
34 minute read
CHAPTER 12— ETHICAL, LEGAL, AND SOCIAL ISSUES OF INFORMATION TECHNOLOGY
from Test Bank for Information Technology for Managers, 2nd Edn, George Reynolds, (Complete Download)
by ACADEMIAMILL
Multiple Choice
1. _____ is a set of beliefs about right and wrong behavior.
a. Moral b. Law c. Ethics d. Value
ANS: C a. They are an individual’s beliefs about right and wrong. b. They are a set of beliefs about right and wrong behavior that are universally accepted. c. They consist of principles and core values that are essential to behavior. d. They are a system of rules enforced by a set of institutions that states what a person can and cannot do.
RATIONALE: Ethics is a set of beliefs about right and wrong behavior. Ethical behavior conforms to generally accepted social norms—many of which are almost universally accepted. Doing what is ethical can be difficult in certain situations. For example, although nearly everyone would agree that lying and cheating are unethical, some people might consider it acceptable to tell a lie to protect someone’s feelings or to keep a friend from getting into trouble.
2. Which of the following best describes morals?
ANS: A a. It is an individual’s beliefs about right and wrong. b. It is a set of beliefs about right and wrong behavior that are universally accepted. c. It is a set of principles and core values that are essential to ethical work and governs a practitioner’s behavior. d. It is a system of rules enforced by a set of institutions that states what a person can and cannot do.
RATIONALE: Morals are one’s personal beliefs about right and wrong, whereas the term ethics describes standards or codes of behavior expected of an individual by a group (nation, organization, and profession) to which an individual belongs. Moral acts conform to what an individual believes to be the right thing to do.
3. Which of the following defines law?
ANS: D a. It is an individual’s beliefs about right and wrong. b. It is a set of beliefs about right and wrong behavior that are universally accepted. c. It states the principles and core values that are essential to any professional’s work and that govern their behavior. d. It is a system of rules enforced by a set of institutions that states what a person can and cannot do .
RATIONALE: Law is a system of rules that tells us what we can and cannot do. Laws are enforced by a set of institutions (the police, courts, law-making bodies). Legal acts are acts that conform to the law.
4. Which of the following is true of a code of ethics?
ANS: C a. Code of laws b. Code of ethics c. Code of conduct d. Code of practice
RATIONALE: Laws do not provide a complete guide to ethical behavior. Just because an activity is defined as legal does not mean that it is ethical. As a result, practitioners in many professions subscribe to a code of ethics that states the principles and core values that are essential to their work and, therefore, govern their behavior.
5. Which of the following acts as a reference point to determine what is legal and what is ethical?
ANS: B a. ethics b. morals c. laws d. values
RATIONALE: Laws do not provide a complete guide to ethical behavior. Just because an activity is defined as legal does not mean that it is ethical. As a result, practitioners in many professions subscribe to a code of ethics that states the principles and core values that are essential to their work and, therefore, govern their behavior. The code can become a reference point for determining what is legal and what is ethical.
6. John, a lawyer, defends his client, who is accused of murder, to the best of his ability while conforming to the _____ of his profession.
ANS: A a. It was adopted to protect Americans from unreasonable searches and seizures of properties. b. It was adopted to prohibit people from excessive bail as well as cruel and unusual punishment. c. It was adopted to guarantee fair trial and other rights of the accused. d. It was adopted to guarantee Americans’ rights to freedom of religion, freedom of expression, and freedom to assemble.
RATIONALE: Ethics is a set of beliefs about right and wrong behavior. Ethical behavior conforms to generally accepted social norms—many of which are almost universally accepted. Doing what is ethical can be difficult in certain situations. For example, although nearly everyone would agree that lying and cheating are unethical, some people might consider it acceptable to tell a lie to protect someone’s feelings or to keep a friend from getting into trouble.
7. Which of the following is true of the First Amendment to the U.S. Constitution?
ANS: D a. The First Amendment b. The Second Amendment c. The Third Amendment d. The Fourth Amendment
RATIONALE: The First Amendment to the U.S. Constitution was adopted to guarantee Americans’ rights to freedom of religion, freedom of expression, and freedom to assemble. It reads as follows: Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the government for a redress of grievances.
8. Which of the following amendments to the U.S. Constitution comes into play in privacy issues if it appears that data is being gathered to track the movement of groups of people, as this could threaten their right to assemble or gather peacefully?
ANS: A a. guarantee fair trial and other rights of an accused b. prohibit excessive bail as well as cruel and unusual punishment c. protect people from unreasonable searches and seizures of properties d. guarantee the rights to freedom of religion, freedom of expression, and freedom to assemble
RATIONALE: The First Amendment to the U.S. Constitution was adopted to guarantee Americans’ rights to freedom of religion, freedom of expression, and freedom to assemble. The First Amendment comes into play in privacy issues if it appears that data is being gathered to track the movement of groups of people, as this could threaten their right to assemble or gather peacefully.
9. The Fourth Amendment to the U.S. Constitution was adopted to _____.
ANS: C
RATIONALE: The Fourth Amendment was adopted to protect people from unreasonable searches and seizures of properties and reads as follows: The amendment states that the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.
