard the electronic exchange of patient records in the health care industry.

Choose correct answer/s
A
SoX
B
HIPAA
C
IETF
D
COBIT
E
PAPA
To unlock the question
Question 19
Multiple Choice

Information privacy guidelines should come from what level in a company?

Choose correct answer/s
A
CEO and top-level executives
B
Middle management
C
Employees
D
Federal regulations
E
State laws
To unlock the question
Question 20
Multiple Choice

The European Union relies on a government data protection agency and specific privacy protection standards outlined in the ___________ .

Choose correct answer/s
A
Safe Harbor Framework
B
PAPA Principles
C
Directive on Data Protection
D
HIPPA
E
SoX Act
To unlock the question