MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.

Size: px
Start display at page:

Download "MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question."

Transcription

1 Exam Name MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 1) Food Inc. operates a website for their firm. They ask visitors to the website to give information such as name, , address, DOB, etc. Food Inc has found that they can sell this information to outside marketing groups for a lot of money. They are in the process of deciding if they should sell their customers information. The moral dimension best described by this scenario is 1) A) information rights and obligations. B) accountability and control. C) property rights and obligations. D) quality of life 2) Right now is the only province with privacy laws for the private sector that meet European Union standards. 2) A) Quebec B) Ontario C) Alberta D) Nova Scotia 3) Mary telecommutes with her head office in downtown Toronto. She finds that she is working longer hours at home than she did at the office. Her work day starts as soon as she gets out of bed as she checks her e-mal and responds to it. She is also finding that she stays on the computer long after supper in the evening as she ties up loose ends from the previous day's work. The moral dimension best described by this scenario is 3) A) quality of life B) property rights and obligations. C) information rights and obligations. D) accountability and control. 4) A colleague of yours frequently takes for his own personal use small amounts of office supplies, noting that the loss to the company is minimal. You counter that if everyone were to take the office supplies, the loss would no longer be minimal. Your rationale expresses which historical ethical principle? 4) A) The Risk Aversion Principle B) Kant's Categorical Imperative C) The "No free lunch" rule D) The Golden Rule 5) Mary has found a way to get access to her school's grading database. She determines that she can change her own grades to a higher level without getting caught. She decides not to because she feels she wouldn't want someone to access her information and change things without permission so she won't do that to others. The ethical principle best described by this scenario is 5) A) the golden rule. B) the utilitarian principle. C) the risk aversion principle D) the Immanuel Kant's categorical imperative. 6) One of the difficulties of patent protection is 6) A) that only the underlying ideas are protected. B) preventing the ideas from falling into public domain. C) digital media cannot be patented. D) the years of waiting to receive it.

2 7) Accepting the potential costs, duties, and obligations for the decisions you make is referred to as 7) A) responsibility. B) due process. C) liability. D) accountability. 8) The process in law-governed societies in which laws are known and understood and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly is called 8) A) accountability. B) due process. C) liability. D) the courts of appeal. 9) Immanuel Kant's Categorical Imperative states that 9) A) one should take the action that produces the least harm or incurs the least cost. B) if an action cannot be taken repeatedly, then it is not right to be taken at any time. C) if an action is not right for everyone to take, it is not right for anyone to take. D) one can put values in rank order and understand the consequences of various courses of action. 10) Which of the following is not one of the five steps discussed in the chapter as a process for analyzing an ethical issue? 10) A) identify the options you can reasonably take B) identify the stakeholders C) identify and clearly describe the facts D) assign responsibility 11) The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called 11) A) spamming. B) profiling. C) targeting. D) phishing. 12) are not held liable for the messages they transmit. 12) A) Regulated common carriers B) Private individuals C) Elected officials D) Organizations and businesses 13) The feature of social institutions that means mechanisms are in place to determine responsibility for an action is called 13) A) the judicial system. B) the courts of appeal. C) due process. D) accountability. 14) What legal mechanism protects the owners of intellectual property from having their work copied by others? 14) A) patent protection B) intellectual property law C) Fair Use Doctrine D) copyright law 15) P3P stands for 15) A) Personal Privacy Policy. B) Platform for Privacy Preferences. C) Personal Privacy Protection. D) Privacy for Personal Protection. 16) The P3P standard is concerned with 16) A) controlling pop-up ads based on user profiles and preventing ads from collecting or sending

3 information. B) scrambling data so that it can't be read. C) allowing users to surf the Web anonymously. D) blocking or limiting cookies. 17) The limitation of trade secret protection for software is that it is difficult to prevent the ideas in the work from falling into the public domain when 17) A) the courts become involved. B) the software is widely distributed. C) hackers are able to break into the source code. D) a new version of the software is released. 18) The strength of patent protection is that it 18) A) puts the strength of law behind copyright. B) is easy to define. C) grants a monopoly on underlying concepts and ideas. D) allows protection from Internet theft of ideas put forth publicly. 19) FIP principles are based on the notion of the 19) A) responsibility of the record holder. B) mutuality of interest between the record holder and the individual. C) accountability of the record holder. D) privacy of the individual. 20) The U.S. CAN-SPAM Act of ) A) requires spammers to identify themselves. B) has dramatically cut down spamming. C) does not override state anti-spamming laws. D) makes spamming illegal. 21) CVS refers to 21) A) stress induced by technology. B) wrist injuries brought about by incorrect hand position when using a keyboard. C) eyestrain related to computer display screen use. D) carpal vision syndrome. 22) Software is protected from being stolen, replicated and sold by anyone but the owner of the software or those given his permission by what law? 22) A) Canadian patent law B) Canadian copyright law C) there is no legal protection D) Canadian property law 23) Barb is buying a book online. They are asking her to give them a large amount of personal information before she is able to buy the book. The book site describes what will happen with the information and they also provide a way for Barb to ask them to collect no more data on her. The principle best described by this scenario is 23) A) due process B) safe harbor C) informed consent D) liability

4 24) Which of the five moral dimensions of the information age do the central business activities of ChoicePoint raise? 24) A) system quality B) property rights and obligations C) accountability and control D) information rights and obligations 25) In today s new legal environment, managers who violate the law and are convicted will most likely 25) A) get probation. B) pay a fine. C) pay a fine and get probation. D) spend time in prison. 26) "Free is Me" is a software company sells software that is a file sharing software. Once downloaded, the software customers can download movies, music, and software programs for free. If these goods were purchased at a store they would cost anywhere from ten dollars to several hundred dollars. This is great way to get all this stuff for free. The moral dimension best described by this scenario is 26) A) accountability and control. B) property rights and obligations. C) quality of life D) information rights and obligations. 27) Books Inc. sell books at their website. They have a policy of putting tiny files on their clients computers to track visits to their site. This tiny program can customize the clients next visit to Books Inc. site. This tiny files is a. 27) A) cookie B) cracker C) biscuit D) web bug 28) It is not feasible for companies to produce error-free software because 28) A) errors can be introduced in the maintenance stage of development. B) it is too expensive create perfect software. C) any software of any complexity will have errors. D) any programming code is susceptible to error. 29) A classic ethical dilemma is the hypothetical case of a man stealing from a grocery store in order to feed his starving family. If you used the Utilitarian Principle to evaluate this situation, you might argue that stealing the food is 29) A) acceptable, because the higher value is the survival of the family. B) wrong, because the man would not want the grocery to steal from him. C) acceptable, because the grocer suffers the least harm. D) wrong, because if everyone were to do this, the concept of personal property is defeated. 30) In the information age, the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of 30) A) information rights and obligations. B) accountability and control. C) property rights and obligations. D) system quality. 31) can be induced by tens of thousands of repetitions under low-impact loads. 31) A) RSI B) technostress C) CVS D) CTS 32) "Look and feel" copyright infringement lawsuits are concerned with 32) A) using the creative elements of another product.

5 B) the distinction between tangible and intangible ideas. C) the distinction between an idea and its expression. D) using the graphical elements of another product. 33) Which of the following is not one of the three principal sources of poor system performance? 33) A) software bugs and errors B) insufficient integration with external systems. C) hardware or facility failures caused by natural or other causes. D) poor input data quality. 34) The introduction of new information technology has a 34) A) dampening effect on the discourse of business ethics. B) beneficial effect for society as a whole, while raising dilemmas for consumers. C) waterfall effect in raising ever more complex ethical issues. D) ripple effect raising new ethical, social, and political issues. 35) Doors Inc. has just developed a new software that helps put in state of the art manufacturing techniques into plants. A quick search of the Internet reveals that another company in China already has a copy of their software that has not yet been put on the market. The moral dimension best described by this scenario is 35) A) quality of life B) property rights and obligations. C) accountability and control. D) information rights and obligations. 36) Which of the following adjusts copyright laws to the Internet age by making it illegal to make, distribute, or use devices that circumvent technology-based protections of copyrighted materials? 36) A) Electronic Communications Privacy Act B) Privacy Act C) Freedom of Information Act D) Digital Millennium Copyright Act 37) The ethical "no free lunch" rule states that 37) A) everything is owned by someone else, and that the creator wants compensation for this work. B) one should take the action that produces the least harm or incurs the least cost. C) if an action cannot be taken repeatedly, then it is not right to be taken at any time. D) one can put values in rank order and understand the consequences of various courses of action. 38) When a cookie is created during a Web site visit, it is stored 38) A) in a Web directory. B) on the ISP's computer. C) on the Web site computer. D) on the visitor's computer. 39) Advances in data storage techniques and rapidly declining storage costs have 39) A) doubled every 18 months. B) made universal access possible. C) been accompanied by relevant federal statutes protecting personal data. D) made routine violations of privacy cheap and effective. 40) U.S. businesses are allowed to use personal data from EU countries if they 40)