10. The Supreme Court has ruled that American citizens are protected by the _____ when there is a “reasonable expectation of privacy.” a. First Amendment b. Second Amendment c. Third Amendment d. Fourth Amendment
ANS: D
RATIONALE: The Fourth Amendment was adopted to protect people from unreasonable searches and seizures of properties. The Supreme Court has ruled that American citizens are protected by the Fourth Amendment when there is a “reasonable expectation of privacy.” a. Customer relationship management b. Business intelligence management c. Access information management d. Enterprise resource management
11. Identify the system implemented by organizations to collect and store key data from every interaction they have with a customer.
ANS: A a. Dashboard recognizer b. Stingray c. Automatic license plate reader d. Secure flight program
RATIONALE: Organizations need basic information about existing customers to serve them better. It is hard to imagine an organization having a relationship with its customers without having data about them. Thus, many organizations implement customer relationship management (CRM) systems that collect and store key data from every interaction they have with a customer.
12. Which of the following systems is used by law enforcement agencies to snap photos and document the location of vehicles?
ANS: C a. Facebook shares b. Facebook notifications c. Facebook messages d. Facebook tags
RATIONALE: Automatic license plate readers (ALPRs) snap photos and document the location of vehicles; some systems can also photograph drivers and passengers. ALPRs are used to snag red-light runners and to identify motorists with outstanding arrest warrants, overdue parking tickets, and delinquent tax bills.
13. _____ identify and reference people in photos and videos posted on Facebook.
ANS: D a. It saves shortcuts to Web sites and navigates to them within a few seconds. b. It helps users to browse incognito by hiding their browsing data. c. It passes the session identification number to a web server every time a browser makes a hypertext transfer protocol request. d. It captures browsing history for Web site customization and personalization purposes.
RATIONALE: Facebook tags identify and reference people in photos and videos posted on Facebook by its more than 1 billion users. Whenever such tags are created, the concerned people are notified about this.
14. Which of the following is true of a cookie?
ANS: D
RATIONALE: Cookies capture browsing history for Web site customization and personalization purposes and for targeted marketing purposes. Many organizations that operate a Web site place a cookie—a small file containing a string of characters that uniquely identifies a customer’s browser—on the computer hard drive of visitors to the organization’s site. a. Stingray b. PRISM c. Secure flight program d. Backscatter imaging scanners
15. Which of the following is a national security agency surveillance program that collects Internet data including search histories?
ANS: B a. It supports operations that require aerial surveillance. b. It is a national security agency surveillance program that collects Internet data including search histories. c. It impersonates a cell tower and forces all mobile phones within range to connect to it. d. It is an airline passenger prescreening program that checks travelers’ personal information.
RATIONALE: PRISM is an NSA surveillance program that collects Internet data including search histories; photos; the contents of email, file transfers, and voice and video chats; and other Internet communication data. PRISM also gathers data related to telephone calls, including the numbers of both parties on a call and the location, date, time, and duration of the call.
16. Which of the following is true of stingray?
ANS: C a. Data brokers b. Yellow pagers c. Data miners d. Drill-down analysts
RATIONALE: Stingray is a type of hardware device used to impersonate a cell tower, forcing all mobile phones within range to connect to it. The device can then capture information that can be used to identify and locate users and the phone numbers they call or text.
17. _____ create profiles on people based on aggregated data from public records such as business directories and social media networks.
ANS: A a. data brokers b. data miners c. privacy analysts d. privacy brokers
RATIONALE: Data brokers are companies that create profiles on people based on aggregated data from arrest records, business directories, phone directories, social media networks, Web sites (including browsing histories), online product registration forms, credit card purchases, and other public records. Some data brokers have detailed profiles on tens of millions of consumers, which they then sell to each other, to advertisers, to the government, and even to individuals—typically without our direct knowledge.
18. ZoomMe is a company that accumulates data on people from various sources such as online product registration forms, credit card purchases, and other public records. It then uses these data to create profiles on people and sell them to advertisers. ZoomMe comes under the category of _____.
ANS: A a. Doxing b. Spamming c. Hacking d. Cracking
RATIONALE: Data brokers are companies that create profiles on people based on aggregated data from arrest records, business directories, phone directories, social media networks, Web sites, online product registration forms, credit card purchases, and other public records. Some data brokers have detailed profiles on tens of millions of consumers, which they then sell to each other, to advertisers, to the government, and even to individuals.
19. David collects pieces of information about individuals garnered from data brokers. He then uses this information to threaten the individuals to publicly uncover their personal details until a monetary ransom is paid to him. Identify the tactic used by David to gather the information.
ANS: A a. Hacking b. Spamming c. Doxing d. Cracking
RATIONALE: Some bad characters use a tactic called doxing where they gather tidbits of information about an individual using information gleaned from data brokers and threaten to publicly expose their victims’ personal details unless some form of ransom (monetary or other) is paid. In other cases, doxing is used to publicize personal details about someone purely for the purpose of encouraging others to engage in harassment (online and in the real world) of the victim.
