Business and Intellectual Property Quiz
48 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What increases switching costs for buyers?

  • Creating a broader selection of products
  • Delivering poorer customer service
  • Offering valued incentives (correct)
  • Providing cheaper alternatives

When is the bargaining power of suppliers strongest?

  • When the supplier has exclusive distribution
  • When many firms supply the same product
  • When demand for products is high
  • When the quality of inputs is crucial (correct)

What factor contributes to a high level of rivalry among industrial competitors?

  • Significant technological advancements
  • High product differentiation
  • High costs to exit the industry (correct)
  • A growing market share

Which factor influences the threat of substitute products?

<p>The buyers' willingness to substitute (C)</p> Signup and view all the answers

What reduces switching costs for buyers?

<p>Transparent communication of benefits (C)</p> Signup and view all the answers

What can increase a buyer's switching costs?

<p>Providing loyalty rewards (A)</p> Signup and view all the answers

In what situation is the threat of substitutes minimal?

<p>When alternative products are highly differentiated (D)</p> Signup and view all the answers

What leads to a decline in market growth rate for industrial competitors?

<p>Market saturation (C)</p> Signup and view all the answers

What is the duration of copyright protection for an individual's work?

<p>Life of the author plus 70 years (C)</p> Signup and view all the answers

Which of the following is NOT a method of protecting intellectual property?

<p>Trademark (B)</p> Signup and view all the answers

What does a patent grant the creator of an invention?

<p>Exclusive monopoly on ideas behind the invention for 20 years (D)</p> Signup and view all the answers

What challenge does digital media present to intellectual property rights?

<p>Ease of replication and transmission (B)</p> Signup and view all the answers

What is the primary purpose of the Digital Millennium Copyright Act (DMCA)?

<p>To prevent the circumvention of technology-based protections for copyrighted materials (B)</p> Signup and view all the answers

Which of the following is a challenge in establishing uniqueness in digital media?

<p>Ease of alteration (B)</p> Signup and view all the answers

What key concepts are essential for patent law?

<p>Originality, novelty, and invention (C)</p> Signup and view all the answers

In the context of computer-related liability problems, what is a significant question to consider?

<p>Who is responsible if software fails (B)</p> Signup and view all the answers

What trend is indicated for eCommerce growth after the pandemic compared to during the pandemic?

<p>E-commerce growth is expected to slow down. (B)</p> Signup and view all the answers

What was the approximate share of eCommerce in total retail sales in 2020?

<p>20.8% (D)</p> Signup and view all the answers

By how much did the share of eCommerce in total retail sales approximately double from 2017 to 2022?

<p>From 10.4% to 20.8% (B)</p> Signup and view all the answers

What was the projected eCommerce share of total retail sales in 2026?

<p>24% (C)</p> Signup and view all the answers

In which year did eCommerce share exceed 19% for the first time?

<p>2020 (D)</p> Signup and view all the answers

What was the share of eCommerce in total retail sales in 2021?

<p>21.9% (C)</p> Signup and view all the answers

How much of a growth percentage is eCommerce share expected to see from 2021 to 2023?

<p>Increase of 2.2% (A)</p> Signup and view all the answers

What was the minimal recorded share of eCommerce in total retail sales during the period of 2015-2022?

<p>7.4% (A)</p> Signup and view all the answers

What is a major advantage of quantum computing over conventional computing?

<p>It can process bits as 0, 1, or both simultaneously. (A)</p> Signup and view all the answers

Which of the following is NOT an example of open-source software?

<p>Microsoft Windows (A)</p> Signup and view all the answers

Which programming language is known for its use in building cloud computing applications?

<p>Python (D)</p> Signup and view all the answers

What is the role of the Java Virtual Machine?

<p>To execute Java code across different platforms. (D)</p> Signup and view all the answers

Which software development approach uses a service-oriented architecture?

<p>Web services (D)</p> Signup and view all the answers

What is a primary characteristic of open-source software?

<p>It can be modified by users. (D)</p> Signup and view all the answers

What does Swift primarily cater to?

<p>Mobile app development for iOS (A)</p> Signup and view all the answers

Which of the following programming languages does share a direct lineage with Objective-C?

<p>Swift (D)</p> Signup and view all the answers

Which unethical practice was Volkswagen involved in regarding their diesel-engine models in the United States?

<p>They used fraudulent software to pass emissions tests. (C)</p> Signup and view all the answers

What defines the ethical issues surrounding information systems?

