The Ninth Annual Global Software Piracy Study reported that the rate of global software piracy climbed to what percentage in 2011?

Correct answer: 42 percent

Explanation

This question uses a specific statistic from the chapter to quantify the scale of the software piracy problem, a major challenge to intellectual property rights.

Other questions

Question 1

According to the case study on ethical issues for the aged community, what is a primary recurring ethical issue associated with 'Smart House' technology?

Question 2

What are the five moral dimensions of the information age identified in the chapter?

Question 3

Which technology trend involves combining data from multiple sources to create detailed electronic dossiers of individuals?

Question 4

What is the primary purpose of Nonobvious Relationship Awareness (NORA) technology?

Question 5

Which ethical principle suggests that if an action is not right for everyone to take, it is not right for anyone?

Question 6

What is the ethical 'no free lunch' rule, as described in the chapter?

Question 7

What is the most important U.S. federal law regulating the federal government's collection, use, and disclosure of information?

Question 8

The European Directive on Data Protection requires companies to obtain what before they can legally use data about an individual?

Question 9

What is the primary method by which websites like Amazon.com track a visitor's activity and customize content for them upon return?

Question 10

What U.S. law makes it illegal to circumvent technology-based protections of copyrighted materials?

Question 11

Which of the following is NOT considered a principal source of poor system performance?

Question 12

The term for stress induced by computer use, with symptoms like aggravation, hostility, and impatience, is known as:

Question 13

In the Interactive Session about the iPhone becoming an iTrack, what was the primary commercial value of the location data gathered from cell phones?

Question 14

What is the core principle of the Fair Information Practices (FIP) regime?

Question 15

What is the legal protection for an intellectual work product, such as a formula or business process, that is not based on information in the public domain?

Question 16

What did GlaxoSmithKline pay in fines in 2012 for unlawful promotion of drugs and other civil and criminal liabilities?

Question 17

What is the first step in the five-step process for ethical analysis presented in the chapter?

Question 18

Which of the following best describes the opt-out model of informed consent?

Question 19

What is the primary drawback of copyright protection for software?

Question 20

A study by Symantec in 2012 found that what percentage of malware was being targeted at small businesses?

Question 21

The case study on monitoring in the workplace discusses a legal case (Copeland v the United Kingdom) where the European Court ruled in the employee's favor. On what grounds was the employee's privacy deemed violated?

Question 22

Which of the following is NOT one of the FTC's Fair Information Practice principles?

Question 23

According to the chapter, what is the 'digital divide'?

Question 24

The case study 'Facebook: It’s About the Money' states that in 2011, advertising revenue constituted what percentage of Facebook's total revenue?

Question 25

The concept of liability, a key element of ethical action, is defined as a feature of which type of system?

Question 26

What is the main purpose of professional codes of conduct, such as those from the ACM or AMA?

Question 27

The European Directive on Data Protection, which went into effect on October 25, 1998, is stricter than U.S. law primarily because:

Question 28

In the case of the BlackBerry outage in October 2011, what was the primary cause of the cascading failure?

Question 29

According to the chapter, what is the single largest source of Repetitive Stress Injury (RSI)?

Question 30

Approximately what percentage of people who spend three or more hours per day at a computer are affected by Computer Vision Syndrome (CVS)?

Question 31

What is the primary difference between a trade secret and a patent?

Question 32

The 2011 report from the Internet Crime Complaint Center (IC3) found the average financial loss for complainants was more than:

Question 33

According to the chapter, which two technology trends are most directly responsible for making the routine violation of individual privacy cheap and effective?

Question 34

What does 'accountability' mean as a basic concept in ethics?

Question 35

The proposed 'Do-Not-Track Online Act of 2011' would require firms to:

Question 36

How does patent law differ from copyright law in what it protects?

Question 38

What is the primary reason it is so difficult to hold software producers liable for damages from their software?

Question 39

The term 'spam' is described as junk e-mail sent to a mass audience of Internet users. Approximately what percentage of all e-mail was estimated to be spam in 2012?

Question 40

What is the primary argument made by economists like Erik Brynjolfsson and Andrew P. McAfee regarding the impact of new technology on employment?

Question 41

In the Facebook case study, what is 'weblining'?

Question 42

According to a Consumer Reports study cited in the Facebook case study, how many of the 150 million Americans on Facebook have never adjusted their privacy controls?

Question 43

What does the concept of 'due process' ensure in a law-governed society?

Question 44

Descartes' rule of change is also known as the:

Question 45

What is the primary function of Web beacons?

Question 46

In what year did the European Parliament pass new rules governing the use of third-party cookies for behavioral tracking?

Question 47

What is the primary difference between a computer virus and a computer worm?

Question 48

The practice of tricking employees into revealing their passwords by pretending to be legitimate members of a company is known as:

Question 49

In the case study about the aged community, what social and cultural consideration might make sensor-based monitoring systems unacceptable?

Question 50

What type of intellectual property protection grants an exclusive monopoly on the ideas behind an invention for 20 years?