20. Identify the tactic through which an individual obtains information about an individual from data brokers and threatens to expose the victim’s personal details unless a ransom is paid.
ANS: C a. Hacking b. Doxing c. Phishing d. Distributed denial-of-service
RATIONALE: Bad characters use a tactic called doxing where they gather tidbits of information about an individual using information gleaned from data brokers and threaten to publicly expose their victims’ personal details unless some form of ransom (monetary or other) is paid. In other cases, doxing is used to publicize personal details about someone purely for the purpose of encouraging others to engage in harassment (online and in the real world) of the victim.
21. _____ is used to publicize personal details about someone purely for the purpose of encouraging others to engage in harassment of the victim.
ANS: B a. The Code of Fair Information Practices b. The European Union Data Protection Directives c. The 1965 Organization for Data Brokering and Doxing (ODBD) privacy guidelines d. The 1957 Organization for Economic Cooperation and Development (OECD) privacy guidelines
RATIONALE: Bad characters use a tactic called doxing where they gather tidbits of information about an individual using information gleaned from data brokers and threaten to publicly expose their victims’ personal details unless some form of ransom (monetary or other) is paid. In other cases, doxing is used to publicize personal details about someone purely for the purpose of encouraging others to engage in harassment (online and in the real world) of the victim.
22. Which of the following must be adopted by a company to treat its customers’ data responsibly?
ANS: A a. Code of Fair Information Practices b. 1980 Organization for Economic Cooperation and Development (OECD) privacy guidelines c. European Union Data Protection Directives d. 1965 Organization for Data Brokering and Doxing (ODBD) privacy guidelines
RATIONALE: When dealing with customer data, strong measures are required to avoid customer relationship problems. One widely accepted approach to treating customer data responsibly is for a company to adopt the Code of Fair Information Practices and the 1980 Organization for Economic Cooperation and Development (OECD) privacy guidelines.
23. The _____ represent the international consensus regarding the collection and management of personal information.
ANS: B a. Code of Fair Information Practices b. European Data Transfer Act c. Organization for Economic Cooperation and Development privacy guideline d. European Union Data Protection Directive
RATIONALE: When dealing with customer data, strong measures are required to avoid customer relationship problems. One widely accepted approach to treating customer data responsibly is for a company to adopt the Code of Fair Information Practices and the 1980 Organization for Economic Cooperation and Development (OECD) privacy guidelines. The 1980 Organization for Economic Cooperation and Development (OECD) privacy guidelines continue to represent the international consensus regarding the collection and management of personal information.
24. The _____ prohibits the transfer of personal data to non–European Union nations that do not meet the European adequacy standard for privacy protection.
ANS: D a. The 1980 Organization for Economic Cooperation and Development (OECD) privacy guidelines b. The European Union Data Protection Directive c. The Code of Fair Information Practices d. The Code of Fair Transportation Security
RATIONALE: The European Union Data Protection Directive prohibits the transfer of personal data to non–European Union nations that do not meet the European adequacy standard for privacy protection. Some of these standards require the creation of government data protection agencies, registration of databases with those agencies, and in certain cases, approval before personal data processing can begin.
25. Mapua Corp., a multinational corporation based in Germany, has decided to relocate its business to Japan. It faces difficulties in transferring the personal data of its employees from Germany to Japan Which of the following is causing this difficulty?
ANS: B a. A “safe harbor” framework must be developed. b. The US Patriot Act must be implemented. c. A doxing framework must be developed. d. The Digital Millennium Copyright Act must be implemented.
RATIONALE: The European Union Data Protection Directive prohibits the transfer of personal data to non–European Union nations that do not meet the European adequacy standard for privacy protection. Some of these standards require the creation of government data protection agencies, registration of databases with those agencies, and in certain cases, approval before personal data processing can begin.
26. A company based in Houston wants to expand its business to Rome. The human resources department will run background checks from Houston. Identify the condition that must be satisfied to make this possible.
ANS: A a. A Chief Privacy Officer (CPO) b. A Chief Operations Officer (COO) c. A Database Privacy Officer (DPO) d. A Data warehouse Officer (DWO)
RATIONALE: The U.S. Department of Commerce together with the European Commission developed a “safe harbor” framework to ensure that U.S. companies don’t experience interruptions in their dealings with countries in the European Union. U.S. organizations that can verify their policies and practices are compliant with the safe harbor’s requirements will be recognized as meeting the European adequate standard privacy for privacy protection.
27. Who is appointed by an organization to define, implement, and oversee a set of data privacy policies?
ANS: A a. Data Security Officer (DSO) b. Chief Operations Officer (COO) c. Database Privacy Officer (DPO) d. Chief Privacy Officer (CPO)
RATIONALE: Many organizations appoint an executive (often called a Chief Privacy Officer [CPO]) to define, implement, and oversee a set of data privacy policies. A CPO is charged with the responsibility of ensuring that the organization does not violate state and federal government regulations.
