Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Business Development
Q:
A cyberwarrior is a person who intentionally carries out crimes over the Internet.
Q:
(p. 282) During the 1960s and 1970s, national politics became dominated by a conservative agenda.
Q:
Exposure is the estimated cost, loss, or damage that can result if a threat exploits a vulnerability.
Q:
(p. 281) Much New Deal legislation was profoundly unequal and uncompassionate and reasserted the tradition of industrial idealism.
Q:
There is a clear shift in the nature of the operation of computer criminals from the desire for fame to the desire for financial gain.
Q:
(p. 280) The Nineteenth Amendment to the U.S. Constitution gave women the right to vote.
Q:
An IP address uniquely identifies each computer connected to a network or the Internet.
Q:
(p. 279) The organized labor was the strongest supporter of the industries.
Q:
(p. 278) Immediately after the U.S. Civil War, big business dominated both the federal government and the state governments to an extent that has not been seen since that time.
Q:
The Internet was designed for maximum efficiency and security by providing for error checking to ensure that the message was sent and received correctly, user authentication, and access control.
Q:
The Internet, or more specifically the Internet and network protocols, was never intended for use by untrusted users or components.
Q:
(p. 277) The First Amendment to the U.S. Constitution gives businesses the right to pursue their agenda with the federal government.
Q:
(p. 276) The U.S. Constitution allows for judicial review of laws to determine if officials of the government exceed their authority.
Q:
Protection of the U.S. computer networks is in the hands of the Department of the Interior (DOI).
Q:
The CyberCop Portal analyzes and combats cyberthreats and vulnerabilities.
Q:
(p. 275) The U.S. Constitution is a federal system in which governmental powers are divided between a national government and 50 state governments.
Q:
Data leaks were the most important EC security management concern for 2011.
Q:
(p. 257-258) List some practical suggestions for making ethical decisions in business.
Q:
Fraud is aimed mostly against organizations.
Q:
(p. 254) Describe the process of a functional magnetic resonance imaging (fMRI) study of ethical decision making.
Q:
Computer security refers to the protection of data, networks, computer programs, computer power, and other elements of computerized information systems.
Q:
Discuss the four cardinal virtues of Plato.
Q:
A cyberwar occurs when computers are set up to attack other computers in the same or other organizations.
Q:
(p. 250-251) What is meant by the theory of justice in ethical decision-making? Distinguish between distributive, retributive, and compensatory justice.
Q:
Discuss Thomas M. Garrett's principle of proportionality. What are the five factors that managers need to consider in their decisions?
Q:
Seattle's Northwest Hospital and Medical Center was attacked by malware that was able to enter their network through a Windows flaw.
Q:
Explain what is meant by the organization ethic in ethical decision-making and give a business example of the application of this concept.
Q:
Why does the success of an EC security strategy and program depend on the commitment and involvement of executive management?
Q:
Explain what is meant by the might-equals-right ethic in ethical decision-making and give a business example of the application of this concept.
Q:
Define encryption. Identify five major benefits of encryption.
Q:
Explain what is meant by the intuition ethic in ethical decision-making and give a business example of the application of this concept.
Q:
Define biometric system. Identify four common biometrics.
Q:
Explain what is meant by the ends-means ethic in ethical decision-making and give a business example of the application of this concept.
Q:
Briefly describe the CIA security triad.
Q:
Briefly describe nonrepudiation and its importance for EC and electronic transactions.
Q:
Explain what is meant by the conventionalist ethic and give a business example of the application of this concept.
Q:
(p. 251) Explain what is meant by the utilitarian ethic in ethical decision-making.
Q:
The key reasons why EC criminals cannot be stopped include each of the following except
A) sophisticated hackers use browsers to crack into Web sites.
B) strong EC security makes online shopping inconvenient and demanding on customers.
C) there is a lack of cooperation from credit card issuers and foreign ISPs.
D) online shoppers do not take necessary precautions to avoid becoming a victim.
Q:
An exercise that determines the impact of losing the support of an EC resource to an organization and establishes the escalation of that loss over time, identifies the minimum resources needed to recover, and prioritizes the recovery of processes and supporting systems best describes
A) business continuity plan.
B) business impact analysis.
C) vulnerability assessment.
D) computer security incident management.
Q:
(p. 249) What is meant by the rights ethic in ethical decision-making?
Q:
(p. 248) Explain what is meant by the principle of equal freedom in ethical decision-making.
Q:
What are the five basic principles of the Global Code of Conduct from the Mobile Marketing Association?
Q:
(p. 240) What is consequentialism?
Q:
Define advergaming. Briefly identify three categories of advergaming.
Q:
(p. 239) Define deontological ethics.
Q:
Why is Web advertising growing rapidly?
Q:
(p. 257) A method of ethical reasoning in which insight comes from answering a list of questions is known as the:
A. deontological approach.
B. critical questions approach.
C. general questions approach.
D. consequentialist approach.
Q:
Identify five data collection methods in the Web 2.0 environment.
Q:
(p. 257) The learning of specific virtues such as prudence or honesty is known as:
A. character development.
B. intellectual development.
C. affective development.
D. social development.
Q:
Define online trust. How can trust be increased in EC?
Q:
(p. 257) Brain research into neural sensitivity affirms this ethic if it is defined as moral intuition enlightened by experience and ethical education.
A. The intuition ethic
B. The rights ethic
C. The equal freedom ethic
D. The virtue ethic
Q:
A popular Internet advertising payment model where advertisers pay their host only when the ad is clicked on best defines
A) banner pricing.
B) itemized click pricing.
C) page pricing.
D) pay per click.
