a. align their business mission with the social good.
b. conduct advertising campaigns to tell why they should be trusted.
c. neither of the above.
a. align their business mission with the social good.
p 410
a. boycotting websites.
b. email campaigns.
c. rejecting cookies.
c. rejecting cookies.
p 411
a. organizations that monitor behavior of websites.
b. security of personal data.
c. public relations activities of enterprises.
b. security of personal data.
411
a. reduced cost of customer acquisition.
b. wider visibility.
c. more visitors to their websites.
a. reduced cost of customer acquisition
411
a. banner advertising.
b. email newsletters.
c. behavioral tracking.
c. behavioral tracking.
ANS: C REF: p. 413
a. educating consumers about online behavioral advertising.
b. introducing an icon for advertisers who comply with industry policies.
c. both of the above.
a. educating consumers about online behavioral advertising.
b. introducing an icon for advertisers who comply with industry policies.
c. both of the above.
ANS: C REF: p. 414
a. health-related.
b. goods and services purchased.
c. websites visited.
a. health-related.
a. presents difficult issues for both consumers and marketers.
b. is guaranteed by the social networks.
c. is not generally an issue of concern.
a. presents difficult issues for both consumers and marketers.
416-417
a. financial activities of consumers.
b. people over 65 years of age.
c. information collected from children.
b. people over 65 years of age.
419-422
a. FTC
b. COPPA
c. HIPPA
c. HIPPA
ANS: C REF: pp. 422-423
a. greater transparency in consumer data collection policies and practices.
b. a standard privacy policy to be used by all business entities.
c. survey consumers about their attitudes toward the company’s privacy policies.
a. greater transparency in consumer data collection policies and practices.
a. Choice
b. Authentication
c. Entitlement
a. Choice
P 424
a. most users are confident that they can identify a phishing email.
b. most users are not sure they are protected from malware.
c. neither of the above.
b. most users are not sure they are protected from malware.
428
a. openware.
b. spyware.
c. traceware.
b. spyware.
428
a. Viruses
b. Spam
c. Identity theft
c. Identity theft
ANS: C REF: p. 430
a. Fair Information Practices Law.
b. Treaty of Rome.
c. Digital Millennium Copyright Act.
c. Digital Millennium Copyright Act.
ANS: C REF: p. 431
a. P2P file sharing is acceptable in the eyes of copyright law.
b. The Internet has magnified the problem of protecting intellectual property.
c. Businesses show little concern for intellectual property protection
P2P file sharing is acceptable in the eyes of copyright law.
431-432
a. government program to protect intellectual property.
b. voluntary alternative to traditional copyright law.
c. oftware program that protects against malicious content.
b. voluntary alternative to traditional copyright law.
433