<p>Concerns regarding collective behavior on correct information usage. (D)</p> Signup and view all the answers

What is a major social issue related to information technology?

<p>The digital divide and unequal access to technology. (B)</p> Signup and view all the answers

How can information systems create new ethical questions?

<p>By threatening existing distributions of power and money. (A)</p> Signup and view all the answers

Which of the following best describes political issues related to information systems?

<p>Governance, laws, and regulations managing IT impacts. (C)</p> Signup and view all the answers

What does consumerization refer to in a business context?

<p>Technology that starts in the consumer market and enters businesses (A)</p> Signup and view all the answers

What ethical concern involves how personal data is utilized in information systems?

<p>Privacy concerns regarding data collection and usage. (D)</p> Signup and view all the answers

What challenge is associated with BYOD (Bring Your Own Device)?

<p>Reevaluation of IT equipment management strategies (D)</p> Signup and view all the answers

What aspect of information systems creates opportunities for new kinds of crime?

<p>The complex nature of cybersecurity measures. (D)</p> Signup and view all the answers

What is a primary benefit of virtualization?

<p>Allows single hardware to function as multiple resources (A)</p> Signup and view all the answers

Which issue primarily deals with the broader societal impacts of IT?

<p>Social issues that focus on economic structures and relationships. (B)</p> Signup and view all the answers

How does cloud computing benefit businesses during peak demand?

<p>It allows offloading computing demands to remote servers (A)</p> Signup and view all the answers

What does software-defined storage (SDS) typically aim to improve?

<p>Efficiency in managing data storage resources (D)</p> Signup and view all the answers

What is a financial advantage of using cloud computing for businesses?

<p>Pay per usage similar to utility services (C)</p> Signup and view all the answers

What does virtualization reduce in terms of operational costs?

<p>Hardware and power expenditures (A)</p> Signup and view all the answers

What is one impact of consumerization on IT departments?

<p>Need for new strategies to manage devices and services (C)</p> Signup and view all the answers

Flashcards

Ethics in Information Systems

Principles that guide individuals' choices about right and wrong when using information systems.

VW Emission Scandal

The software installed in VW diesel engines allowed the vehicles to cheat emissions tests, resulting in a significant financial penalty for the company.

New Kinds of Crime

Information systems create new opportunities for crime by enabling new ways to steal or manipulate data.

Digital Divide

The unequal access to technology and its benefits among different populations. This could be due to socioeconomic factors, geographical location, or lack of digital literacy.

Signup and view all the flashcards

Social Issues in IT

The impact of information technology on communication, social structures, and relationships. Examples include the rise of social media and its influence on public opinion.

Signup and view all the flashcards

Privacy Concerns

Questions about the use of data, such as how it is collected, used, and protected.

Signup and view all the flashcards

Transparency in Algorithmic Decision-Making

Concerns about how algorithms are used to make decisions and whether those algorithms are transparent, fair, and unbiased.

Signup and view all the flashcards

Political Issues in IT

Issues related to governing and regulating the use of technology, such as intellectual property rights and cybersecurity.

Signup and view all the flashcards

Patent

A form of intellectual property protection that grants the creator of an invention an exclusive monopoly on the ideas behind that invention for 20 years.

Signup and view all the flashcards

Copyright

A mechanism to protect intellectual property that gives the author exclusive rights to copy, distribute, and modify their original creative works for a specific duration.

Signup and view all the flashcards

Trade Secret

A type of intellectual property that protects confidential information belonging to a business and not in the public domain.

Signup and view all the flashcards

Challenges to Intellectual Property Rights in the Digital Age

The challenge of protecting intellectual property in the digital world due to the ease of copying, sharing, and altering digital content.

Signup and view all the flashcards

Digital Millennium Copyright Act (DMCA)

A US law that makes it illegal to circumvent technology-based protections of copyrighted materials.

Signup and view all the flashcards

Software Failure and Liability

The difficulty in determining who is responsible when software malfunctions.

Signup and view all the flashcards

Privacy

The legal right to be free from unreasonable interference with your personal information or affairs.

Signup and view all the flashcards

Digital Literacy

The ability to access and use information technology and its benefits.

Signup and view all the flashcards

Switching Costs

The cost incurred when switching from one product or provider to another. It can include financial costs, time spent, learning new processes, and disruption to existing workflows.

