Which of the following is not one of the four basic principles shared by ethical schools of thought in western culture? A)
responsibility
B)
liability
C)
privacy
D)
accountability
C)
privacy
2
New cards
Which of the following can be used to record all keyboard activity of a user? A)
shopping carts
B)
trusted computing environments
C)
spyware
D)
DRM
C)
spyware
3
New cards
What is the first step in analyzing an ethical dilemma? A)
Define the conflict or dilemma and identify the higher-order values involved.
B)
Identify the potential consequences of your opinions.
C)
Identify the options you can reasonably take.
D)
Identify and describe the facts.
D)
Identify and describe the facts.
4
New cards
Which of the following allows someone to obtain an exclusive monopoly on the ideas behind an invention for 20 years? A)
trade secret law
B)
copyright law
C)
trademark law
D)
patent law
D)
patent law
5
New cards
Downloading music tracks owned by record companies without paying for them is an example of a violation of:A)
trademark law.
B)
patent law.
C)
privacy law.
D)
copyright law.
D)
copyright law.
6
New cards
All of the following are factors that will be considered in determining whether use of copyrighted material is fair use except the: A)
free availability of the work on Netflix or Hulu.
B)
market effect of the use.
C)
nature of the work used.
D)
amount of the work used.
A)
free availability of the work on Netflix or Hulu.
7
New cards
Which of the following statements about net neutrality is true? A)
The FCC now regulates ISP pricing but only offers guidelines on advertising.
B)
Net neutrality requires that no data be treated in the same manner.
C)
Net neutrality requires that all data be treated in the same manner.
D)
The FCC now regulates ISP pricing and advertising.
C)
Net neutrality requires that all data be treated in the same manner.
8
New cards
Registering a domain name (URL) similar or identical to trademarks of others to extort profits from legitimate holders is an example of: A)
cyberpiracy.
B)
framing.
C)
cybersquatting.
D)
metatagging.
C)
cybersquatting.
9
New cards
Which of the following protects original forms of expression in a tangible medium? A)
trademark law
B)
trade secret law
C)
patent law
D)
copyright law
D)
copyright law
10
New cards
Which of the following situations would not qualify for the fair use exception to U.S. copyright law? A)
A professor clips a newspaper article just before class and distributes copies of it to his class.
B)
Google posts thumbnail images of books in the Google Book Search Project.
C)
A student copies a song of his favorite band from a Web site created by the band's record label and places it on the student's personal Web site.
D)
A journalist quotes a paragraph from a book in a review of the book.
C)
A student copies a song of his favorite band from a Web site created by the band's record label and places it on the student's personal Web site.
11
New cards
In the United States today, single, white, young college-educated males with high income dominate the Internet in terms of percentage of Internet usage
False
12
New cards
Research has found that of all the standard formats of display ads, wide skyscaper ads are most effective at holding a user's attention.
False
13
New cards
rice is more important that convenience as a factor in online purchase decisions.
False
14
New cards
E-commerce is a major conduit and generator of offline commerce.
True
15
New cards
Online shoppers tend to browse for available products rather than search for specific products they have determined in advance.
False
16
New cards
Research shows that the two most important factors shaping the decision to purchase online are utility and trust.
True
17
New cards
In 2013, mobile marketing grew at nearly the same rate as traditional online marketing.
False
18
New cards
Evidence suggests that real-time customer chat increases sales.
True
19
New cards
Transaction logs are built into Web server software.
True
20
New cards
Cookies, when combined with Web beacons, can be used to create cross-site profiles.
True
21
New cards
An interstitial ad is typically contained in a pop-up window that the user must close in order to continue
False
22
New cards
The digital divide still persists along age, income, ethnic, and education dimensions.
True
23
New cards
The cost of sending 10,000 e-mails in an advertising campaign is about the same as sending 5,000.
True
24
New cards
The concept of "customer satisfaction" is broader than the concept of "customer experience."