6 A) make their privacy protection policies publicly available. B) create a safe harbor. C) have informed consent. D) develop equivalent privacy protection policies. 41) The most common source of business system failure is 41) A) software errors. B) software bugs. C) hardware or facilities failures. D) data quality. 42) The term " divide" refers to large disparities in access to computers and the Internet among different social groups and different locations. 42) A) technology B) digital C) computer D) electronic 43) European privacy protection is than in the United States. 43) A) much less stringent B) less liable to laws C) much more stringent D) less far-reaching 44) NORA is a 44) A) profiling technology used by the EU. B) new data analysis technology that finds hidden connections between data in disparate sources. C) sentencing guideline adopted in 1987 mandating stiff sentences on business executives. D) federal privacy law protecting networked data 45) Intellectual property can best be described as 45) A) the expression of an intangible idea. B) unique creative work or ideas. C) tangible or intangible property created from a unique idea. D) intangible property created by individuals or corporations. 46) The "do anything anywhere" computing environment can 46) A) make work environments much more pleasant. B) blur the traditional boundaries between work and family time. C) centralize power at corporate headquarters. D) create economies of efficiency. 47) Re-designing and automating business processes can be seen as a double-edged sword because 47) A) support for middle-management decision making may be offset by poor data quality. B) increases in efficiency may be accompanied by poor data quality. C) increases in efficiency may be accompanied by job losses. D) reliance on technology results in the loss of hands-on knowledge. 48) The ethical rules discussed in the textbook 48) A) cannot be applied to many e-commerce situations. B) are based on political philosophies. C) cannot be guides to actions. D) do not allow for competing values.

7 49) Ben has found a way to get access to his school's grading database. He determines that he can change his own grades to a higher level without getting caught. He decides not to because he feels he needs to choose between earning a grades or a lesser value choice of stealing a grade or getting something for nothing. He will choose the higher value choice and not changing the grade. The ethical principle best described by this scenario is 49) A) the risk aversion principle B) the golden rule. C) the utilitarian principle. D) the Immanuel Kant's categorical imperative. 50) A(n) model of informed consent permits the collection of personal information until the consumer specifically requests that the data not be collected. 50) A) opt-out B) PGP C) P3P D) opt-in 51) John has found a way to get access to his school's grading database. He determines that he can change his own grades to a higher level without getting caught. He decides not to because he feels this would not be right if everyone did this so it is not right that he alone should do it. The ethical principle best described by this scenario is 51) A) the risk aversion principle B) the utilitarian principle. C) the golden rule. D) the Immanuel Kant's categorical imperative. 52) The practice of spamming has been growing because 52) A) it is good advertising practice and brings in many new customers. B) it helps pay for the Internet. C) it is so inexpensive and can reach so many people. D) telephone solicitation is no longer legal. 53) Information systems 53) A) raise ethical questions primarily related to information rights and obligations. B) raise new ethical questions. C) raise the same ethical questions created by the industrial revolution. D) pose traditional ethical situations in new manners. 54) Fred has found a way to get access to his school's grading database. He determines that he can change his own grades to a higher level but there is a chance he might get caught. He decides not to change his grade because if he gets caught he will get kicked out of school and not be able to go to college. The ethical principle best described by this scenario is 54) A) the risk aversion principle B) the Immanuel Kant's categorical imperative. C) the golden rule. D) the utilitarian principle. 55) In general, it is very difficult to hold software producers liable for their software products when those products are considered to be 55) A) services. B) part of a machine.

8 C) similar to books. D) artistic expressions. 56) Orange Computers sell software at their website. They have a policy of putting secret software on their clients computers when they install the actual software which they purchase from Orange Computers. This secret software calls out to other websites to send banner ads and other unsolicited material to the user. This secret software is. 56) A) a web bug B) spyware C) a cookie D) illegal 57) Which of the five moral dimensions of the information age does spamming raise? 57) A) information rights and obligations B) system quality C) quality of life D) accountability and control 58) The Online Privacy Alliance 58) A) protects user privacy during interactions with Web sites. B) has established technical guidelines for ensuring privacy. C) encourages self-regulation to develop a set of privacy guidelines for its members. D) is a government agency regulating the use of customer information. 59) The feature of political systems in which a body of laws is in place that permits individuals to recover the damages done to them by other actors, systems, or organizations is referred to as 59) A) responsibility. B) liability. C) due process. D) accountability. 60) Books Inc. sell books at their website. They have a policy towards their customer privacy of self-regulating. Their policy meets all the government regulation and legislation but does not involve government regulation or enforcement. The principle best described by this scenario is 60) A) safe harbor B) liability C) due process D) informed consent 61) The four key technical trends responsible for current ethical stresses related to information technology are (1) doubling of computer power every 18 months, (2) data analysis advances, (3) declining data storage costs, and (4). 61) A) increased ease in file sharing and copying B) networking advances and the Internet C) advances in wireless networking D) international standards for data protection 62) In the information age, the obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within the moral dimension of 62) A) family and home. B) quality of life. C) system quality. D) property rights and obligations. SHORT ANSWER. Write the word or phrase that best completes each statement or answers the question. 63) property is considered to be intangible property created by individuals or corporations. 63)

9 64) The model of informed consent permitting prohibiting an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use. 64) 65) Many companies what their employees are doing on the Internet to prevent them from wasting company resources on nonbusiness activities. 65) 66) The ethical principle that states Do unto others as you would have them do unto you. is the. 66) 67) A is a private, self-regulating policy and enforcement mechanism that meets the objectives of government regulators and legislation but does not involve government regulation or enforcement. 67) 68) The Platform for Privacy Preferences, known as. 68) 69) Although software bugs and facility catastrophes are likely to be widely reported in the press, by far the most common source of business system failure is. 69) 70) The now-more-efficient global marketplace has reduced the normal social buffers that permitted businesses many years to adjust to. 70) 71) services such as Napster, and later Grokster, Kazaa, and Morpheus, sprung up to help users locate and swap digital music files, including those protected by copyright. 71) 72) is permission given with knowledge of all the facts needed to make a rational decision. 72) 73) The Internet was designed to information freely around the world, including copyrighted information. 73) 74) in particular has been on the rise as bullies become more creative in their use of the Internet to humiliate their peers. 74) 75) Internet use, even for entertainment or recreational purposes, takes people away from their family and friends. 75) 76) is the commission of illegal acts through the use of a computer or against a computer system. 76) 77) has mushroomed because it costs only a few cents to send thousands of messages advertising wares to Internet users. 77) 78) The describes large disparities in access to computers and the Internet among different social groups and different locations. 78)

10 79) The liberties that individuals and organizations have with respect to data pertaining to themselves describe the moral dimension of. 79) 80) refers to the existence of laws that permit individuals to recover damages done to them by other actors, systems, or organizations. 80) 81) "If an action cannot be taken repeatedly, it is not right to take at all " describes the ethical principal of rule of change. 81) 82) Information technology has made it difficult to protect intellectual property because computerized information can be so easily copied or distributed on. 82) 83) Although some people enjoy the convenience of working at home, the do anything anywhere computing environment can blur the traditional between work and family time. 83) 84) A(n) is a tiny graphic file embedded in messages and Web pages that is designed to monitor online Internet user behaviour. 84) 85) The model prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use. 85) 86) is a statutory grant that protects creators of intellectual property from having their work copied by others for any purpose for a period of at least 50 years. 86) 87) The danger to ubiquitous computing, telecommuting, nomad computing, and the do anything anywhere computing environment is that the traditional boundaries that work from family and just plain leisure will be weakened. 87) 88) A(n) grants the owner an exclusive monopoly on the ideas behind an invention for 20 years. 88) 89) is a type of RSI in which pressure on the median nerve through the wrist s bony carpal tunnel structure produces pain. 89) 90) can be defined as consent given with knowledge of all the facts needed to make a rational decision. 90) 91) The commission of acts involving the computer that may not be illegal but are considered unethical is called. 91) 92) The role of from computer display screens in occupational disease has not been proved. 92) 93) Every Canadian province and territory has enacted parallel to the federal Privacy