Signup and view all the flashcards

Bargaining Power of Suppliers

The strength of a supplier's influence in a market. It's high when few suppliers exist, their products are crucial, or buyers purchase small quantities relative to the supplier's total output.

Signup and view all the flashcards

Threat of Substitute Products

The likelihood that customers will opt for alternative products or services. It depends on buyer preferences and the ease of switching to a substitute.

Signup and view all the flashcards

Competitive Rivalry

The intensity of competition within an industry. Higher rivalry exists when leaving the industry is costly, growth is slowing, or products lack differentiation.

Signup and view all the flashcards

Threat of New Entrants

The ease with which new players can enter a market. It's lower when barriers to entry, such as high startup costs or stringent regulations, exist.

Signup and view all the flashcards

What increases Switching Costs?

Factors that increase switching costs can include lowering costs for buyers, reducing effort or time needed, or providing valuable information. This makes it less appealing for customers to switch to competitors.

Signup and view all the flashcards

Bargaining Power of Buyers

The power of buyers in a market. It's higher when buyers purchase in bulk, have many options, or can easily switch suppliers.

Signup and view all the flashcards

Strategic Use of Information Resources

Information resources can be strategically used to enhance competitive advantage by addressing these forces. For instance, a company can leverage data analytics to understand customer preferences and tailor products accordingly, reducing the threat of substitute products.

Signup and view all the flashcards

Quantum Computing

A method of computing that utilizes principles of quantum mechanics to process information, enabling significantly faster calculations than traditional computers.

Signup and view all the flashcards

Open-Source Software

Open-source software is freely available for use, modification, and distribution. It is developed collaboratively by a community of programmers and designers.

Signup and view all the flashcards

Java Virtual Machine

A software platform that allows developers to write applications that run on any device with a compatible virtual machine.

Signup and view all the flashcards

Software for the Web

Software developed specifically for web-based applications, using languages like Java, HTML, and HTML5.

Signup and view all the flashcards

Service-Oriented Architecture

A software architecture that utilizes a network of independent services to perform specific tasks, making applications flexible and scalable.

Signup and view all the flashcards

Software Outsourcing

A type of software outsourcing in which a third-party provider handles the software development and maintenance, allowing businesses to focus on their core operations.

Signup and view all the flashcards

Cloud Services

Cloud computing services are delivered over the internet, providing access to software, storage, and other resources on a pay-per-use basis.

Signup and view all the flashcards

Linux

Linux is a powerful open-source operating system known for its stability and security. It is widely used in servers, embedded systems, and personal computers.

Signup and view all the flashcards

Consumerization of IT

The adoption of technology initially designed for consumer use within business contexts.

Signup and view all the flashcards

BYOD

Employees using their own personal devices for work purposes.

Signup and view all the flashcards

Virtualization

A technology that presents computing resources in a flexible, accessible way, breaking down physical limitations.

Signup and view all the flashcards

VMware

A software company specializing in virtualization technologies, allowing for efficient use of computing resources.

Signup and view all the flashcards

Cloud Computing

A model of computing where resources are accessed over the internet, often on a pay-per-use basis.

Signup and view all the flashcards

Outsourcing IT

A strategy for reducing the cost and complexity of IT infrastructure by outsourcing computing tasks to external providers.

Signup and view all the flashcards

Data Storage

The practice of storing data in a physical location different from where it is used, accessed through the internet.

Signup and view all the flashcards

Software-defined Storage (SDS)

A technique for efficiently managing data storage, adapting to changing storage requirements.

Signup and view all the flashcards

E-commerce Share of Retail Sales

The proportion of total retail sales conducted online. This figure shows how much of shopping is being done digitally, indicating the growth of e-commerce.

Signup and view all the flashcards

Pandemic E-Commerce Boom

The period from 2020 onward saw a large increase in online shopping, likely due to the global pandemic.

Signup and view all the flashcards

Slower E-Commerce Growth

After the initial surge, e-commerce growth is expected to slow down but continue increasing. It won't be as dramatic as during the pandemic.

Signup and view all the flashcards

E-Commerce Growth Forecast

The rate at which e-commerce sales are expected to increase. This suggests it's still a growing market.

Signup and view all the flashcards

E-Commerce Future

By 2026, e-commerce is expected to account for a significant portion of total retail sales, showing its continued importance in the future.

Signup and view all the flashcards

Before and After the Pandemic

The difference between the way things were before the pandemic and the way they are now. This can be seen in the changes in e-commerce growth.

