Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

MBI 600 CHAPTER 14 EXAM QUESTIONS WITH ANSWERS 100% PASS., Exams of Information Systems

MBI 600 CHAPTER 14 EXAM QUESTIONS WITH ANSWERS 100% PASS.

Typology: Exams

2024/2025

Available from 05/11/2025

joyce-williams
joyce-williams 🇺🇸

2.3K documents

1 / 12

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
MBI 600 CHAPTER 14 EXAM QUESTIONS WITH
ANSWERS 100% PASS
What are several potential causes of cognitive overload? - ANSWER 1. Tweets, texts, e-mail,
social media, and annoying electronic static are potential causes.
Predicting People's Behavior - ANSWER Predicting people's behavior is big business, but
companies may face backlash from customers or be subject to investigations or fines.
Mobile Apps and Risky Behaviors - ANSWER 93% top 200 free iOS & Andriod apps exhibited
at least one risky behavior.
Apple Policy - ANSWER prohibits user information gathering without permission, but
countless 3rd party apps are unregulated.
Risky Behaviors - ANSWER Location tracking
Accessing the device's address book or contact list
Identifying user or phone unique identifier (UDID)
Recording in-app purchases
Sharing data with ad networks and analytics companies
Twitter, foursquare and instagram - ANSWER routinely gather information from personal
address books and other places on your phone.
Wardriving - ANSWER Driving around sniffing out and mapping the physical location of the
world's Wi-Fi routers (see Wi-Spy).
Open Wi-Fi Networks - ANSWER Non-password protected routers that provide access over
wireless networks.
The FCC posted, "...collecting information sent over Wi-Fi networks clearly infringes on
consumer privacy."
3D Printing - ANSWER Depositing tiny layers of material to create computer-assisted
design and/or computer-assisted manufacturing blueprints.
Bioprinting - ANSWER Using DNA to 3D print human body parts using bioprinting
pf3
pf4
pf5
pf8
pf9
pfa

Partial preview of the text

Download MBI 600 CHAPTER 14 EXAM QUESTIONS WITH ANSWERS 100% PASS. and more Exams Information Systems in PDF only on Docsity!

MBI 600 CHAPTER 14 EXAM QUESTIONS WITH

ANSWERS 100% PASS

What are several potential causes of cognitive overload? - ANSWER 1. Tweets, texts, e-mail, social media, and annoying electronic static are potential causes. Predicting People's Behavior - ANSWER Predicting people's behavior is big business, but companies may face backlash from customers or be subject to investigations or fines. Mobile Apps and Risky Behaviors - ANSWER 93% top 200 free iOS & Andriod apps exhibited at least one risky behavior. Apple Policy - ANSWER prohibits user information gathering without permission, but countless 3rd party apps are unregulated. Risky Behaviors - ANSWER Location tracking Accessing the device's address book or contact list Identifying user or phone unique identifier (UDID) Recording in-app purchases Sharing data with ad networks and analytics companies Twitter, foursquare and instagram - ANSWER routinely gather information from personal address books and other places on your phone. Wardriving - ANSWER Driving around sniffing out and mapping the physical location of the world's Wi-Fi routers (see Wi-Spy). Open Wi-Fi Networks - ANSWER Non-password protected routers that provide access over wireless networks. The FCC posted, "...collecting information sent over Wi-Fi networks clearly infringes on consumer privacy." 3D Printing - ANSWER Depositing tiny layers of material to create computer-assisted design and/or computer-assisted manufacturing blueprints. Bioprinting - ANSWER Using DNA to 3D print human body parts using bioprinting

technology. By avoiding illegal conduct, do companies also act responsibly? Explain your Answer - ANSWER 1. No. What is legal is not necessarily ethical or responsible. Laws lag behind what is possible to do because laws change slowly whereas technology changes rapidly. What types of companies can benefit from predicting people's behavior? - ANSWER 2. Virtually any type. The most benefit is for those at the end of the supply chain (retailers, etc.) When is predicting people's behavior a violation of privacy? Give an example. - ANSWER 3. Answers may vary. Certainly when personal data upon which the prediction relies are collected without consent, as appears with Target, especially for those underage. When is predicting people's behavior not a violation of privacy? Give an example. - ANSWER 4. Answers may vary. It depends on the level of intrusiveness, and that can be very subjective. One might argue that Canadian Tire's credit card business inherently has purchase information and can analyze to determine risk of missed payments. What are the ethical challenges attached to 3D printing and 3D bioprinting? - ANSWER 5. Answers may vary. There are many. They range from legal to illegal activities (e.g., theft of intellectual property.) When demand is high, will living and/or nonliving medical organs/devices go to the highest bidder? Who is legally responsible for ensuring the quality of the resulting organs and devices? In some cases, 3D printing may be the only mechanism to produce an item. 3D printing is costly. In cases where non-additive manufacturing can do the same at less cost, which will be used? Privacy - ANSWER Right, or freedom of choice and control to self-determine what information about you is made accessible, to whom, when, and for what use or purpose. Breach of Privacy - ANSWER Unauthorized disclosure of personal information. Privacy Paradox - ANSWER Phenomenon where social users are concerned about privacy but their behaviors contradict these concerns to an extreme degree. 1040 - ANSWER Major Data Breaches Reported by _______ Adult Americans in 2016 Pew Research Privacy and Security Study Social Recruitment - ANSWER Use of social media to engage, share knowledge among, and recruit and hire employees. Often involving information the candidate did not want considered (or is illegal) to use in

Social Media Discrimination - ANSWER Visiting a person's social media sites, however, clearly creates the opportunity to view large amounts of information going against these nondiscriminatory practices. Competing Legal Concerns - ANSWER Two competing legal concerns are discrimination & negligent hiring. Negligent Hiring - ANSWER If a workplace violence incident occurred and the attacker's public social networking profile contained information that could have predicted that behavior, the employer may be held liable for negligence in not using readily available information during the hiring decision. Reducing Risk of Negligent Hiring - ANSWER Ask candidates to sign a disclosure statement Allow self-disclosure Create a standard process and document it Consistent well-documented processes Avoid coercive practices Eliminate recruiter pressure for applicant disclosure Training Emphasize related compliance

Describe privacy. - ANSWER 1. Privacy is the right to self-determine what information about you is made accessible, to whom, when, and for what use or purpose. Privacy means we have freedom of choice and control over our personal information, including what we do not want shared with or used by others. What is the phenomenon where social users are concerned about privacy but their behaviors contradict these concerns? - ANSWER 2. The privacy paradox refers to this phenomenon where social users are concerned about privacy but their behaviors contradict these concerns to an extreme degree. Users of social sites often claim that they are concerned about their privacy. At the same time, they disclose their highly personal lives, even content that is incriminating or illegal, in their profiles or posts. What is the use of social media to find, screen, and select job candidates? - ANSWER 3. Social recruitment refers to use of social media to find, screen, and select job candidates. Often it involves searching information the job candidate did not want considered or that is illegal to use in the hiring process. Rejecting a job candidate because of concerns about the person's health from information on his or her Facebook page is an example of what? - ANSWER 4. This is an example of corporate social media discrimination. Age, disability, gender, religion, and race are examples of what? - ANSWER 5. Protected classes. Why are the legal concepts of discrimination and negligent hiring competing demands on a business? - ANSWER 6. Two competing legal concerns are discrimination and negligent hiring. These put pressure on prospective employers to find out what they can about a potential employee, to avoid negligence in hiring, yet not cross the line into discrimination. Discrimination. Most employers have stringent employment policies that prevent their recruiters and hiring managers from learning potentially discriminatory information about

There is disagreement if multitaskers are working as well as they could, or they could improve their focus. What are the consequences of constant distractions? - ANSWER 2. Distractions cause a loss of focus and a loss of productivity. When a person is distracted, how long does it take to return to the task at hand and get focused again? - ANSWER 3. Gloria Mark, a professor of informatics at the University of California, Irvine, says a worker distracted by a Web search that goes rogue or a new text or tweet can take about 25 minutes to return to the task at hand and get focused again (Dumaine, 2014). Why are senior managers interested in focus management? - ANSWER 4. To improve creativity and productivity. If your mind is free of distraction, your mind is better able to absorb data, interactions, and trends and synthesize the new information with what you already know. As a result, you are more likely to come up with innovative ideas. What is the difference between the performance of high and low multitaskers on cognitive tests? - ANSWER 5. In contrast to widely held assumptions, subjects who were Media (high) multitaskers scored poorly on cognitive tests. How can multitaskers improve their ability to focus? - ANSWER 6. The best strategy to improve focus is to practice doing it. ICT and Sustainable Development - ANSWER Being profit-motivated without concern for damage to the environment is unacceptable. Companies should conduct themselves in an ethical, socially responsible, and environmentally sustainable manner.