11 Act and the Access to Information Act. 93) 94) extends the concept of responsibility further to the area of laws. 94) 95) refers to any eyestrain condition related to computer display screen use. 95) 96) is the use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals. 96) 97) The development of information technology will produce for many and costs for others. 97) 98) The claim to is protected in the Canadian, U.S., and German constitutions in a variety of different ways and in other countries through various statutes. 98) 99) The ethical principle called states that one should take the action that produces the least harm or incurs the least cost. 99) 100) Right now is the only province with privacy laws for the private sector that meet European Union standards. 100) 101) In Europe, privacy protection is much more than in many non-european countries. 101) 102) Accepting the potential costs, duties, and obligations for the decisions one makes is called. 102) 103) issues in information systems have been given new urgency by the rise of the Internet and electronic commerce. 103) 104) is the commission of acts involving a computer that may not be illegal but are considered unethical. 104) 105) is technology that can find obscure hidden connections between people or other entities by analyzing information from many different sources to correlate relationships. 105) 106) Copyright law in Canada is one of the principal means of protecting computer in Canada. 106) 107) The principles of right and wrong that can be used by individuals acting as free moral agents to make choices to guide their behaviour are called. 107) TRUE/FALSE. Write 'T' if the statement is true and 'F' if the statement is false. 108) One of the four key technological trends responsible for ethical stresses is networking advances and the Internet. 108)

12 109) The major ethical, social, and political issues raised by information systems include property rights and obligations. 109) 110) Ethical issues in information systems have been given new urgency by the rise of the Internet and electronic commerce. 110) 111) Most Internet businesses do very little to protect the privacy of their customers. 111) 112) P3P encrypts or scrambles or data so that it cannot be read illicitly. 112) 113) In 2000, Parliament passed the Personal Information Protection and Electronic Documents Act (PIPEDA), Canada s modern privacy law. 113) 114) Most companies in North America have computer usage policies that tell employees to use only software that has been properly leased or purchased. 114) 115) Copyright is the legal protection afforded intellectual property, such as a song, book, or video game. 115) 116) Liability extends the concept of responsibility further to the area of laws. 116) 117) Radiation from computer display screens has been proved to be a factor in CVS. 117) 118) A cookie is a small file containing information about you and your Web activities that is deposited on your hard disk by a Web site. 118) 119) Risk aversion principle states that one should take the action that produces the least harm or incurs the least cost. 119) 120) Descartes rule of change categorical imperative is a principle that states that if an action is not right for everyone to take, it is not right for anyone. 120) 121) The drawback to copyright protection is that the underlying ideas behind the work are not protected, only their manifestation in a product. 121) 122) Software piracy is bad for business. 122) 123) Right now Quebec, Ontario and Alberta are the only provinces with privacy laws for the private sector that meet European Union standards. 123) 124) Despite the passage of several laws defining and addressing computer crime, accessing a computer system without authorization is not yet a federal crime. 124) 125) The major ethical, social, and political issues raised by information systems include informed consent. 125)

13 126) The key concepts in patent law's determination of nonobviousness are originality, novelty, and value. 126) 127) Ethics are principles of right and wrong that can be used by individuals acting as free moral agents to make choices to guide their behaviour. 127) 128) Spyware is software that comes hidden in downloaded applications and can track your online movements. 128) 129) Web sites use "cookies" in order to obtain the names and addresses of their visitors. 129) 130) One of the four key technological trends responsible for ethical stresses is that computing power doubles every 18 months. 130) 131) In Europe, privacy protection is much more accommodating than in many non-european countries. 131) 132) One of the four key technological trends responsible for ethical stresses are the use of iphones. 132) 133) A safe harbour is a private, self-regulating policy and enforcement mechanism that meets the objectives of government regulators and legislation but does not involve government regulation or enforcement. 133) 134) The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called spoofing. 134) 135) The Copyright Office began registering software programs in the 1990s. 135) 136) Professionals take on special rights and obligations because of their special claims to knowledge, wisdom, and respect. 136) 137) The major ethical, social, and political issues raised by information systems include accountability and control. 137) 138) Nonobvious relationship awareness (NORA) is technology that can find obscure hidden connections between people or other entities by analyzing information from many different sources to correlate relationships. 138) 139) RSI is unavoidable for a computer keyboard worker. 139) 140) Ethical, social, and legal or political issues are not linked. 140) 141) Responsibility is a very minor element of ethical action. 141) 142) Protection for trade secrets is enforced at the federal level. 142)

14 143) The claim to privacy is protected in the Canadian, U.S., and German constitutions in a in exactly the same way and in other countries through various statutes. 143) 144) Golden Rule Ethical principle states Do unto others as you would have them do unto you. 144) 145) In today s new economic environment, managers who violate the law and are convicted will most likely spend time in prison. 145) 146) The European Parliament has passed a ban on unsolicited commercial messaging. 146) 147) Many companies monitor what their employees are doing on the Internet to prevent them from wasting company resources on nonbusiness activities. 147) 148) According to the courts, in the creation of software, unique concepts, general functional features, and even colours are protectable by copyright law. 148) 149) Technostress is a computer-related malady whose symptoms include fatigue. 149) 150) Spam is unsolicited ) 151) Advances in data storage have made routine violation of individual privacy more difficult. 151) 152) Privacy is the right to be left alone when you want to be, without surveillance or interference from other individuals or organizations. 152) ESSAY. Write your answer in the space provided or on a separate sheet of paper. 153) List and define the six ethical principles discussed in your text. 154) What do you consider to be the primary ethical, social, and political issues regarding information system quality? 155) List and describe the five moral dimensions that are involved in political, social, and ethical issues. Which do you think will be the most difficult for society to deal with? Support your opinion. 156) What is technostress? What are the best ways in which firms can protect their employees from getting technostress? 157) What are the major issues concerning privacy in the information age? Do you believe the need for a country's security should overrule some of the personal privacy and information rights we have previously taken for granted? Why or why not? 158) Discuss at least three key technology trends that raise ethical issues. Give an example of an ethical or moral impact connected to each one.

15 159) What are the steps in conducting an ethical analysis? 160) Define the basic concepts of responsibility, accountability, and liability as applied to ethical decisions. How are these concepts related? 161) What is spyware? Do you think it should be illegal? 162) How does the use of electronic voting machines act as a "double-edged sword?" What moral dimensions are raised by this use of information technology? 163) Do you believe that professional groups should be allowed to assign their own professional codes of conduct and police themselves from within? Why or why not? 164) Your workplace is considering implementing major changes in their IS infrastructures. This will cause radical change in the business processes of the firm. Many tasks and jobs will change. What would you advise you firm are the benefits and costs of considering such changes? 165) How does a cookie work?

16 1) A 2) A 3) A 4) B 5) A 6) D 7) A 8) B 9) C 10) D 11) B 12) A 13) D 14) D 15) B 16) D 17) B 18) C 19) B 20) A 21) C 22) B 23) C 24) D 25) D 26) D 27) A 28) B 29) A 30) C 31) A 32) C 33) B 34) D 35) B 36) D 37) A 38) D 39) D 40) D 41) D 42) B 43) C 44) B 45) D 46) B 47) C

17 48) C 49) C 50) A 51) D 52) C 53) B 54) A 55) C 56) B 57) C 58) C 59) B 60) A 61) B 62) B 63) Intellectual 64) opt-in 65) monitor 66) Golden Rule 67) safe harbour 68) P3P 69) data quality 70) competition 71) File sharing 72) Informed consent 73) transmit 74) Cyberbullying 75) Extensive 76) Computer crime 77) Spamming 78) digital divide 79) information rights 80) Liability 81) Descartes 82) networks 83) boundaries 84) web bug 85) opt-in 86) Copyright 87) separate 88) patent 89) (CTS) Carpal tunnel syndrome 90) Informed consent 91) computer abuse 92) radiation 93) legislation 94) Liability 95) Computer vision syndrome (CVS)

18 96) Profiling 97) benefits 98) privacy 99) the Risk Aversion Principle 100) Quebec 101) stringent 102) responsibility 103) Ethical 104) Computer abuse 105) Nonobvious relationship awareness (NORA) 106) software 107) ethics 108) TRUE 109) TRUE 110) TRUE 111) TRUE 112) FALSE 113) TRUE 114) TRUE 115) TRUE 116) TRUE 117) FALSE 118) TRUE 119) TRUE 120) FALSE 121) TRUE 122) TRUE 123) FALSE 124) FALSE 125) FALSE 126) FALSE 127) TRUE 128) TRUE 129) FALSE 130) TRUE 131) FALSE 132) FALSE 133) TRUE 134) FALSE 135) FALSE 136) TRUE 137) TRUE 138) TRUE 139) FALSE 140) FALSE 141) FALSE 142) FALSE 143) FALSE

