Course Hero Logo

Used in a company with a flatter organization a

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 59 - 62 out of 285 pages.

used in a company with a flatter organization. A company with a highly stratified hierarchymay have difficulty adjusting its business processes and structures to an information systemthat does not follow the same business hierarchy of information.Difficulty: MediumReference:pp. 86–88Synthesis in terms of organize, formulate
Chapter 4Ethical and Social Issues inInformation SystemsTrue-False Questions1.The cases of Enron, Worldcom, Parmalat, and Bristol-Meyers Squibb are examples of failedethical judgment by information systems managers.Answer: FalseDifficulty: EasyReference:pp. 127–1282.Firms that cooperate with prosecutors may receive reduced charges against the entire firm forobstructing investigations.Answer: TrueDifficulty: EasyReference:p. 1283.Political institutions require time to develop new laws and often require the demonstration ofreal harm before they act.Answer: TrueDifficulty: EasyReference: p. 1304.Advances in data storage have made routine violation of individual privacy more difficult.Answer: FalseDifficulty: EasyReference:p. 1315.The Utilitarian Principle states that if an action is not right for everyone to take it is notright for anyone to take.Answer: FalseDifficulty: MediumReference:p. 1376.Privacy is the right to be left alone when you want to be, without surveillance or interferencefrom other individuals or organizations.Answer: TrueDifficulty: EasyReference:p. 1397.Standards for ensuring the accuracy and reliability of any corporate information systemsare enforced through the Gramm–Leach–Bliley Act.Answer: FalseDifficulty: EasyReference:p. 140
8.The FIP principles direct Web sites to disclose their information practices before collectingdata.Answer: TrueDifficulty: MediumReference:p. 1409.“Cookies” are designed to directly obtain the names and addresses of Web site visitors.Answer: FalseDifficulty: MediumReference:p. 14210.Spyware is software that comes hidden in free downloadable software and can track youronline movements.Answer: TrueDifficulty: EasyReference:pp. 142–14311.P3P encrypts or scrambles e-mail or data so that it cannot be read illicitly.Answer: FalseDifficulty: MediumReference: p. 14412.Protection for trade secrets is enforced at the federal level.Answer: FalseDifficulty: HardReference:p. 14513.The drawback to copyright protection is that the underlying ideas behind the work are notprotected, only their manifestation in a product.Answer: TrueDifficulty: HardReference:p. 14614.According to the courts, in the creation of unique software, similar concepts, generalfunctional features, and even colors are protectable by copyright law.Answer: FalseDifficulty: MediumReference:p. 14615.The key concepts in patent law are originality, novelty, and invention.Answer: TrueDifficulty: EasyReference:p. 14616.Computers and information technologies potentially can destroy valuable elements of ourculture in society even while they bring us benefits.

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 285 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Spring
Professor
SOMEGUY

Newly uploaded documents

Show More

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture