İŞL452U
İŞLETME ETİĞİ
6. Ünite
Soru 1
According to Brey which of the following is one of the three-level approach to look at technology that can be useful when analyzing ethical issues?
Soru 2
Which one of the following is developed at the artifact level?
Soru 3
Which of the following data mining technology has the potential to be unethically used?
Soru 4
‘Genetic engineering involving the applications to human beings, such as stem cell research and cloning, have raised enormous ethical challenges for the ……. industry.’
Which of the following fills the gap in the given sentence most appropriately?
Soru 5
Which of the following is an example of neuroethics topics?
Soru 6
Which of the following could have the been the reason of the above ethical issues?
Soru 7
‘Ethical use of biometric technology must also be addressed by organizations especially those with more sensitive personal data such as those involving ……….. data.’
Which of the following completes the blank above correctly?
Soru 8
Which of the following could be an essential tool to build trust in e-commerce firms?
Soru 9
Which of the following Consumer Privacy Threats includes collection of unnecessary data, data transfer over insecure channels and failing to remove personal data upon request or after relationship termination?
Soru 10
Which of the following uses AI and deep learning to manipulate or generate visual and audio content in which a person’s existing image or video is replaced with someone else’s likeness?
Soru 11
Which of the technologies below allows a computer game player to deeply engage in a digital experience with multisensory like seeing, hearing and feeling a digital game?
Soru 12
Which technology makes it possible for a woman to switch on the owen in her home through her smart phone while working in the office?
Soru 13
A customer frequently buys books from a big online book shop. When she visits the web site of this book seller she gets online book recommendations that fits to her preferences. Which technology makes this possible?
Soru 14
If in a spesific country there is a big gap between men and women in terms of accessing the information and information technology for the favor of men, how this situation is called?
Soru 15
Based on the Pike’s CRAFT framework for ethical decision making involving big data what A stands for?
Soru 16
Which of the followings that act like identification tags may challenge the privacy of website visitors by depositing small text files on users’ computers ?
Soru 17
Which of the followings is not a dimension concerning information security in e-commerce?
Soru 18
Which of the followings represents the business information that has economic value that requires effort or costs to develop with some degree of uniqueness or novelty?
Soru 19
Virus, worm and malware are the terms about ............................
Which of the followings completes the sentence above?
Soru 20
Which of the followings is a type of computer abuse that manipulates or generates visual and audio content in which a person’s existing image or video is replaced with someone else’s likeness?