19 144) TRUE 145) FALSE 146) TRUE 147) TRUE 148) FALSE 149) TRUE 150) TRUE 151) FALSE 152) TRUE 153) The six ethical principles are the Golden Rule, Kant's Categorical Imperative, Descartes' rule of change (slippery slope), the Utilitarian Principle, the Risk Aversion Principle, and the "no free lunch" rule. The Golden Rule proposes: do unto others as you would have them do unto you. Immanuel Kant's Categorical Imperative proposes, if an action is not right for everyone to take, it is not right for anyone. Descartes' rule of change says: If an action cannot be taken repeatedly, it is not right to take at all. The Utilitarian Principle is: Take the action that achieves the higher or greater value. The Risk Aversion Principle is: Take the action that produces the least harm or the least potential cost. The ethical no free lunch rule says: Assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise.tangible objects are owned by someone else unless there is a specific declaration otherwise. 154) The central quality-related ethical issue that information systems raise is at what point should I release software or services for consumption by others? At what point can I conclude that my software or service achieves an economically and technologically adequate level of quality? What am I obligated to know about the quality of my software, its procedures for testing, and its operational characteristics? The leading quality-related social issue deals with expectations: As a society, do we want to encourage people to believe that systems are infallible, that data errors are impossible? By heightening awareness of system failure, do we inhibit the development of all systems, which in the end contribute to social well-being? The leading quality-related political issue concerns the laws of responsibility and accountability, what they should be, and how they should be applied. 155) The five moral dimensions are: 1. Information rights and obligations. What rights do individuals and organizations have with respect to information pertaining to them? 2. Property rights. How can intellectual property rights be protected when it is so easy to copy digital materials? 3. Accountability and control. Who will be held accountable and liable for the harm done to individual and collective information and property rights? 4. System quality. What standards of data and system quality should we demand to protect individual rights and the safety of society? 5. Quality of life. What values should be preserved? What institutions must we protect? What cultural values can be harmed? Individual answers for determining the most difficult for society to deal with will vary. One answer might be: Quality of life issues will be most difficult for society to deal with in societies that are comprised of many different cultural and ethnic groups, such as the United States. It is difficult to regulate concerns that are based on subjective values. 156) You will get various answers of ways in which to combat technostress. Technostress is stress induced by computer use; symptoms include aggravation, hostility toward humans, impatience, and enervation

20 Perhaps firms first need to recognize the problems caused by technostress. Firms then should put policies in place which reduce the technostress such as job rotation, mandatory breaks, rules for maxim time on computer in a week etc 157) One answer might be that we should depend upon the Fair Information Practice Principles and that as long as these principles are not ignored or overset, personal privacy does not conflict with homeland security. This is a weak argument. Other issues involve online privacy, employee monitoring, tradeoffs between security and privacy and good business results versus privacy. 158) Key technology trends include the following: (1) Computer power doubling every 18 months: ethical impact - because more organizations depend on computer systems for critical operations, these systems are vulnerable to computer crime and computer abuse; (2) Data storage costs are rapidly declining: ethical impact - it is easy to maintain detailed databases on individuals -- who has access to and control of these databases?; (3) Data analysis advances: ethical impact - vast databases full of individual information may be used to develop detailed profiles of individual behaviour; and (5) Networking advances and the Internet: ethical impact - it is easy to copy data from one location to another. Who owns data? How can ownership be protected? 159) The steps are: (1) Identify and describe clearly the facts; (2) define the conflict or dilemma and identify the higher-order values involved; (3) identify the stakeholders; (4) identify the options that you can reasonably take; and (5) identify the potential consequences of your options. 160) Responsibility is the first key element of ethical action. Responsibility means that an individual, group, or organization accepts the potential costs, duties, and obligations for decisions made. Accountability is a feature of systems and social institutions. It means that mechanisms are in place to determine who took responsible action; i.e., who is responsible for the action. Liability is a feature of political systems in which a body of law is in place that permits individuals to recover the damages done to them by others. These concepts are related as follows: I will assume the blame or benefit for the actions I take (responsibility); this blam or benefit accrues to me through the requirement that I be able to explain why I have taken the actions I have (accountability) for actions traceable to me by defined mechanisms in the organization, and if those actions result in ha to another, I will be held by law to reparations for those actions (liability). 161) Spyware is a technology that aids in gathering information about a person or organization without their knowledge. Should it be illegal -- you will get various answers for this questions. Some may feel that it is a legitimate business model for companies to collect information to better serve their customers or to lower the price of another product in which spyware is bundled. Others may feel that it is a total invasion of privacy and has the strong potential to be used for nefarious purposes. 162) Electronic voting machines can be seen as beneficial by making voting easy to accomplish and tabulate. However, it may be easier to tamper with electronic voting machines than with countable paper ballots. In terms of information rights, it seems possible that methods could be set up to determine how an individual has voted and to store and disseminate this knowledge. Manufacturers of voting machines claim property rights to the voting software, which means that if the software is protected from inspection, there is no regulation in how the software operates or how accurate it is. In terms of accountability and control, if an electronic voting system malfunctions, will it be the responsibility of the government, of the company manufacturing the machines or software, or the programmers who programmed the software? The dimension of system quality raises questions of how the level of accuracy of the machines is to be judged and what level is acceptable? In terms of quality of life, while it may make voting easier and quicker, does the vulnerability to abuse of these systems pose a threat to the democratic principle of one person, one vote?

21 163) This is an opinion question, but anyone who aspires to management will consider himself or herself a professional and will need to have a clear understanding as to how he or she feels about this matter. With the recent scandals in large business firms, which have devastated our economy, there is likely to be a cry for legally sanctioned codes and outside regulatory agencies. 164) Re-engineering work is typically hailed in the information systems community as a major benefit of new information technology. It is much less frequently noted that redesigning business processes could potentially cause middle-level managers and clerical workers to lose their jobs. One economist has raised the possibility that we will create a society run by a small high tech elite of corporate professionals... in a nation of the permanently unemployed. Other economists are much more sanguine about the potential job losses. They believe relieving bright, educated workers from re-engineered jobs will result in these workers moving to better jobs in fast-growth industries. Missing from this equation are unskilled, blue-collar workers and older, less well-educated middle managers. It is not clear that these groups can be retrained easily for high-quality (highpaying) jobs. Careful planning and sensitivity to employee needs can help companies redesign work to minimize job losses. 165) A cookie works as follows: A user opens a Web browser and selects a site to visit. The user's computer sends a request for information to the computer running at the Web site. The Web site computer is called the server, since it allows the user's computer to display the Web site. At the same time it sends a cookie a data file containing information like an encrypted user ID and information about when the user visited and what he did on the site. The user's computer receives the cookie and places it in a file on the hard drive. Whenever the user goes back to the Web site, the server running the site retrieves the cookie to help identify the user.

2) Software piracy is bad for business. 2) Answer: True False

2) Software piracy is bad for business. 2) Answer: True False Exam Name TRUE/FALSE. Write 'T' if the statement is true and 'F' if the statement is false. 1) Advances in data storage have made routine violation of individual privacy more difficult. 1) 2) Software

More information

Chapter 4. L&L 12ed Global Ed ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS. Information systems and ethics

Chapter 4. L&L 12ed Global Ed ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS. Information systems and ethics MANAGING THE DIGITAL FIRM, 12 TH EDITION, GLOBAL EDITION Chapter 4 ETHICAL AND SOCIAL ISSUES IN Learning Objectives What ethical, social, and political issues are raised by information systems? What specific

More information

Management Information Systems MANAGING THE DIGITAL FIRM, 12 TH EDITION. Chapter 4 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS

Management Information Systems MANAGING THE DIGITAL FIRM, 12 TH EDITION. Chapter 4 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS MANAGING THE DIGITAL FIRM, 12 TH EDITION Chapter 4 ETHICAL AND SOCIAL ISSUES IN Learning Objectives What ethical, social, and political issues are raised by information systems? What specific principles

More information

Ethical and social aspects of management information systems

Ethical and social aspects of management information systems Ethical and social aspects of management Marcos Sanches Commerce Électronique The challenge Why are contemporary and the Internet a challenge for the protection of privacy and intellectual property? How

More information

Chapter 4 INFORMATION SYSTEMS

Chapter 4 INFORMATION SYSTEMS Chapter 4 MANAGING THE DIGITAL FIRM, 12 TH EDITION ETHICAL AND SOCIAL ISSUES IN VIDEO CASES Case 1: Big Brother is Copying Everything on the Internet Case 2: Delete: The Virtue of Forgetting in a Digital

More information

Managing Information Systems Seventh Canadian Edition. Laudon, Laudon and Brabston. CHAPTER 4 Social, Ethical, and Legal Issues in the Digital Firm

