Busy. Please wait.

show password
Forgot Password?

Don't have an account?  Sign up 

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
We do not share your email address with others. It is only used to allow you to reset your password. For details read our Privacy Policy and Terms of Service.

Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
Don't know
remaining cards
To flip the current card, click it or press the Spacebar key.  To move the current card to one of the three colored boxes, click on the box.  You may also press the UP ARROW key to move the card to the "Know" box, the DOWN ARROW key to move the card to the "Don't know" box, or the RIGHT ARROW key to move the card to the Remaining box.  You may also click on the card displayed in any of the three boxes to bring that card back to the center.

Pass complete!

"Know" box contains:
Time elapsed:
restart all cards
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

mana 4345 test 3 ch

test review questions and vocab for ch8 ecommerce 2012 8e

Which of the following e-commerce technology dimensions opens up the possibility of intensive invasion of privacy for commercial and governmental purposes? personalization/ customization
Which of the following e-commerce technology dimensions has the potential to reduce cultural diversity in products? global reach
In the Metro-Goldwyn-Mayer v. Grokster case, the Supreme Court relied on ________ to arrive at its decision. copyright laws
What is the first step in analyzing an ethical dilemma? Identify and describe the facts.
Which ethical principle states that, when confronted with an ethical dilemma, individuals should take the action that achieves the greater value for all of society? The Collective Utilitarian Principle
Which ethical principle emphasizes putting oneself into the place of others and thinking of oneself as the object of the decision? The Golden Rule
Which ethical principle asks you to assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise? No Free Lunch
Which ethical principle states that if an action cannot be taken repeatedly, then it is not right to take at all? Slippery Slope
Which ethical principle asks you to consider the impact of your decision if the principles underlying your decision became an organizing principle of the entire society? The Social Contract Rule
Which ethical principle tells you that it is wise to assume perfect information markets? The New York Times Test
Which ethical principle states that when confronted with an ethical dilemma, an individual should take the action that produces the least harm, or the least potential cost? Risk Aversion
Which of the following basic ethical concepts plays an important role in defining privacy? due process
Which of the following can be used to monitor and track online behavior across thousands of sites? third-party cookies
All the following are common techniques used to gather personal information on the Internet except: weblining.
Google’s Gmail advertising has raised concerns about which of the following issues? privacy
Which of the following does not strengthen the ability of law enforcement agencies to monitor Internet users without their knowledge? Computer Security Act of 1987
The placing of a cookie on a user’s hard drive by one site that is then used by another site to sell that user related products without the knowledge of the user is: legal in the United States but illegal in Europe.
Which of the following laws regulates the federal government’s collection, use and disclosure of data collected by federal agencies and gives individuals a right to inspect and correct records about themselves? The Privacy Act of 1974, as amended
Which of the following requires financial institutions to inform consumers of their privacy policies and permits consumers some control over their records? Financial Modernization Act (Graham-Leach-Bliley Act)
Which of the following laws prohibits government agents from conducting unannounced searches of press offices and files if no one in the office is suspected of committing a crime? Privacy Protection Act of 1980
Which of the following is a core Fair Information Practices (FIP) principle? Choice/Consent or Notice/Awareness
Which of the FTC’s FIP principles requires identification of the collector of data? Notice/Awareness
Which of the FTC’s Fair Information Practices (FIP) principles requires opt-in or opt-out policies to be in place? Choice/Consent
What is the FTC recommendation regarding choice as it relates to personally identifiable information (PII)? Require firms to have consumers affirmatively opt-in before PII is collected.
Which privacy protection program has the Federal Trade Commission (FTC) approved as a safe harbor under COPPA? TRUSTe internet privacy protection
________ is collected data that can be used to identify and locate an individual. personally identifiable information (PII)
PGP is an example of a technology that enables: secure e-mail.
Which of the following protects original forms of expression in a tangible medium? copyright law
How long does copyright protection extend for corporate-owned works? 95 years
Downloading music tracks owned by record companies without paying for them is an example of a violation of: copyright law.
Which of the following situations would not qualify for the fair use exception to U.S. copyright law? A student copies a photograph of his favorite band from a Web site created by the band’s record label and places it on the student’s personal Web site.
All of the following are factors that will be considered in determining whether use of copyrighted material is "fair use" except the: free availability of the work on the Web, what is considered are nature, amount and market effect
All of the following are possible penalties for violating the Digital Millennium Copyright Act (DMCA) except: ten years imprisonment for a first offense, its 5 for first offense