28. A _____ is charged with the responsibility of ensuring that an organization does not violate state and federal government regulations.
ANS: D a. data piracy b. data privacy c. data recovery d. data structuring
RATIONALE: Many organizations appoint an executive (often called a Chief Privacy Officer [CPO]) to define, implement, and oversee a set of data privacy policies. A CPO is charged with the responsibility of ensuring that the organization does not violate state and federal government regulations.
29. Conducting a thorough assessment to document what sensitive information an organization is collecting, where it is stored, how long it is kept, who has access to it, and how the organization is using this data is one of the critical tasks in establishing an effective _____ program.
ANS: B a. Net neutrality b. Terms of Use c. Safe harbor d. Struts
RATIONALE: Several tasks are critical to establishing an effective data privacy program. One of them is conducting a thorough assessment to document what sensitive information an organization is collecting, where it is stored, how long it is kept, who has access to it, and how the organization is using this data.
30. Identify the framework developed by the U.S. Department of Commerce and the European Commission to ensure that U.S. companies don’t experience interruptions in their dealings with countries in the European Union.
ANS: C a. Editor-in-chief b. Chief Privacy Officer c. Chief mentor d. Chief Underwriting Officer
RATIONALE: The U.S. Department of Commerce together with the European Commission developed a “safe harbor” framework to ensure that U.S. companies don’t experience interruptions in their dealings with countries in the European Union. U.S. organizations that can verify their policies and practices are compliant with the safe harbor’s requirements will be recognized as meeting the European adequate standard privacy for privacy protection.
31. Who should be briefed on planned and existing marketing programs as well as information systems and databases that involve the collection or dissemination of consumer data?
ANS: B a. A wiki b. A cookie c. An antivirus d. A bookmark
RATIONALE: Many organizations appoint an executive (often called a Chief Privacy Officer [CPO]) to define, implement, and oversee a set of data privacy policies. This individual should be briefed on planned and existing marketing programs as well as information systems and databases that involve the collection or dissemination of consumer data.
32. Which of the following is a small file that is placed on the computer hard drive of visitors to an organization’s site?
ANS: B a. A cookie can create copies of itself and spread to other networks to execute and replicate again. b. The one time password of a transaction is captured and stored under a cookie on a company’s Web server. c. A cookie pulls data from disparate data sources to populate and maintain a data warehouse. d. Data about user preferences and activity is captured and stored under a cookie on a company’s Web server.
RATIONALE: Many organizations that operate a Web site place a cookie—a small file containing a string of characters that uniquely identifies a customer’s browser—on the computer hard drive of visitors to the organization’s site. For each visit to the Web site, data about user preferences and activity is captured and stored under that cookie on the company’s Web server. Additional information that a customer submits, such as name, address, and credit card information, as well as information gleaned from third parties, is also associated with the cookie and added to the customer’s file on the server.
33. Which of the following statements is true of a cookie?
ANS: D a. cookie b. metadata c. data dictionary d. popup
RATIONALE: Many organizations that operate a Web site place a cookie—a small file containing a string of characters that uniquely identifies a customer’s browser—on the computer hard drive of visitors to the organization’s site. For each visit to the Web site, data about user preferences and activity is captured and stored under that cookie on the company’s Web server. Additional information that a customer submits, such as name, address, and credit card information, as well as information gleaned from third parties, is also associated with the cookie and added to the customer’s file on the server.
34. PindCart, an online retailer, places a small file on the computer hard drive of its visitors to recognize them when they revisit their Web site. The company uses this file to generate a personalized welcome message to its visitors. This small file is called a _____.
ANS: A a. extension b. privacy policy c. browser certificate d. developer console
RATIONALE: Many organizations that operate a Web site place a cookie—a small file containing a string of characters that uniquely identifies a customer’s browser—on the computer hard drive of visitors to the organization’s site. For each visit to the Web site, data about user preferences and activity is captured and stored under that cookie on the company’s Web server.
35. The _____ of a Web site states what sort of information about customers is captured and how that information may be used by the capturing organization.
ANS: B a. A chief privacy officer b. A data warehouse officer c. A data broker d. A public administrative broker
RATIONALE: A Web site usually has a privacy policy that states what sort of information about customers is captured and how that information may be used by the capturing organization. Data collected through the use of cookies is one of the many components of the personal profiles created by data brokers.
36. Who creates personal profiles using the data collected through the use of cookies?
ANS: C a. Increased legal liabilities b. Increased productivity c. Decreased leisure hours d. Increased peer discussion
RATIONALE: A Web site usually has a privacy policy that states what sort of information about customers is captured and how that information may be used by the capturing organization. Data collected through the use of cookies is one of the many components of the personal profiles created by data brokers.
37. Identify the factor that has forced employers to monitor workers to ensure compliance with the corporate information technology usage policy.
ANS: A a. protects the privacy of intermediate school students b. protects the privacy of college students c. protects the privacy of private employees d. protects the privacy of government employees
RATIONALE: Many organizations have developed a policy on the use of information technology to protect against employee abuses that reduce worker productivity or that could expose the employer to harassment lawsuits. The potential for decreased productivity, coupled with increased legal liabilities, have forced many employers to monitor workers to ensure compliance with the corporate information technology usage policy.
38. The Fourth Amendment of the U.S. Constitution _____.
ANS: D a. It does not benefit government employees. b. It does not benefit private employees. c. It benefits only voluntary organizations. d. It benefits only nonprofit organizations.
RATIONALE: The Fourth Amendment of the Constitution protects citizens from unreasonable searches by the government and is often used to protect the privacy of government employees. The Fourth Amendment cannot be used to control how a private employer treats its employees, however, because such actions are not taken by the government.
39. Identify a drawback of the Fourth Amendment of the U.S. Constitution.
ANS: B a. public b. nonprofit c. voluntary d. private
RATIONALE: The Fourth Amendment cannot be used to control how a private employer treats its employees because such actions are not taken by the government. As a result, public-sector employees have far greater privacy rights than those in private industry. Although private-sector employees can seek legal protection against an invasive employer under various state statutes, the degree of protection varies widely by state. Furthermore, state privacy statutes tend to favor employers over employees.
40. A _____ organization can defeat a privacy claim simply by proving that an employee had been given explicit notice that email, Internet, and phone usage were not private and that their use might be monitored.
ANS: D
RATIONALE: A private organization can defeat a privacy claim simply by proving that an employee had been given explicit notice that email, Internet, and phone usage were not private and that their use might be monitored. In addition, courts are far less likely to find an employer liable for violating an employee’s right to privacy if there is a valid, work-related reason for monitoring communications—for example, previous cases of employees sending inappropriate email, which prompted the organization to begin monitoring all employees. a. Terms of Use policy b. Privacy policy c. Information technology usage policy d. Profile update policy
41. Which of the following policies should be agreed by a user before joining a social networking page?
ANS: A a. Terms of Trade policy b. Terms of Use policy c. Terms of Endearment policy d. Terms of Retention policy
RATIONALE: Most social networks encourage members to create a user profile consisting of name and other personal data, including photos. Many users are willing to disclose personal data, assuming that only those people in the social network who they wish to see that data will see it. However, the level of privacy offered on various social networks varies greatly and is defined in each network’s Terms of Use policy. Before someone can join a particular social network, he or she must agree to its Terms of Use policy, which often contains clauses permitting the social networking operator to collect and store data on users or even share it with third parties.
42. Which of the following policies often contains clauses that permit a social networking operator to collect and store data on users or even share it with third parties?
ANS: B a. cyberethics b. advanced persistent threat c. identity theft d. cyberterrorism
RATIONALE: The level of privacy offered on various social networks varies greatly and is defined in each network’s Terms of Use policy. Before someone can join a particular social network, he or she must agree to its Terms of Use policy, which often contains clauses permitting the social networking operator to collect and store data on users or even share it with third parties.
43. Social networking users are prone to _____.
ANS: C a. Internet graying b. Internet flagship c. Internet catalysis d. Internet censorship
RATIONALE: Criminals use social networking sites to retrieve a considerable amount of personally identifiable information about a person. Indeed, it is easy for users to become a victim of identity theft or stalking without even being aware of the risk. In addition, there has been growing concern over data breaches at some social networking services.
44. _____ is the control of the publishing of information on the Internet.
ANS: D a. Monitoring the Internet activity of individuals b. Storing user credentials such as name and address c. Selling user data to third parties d. Pilfering credit card information from online shoppers
RATIONALE: Internet censorship is the control or suppression of the publishing or accessing of information on the Internet. Censorship can take many forms—such as limiting access to certain Web sites, allowing access to only some content or modified content at certain Web sites, rejecting the use of certain key words in search engine searches, tracking and monitoring the Internet activities of individuals, and harassing or even jailing individuals for their Internet use.
45. Which of the following is a feature of Internet censorship?
ANS: A a. Cyberespionage b. Internet censorship c. Internet rootkit d. Spear phishing
RATIONALE: Internet censorship is the control or suppression of the publishing or accessing of information on the Internet. Censorship can take many forms—such as limiting access to certain Web sites, allowing access to only some content or modified content at certain Web sites, rejecting the use of certain key words in search engine searches, tracking and monitoring the Internet activities of individuals, and harassing or even jailing individuals for their Internet use.
46. Linc Corp., a software firm, decides to ban social networking sites for its employees at the workplace. However, the employees are able to access other Web sites. Identify the strategy adopted by the firm.
ANS: B a. When only private-sector organizations gain online access b. When only government officials gain online access c. When more people gain online access d. When online access is limited to schools and colleges
RATIONALE: Internet censorship is the control or suppression of the publishing or accessing of information on the Internet. Censorship can take many forms—such as limiting access to certain Web sites, allowing access to only some content or modified content at certain Web sites, rejecting the use of certain key words in search engine searches, tracking and monitoring the Internet activities of individuals, and harassing or even jailing individuals for their Internet use.