Managing Information Systems Seventh Canadian Edition. Laudon, Laudon and Brabston. CHAPTER 4 Social, Ethical, and Legal Issues in the Digital Firm Managing Information Systems Seventh Canadian Edition Laudon, Laudon and Brabston CHAPTER 4 Social, Ethical, and Legal Issues in the Digital Firm 4-1 Online activity is tracked and ads are displayed depending

More information

MANAGEMENT INFORMATION SYSTEMS. Chapter 4 Ethical and Social Issues in Information Systems

MANAGEMENT INFORMATION SYSTEMS. Chapter 4 Ethical and Social Issues in Information Systems MANAGEMENT INFORMATION SYSTEMS Chapter 4 Ethical and Social Issues in Information Systems Mohammad Najjar, PhD, MBA, BSc Operations & Supply Chain Management Learning Objectives 1. Identify ethical, social

More information

Digital Citizenship Continuum

Digital Citizenship Continuum Digital Citizenship Continuum -curricular Competencies (Develop Thinking, Develop Identity and Interdependence, Develop Literacies, and Develop Social Responsibility) support student achievement and the

More information

MISSISSAUGA LIBRARY COLLECTION POLICY (Revised June 10, 2015, Approved by the Board June 17, 2015)

MISSISSAUGA LIBRARY COLLECTION POLICY (Revised June 10, 2015, Approved by the Board June 17, 2015) MISSISSAUGA LIBRARY COLLECTION POLICY (Revised June 10, 2015, Approved by the Board June 17, 2015) PURPOSE To provide library customers and staff with a statement of philosophy and the key objectives respecting

More information

Personal Data Protection Competency Framework for School Students. Intended to help Educators

Personal Data Protection Competency Framework for School Students. Intended to help Educators Conférence INTERNATIONAL internationale CONFERENCE des OF PRIVACY commissaires AND DATA à la protection PROTECTION des données COMMISSIONERS et à la vie privée Personal Data Protection Competency Framework

More information

Academic Vocabulary Test 1:

Academic Vocabulary Test 1: Academic Vocabulary Test 1: How Well Do You Know the 1st Half of the AWL? Take this academic vocabulary test to see how well you have learned the vocabulary from the Academic Word List that has been practiced

More information

POLICY PHILOSOPHY DEFINITIONS AC.2.11 INTELLECTUAL PROPERTY. Programs and Curriculum. APPROVED: Chair, on Behalf of SAIT s Board of Governors

POLICY PHILOSOPHY DEFINITIONS AC.2.11 INTELLECTUAL PROPERTY. Programs and Curriculum. APPROVED: Chair, on Behalf of SAIT s Board of Governors Section: Subject: Academic/Student (AC) Programs and Curriculum AC.2.11 INTELLECTUAL PROPERTY Legislation: Copyright Act (R.S.C., 1985, c.c-42); Patent Act (R.S.C., 1985, c.p-4); Trade-marks Act (R.S.C.

More information

CSI Professional Practice In Computer Science. Ethical, social, and professional aspects of the modern computing technology.

CSI Professional Practice In Computer Science. Ethical, social, and professional aspects of the modern computing technology. CSI 2911 Professional Practice In Computer Science Ethical, social, and professional aspects of the modern computing technology Stan Matwin Jan. Apr. 2012 1 Introduction Why this class? Textbook, other

More information

Patents. What is a patent? What is the United States Patent and Trademark Office (USPTO)? What types of patents are available in the United States?

Patents. What is a patent? What is the United States Patent and Trademark Office (USPTO)? What types of patents are available in the United States? What is a patent? A patent is a government-granted right to exclude others from making, using, selling, or offering for sale the invention claimed in the patent. In return for that right, the patent must

More information

Intellectual Property Ownership and Disposition Policy

Intellectual Property Ownership and Disposition Policy Intellectual Property Ownership and Disposition Policy PURPOSE: To provide a policy governing the ownership of intellectual property and associated University employee responsibilities. I. INTRODUCTION

More information

VALLIAMMAI ENGINEERING COLLEGE

VALLIAMMAI ENGINEERING COLLEGE VALLIAMMAI ENGINEERING COLLEGE SRM Nagar, Kattankulathur 603 203 DEPARTMENT OF COMPUTER APPLICATIONS QUESTION BANK III SEMESTER MC7304 PROFESSIONAL ETHICS Regulation 2013 Academic Year 2017 18 Prepared

More information

Trade Secret Protection of Inventions

Trade Secret Protection of Inventions Trade Secret Protection of Inventions Phil Marcoux & Kevin Roe Inventions - Trade Secret or Patent? Theft by employees, executives, partners Theft by contract Note - this class does not create an attorney-client

More information

Tip. Getting on the same page. More topics - my favorites. Basic CSC 300 Issue List. Readings - make sure you keep up General Ethical concepts

Tip. Getting on the same page. More topics - my favorites. Basic CSC 300 Issue List. Readings - make sure you keep up General Ethical concepts Getting on the same page Readings - make sure you keep up General Ethical concepts do a little research, read Johnson chapter SE Code of Ethics reading (pop quiz) Paper proposal coming up! What is the

More information

Getting on the same page

Getting on the same page Getting on the same page Readings - make sure you keep up General Ethical concepts do a little research, read Johnson chapter SE Code of Ethics reading (pop quiz) Paper proposal coming up! What is the

More information

ETHICS AND THE INFORMATION SYSTEMS DEVELOPMENT PROFESSIONAL: ETHICS AND THE INFORMATION SYSTEMS DEVELOPMENT PROFESSIONAL: BRIDGING THE GAP

ETHICS AND THE INFORMATION SYSTEMS DEVELOPMENT PROFESSIONAL: ETHICS AND THE INFORMATION SYSTEMS DEVELOPMENT PROFESSIONAL: BRIDGING THE GAP Association for Information Systems AIS Electronic Library (AISeL) MWAIS 2007 Proceedings Midwest (MWAIS) December 2007 ETHICS AND THE INFORMATION SYSTEMS DEVELOPMENT PROFESSIONAL: ETHICS AND THE INFORMATION

More information

A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology (Fourth edition) by Sara Baase. Term Paper Sample Topics

A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology (Fourth edition) by Sara Baase. Term Paper Sample Topics A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology (Fourth edition) by Sara Baase Term Paper Sample Topics Your topic does not have to come from this list. These are suggestions.

More information

To Patent or Not to Patent

To Patent or Not to Patent Mary Juetten, CEO Traklight February 23, 2013 To Patent or Not to Patent Top Intellectual Property (IP) Question: Do I always need a patent for my business idea? The quick answer is no, not always. But

More information

AN OVERVIEW OF THE UNITED STATES PATENT SYSTEM

AN OVERVIEW OF THE UNITED STATES PATENT SYSTEM AN OVERVIEW OF THE UNITED STATES PATENT SYSTEM (Note: Significant changes in United States patent law were brought about by legislation signed into law by the President on December 8, 1994. The purpose

More information

Technology Transfer and Intellectual Property Best Practices

Technology Transfer and Intellectual Property Best Practices Technology Transfer and Intellectual Property Best Practices William W. Aylor M.S., J.D. Director, Technology Transfer Office Registered Patent Attorney Presentation Outline I. The Technology Transfer

More information

Computer and Information Ethics

Computer and Information Ethics Computer and Information Ethics Instructor: Viola Schiaffonati May,4 th 2015 Ethics (dictionary definition) 2 Moral principles that govern a person's behavior or the conducting of an activity The branch

More information

Legal Notice: The Author and Publisher assume no responsibility or liability whatsoever on the behalf of any Purchaser or Reader of these materials.