The IT industry sector is called the - ANSWER Information and Communications Technology, or ICT, in emissions reports. global warming - ANSWER refers to the upward trend in Global Mean Temperature (GMT). greenhouse effect - ANSWER is the holding of heat within the earth's atmosphere. global warming is driven by the - ANSWER greenhouse effect Carbon emissions - ANSWER directly contribute to the greenhouse effect. McKinsey & Company conclude the following: - ANSWER IT sector's own footprint of 2 percent of global emissions could double by 2020 because of increased use of tablets, smartphones, apps, and services. IT sector must continue to reduce emissions from data centers, telecom networks, and the manufacture and use of its products. IT has the unique ability to monitor and maximize energy efficiency both within and outside of its own industry sector to cut CO2 emissions by up to 5 times this amount. climate change mitigation - ANSWER Every IT user, enterprise, and nation plays a role in Wired and mobile networks enable limitless - ANSWER data creation and consumption

organizations deliver value. Workforce Marketplace. - ANSWER Companies are dissolving traditional hierarchies and replacing them with talent marketplaces of independent freelance workers. The Uncharted. - ANSWER Businesses must delve into uncharted territory, seizing opportunities to establish rules and standards for entirely new industries. The Next Wave of Disruption - ANSWER High-performing business leaders now accept that their organizations' future success is tied to their ability to keep pace with technology. Technology is more important than ever to their business success. Biggest IT innovations will not be in the technology tools themselves, but in how they are designed with people in mind. A people first approach is the key to any organization's digital success. Why do some experts warn that carbon emission reductions between 50 percent and 85 percent are necessary by 2050? - ANSWER Carbon emission reductions between 50 percent and 85 percent are necessary by 2050 to prevent the global temperature from rising too much too fast because of the greenhouse effect. What contributes to the rise of global mean temperature? - ANSWER Increases in CO resulting from human activities that generate carbon emissions have thrown the earth's natural carbon cycle off balance, increasing global temperatures and changing the planet's climate. Climatologists estimated that countries must keep the global mean temperature (GMT) from rising by more than 2°C (3.6°F) above the preindustrial GMT in

order to avoid profound damage to life on the earth. Damage includes water and food scarcity, rising sea levels, and greater incidence and severity of disease. What is the greenhouse effect? - ANSWER The greenhouse effect is the holding of heat within the earth's atmosphere. CO2 and other greenhouse gases (GHGs) trap the sun's heat with-in the earth's atmosphere, warming it and keeping it at habitable temperatures. How does the use of mobile devices contribute to the level of greenhouse gases? - ANSWER The surge in energy used to power data centers, cell towers, base stations, and recharge devices, all of which support mobile devices, is damaging the environment and depleting natural resources. What is ICT's role in global warming? - ANSWER ICT plays a key role in reducing global warming. Transforming the way people and businesses use IT could reduce annual human-generated global emissions by 15 percent by 2020 and deliver energy efficiency savings to global businesses of over 500 billion euros, or $800 billion U.S. And using social media, for example, to inform consumers of the grams (g) of carbon emissions associated with the products they buy could change buyer behavior and ultimately have a positive eco-effect. Why is global warming hotly debated? - ANSWER Many scientists and experts are extremely alarmed by global warming and climate change, but other experts outright deny that they are occurring. What is the role of IT in sustainable development? - ANSWER Every IT user, enterprise, and nation plays a role in climate change mitigation. Climate change mitigation is any action to limit the magnitude of long-term cli-mate change. Examples of mitigation include switching to low-carbon renewable energy sources and reducing the amount of energy consumed by power stations by increasing their efficiency.