All of the following statements about the DMCA are true except: the DMCA makes Internet Service Provider (ISPs) responsible and accountable for hosting Web sites or providing services to infringers regardless of whether the ISP is aware of infringement.
Which of the following allows someone to obtain an exclusive monopoly on the ideas behind an invention for 20 years? patent law
Which case was instrumental in paving the way for Internet business methods patents? State Street Bank & Trust Co. v. Signature Financial Group. Inc.
Amazon has a patent on: one-click purchasing.
Registering a domain name similar or identical to trademarks of others to extort profits from legitimate holders is an example of: cybersquatting.
Registering a domain name similar or identical to trademarks of others to divert Web traffic to their own sites is an example of: cyberpiracy.
Registering the domain name gooogle.com with the intent to divert Web traffic from people misspelling google.com is an example of: typosquatting.
The use of another party’s trademarks as a metatag is: permitted only if the use does not mislead or confuse consumers.
The display of a third-party's Web site or page within your own Web site is called: framing
Disputes over federal trademarks involve establishing: infringement.
Internet Corporation for Assigning Numbers and Names (ICANN) was created during what period of the evolution of the governance of e-commerce? Self-Regulation: 1995—present
Over which of the following does ICANN have authority? domain name system
Which of the following authorizes the creation of a second level domain on the Internet where all Web sites have to declare they contain no material harmful to children? Children’s Online Protection Act (COPA)
The study of principles that individuals and organizations can use to determine right and wrong courses of action. ethics
as free moral agents, individuals, organizations, and societies are responsible for the actions they take responsibility
individuals, organizations, and societies should be held accountable to others for the consequences of their actions accountability
a feature of political systems in which a body of law is in place that permits individuals to recover the damages done to them by other actors, systems, or organizations. liability
a process in which laws are known and understood and there is an ability to appeal to higher authorities to ensure that the laws have been applied correctly. due process
a situation in which there are at least two diametrically opposed actions, each of which supports a desirable outcome dilemma
the moral right of individuals to be left alone, free from surveillance or interference from other individuals or organizations, including the state privacy
includes both the claim that certain information should not be collected at all by governments or business firms, and the claim of individuals to control the use of 'whatever information that is collected about them information privacy
any data that can be used to identify, locate, or contact an individual personally identifiable information (PII)
demographic and behavioral information, such as age, occupation, income, zip code, ethnicity, and other data that characterizes your life without identifying who you are anonymous information,
the creation of digital images that characterize online individual and group behavior. profiling
identify people as belonging to highly specific and targeted groups anonymous profiles
add a personal e-mail address, postal address, and/or phone number to behavioral data personal profiles
technology for recording every key stroke at the ISP level of everyone (no matter where they ultimately go on the Web deep packet inspection
consent given with knowledge of all material facts needed to make a rational decision) informed consent
requires an affirmative action by the consumer to allow collection and use of information. opt-in
the default is to collect information unless the consumer takes an affirmative action to prevent the collection of data opt-out
a private self-regulating policy and enforcement mechanism that meets the objectives of government regulators and legislation, but does not involve government regulation or enforcement. safe harbor
protects original forms of expression such as writings (books, periodicals, lecture notes), art, drawings, photographs, music, motion pictures, performances, and computer programs from being copied by others for 70yrs. copyright law
permits teachers and writers to use copyrighted materials without permission under certain circumstances doctrine of fair use
the first major effort to adjust the copyright laws to the Internet age. Digital Millennium Copyright Act (DMCA)
grants the owner a 20-year exclusive monopoly on the ideas behind an invention. patent
a mark used to identify and distinguish goods and indicate their source. trademark
any behavior that would weaken the connection between the trademark and the product dilution
creates civil liabilities for anyone who attempts in bad faith to profit from an existing famous or distinctive trademark by registering an Internet domain name that is identical, confusingly similar, or "dilutive" of that trademark. Anticybersquatting Consumer Protection Act (ACPA)
involves the registration of an infringing domain name, or other Internet use of an existing trademark, for the purpose of extorting payments from the legitimate owners cybersquatting
involves the same behavior as cybersquatting, but with the intent of diverting traffic from the legitimate site to an infringing site cyberpiracy
building hypertext links from one site to another site linking
involves bypassing the target site's home page and going directly to a content page deep linking framing
has to do with social control: Who will control the Internet? Who will control the processes of e-commerce, the content, and the activities? What elements will be controlled, and how will the controls be implemented? governance
Created by: romoore245