Legal Notice: The Author and Publisher assume no responsibility or liability whatsoever on the behalf of any Purchaser or Reader of these materials. BACK DOOR SUPPLIERS Legal Notice: While all attempts have been made to verify information provided in this publication,neither the Author nor the Publisher assumes any responsibility for errors, omissions,

More information

EL PASO COMMUNITY COLLEGE PROCEDURE

EL PASO COMMUNITY COLLEGE PROCEDURE For information, contact Institutional Effectiveness: (915) 831-6740 EL PASO COMMUNITY COLLEGE PROCEDURE 2.03.06.10 Intellectual Property APPROVED: March 10, 1988 REVISED: May 3, 2013 Year of last review:

More information

Privacy and Security in an On Demand World

Privacy and Security in an On Demand World Privacy and Security in an On Demand World Harriet Pearson, V.P. Workforce & Chief Privacy Officer IBM Corporation Almaden Institute Symposium on Privacy April 9, 2003 2002 IBM Corporation Outline Where

More information

ICC POSITION ON LEGITIMATE INTERESTS

ICC POSITION ON LEGITIMATE INTERESTS ICC POSITION ON LEGITIMATE INTERESTS POLICY STATEMENT Prepared by the ICC Commission on the Digital Economy Summary and highlights This statement outlines the International Chamber of Commerce s (ICC)

More information

Dr. Biswajit Dhar Professor, Jawaharlal Nehru University, India and Member DA9 Advisory Board

Dr. Biswajit Dhar Professor, Jawaharlal Nehru University, India and Member DA9 Advisory Board Dr. Biswajit Dhar Professor, Jawaharlal Nehru University, India and Member DA9 Advisory Board Intellectual Property Rights in Preferential Trade Agreements Many Preferential Trade Agreements (PTAs) adopted

More information

A PERSPECTIVE IN COMPUTER ETHICS. Pattarasinee Bhattarakosol 1. Abstract. Introduction. What is computer ethics?

A PERSPECTIVE IN COMPUTER ETHICS. Pattarasinee Bhattarakosol 1. Abstract. Introduction. What is computer ethics? A PERSPECTIVE IN COMPUTER ETHICS Pattarasinee Bhattarakosol 1 Abstract Since computers are counted as a part of life, the issue of computer-related ethics has been considered seriously. Although there

More information

Answer to Community Patent Consultation To:

Answer to Community Patent Consultation To: MRS Broadcasting AB Box 3091 SE-161 03 BROMMA STOCKHOLM SWEDEN http://www.mrs.net info@mrs.net tel +468 371400 fax +468 371700 MRS (music radio service) Broadcasting AB is a broadcast consulting company

More information

Identifying and Managing Joint Inventions

Identifying and Managing Joint Inventions Page 1, is a licensing manager at the Wisconsin Alumni Research Foundation in Madison, Wisconsin. Introduction Joint inventorship is defined by patent law and occurs when the outcome of a collaborative

More information

Slide 15 The "social contract" implicit in the patent system

Slide 15 The social contract implicit in the patent system Slide 15 The "social contract" implicit in the patent system Patents are sometimes considered as a contract between the inventor and society. The inventor is interested in benefiting (personally) from

More information

Intellectual Property Rights in the Academic and Research Environment

Intellectual Property Rights in the Academic and Research Environment Intellectual Property Rights in the Academic and Research Environment Roger Elliott * Introduction The concept of intellectual property rights, which in the academic and research context are mainly concerned

More information

The Role of the Intellectual Property Office

The Role of the Intellectual Property Office The Role of the Intellectual Property Office Intellectual Property Office is an operating name of the Patent Office The Hargreaves Review In 2011, Professor Ian Hargreaves published his review of intellectual

More information

Comments of the AMERICAN INTELLECTUAL PROPERTY LAW ASSOCIATION. Regarding

Comments of the AMERICAN INTELLECTUAL PROPERTY LAW ASSOCIATION. Regarding Comments of the AMERICAN INTELLECTUAL PROPERTY LAW ASSOCIATION Regarding THE ISSUES PAPER OF THE AUSTRALIAN ADVISORY COUNCIL ON INTELLECTUAL PROPERTY CONCERNING THE PATENTING OF BUSINESS SYSTEMS ISSUED

More information

CS 4984 Software Patents

CS 4984 Software Patents CS 4984 Software Patents Ross Dannenberg Rdannenberg@bannerwitcoff.com (202) 824-3153 Patents I 1 How do you protect software? Copyrights Patents Trademarks Trade Secrets Contract Technology (encryption)

More information

Computer Ethics. Dr. Aiman El-Maleh. King Fahd University of Petroleum & Minerals Computer Engineering Department COE 390 Seminar Term 062

Computer Ethics. Dr. Aiman El-Maleh. King Fahd University of Petroleum & Minerals Computer Engineering Department COE 390 Seminar Term 062 Computer Ethics Dr. Aiman El-Maleh King Fahd University of Petroleum & Minerals Computer Engineering Department COE 390 Seminar Term 062 Outline What are ethics? Professional ethics Engineering ethics

More information

Leveraging Intellectual Property for Success

Leveraging Intellectual Property for Success Leveraging Intellectual Property for Success Mark Radtke Assistant Regional Director Rocky Mountain Regional Office April 16 th, 2018 USPTO Locations The USPTO in FY17 12,588 Employees Patents Trademarks

More information

Chapter 4. Ethical and Social Issues in Information Systems. After completing this chapter, students should be able to answer the following questions:

Chapter 4. Ethical and Social Issues in Information Systems. After completing this chapter, students should be able to answer the following questions: Chapter 4 Ethical and Social Issues in Information Systems After completing this chapter, students should be able to answer the following questions: What ethical, social, and political issues are raised

More information

Paola Bailey, PsyD Licensed Clinical Psychologist PSY# 25263

Paola Bailey, PsyD Licensed Clinical Psychologist PSY# 25263 NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW IT CAREFULLY. Privacy is a very

More information

Notice of Privacy Practices

Notice of Privacy Practices Notice of Privacy Practices THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW IT CAREFULLY. Privacy is a very

More information

Commonwealth Data Forum. Giovanni Buttarelli

Commonwealth Data Forum. Giovanni Buttarelli 21 February 2018 Commonwealth Data Forum Giovanni Buttarelli Thank you, Michael, for your kind introduction. Thank you also to the Commonwealth Telecommunications Organisation and the Government of Gibraltar

More information

This research is supported by the TechPlan program funded by the ITS Institute at the University of Minnesota

This research is supported by the TechPlan program funded by the ITS Institute at the University of Minnesota Frank Douma, Assistant Director,! Sarah Aue, Research Assistant! State and Local Policy Program! Humphrey Institute of Public Affairs! University of Minnesota! This research is supported by the TechPlan

More information

Professional guide for any online marketing business

Professional guide for any online marketing business 24/7 Direct Referrals on Auto-Pilot Professional guide for any online marketing business LEGAL DISCLAIMER The Publisher has strive to be as accurate and complete as possible in the creation of this report,

More information

International IP. Prof. Eric E. Johnson. General Principles

International IP. Prof. Eric E. Johnson. General Principles International IP Prof. Eric E. Johnson ericejohnson.com General Principles territoriality Dependence, independence, central attack Procedural harmonization Substantive agreements National treatment Minima

More information

BARRIE PUBLIC LIBRARY COLLECTION DEVELOPMENT POLICY MOTION #16-34 Revised June 23, 2016

BARRIE PUBLIC LIBRARY COLLECTION DEVELOPMENT POLICY MOTION #16-34 Revised June 23, 2016 TABLE OF CONTENTS 1. PURPOSE OF THE POLICY... 2 2. RESPONSIBILITIES... 2 3. GENERAL PRINCIPLES OF SELECTION... 2 4. SPECIAL COLLECTIONS... 6 5. DONATIONS OF MATERIALS... 7 6. COLLECTION MAINTENANCE...

More information

Codes & Creativity 3-4 February 2005, UNESCO Chris Kabwato, Highway Africa

Codes & Creativity 3-4 February 2005, UNESCO Chris Kabwato, Highway Africa Freedom of Expression in Cyberspace Codes & Creativity 3-4 February 2005, UNESCO Chris Kabwato, Highway Africa www.highwayafrica.ru.ac.za Acknowledgements Lawrence Lessig, Free Culture Joost Smiers, Arts

More information

INTELLECTUAL PROPERTY (IP) SME SCOREBOARD 2016

INTELLECTUAL PROPERTY (IP) SME SCOREBOARD 2016 www.euipo.europa.eu INTELLECTUAL PROPERTY (IP) SME SCOREBOARD 2016 Executive Summary JUNE 2016 www.euipo.europa.eu INTELLECTUAL PROPERTY (IP) SME SCOREBOARD 2016 Commissioned to GfK Belgium by the European

More information

INTELLECTUAL PROPERTY (IP) SME SCOREBOARD 2016

INTELLECTUAL PROPERTY (IP) SME SCOREBOARD 2016 www.euipo.europa.eu INTELLECTUAL PROPERTY (IP) SME SCOREBOARD 2016 Executive Summary JUNE 2016 www.euipo.europa.eu INTELLECTUAL PROPERTY (IP) SME SCOREBOARD 2016 Commissioned to GfK Belgium by the European

More information

Utility Patents. New and useful inventions and configurations of useful articles

Utility Patents. New and useful inventions and configurations of useful articles COMPARATIVE INTELLECTUAL PROPERTY LAW CHART (Except as otherwise indicated, citations refer to U.S. Federal Law) (Intellectual Property Advisory No. 4) Intellectual Property has become important to many

More information

Questions for the public consultation Europeana next steps

Questions for the public consultation Europeana next steps Questions for the public consultation Europeana next steps November 13, 2009 The International Federation of Film Distributors Associations gathers the national organisations of film distribution companies.

