: Quiz One Flashcards

1
Q

Which of the following best describes the basis for the FIP principles?

A

The mutuality of interest between the record holder and the individual

page 168

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The Federal Trade Commission FIP principle of Notice/Awareness states that:

A

Web sites must disclose their information practices before collecting data.

page 169

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Ethics describes the principles of right and wrong that can be used by individuals to make choices to guide their behaviour.

A

True.

page 158

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The ethical guideline that asks you to put yourself in the place of others, and think of yourself as the object of the decision, is called the Utilitarian Principle.

A

False.

page 167

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

____ restricts the information that the U.S. federal government can collect about an individual and regulates what it can do with the information.

A

The Privacy Act of 1974

page 168

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

____ is a feature of social institutions that means mechanisms are in place to determine responsibility for an action.

A

Accountability

page 163-164

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A man steals from a grocery store in order to feed his starving family. Which of the following best expresses the Utilitarian Principle in evaluating this situation?

A

His action is acceptable, because the increase in social value of the survival of the family exceeds the decrease in social value from the harm suffered by the grocer.

page 167

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Liability is a feature of political systems and allows individuals to recover damages done to them by others.

A

True

page 165

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

____ is a societal practice of having laws that are known and understood, along with the ability to appeal to higher authorities to ensure that the laws are applied correctly.

A

Due process

page 165

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A peer at work takes small amounts of office supplies for her own use at home, saying that this is a tiny loss to the company. You tell her that if everyone were to take office supplies, then the loss would no longer be minimal. Your rationale expresses which historical ethical principle?

A

Kant’s Categorical Imperative

page 166

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The ethical “no free lunch” rule states that:

A

Everything is owned by someone else, and that the creator wants compensation for this work.

page 167

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following describes Immanuel Kant’s Categorical Imperative?

A

If an action is not right for everyone to take, it is not right for anyone to take.

page 167

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

____ is a new data analysis technology that finds hidden connections between data in disparate sources.

A

NORA

page 162

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Taking the action that produces the least harm best describes the:

A

Risk Aversion Principle.

page 167

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In 2010, the FTC added all of the following recommendations to its privacy guidelines except:

A

Firms should limit the length of time that any personal data is stored to six months or less.

page 169

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

As discussed in the chapter, all of the following are steps in the process for analyzing an ethical issue except:

A

Assigning responsibility

page 166

17
Q

____ means that you accept the potential costs and obligations for the decisions you make.

A

Responsibility

page 163

18
Q

____ is the use of computers to assemble data from different sources to create electronic dossiers of detailed information about individuals.

A

Profiling

page 161

19
Q

The limitation of trade secret protection for software is that it is difficult to prevent the ideas in the work from falling into the public domain when:

A

The software is widely distributed.

page 177

20
Q

Because of their special claims to knowledge, wisdom, and respect, professionals take on special rights and obligations.

A

True

page 167