47. When does the support for open access to Internet grow in a country?
ANS: C a. The change management continuum model b. Net neutrality c. The digital divide d. Internet traffic
RATIONALE: Typically, as more people within a country gain online access, support for open access to the Internet, without government censorship, grows. According to a recent Pew Research Center survey of people in 24 countries with emerging and developing economies, support for Internet freedom is especially strong in countries where a high percentage of the population is online.
48. Identify the term that is used to describe the gulf between those who do and those who don’t have access to modern information and communications technology.
ANS: C a. net neutrality b. digital divide c. net equality d. social divide
RATIONALE: The digital divide is a term used to describe the gulf between those who do and those who don’t have access to modern information and communications technology such as smartphones, personal computers, and the Internet. The digital divide exists not only from region to region but also from country to country and even within countries—among age groups, economic classes, and people who live in cities versus those in rural areas.
49. Consider a country with a law stating that citizens below the age of 25 must not have access to the Internet. This type of law creates a _____.
ANS: B a. solve emergency issues b. support net neutrality c. prevent online threats d. promote Internet censorship
RATIONALE: The digital divide is a term used to describe the gulf between those who do and those who don’t have access to modern information and communications technology such as smartphones, personal computers, and the Internet. The digital divide exists not only from region to region but also from country to country and even within countries—among age groups, economic classes, and people who live in cities versus those in rural areas.
50. The digital divide must be bridged to _____.
ANS: A a. The Internet traffic program b. Net neutrality program c. Workplace monitoring program d. The Education Rate program
RATIONALE: The digital divide is a term used to describe the gulf between those who do and those who don’t have access to modern information and communications technologies. Many people believe that the digital divide must be bridged for a number of reasons. Clearly, health, crime, and other emergencies could be resolved more quickly if a person in trouble had easy access to a communications network.
51. Which program was designed to eliminate the digital divide in the United States?
ANS: D a. It provides dial-up Internet services to multinational companies. b. It provides broadband Internet services to schools and libraries. c. It provides broadband Internet services to multinational companies. d. It provides dial-up Internet services to schools and libraries.
RATIONALE: The Education Rate program was designed to help eliminate the digital divide within the United States. It was designed to increase the availability of low-cost computers and smartphones.
52. Which of the following is true of the Education Rate (E-Rate) program?
ANS: B a. Education Rate (E-Rate) program b. Mobile Network (M-Net) program c. Internet Mate (I-Mate) program d. Education Network (E-Net) program
RATIONALE: The Education Rate (E-Rate) program was created through the Telecommunications Act of 1996. The full name of the program is The Schools and Libraries Program of the Universal Service Fund (USF). E-Rate helps schools and libraries obtain broadband Internet services to advance the availability of educational and informational resources.
53. Which of the following programs was created through the Telecommunications Act of 1996?
ANS: A a. Education Network (E-Net) program b. Mobile Network (M-Net) program c. Internet Mate (I-Mate) program d. Education Rate (E-Rate) program
RATIONALE: The Education Rate (E-Rate) program was created through the Telecommunications Act of 1996. The E-Rate program was designed to help eliminate the digital divide within the United States.
54. The _____ reimburses telecommunications, Internet access, and internal connections providers for discounts on eligible services provided to schools and libraries.
ANS: D a. Education Network (E-Net) program b. Education Rate (E-Rate) program c. Internet Mate (I-Mate) program d. Mobile Network (M-Net) program
RATIONALE: The Education Rate (E-Rate) program was created through the Telecommunications Act of 1996. E-Rate reimburses telecommunications, Internet access, and internal connections providers for discounts on eligible services provided to schools and libraries.
55. The Schools and Libraries Program of the Universal Service Fund (USF) is the full name of the _____.
ANS: B a. Net neutrality b. Internet of Things c. Cloud computing d. Cryptography a. To decrease the incentives of Internet Service Providers b. To support only the existing services and cancel the new services c. To keep the Internet open and impartial d. To reduce the network of Internet Service Providers
RATIONALE: The Education Rate (E-Rate) program was created through the Telecommunications Act of 1996. The full name of the program is The Schools and Libraries Program of the Universal Service Fund (USF). E-Rate helps schools and libraries obtain broadband Internet services to advance the availability of educational and informational resources.
56. _____ is the principle that requires Internet Service providers to treat all Internet traffic from various sources in an unbiased manner.
ANS: A RATIONALE: Net neutrality is the principle that ISPs should be required to treat all Internet traffic running over their wired and wireless broadband networks the same—without favoring content from some sources and/or blocking or slowing (also known as throttling) content from others. The debate over net neutrality raises questions about how best to keep the Internet open and impartial while still offering ISPs sufficient incentive to expand their networks to serve more customers and to support new services.
57. What is the debate over net neutrality?
ANS: C a. To provide dial-up Internet services to schools and libraries b. To protect users from online threats such as cracking and identity theft c. To restrict the use of social networking Web sites d. To ensure broad access to affordable communications services
RATIONALE: Net neutrality is the principle that Internet Service Providers (ISPs) should be required to treat all Internet traffic running over their wired and wireless broadband networks the same—without favoring content from some sources and/or blocking or slowing (also known as throttling) content from others. The debate over net neutrality raises questions about how best to keep the Internet open and impartial while still offering ISPs sufficient incentive to expand their networks to serve more customers and to support new services.
