used in a company with a flatter organization. A company with a highly stratified hierarchymay have difficulty adjusting its business processes and structures to an information systemthat does not follow the same business hierarchy of information.Difficulty: MediumReference:pp. 86–88Synthesis in terms of organize, formulate
Chapter 4Ethical and Social Issues inInformation SystemsTrue-False Questions1.The cases of Enron, Worldcom, Parmalat, and Bristol-Meyers Squibb are examples of failedethical judgment by information systems managers.Answer: FalseDifficulty: EasyReference:pp. 127–1282.Firms that cooperate with prosecutors may receive reduced charges against the entire firm forobstructing investigations.Answer: TrueDifficulty: EasyReference:p. 1283.Political institutions require time to develop new laws and often require the demonstration ofreal harm before they act.Answer: TrueDifficulty: EasyReference: p. 1304.Advances in data storage have made routine violation of individual privacy more difficult.Answer: FalseDifficulty: EasyReference:p. 1315.The Utilitarian Principle states that if an action is not right for everyone to take it is notright for anyone to take.Answer: FalseDifficulty: MediumReference:p. 1376.Privacy is the right to be left alone when you want to be, without surveillance or interferencefrom other individuals or organizations.Answer: TrueDifficulty: EasyReference:p. 1397.Standards for ensuring the accuracy and reliability of any corporate information systemsare enforced through the Gramm–Leach–Bliley Act.Answer: FalseDifficulty: EasyReference:p. 140
8.The FIP principles direct Web sites to disclose their information practices before collectingdata.Answer: TrueDifficulty: MediumReference:p. 1409.“Cookies” are designed to directly obtain the names and addresses of Web site visitors.Answer: FalseDifficulty: MediumReference:p. 14210.Spyware is software that comes hidden in free downloadable software and can track youronline movements.Answer: TrueDifficulty: EasyReference:pp. 142–14311.P3P encrypts or scrambles e-mail or data so that it cannot be read illicitly.Answer: FalseDifficulty: MediumReference: p. 14412.Protection for trade secrets is enforced at the federal level.Answer: FalseDifficulty: HardReference:p. 14513.The drawback to copyright protection is that the underlying ideas behind the work are notprotected, only their manifestation in a product.Answer: TrueDifficulty: HardReference:p. 14614.According to the courts, in the creation of unique software, similar concepts, generalfunctional features, and even colors are protectable by copyright law.Answer: FalseDifficulty: MediumReference:p. 14615.The key concepts in patent law are originality, novelty, and invention.Answer: TrueDifficulty: EasyReference:p. 14616.Computers and information technologies potentially can destroy valuable elements of ourculture in society even while they bring us benefits.
Upload your study docs or become a
Course Hero member to access this document
Upload your study docs or become a
Course Hero member to access this document
End of preview. Want to read all 285 pages?
Upload your study docs or become a
Course Hero member to access this document