False
25
New cards
Bundling is the process of selling of selling two or more product's individual prices
True
26
New cards
By 2012, social marketing had overtaken mobile marketing.
False
27
New cards
By 2015, it is estimated that mobile marketing spending will account for around $16 billion annually.
True
28
New cards
Traditional desktop marketing remains the largest part of all online marketing.
True
29
New cards
Facebook has more unique monthly visitors than LinkedIn, Twitter, Pinterest, Tumblr, and Instagram combined.
False
30
New cards
It is possible to opt-out of FB typically attract more visitors than a brand's Web site.
True
31
New cards
Promoted Tweets are Twitter's version of Google's Ad Words.
True
32
New cards
Pinterest's visitors are predominantly women.
True
33
New cards
It is expected that by 2017, mobile commerce will account for 50% of all e-commerce.
False
34
New cards
About 25% of all search engine requests originate from mobile devices
True
35
New cards
Mobile users spend most of their time browsing mobile Web sites.
False
36
New cards
Google provides the leading location-based marketing platform.
True
37
New cards
A cell phone's GPS is accurate to within 5 feet of the actual location of the phone.
False
38
New cards
Text message generates the majority of mobile marketing spending.
False
39
New cards
Liability is a feature of political systems in which a body of law is in place that permits individuals to recover damages done to them by other actors, systems, or organizations.
True
40
New cards
The principle of responsibility means that individuals, organizations, and societies should be held accountable to others for the consequences of their actions.
False
41
New cards
The ethical principle of Universalism states that if an action is not right for all situations, then it is not right for any situation.
True
42
New cards
Deep packet inspection uses software installed on client computers to collect and analyze detailed information on page content viewed by users.
False
43
New cards
Most adult social network participants do not have any expectation of personal privacy when using a social network.
False
44
New cards
The Children's Online Privacy Protection Act (COPPA prohibits Web sites from collecting information on children under the age of 13
True
45
New cards
The European Data Protection Directive prohibits the transfer of PII to organizations or countries that do not have similar privacy protection policies.
True
46
New cards
The FTC's privacy approach is now focused on targeting practices that are likely to cause harm or unwarranted intrusion into consumers' daily lives.
True
47
New cards
Copyright protection protects against others copying the underlying ideas in a work.
False
48
New cards
It is not necessarily illegal to use someone else's trademark in a metatag.
True
49
New cards
Net neutrality refers to Internet backbone owners treating all Internet traffic equally.
True
50
New cards
The Children's Protection Act (CIPA) requires schools and libraries in the United States to install technology protection measures in an effort to shield children from pornography.
True
51
New cards
The Unlawful Internet Gambling Enforcement Act has eliminated all online gambling in the United States.
False
52
New cards
Google defends its Library Project on the grounds of fair use.
True
53
New cards
Mobile commerce currently accounts for more retail goods sold than social commerce.
True
54
New cards
In 2013, the number of online buyers was over 150 million.
True
55
New cards
Groupon is an example of local commerce.
True
56
New cards
Online retailing is one of the largest segments of the retail industry.
False
57
New cards
Contrary to predictions of analysts made during the early days of e-commerce, the Internet has let to both disintermediation and hypermediation on a widespread basis.
False
58
New cards
Consumers are primarily price-driven when shopping on the Internet.
False
59
New cards
Online retailing provides an example of the powerful role that intermediaries continue to play in retail trade.
True
60
New cards
The power of suppliers is a key industry strategic factor.
True
61
New cards
In the United States, the service sector accounts for about 75% of all economic activity.
True
62
New cards
The retail industry is the largest investor in information technology.
False
63
New cards
Social network sites have become major locations from which consumers directly purchase products.
False
64
New cards
Approximately two-thirds of U.S. Internet users use online banking.
True
65
New cards
The online mortgage industry has transformed the process of obtaining a mortgage.
False
66
New cards
The major impact of Internet real estate sites is in enabling online-only property transactions.