More information

SF Certified International Shipping Customer Agreement V1.0

SF Certified International Shipping Customer Agreement V1.0 SF Certified International Shipping Customer Agreement V1.0 SF Certified International Shipping (further referred as SF CIS ) is a service provided by S.F. Express Co., Ltd. (further referred as SF ) to

More information

THE UNIVERSITY OF AUCKLAND INTELLECTUAL PROPERTY CREATED BY STAFF AND STUDENTS POLICY Organisation & Governance

THE UNIVERSITY OF AUCKLAND INTELLECTUAL PROPERTY CREATED BY STAFF AND STUDENTS POLICY Organisation & Governance THE UNIVERSITY OF AUCKLAND INTELLECTUAL PROPERTY CREATED BY STAFF AND STUDENTS POLICY Organisation & Governance 1. INTRODUCTION AND OBJECTIVES 1.1 This policy seeks to establish a framework for managing

More information

Ethics, privacy and legal issues concerning GIS. This is lecture 12

Ethics, privacy and legal issues concerning GIS. This is lecture 12 Ethics, privacy and legal issues concerning GIS This is lecture 12 New technologies; new laws Any new technology brings with it a set of previously unencountered ethical problems. E.g. printing press;

More information

DRAFT REPORT. EN United in diversity EN. European Parliament 2017/2007(INI)

DRAFT REPORT. EN United in diversity EN. European Parliament 2017/2007(INI) European Parliament 2014-2019 Committee on Legal Affairs 2017/2007(INI) 22.2.2018 DRAFT REPORT on three-dimensional printing, a challenge in the fields of intellectual property rights and civil liability

More information

the Companies and Intellectual Property Commission of South Africa (CIPC)

the Companies and Intellectual Property Commission of South Africa (CIPC) organized by the Companies and Intellectual Property Commission of South Africa (CIPC) the World Intellectual Property Organization (WIPO) the International Criminal Police Organization (INTERPOL) the

More information

How To Make Money With CPALead

How To Make Money With CPALead By (melek.taus@yahoo.com) This free ebook has been downloaded from: http://easy-cpalead-money.blogspot.com/p/download.html If you already registered to CPALead please take the time to complete a two minutes

More information

My name is Carsten Wald, I am freelancer in software developement and I would like to answer to your questions.

My name is Carsten Wald, I am freelancer in software developement and I would like to answer to your questions. Dear Ladies and Gentlemen, My name is Carsten Wald, I am freelancer in software developement and I would like to answer to your questions. 1.1 Do you agree that these are the basic features required of

More information

Whatever Happened to the. Fair Information Practices?

Whatever Happened to the. Fair Information Practices? Whatever Happened to the Fair Information Practices? Beth Givens Director Privacy Rights Clearinghouse Privacy Symposium August 22, 2007 Cambridge, MA Topics Definition and origins of FIPs Overview of

More information

California State University, Northridge Policy Statement on Inventions and Patents

California State University, Northridge Policy Statement on Inventions and Patents Approved by Research and Grants Committee April 20, 2001 Recommended for Adoption by Faculty Senate Executive Committee May 17, 2001 Revised to incorporate friendly amendments from Faculty Senate, September

More information

UW REGULATION Patents and Copyrights

UW REGULATION Patents and Copyrights UW REGULATION 3-641 Patents and Copyrights I. GENERAL INFORMATION The Vice President for Research and Economic Development is the University of Wyoming officer responsible for articulating policy and procedures

More information

Position Paper: Ethical, Legal and Socio-economic Issues in Robotics

Position Paper: Ethical, Legal and Socio-economic Issues in Robotics Position Paper: Ethical, Legal and Socio-economic Issues in Robotics eurobotics topics group on ethical, legal and socioeconomic issues (ELS) http://www.pt-ai.org/tg-els/ 23.03.2017 (vs. 1: 20.03.17) Version

More information

Chapter 8. Technology and Growth

Chapter 8. Technology and Growth Chapter 8 Technology and Growth The proximate causes Physical capital Population growth fertility mortality Human capital Health Education Productivity Technology Efficiency International trade 2 Plan

More information

UNITED NATIONS EDUCATIONAL, SCIENTIFIC AND CULTURAL ORGANIZATION

UNITED NATIONS EDUCATIONAL, SCIENTIFIC AND CULTURAL ORGANIZATION UNITED NATIONS EDUCATIONAL, SCIENTIFIC AND CULTURAL ORGANIZATION Teleconference Presentation On the occasion of the Joint ITU-AICTO workshop Interoperability of IPTV in the Arab Region Dubai, United Arab

More information

Pickens Savings and Loan Association, F.A. Online Banking Agreement

Pickens Savings and Loan Association, F.A. Online Banking Agreement Pickens Savings and Loan Association, F.A. Online Banking Agreement INTERNET BANKING TERMS AND CONDITIONS AGREEMENT This Agreement describes your rights and obligations as a user of the Online Banking

More information

I m sorry, my friend, but you re implicit in the algorithm Privacy and internal access to #BigDataStream

I m sorry, my friend, but you re implicit in the algorithm Privacy and internal access to #BigDataStream I m sorry, my friend, but you re implicit in the algorithm Privacy and internal access to #BigDataStream An interview with Giovanni Buttarelli, European Data Protection Supervisor by Roberto Zangrandi

More information

POLICY ON INVENTIONS AND SOFTWARE

POLICY ON INVENTIONS AND SOFTWARE POLICY ON INVENTIONS AND SOFTWARE History: Approved: Senate April 20, 2017 Minute IIB2 Board of Governors May 27, 2017 Minute 16.1 Full legislative history appears at the end of this document. SECTION

More information

GENERAL PRINCIPLES OF INTERNET GOVERNANCE

GENERAL PRINCIPLES OF INTERNET GOVERNANCE GENERAL PRINCIPLES OF INTERNET GOVERNANCE PROPOSAL OF THE FRENCH GOVERNMENT INTRODUCTION: THE VALUES OF THE INFORMATION SOCIETY The network has become a part of every nation s wealth and one of its most

More information

UNESCO and Juventus Photo Contest CONTEST RULES

UNESCO and Juventus Photo Contest CONTEST RULES UNESCO and Juventus Photo Contest CONTEST RULES Article 1: ORGANIZATION UNESCO through its Headquarters in Paris, France (hereinafter "the Organizer"), is organizing a free-of-charge photo contest on the

More information

The Case for ISO27001:2013

The Case for ISO27001:2013 The Case for ISO27001:2013 Second edition ALAN CALDER Every possible effort has been made to ensure that the information contained in this book is accurate at the time of going to press, and the publisher

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Privacy framework

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Privacy framework INTERNATIONAL STANDARD ISO/IEC 29100 First edition 2011-12-15 Information technology Security techniques Privacy framework Technologies de l'information Techniques de sécurité Cadre privé Reference number

More information

MEDICINE LICENSE TO PUBLISH

MEDICINE LICENSE TO PUBLISH MEDICINE LICENSE TO PUBLISH This LICENSE TO PUBLISH (this License ), dated as of: DATE (the Effective Date ), is executed by the corresponding author listed on Schedule A (the Author ) to grant a license

More information

Patentability of Computer-Implemented Inventions in the field of Computer Security

Patentability of Computer-Implemented Inventions in the field of Computer Security Patentability of Computer-Implemented Inventions in the field of Computer Security Erik Veillas Patent Examiner, Cluster Computers European Patent Office TU München Munich, 21 June 2011 Acknowledgments

More information

USTR NEWS UNITED STATES TRADE REPRESENTATIVE. Washington, D.C UNITED STATES MEXICO TRADE FACT SHEET

USTR NEWS UNITED STATES TRADE REPRESENTATIVE.   Washington, D.C UNITED STATES MEXICO TRADE FACT SHEET USTR NEWS UNITED STATES TRADE REPRESENTATIVE www.ustr.gov Washington, D.C. 20508 202-395-3230 FOR IMMEDIATE RELEASE August 27, 2018 Contact: USTR Public & Media Affairs media@ustr.eop.gov UNITED STATES

More information

Telecommunication Policy, 2060 (2004)

Telecommunication Policy, 2060 (2004) Telecommunication Policy, 2060 (2004) 1. Background Even though policies undertaken after the restoration of the Multi Party Democracy in Nepal appear to have moved forward the right direction, it is not

More information

Langdon Winner: Frankenstein s Problem and Technology as Legislation

Langdon Winner: Frankenstein s Problem and Technology as Legislation Langdon Winner: Frankenstein s Problem and Technology as Legislation Langdon Winner Political theorist at Rensselaer Polytechnic Institute Best-known books: Autonomous Technology: Technics Out-of-Control

More information

Christina Narensky, Psy.D.