Q:
(p. 257) According to brain research, the effectiveness of the disclosure rule is shown to rest on emotions such as:
A. fear.
B. greed.
C. remorse.
D. anger.
Q:
A free Internet news service that broadcasts personalized news and information, including seminars, in categories selected by the user, best defines
A) Really Simple Syndication.
B) Hulu.
C) Webcasting.
D) interactive video.
Q:
(p. 256) Evidence suggests that the sensitivity of neural pathways is based on learning and:
A. motivation.
B. social experience.
C. reinforcement.
D. classical conditioning.
Q:
A marketing arrangement by which an organization refers consumers to the selling company's website best defines
A) affiliate network.
B) affiliate marketing.
C) affiliate brokering.
D) clickstream marketing.
Q:
(p. 256) Moral intuition is a form of social intuition that is adaptive to the social environment and predominates in individual ethical decisions, more so when they are:
A. immediate.
B. abstract.
C. less emotionally loaded.
D. amenable to decision regimes.
Q:
An advertising strategy in which customers agree to accept advertising and marketing materials best defines
A) permission advertising.
B) localized advertising.
C) customer-based marketing.
D) approval-based marketing.
Q:
(p. 256) Neuroscience provides a basis for the _____ ethic set forth by philosopher G. E. Moore more than a century ago.
A. rights
B. utilitarian
C. might-equals-right
D. intuition
Q:
Internet campaign objectives include
A) stimulating mobile word of mouth.
B) enhancing brand loyalty.
C) changing brand image.
D) all of the above.
Q:
(p. 256) What is the evolutionary basis of ethics?
A. Heredity
B. Eugenics
C. Natural selection
D. Artificial selection
Q:
Basic classes of online campaigns include each of the following except
A) affiliation.
B) raffles.
C) coupons.
D) entertainment.
Q:
(p. 254) All of the following statements about a functional magnetic resonance imaging (fMRI) are true EXCEPT:
A. it is a method used to map activity in neural networks during ethical decision making.
B. it can pinpoint neural activity to within 1 micrometer in the brain.
C. it measures changes in blood flow and blood oxygen content related to neural activity.
D. it works by detecting shifts in magnetic properties of hemoglobin.
Q:
The most popular mobile ad is
A) advertising within mobile games.
B) a short message.
C) multimedia advertising.
D) ads in mobile videos.
Q:
The practice of using computer games to advertise a product, an organization, or a viewpoint best defines
A) viral video.
B) behavioral targeting.
C) advergaming.
D) relationship marketing.
Q:
(p. 253) The four cardinal virtues identified by Plato are justice, temperance, courage, and:
A. wisdom.
B. respect.
C. honor.
D. benevolence.
Q:
(p. 253) The idea that character development is the wellspring of ethical behavior is known as the:
A. Golden Rule.
B. disclosure rule.
C. virtue ethic.
D. equal freedom ethic.
Q:
A live direct or indirect view of a physical, real-world environment whose elements are enhanced by computer-generated sensory input, such as sound or graphics defines
A) augmented reality.
B) interactive video.
C) viral marketing.
D) virtual marketing.
Q:
The craft of increasing site rank on search engines best describes
A) page conversion.
B) analytical marketing.
C) search engine optimization.
D) collaborative placement.
Q:
(p. 252) This ethical principle requires the manager to calculate which course of action, among alternatives, will result in the greatest benefit for the company and all workers.
A. The might-equals-right ethic
B. The ends-means ethic
C. The proportionality ethic
D. The utilitarian ethic
Q:
Online marketing, facilitated by the Internet, by which marketers can interact directly with customers, and consumers can interact with advertisers and vendors best describes
A) market segmenting.
B) interactive marketing.
C) augmented reality.
D) online brokering.
Q:
(p. 251) One problem with _____ is that in practice it has led to self-interested reasoning.
A. the conventionalist ethic
B. utilitarianism
C. the disclosure rule
D. proportionality
Q:
(p. 251) In making a decision using this principle, one must determine whether the harm in an action is outweighed by the good.
A. The organization ethic
B. The utilitarian ethic
C. The categorical imperative
D. The practical imperative
Q:
An individual's unique physical or behavioral characteristics that can be used to identify an individual precisely best defines
A) biometrics.
B) cookies.
C) Web bugs.
D) page monitor.
Q:
(p. 251) "Actions that promote happiness are right while actions that promote unhappiness are wrong" is the basis of the:
A. might-equals-right ethic.
B. ends-means ethic.
C. utilitarian ethic.
D. organization ethic.
Q:
Data mining techniques for discovering and extracting information from Web documents, exploring both Web content and Web usage, best defines
A) Web brokering.
B) collaborative filtering.
C) page filtering.
D) Web mining.
Q:
(p. 251) The idea that a retail shop owner should pay damages to a customer who was hurt by a salesperson is consistent with the ethical principle of:
A. restorative justice.
B. compensatory justice.
C. retributive justice.
D. distributive justice.
Q:
Software that gathers user information over an Internet connection without the user's knowledge best defines
A) ad-aware.
B) collaborative filtering.
C) spyware.
D) Web mining.
Q:
(p. 251) The idea that a bank cashier should not be fired for stealing $100 if a bank officer is allowed to keep his job after embezzling $1,000 is consistent with the ethical principle of:
A. retributive justice.
B. restorative justice.
C. distributive justice.
D. compensatory justice.
Q:
Tiny graphics files embedded in e-mail messages and in websites that transmit information about users and their movements to a Web server best describes
A) Web slugs.
B) Web bugs.
C) Web cookies.
D) Web monitors.