False
67
New cards
Online career sites are being threatened by both job search engines and aggregators.
True
68
New cards
1) Liability is a feature of political systems in which a body of law is in place that permits individuals to recover damages done to them by other actors, systems, or organizations.
TRUE
69
New cards
2) The principle of responsibility means that individuals, organizations, and societies should be held accountable to others for the consequences of their actions.
FALSE
70
New cards
3) The ethical principle of Universalism states that if an action is not right for all situations, then it is not right for any situation.
TRUE
71
New cards
4) Deep packet inspection uses software installed on client computers to collect and analyze detailed information on page content viewed by users.
FALSE
72
New cards
5) Most adult social network participants do not have any expectation of personal privacy when using a social network.
FALSE
73
New cards
6) The opt-in model for informed consent requires an affirmative action by the consumer before a company can collect and use information.
TRUE
74
New cards
10) Copyright protection protects against others copying the underlying ideas in a work.
FALSE
75
New cards
11) It is not necessarily illegal to use someone else's trademark in a metatag.
TRUE
76
New cards
12) Net neutrality refers to Internet backbone owners treating all Internet traffic equally.
TRUE
77
New cards
14) The Unlawful Internet Gambling Enforcement Act has eliminated all online gambling in the United States.
FALSE
78
New cards
Which of the following e-commerce technology dimensions creates greater opportunities for cyberbullying?
social technology
79
New cards
Which of the following e-commerce technology dimensions has the potential to reduce cultural diversity in products?
global reach
80
New cards
In Western culture, the basic principles shared by ethical schools of thought are:
responsibility, liability, and accountability
81
New cards
What is the first step in analyzing an ethical dilemma?
Identify and describe the facts
82
New cards
Which ethical principle states that, when confronted with an ethical dilemma, individuals should take the action that achieves the greater value for all of society?
the Collective Utilitarian principle
83
New cards
Which ethical principle emphasizes putting oneself into the place of others and thinking of oneself as the object of the decision?
the Golden Rule
84
New cards
Which ethical principle asks you to assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise?
No Free Lunch
85
New cards
Which ethical principle states that if an action cannot be taken repeatedly, then it is not right to take at all?
the Slippery Slope
86
New cards
Which ethical principle asks you to consider the impact of your decision if the principles underlying your decision became an organizing principle of the entire society?
the Social Contract rule
87
New cards
Which ethical principle tells you that it is wise to assume perfect information markets?
the New York Times test
88
New cards
Which ethical principle states that when confronted with an ethical dilemma, an individual should take the action that produces the least harm, or the least potential cost?
Risk Aversion
89
New cards
Which of the following basic ethical concepts plays an important role in defining privacy?
due process
90
New cards
\________ is collected data that can be used to identify and locate an individual.
PII
91
New cards
Which of the following tools can companies use to track user statements and views on newsgroups, chat groups, and other public forums?
search engines
92
New cards
Which of the following can be used to record all keyboard activity of a user?
spyware
93
New cards
Which of the following is not one of the issues complicating the taxation of e-commerce sales?
Taxes raised are used for different government purposes
94
New cards
Google's Gmail advertising has raised concerns about which of the following issues?
privacy
95
New cards
Which of the following statements about industry self-regulation regarding privacy is not true?
The NAI's privacy policies were developed without regard to the FTC principles
96
New cards
The placing of a cookie on a user's hard drive by one site that is then used by another site to sell that user related products without the knowledge of the user is:
legal in the United States but illegal in Europe
97
New cards
Which of the following requires financial institutions to inform consumers of their privacy policies and permits consumers some control over their records?
Gramm-Leach-Bliley Act
98
New cards
A social consequence of the richness of Internet information is:
very persuasive messages might reduce the need for multiple independent sources of information.
99
New cards
Which of the following is a core Fair Information Practices (FIP) principle?
Choice/Consent
100
New cards
Which of the FTC's Fair Information Practices (FIP) principles requires identification of the collector of data?