Christina Narensky, Psy.D. Christina Narensky, Psy.D. License # PSY 25930 2515 Santa Clara Ave., Ste. 207 Alameda, CA 94501 Phone: Fax: 510.229.4018 E-Mail: Dr.ChristinaNarensky@gmail.com Web: www.drchristinanarensky.com Notice

More information

b. Who invented it? Quinn credits Jeremy Bentham and John Stuart Mill with inventing the theory of utilitarianism. (see p. 75, Quinn).

b. Who invented it? Quinn credits Jeremy Bentham and John Stuart Mill with inventing the theory of utilitarianism. (see p. 75, Quinn). CS285L Practice Midterm Exam, F12 NAME: Holly Student Closed book. Show all work on these pages, using backs of pages if needed. Total points = 100, equally divided among numbered problems. 1. Consider

More information

The ALA and ARL Position on Access and Digital Preservation: A Response to the Section 108 Study Group

The ALA and ARL Position on Access and Digital Preservation: A Response to the Section 108 Study Group The ALA and ARL Position on Access and Digital Preservation: A Response to the Section 108 Study Group Introduction In response to issues raised by initiatives such as the National Digital Information

More information

Report on the impact of the convergence of telecommunication, broadcasting and information technologies

Report on the impact of the convergence of telecommunication, broadcasting and information technologies International Telecommunication Union QUESTION 10-1/1 Impact of the convergence of telecommunication, broadcasting and information technologies ITU-D STUDY GROUP 1 3rd STUDY PERIOD (2002-2006) Report on

More information

Towards a Magna Carta for Data

Towards a Magna Carta for Data Towards a Magna Carta for Data Expert Opinion Piece: Engineering and Computer Science Committee February 2017 Expert Opinion Piece: Engineering and Computer Science Committee Context Big Data is a frontier

More information

Committee on Legal Affairs WORKING DOCUMENT

Committee on Legal Affairs WORKING DOCUMENT European Parliament 2014-2019 Committee on Legal Affairs 23.11.2017 WORKING DOCUMT on three-dimensional printing, a challenge in the fields of intellectual property rights and civil liability Committee

More information

AN OVERVIEW OF THE UNITED STATES PATENT SYSTEM

AN OVERVIEW OF THE UNITED STATES PATENT SYSTEM AN OVERVIEW OF THE UNITED STATES PATENT SYSTEM Significant changes in the United States patent law were brought about by legislation signed into law on September 16, 2011. The major change under the Leahy-Smith

More information

BUREAU OF LAND MANAGEMENT INFORMATION QUALITY GUIDELINES

BUREAU OF LAND MANAGEMENT INFORMATION QUALITY GUIDELINES BUREAU OF LAND MANAGEMENT INFORMATION QUALITY GUIDELINES Draft Guidelines for Ensuring and Maximizing the Quality, Objectivity, Utility, and Integrity of Information Disseminated by the Bureau of Land

More information

An Essential Health and Biomedical R&D Treaty

An Essential Health and Biomedical R&D Treaty An Essential Health and Biomedical R&D Treaty Submission by Health Action International Global, Initiative for Health & Equity in Society, Knowledge Ecology International, Médecins Sans Frontières, Third

More information

Distributive Justice Nozick

Distributive Justice Nozick 1. Wilt Chamberlain: Consider this story: Distributive Justice Nozick Wilt Chamberlain: There is a society that is currently in a perfectly just state. In that society, Wilt Chamberlain is a very talented

More information

Data Acquisition, Management, Sharing and Ownership

Data Acquisition, Management, Sharing and Ownership Data Acquisition, Management, Sharing and Ownership University of Ibadan MEPI-J program 1 What are data? Research Data are ".. the recorded factual material commonly accepted in the scientific community

More information

IAB Europe Guidance THE DEFINITION OF PERSONAL DATA. IAB Europe GDPR Implementation Working Group WHITE PAPER

IAB Europe Guidance THE DEFINITION OF PERSONAL DATA. IAB Europe GDPR Implementation Working Group WHITE PAPER IAB Europe Guidance WHITE PAPER THE DEFINITION OF PERSONAL DATA Five Practical Steps to help companies comply with the E-Privacy Working Directive Paper 02/2017 IAB Europe GDPR Implementation Working Group

More information

Lesson 2: What is the Mary Kay Way?

Lesson 2: What is the Mary Kay Way? Lesson 2: What is the Mary Kay Way? This lesson focuses on the Mary Kay way of doing business, specifically: The way Mary Kay, the woman, might have worked her business today if she were an Independent

More information

Invention SUBMISSION BROCHURE PLEASE READ THE FOLLOWING BEFORE SUBMITTING YOUR INVENTION

Invention SUBMISSION BROCHURE PLEASE READ THE FOLLOWING BEFORE SUBMITTING YOUR INVENTION Invention SUBMISSION BROCHURE PLEASE READ THE FOLLOWING BEFORE SUBMITTING YOUR INVENTION The patentability of any invention is subject to legal requirements. Among these legal requirements is the timely

More information

Innovation and Technology Law Curriculum

Innovation and Technology Law Curriculum Innovation and Technology Law Curriculum Core Courses FOUNDATIONS OF PRIVACY LAW (FALL 2016) This course explores the principles of privacy law in relation to the affairs of government, non-government

More information

50 Tough Interview Questions (Revised 2003)

50 Tough Interview Questions (Revised 2003) Page 1 of 15 You and Your Accomplishments 50 Tough Interview Questions (Revised 2003) 1. Tell me a little about yourself. Because this is often the opening question, be careful that you don t run off at

More information

SAULT COLLEGE OF APPLIED ARTS AND TECHNOLOGY SAULT STE. MARIE, ONTARIO COURSE OUTLINE

SAULT COLLEGE OF APPLIED ARTS AND TECHNOLOGY SAULT STE. MARIE, ONTARIO COURSE OUTLINE SAULT COLLEGE OF APPLIED ARTS AND TECHNOLOGY SAULT STE. MARIE, ONTARIO COURSE OUTLINE COURSE TITLE: Technology and Society CODE NO. : SEMESTER: ANY PROGRAM: AUTHOR: General Education Course (any program)

More information

ORDER OF THE PRESIDENT OF THE PEOPLE'S REPUBLIC OF CHINA

ORDER OF THE PRESIDENT OF THE PEOPLE'S REPUBLIC OF CHINA ORDER OF THE PRESIDENT OF THE PEOPLE'S REPUBLIC OF CHINA No. 68 The Law of the People's Republic of China on Promoting the Transformation of Scientific and Technological Achievements, adopted at the 19th

More information

OFSET. Organization for Free Software in Education and Teaching. Bagneux, March 31, Our answer to the EU consultation on patents in Europe

OFSET. Organization for Free Software in Education and Teaching. Bagneux, March 31, Our answer to the EU consultation on patents in Europe OFSET Organization for Free Software in Education and Teaching Bagneux, March 31, 2006 Our answer to the EU consultation on patents in Europe 1.1 Do you agree that these are the basic features required

More information

Over the 10-year span of this strategy, priorities will be identified under each area of focus through successive annual planning cycles.

Over the 10-year span of this strategy, priorities will be identified under each area of focus through successive annual planning cycles. Contents Preface... 3 Purpose... 4 Vision... 5 The Records building the archives of Canadians for Canadians, and for the world... 5 The People engaging all with an interest in archives... 6 The Capacity

More information

Loyola University Maryland Provisional Policies and Procedures for Intellectual Property, Copyrights, and Patents

Loyola University Maryland Provisional Policies and Procedures for Intellectual Property, Copyrights, and Patents Loyola University Maryland Provisional Policies and Procedures for Intellectual Property, Copyrights, and Patents Approved by Loyola Conference on May 2, 2006 Introduction In the course of fulfilling the

More information

Course Topics. COS 109: Computers in our World. Today: Administration. House rules. A bit of numeracy. Administrivia.

Course Topics. COS 109: Computers in our World. Today: Administration. House rules. A bit of numeracy. Administrivia. COS 109: Computers in our World Andrea LaPaugh aslp@cs.princeton.edu www.cs.princeton.edu/~aslp 304 Computer Science Building, 258-4568 (email is always better) TAs: Jacopo Cesareo, 103B CS Building, jcesareo@...,

More information