58. Identify the objective of the Communications Act of 1934.
ANS: D a. It created the Education Rate (E-Rate) program’s Terms of Use policy to oversee all interstate and foreign communications. b. It created the Federal Communications Commission to oversee all interstate and foreign communications. c. It created the decision support program to oversee all interstate and foreign communications. d. It created the Universal Service Fund (USF) to oversee all interstate and foreign communications.
RATIONALE: The rules governing net neutrality are set by the Federal Communications Commission (FCC), which was established by the Communications Act of 1934. This act consolidated a myriad of existing regulations that governed radio, telephone, and the emerging television industries. It was passed during the first term of President Franklin Roosevelt—decades before the Internet and computer were even invented. Its goal was to ensure broad access to affordable communications services. The act created the FCC to oversee all interstate and foreign communications.
59. Which of the following is true of the Communications Act of 1934?
ANS: B a. investment b. technology c. information d. commercial
RATIONALE: The rules governing net neutrality are set by the Federal Communications Commission (FCC), which was established by the Communications Act of 1934. This act consolidated a myriad of existing regulations that governed radio, telephone, and the emerging television industries. The act created the FCC to oversee all interstate and foreign communications.
60. In 2002, the Federal Communications Commission decided that most broadband Internet services qualified as _____ services.
ANS: C a. The Internet of Digital divide b. The Internet of Things c. The Internet of Data d. The Internet of Regulations
RATIONALE: The Communications Act is divided into seven major sections or “Titles,” each covering different subject matter. In 2002, the Federal Communications Commission decided that most broadband Internet services qualified as “information services,” making them subject to the regulations of Title I of the Communications Act—and not Title II’s more stringent and comprehensive “common carrier” regulations.
61. _____ is a network of physical objects embedded with sensors, processors, software, and network connectivity capability to enable them to exchange data with the manufacturer, operator, and other connected devices.
ANS: B a. the Internet of Things b. Net neutrality c. the Education Rate (E-Rate) program d. Net censorship
RATIONALE: The Internet of Things (IoT) is a network of physical objects or “things” embedded with sensors, processors, software, and network connectivity capability to enable them to exchange data with the manufacturer, operator, and other connected devices. Each thing is uniquely identifiable and capable of interoperating with other “things” within the existing IoT infrastructure, often by connecting to a central hub. The IoT also includes cloud services, which enable the collection and analysis of data so people can process the data and take appropriate action via mobile apps.
62. Fly thermostat, an automatic temperature controller for homes, learns the patterns for raising and lowering the temperature in a house after a week of use. It then adjusts the temperature automatically based on the observed patterns. This is an application of _____.
ANS: A a. Net censorship b. Net neutrality c. the Education Rate (E-Rate) program d. the Internet of Things
RATIONALE: The Internet of Things (IoT) is a network of physical objects or “things” embedded with sensors, processors, software, and network connectivity capability to enable them to exchange data with the manufacturer, operator. The IoT also includes cloud services, which enable the collection and analysis of data so people can process the data and take appropriate action via mobile apps and other connected devices.
63. The Mishiba Huya LED bulbs enable consumers to control lighting in their homes using a smartphone or tablet. When connected to a Huya wireless bridge, the bulbs can be programmed to emit different tones of white light, from warm, yellow white to vibrant, blue white—any color on the spectrum. The bulbs can also be programmed to blink if they sense an intruder. This is an application of _____.
ANS: D a. The Internet of Things b. The Internet of Digital divide c. The Internet of Regulations d. The Internet of Everything
RATIONALE: The Internet of Things (IoT) is a network of physical objects or “things” embedded with sensors, processors, software, and network connectivity capability to enable them to exchange data with the manufacturer, operator, and other connected devices. In theory, the IoT would enable us to connect almost any device with an on/off switch to a network—automobiles, coffee makers, components of an aircraft engine, heart monitor implants, packing labels, ingestible pills, wearable devices, and even highway sensors that can warn of traffic and hazardous road conditions. The IoT also includes cloud services, which enable the collection and analysis of data so people can process the data and take appropriate action via mobile apps.
64. Which of the following encompasses machine-to-machine, people-to-people, and people-to-machine connections?
ANS: D a. Limited availability of network services b. Increased availability of expensive smart devices c. Increased availability of network access d. Limited availability of inexpensive smart devices
RATIONALE: Until recently, the Internet of Things has been most closely associated with machine-tomachine communications, such as that employed in the manufacturing, gas, oil, and power industries. The Internet of Everything (IoE) encompasses not only machine-to-machine but also people-to-people and people-to-machine connections.