Signup and view all the flashcards

E-Commerce Growth Rate

E-commerce sales have roughly doubled in just six years. This highlights the rapid growth of online shopping.

Signup and view all the flashcards

E-Commerce Trends

This data aims to provide insights into the changing dynamics of retail and the increasing reliance on online shopping.

Signup and view all the flashcards

Study Notes

ITM 100 Class 12: Ethical and Social Issues in Information Systems

  • Big data is a double-edged sword, presenting both opportunities and ethical concerns

  • Predictive policing algorithms can perpetuate existing biases, leading to unfair targeting of communities

  • Insurance companies using big data to determine premiums based on various factors (driving history, location, credit scores) can lead to discriminatory pricing. Lack of transparency in calculation methods leaves consumers disadvantaged.

  • Ethical and societal implications of new technologies and an inadequate legal environment present a problem.

  • Solutions include developing a big data strategy, privacy policies, and creating big data predictive models, mining technology, and analytics tools.

  • Various companies have faced ethical and legal issues related to information systems

  • Examples include General Motors (faulty ignition switches), Takata (faulty airbags), Citigroup, JPMorgan Chase, Barclays & UBS (manipulating LIBOR), SAC Capital (insider trading), GlaxoSmithKline (prescription drug promotion), McKinsey & Company (insider trading), and Bank of America (mortgage fraud).

  • More recently, Volkswagen was accused of cheating emissions tests.

Ethics and Information Systems

  • Ethics are principles of right and wrong that guide individuals' behaviors.
  • Information systems create new ethical dilemmas due to intense social change, challenging power, money, rights, and obligations.
  • These systems also facilitate new kinds of crime.

Layers of Issues

  • Ethical issues concern individual and collective behavior in the use of information systems, encompassing privacy concerns and algorithmic transparency.
  • Social issues focus on broad societal effects of IT, such as digital divide and social media influence.
  • Political issues concern governance, law, and regulations to manage ethical and social impacts of information technology, including intellectual property rights and cybersecurity.

Key Topics

  • Information Rights and Obligations: Who has the right to access, own, and control information?
  • Property Rights and Obligations: How intellectual property is protected in the digital age.
  • Accountability and Control: Determining responsibility for consequences stemming from IT system use.
  • System Quality: Ensuring reliability and security of IT systems.
  • Quality of Life: Impact of IT on well-being and societal standards.
  • Computing power doubles every 18 months.
  • Data storage costs rapidly decrease.
  • Detailed databases on individuals are easily maintained.
  • Data analysis methods advance.
  • Networking advances permit remote access to personal data.
  • Mobile device growth impacts usage and tracking of individual data.

Internet Challenges to Privacy

  • Cookies identify browser and track site visits.
  • Super cookies (Flash cookies) are used for tracking.
  • Web beacons (web bugs) are tiny graphics tracking online activity.
  • Spyware secretly collects information, transmitting keystrokes or displaying unwanted ads.
  • Google services employ behavioral targeting (DoubleClick).
  • The United States allows data collection and use for marketing.
  • Opt-out vs. opt-in models control data collection.

Technical Solutions

  • E-mail encryption, anonymity tools, and anti-spyware software help protect user privacy from tracking across sites.
  • Browser features like "private browsing" and "do not track" options offer more control, but effective protection is still a problem.

Other Real-World Ethical Dilemmas

  • Technology's use in workforce reduction.
  • Selling subscriber information to advertisers.
  • Employees using corporate IT for personal use.
  • IT use for monitoring employees.
  • Data analysis techniques like profiling and nonobvious relationship awareness (NORA) allow for detailed dossiers of individuals to be created from data in multiple sources.

Ethics in an Information Society: Basic Concepts

  • Responsibility: Accepting costs, duties, and obligations for decisions.
  • Accountability: Identifying the responsible parties.
  • Liability: Permitting recovery for damages done to individuals or firms.
  • Due process: Legal recourse for grievances against IT system actions.

Ethical Analysis

  • Five-step process for making ethical judgments about information systems decisions: define facts, identify conflict/dilemmas, identify stakeholders, explore options, and evaluate consequences.

Candidate Ethical Principles

  • Golden Rule, Immanuel Kant's Categorical Imperative, Descartes' Rule of Change, and the Utilitarian Principle guide ethical decision-making.

Information Rights: Privacy and Freedom in the Internet Age

  • Claim of individuals to be left alone, free from state surveillance or interference.
  • Individuals are entitled to control the information available about themselves.
  • Fair information practices (FIPs), COPPA rules, and the Do-Not-Track Online Act of 2011 regulate data collection, specifically for children.

