E-Commerce Chapter 8

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/19

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

20 Terms

1
New cards

Which of the following involves the issue of social control?
A) information rights
B) governance
C) property rights
D) public safety and welfare

B) governance

2
New cards

According to data from Pew Research Center, which of the following is the action which the highest percentage of Internet users has taken to preserve their privacy online?
A) encrypted their communications
B) posted comments online anonymously
C) used an anonymous web browsing service
D) cleared web browser history and cookies

D) cleared web browser history and cookies

3
New cards

Which of the following uses software installed at the ISP level to track user clickstream behavior?
A) shopping carts
B) deep packet inspection
C) DRM
D) trusted computing environments

B) deep packet inspection

4
New cards

Which of the following situations would not qualify for the fair use exception to U.S. copyright law?
A) Google posts thumbnail images of books in the Google Book Search Project.
B) A professor clips a newspaper article just before class and distributes copies of it to his class.
C) A student copies a photograph of his favorite band from a website created by the band's record label and places it on the student's personal website.
D) A journalist quotes a paragraph from a book in a review of the book.

C) A student copies a photograph of his favorite band from a website created by the band's record label and places it on the student's personal website.

5
New cards

What is the FTC recommendation regarding choice as it relates to personally identifiable information (PII)?
A) Require firms to allow consumers to opt-out before PII is collected.
B) Require robust notice only before PII is collected.
C) Make collection of PII illegal.
D) Require firms to have consumers affirmatively opt-in before PII is collected.

D) Require firms to have consumers affirmatively opt-in before PII is collected.

6
New cards

Online gambling is now legal throughout the United States.
True / False

False

7
New cards

Registering the domain name Faceboik.com with the intent to divert web traffic from people misspelling Facebook.com is an example of:
A) metatagging
B) typosquatting
C) keywording
D) deep linking

B) typosquatting

8
New cards

Liability is a feature of political systems in which a body of law is in place that permits individuals to recover damages done to them by other actors, systems, or organizations.
True / False

True

9
New cards

Which ethical principle states that, when confronted with an ethical dilemma, individuals should take the action that achieves the greater value for all of society?
A) The Golden Rule
B) Collective Utilitarian Principle
C) The Social Contract Rule
D) Risk Aversion Principle

B) Collective Utilitarian Principle

10
New cards

Net neutrality refers to the idea that Internet service providers (ISPs), including cable Internet and wireless carriers, should treat all data on the Internet in the same manner, and not discriminate or price differentially by content, protocol, platform, hardware, or application.
True / False

True

11
New cards

Which of the following features of e-commerce technology can result in work and shopping invading family life?
A) ubiquity
B) global reach
C) interactivity
D) information density

A) ubiquity

12
New cards

Which of the following e-commerce technology dimensions creates greater opportunities for cyberbullying?
A) social technology
B) ubiquity
C) interactivity
D) information density

A) social technology

13
New cards

The Children's Internet Protection Act (CIPA) has been struck down by the U.S. Supreme Court as unconstitutional.
True / False

False

14
New cards

The Spokeo case involved a claim for damages based on which of the following?
A) Anticybersquatting Consumer Protection Act
B) Defend Trade Secrets Act
C) Fair Credit Reporting Act
D) Digital Millennium Copyright Act

C) Fair Credit Reporting Act

15
New cards

How long does copyright protection extend for corporate-owned works?
A) 25 years
B) 50 years
C) 75 years
D) 95 years

D) 95 years

16
New cards

Downloading a music track owned by a record company without paying for it is an example of a violation of:
A) privacy law
B) trademark law
C) patent law
D) copyright law

D) copyright law

17
New cards

What is the major reason why the Internet has such potential for destroying traditional conceptions and implementations of intellectual property law?
A) the anonymous nature of the Internet
B) the ability to make perfect copies of digital works at little cost
C) the use of standards for file formats
D) the support for instant peer-to-peer communication

B) the ability to make perfect copies of digital works at little cost

18
New cards

All of the following are required for information to be considered a trade secret except:
A) it must be something that others do not know.
B) the owner must have taken steps to protect it.
C) it must be unique.
D) it must have commercial value to its owner.

C) it must be unique.

19
New cards

Which of the following is not an e-commerce public safety and welfare issue?
A) regulation of gambling
B) regulation of pornography
C) regulation of taxation
D) regulation of cigarette sales

C) regulation of taxation

20
New cards

Disputes over federal trademarks involve establishing:
A) intent
B) infringement
C) piracy
D) underlying ideas

B) infringement