65. Which of the following is a reason for the rapid growth of the Internet of Everything?
ANS: C
RATIONALE: The Internet of Everything (IoE) encompasses not only machine-to-machine but also peopleto-people and people-to-machine connections. It is estimated that the total number of devices supported by the IoE will exceed 50 billion by the end of 2020. This rapid growth is being fueled by the increasing availability of network access, the creation of more inexpensive smart devices with sensors and network capabilities built into them, the rapid growth in smartphone penetration, and the creativity and innovation of people who are able to see and capitalize on the almost unlimited opportunities.
TRUE/FALSE
1. Ethics is one’s personal beliefs about right and wrong.
ANS: False
RATIONALE: Ethics is a set of beliefs about right and wrong behavior. Ethical behavior conforms to generally accepted social norms—many of which are almost universally accepted.
2. Morals is a set of beliefs about right and wrong behavior.
ANS: False
RATIONALE: Morals are one’s personal beliefs about right and wrong, whereas the term ethics describes standards or codes of behavior expected of an individual by a group (nation, organization, and profession) to which an individual belongs. For example, the ethics of the law profession demand that defense attorneys defend an accused client to the best of their ability, even if they know that the client is guilty of the most heinous and morally objectionable crime one could imagine.
3. Laws are enforced by a set of institutions such as the police, courts, and law-making bodies.
ANS: True
RATIONALE: Law is a system of rules that tells us what we can and cannot do. Laws are enforced by a set of institutions (the police, courts, law-making bodies). Legal acts are acts that conform to the law.
4. The First Amendment to the U.S. Constitution was adopted to protect people from unreasonable searches and seizures of properties.
ANS: False
RATIONALE: The First Amendment to the U.S. Constitution was adopted to guarantee Americans’ rights to freedom of religion, freedom of expression, and freedom to assemble. It reads as follows: Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the government for a redress of grievances.
5. The Fourth Amendment to the U.S. Constitution is used to protect the privacy of private employees.
ANS: False RATIONALE: The Fourth Amendment of the Constitution protects citizens from unreasonable searches by the government and is often used to protect the privacy of government employees. The Fourth Amendment cannot be used to control how a private employer treats its employees, however, because such actions are not taken by the government.
6. The state privacy statutes tend to favor private-sector employees over employers.
ANS: False RATIONALE: Private-sector employees can seek legal protection against an invasive employer under various state statutes, but the degree of protection varies widely by state. Furthermore, state privacy statutes tend to favor employers over employees.
7. Internet censorship limits access to certain Web sites.
ANS: True
RATIONALE: Internet censorship is the control or suppression of the publishing or accessing of information on the Internet. Censorship can take many forms—such as limiting access to certain Web sites, allowing access to only some content or modified content at certain Web sites, rejecting the use of certain key words in search engine searches, tracking and monitoring the Internet activities of individuals, and harassing or even jailing individuals for their Internet use.
8. Digital divide helps schools and libraries obtain broadband Internet services to advance the availability of educational and informational resources.
ANS: False RATIONALE: The digital divide is a term used to describe the gulf between those who do and those who don’t have access to modern information and communications technology such as smartphones, personal computers, and the Internet.
9. Net neutrality favors Internet traffic from some specific sources than the others.
ANS: False
RATIONALE: Net neutrality is the principle that Internet Service Providers should be required to treat all Internet traffic running over their wired and wireless broadband networks the same—without favoring content from some sources and/or blocking or slowing (also known as throttling) content from others.
10. The Internet of Things enables people to connect to any device with an on/off switch to a network.
ANS: True
RATIONALE: In theory, the Internet of Things would enable people to connect almost any device with an on/off switch to a network—automobiles, coffee makers, components of an aircraft engine, heart monitor implants, packing labels, ingestible pills, wearable devices, and even highway sensors that can warn of traffic and hazardous road conditions.
Essay
1. Why do practitioners in many professions subscribe to a code of ethics rather than simply following law?
ANSWER: Law is a system of rules that tells what one can and cannot do. Laws do not provide a complete guide to ethical behavior. Just because an activity is defined as legal does not mean that it is ethical. As a result, practitioners in many professions subscribe to a code of ethics that states the principles and core values that are essential to their work and, therefore, govern their behavior. The code can become a reference point for determining what is legal and what is ethical.
2. What are the various tasks carried out by a Chief Privacy Officer to establish an effective data privacy program?
ANSWER: Several tasks are critical to establishing an effective data privacy program, including the following:
Conduct a thorough assessment to document what sensitive information your organization is collecting, where it is stored, how long it is kept, who has access to it, and how your organization is using this data.
Define a comprehensive data privacy program that encompasses the development of a set of data privacy policies that meet or exceed industry and government requirements; addresses ongoing employee education and compliance; and provides for regular updates to suppliers, customers, contractors, and employees.
Assign a high level executive to implement and monitor the data privacy program.
Develop a data breach response plan to be implemented in the event of such an incident.
Track ongoing changes to regulatory and legal requirements and make necessary changes to your data privacy program.
3. In the context of workplace monitoring, explain the requirements of privacy advocates.
ANSWER: Privacy advocates want federal legislation that keeps employers from infringing upon the privacy rights of employees. Such legislation would require prior notification to all employees of the