European Directive on Data Protection

  • Use of data necessitates informed consent from customers.
  • Informed consent must include complete disclosure of all relevant facts for the decision to be rational.
  • EU member nations must adhere to similar privacy standards when transferring personal data to other countries
  • Stricter enforcement mechanisms are under consideration.

Safe Harbor

  • A private system for self-regulation of data policies and procedures without government intervention.
  • Businesses must use personal data from EU countries in accordance with EU standards.
  • Enforcement is carried out through self-regulation, consumer protection policies, and government oversight.

Property Rights: Intellectual Property

  • Intellectual property refers to intangible/tangible creations by individuals or corporations, including trade secrets, copyrights, and patents, and how these creations are protected.

Patents

  • Patents grant exclusive rights for use ideas behind inventions over a specific period of time.
  • Originality, novelty, and inventive concepts are crucial for obtaining patents.

Challenges to Intellectual Property Rights

  • Digital media's ease of replication, transmission, alteration, along with difficulty of establishing uniqueness create problems in enforcing rights to intellectual property.
  • Digital Millennium Copyright Act (DMCA) criminalizes circumvention of technology protecting copyrighted materials.
  • Determining responsibility for software failures: Who is liable in cases of software malfunction causing harm to computer users or property?
  • Difficulty of establishing liability when software is part of larger systems.
  • Software as a service: Establishing liability for services offered through software systems.

System Quality: Data Quality and System Errors

  • Establishing a reasonable standard of system quality includes factors such as accuracy, reliability, and system security.
  • Flawless software may not be economically feasible; therefore, software bugs, errors, and hardware failures remain a challenge.
  • Poorly entered data is the most common cause of system error in a business context.

Quality of Life: Equity, Access, Boundaries

  • Negative social consequences of systems include uneven distribution of power, rapid change, and effects on family, work, and leisure time.
  • Dependence on technology and vulnerability to negative effects of systems.
  • Computer crime and abuse of systems including spam, employment effects, and health risks.

ITM 100 Class 11: Information Systems, Organizations, and Strategy

  • Porter's five forces analysis for competitive strategies within a firm.
  • Value chain analysis provides a detailed view of a firm in terms of the primary and support activities involved in creating its products or services.
  • Network economics, virtual companies, and business ecosystems strategies to leverage networked abilities for competitive advantage.
  • Challenges of sustaining competitive advantage, which competitors may react to via imitation and counter strategies.

ITM 100 Class 10: Emerging Technologies & AI

  • Overview of emerging hardware platform trends including mobile devices, BYOD, cloud computing, and virtualization.
  • Software trends: Open-source software, software for the web (Java, HTML, HTML5), Web services, software outsourcing, and cloud services.
  • Artificial intelligence (AI): definitions, types (expert systems, machine learning, neural networks, natural language processing, computer vision, robotics), and common examples.
  • Intelligent agents in the business context.

ITM 100 Class 9: Securing Information Systems

  • Real-world instances of computer system security breaches (TJX, Heartland Payment Systems).
  • Data breaches, including types of computer crime, and vulnerabilities.
  • Security solutions for hardware, software, network, and user-level vulnerabilities.
  • Policies and procedures to secure information systems.
  • Key concepts associated with cryptography, including ciphers and keys.

ITM 100 Class 8: E-commerce, Digital Markets, and Digital Goods

  • Distinguish between B2B, B2C, and C2C e-commerce.
  • E-commerce revenue models including advertising, sales, subscription, free/freemium, transaction fees, and affiliates.
  • E-commerce's impact on marketing and how it transformed marketing methodology.

ITM 100 Class 7: Telecommunications, the Internet, and Wireless Technologies

  • Telecommunications concepts, including the structure of networks (local area networks (LAN), wide area networks (WAN)), and methods of communication (packet switching).
  • Overview of the Internet including its architecture, addressing (IP, DNS) and protocols (TCP/IP).
  • Brief look at emerging technologies with respect to wireless communications.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

Test your knowledge on the dynamics of buyer-supplier relationships, industry rivalry, and the fundamentals of intellectual property rights. This quiz covers essential concepts including switching costs, the power of suppliers, and legal protections for creators. Assess your understanding of the challenges faced by digital media in relation to copyright and patents.

More Like This

Use Quizgecko on...
Browser
Browser