CIS3250 Exam #1

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What are the three key aspects of Privacy?

"Freedom from intrusion" "Control of information about oneself" "Freedom from surveillance"

Which of the following requirements was a key provision of the Children's Internet Protection Act (CIPA)?

filtering software must be installed on Internet terminals in schools and libraries

United States v. Jones

It was the first major case of digital technology surveillance. Police need a search warrant to attach a surveillance device to a private vehicle.

What is Utilitarian theory?

Its guiding principle is to increase happiness, or "utility." A person's utility is what satisfies the person's needs and values.

The Omnibus Crime Control and Safe Streets (1968) explicitly allowed wiretapping and electronic surveillance by law enforcement agencies with a warrant.

True

The Communications Assistance for Law Enforcement Act (CALEA) said that _________

telecommunications equipment must be designed to allow the interception of telephone calls (with a court order)

Which of the following limits deceptive commercial email and outlines spammers' responsibilities:

the CAN-SPAM Act

In Olmstead v. United States

the gov't had used wiretaps on telephone lines without a court order. The Supreme Court allowed the wiretaps because it interpreted the 4th Amendment to apply only to physical intrusion and only to the search or seizure of material things, not conversations.

The legal guidelines for determining whether material is obscene include all of the following EXCEPT

the material is intended for or distributed to persons under the age of 18

Wikipedia relies upon an advertising-based business model.

False

What's a cookie?

Files a web site stores on a visitor's computer.

In Olmsted v. United States (1928), the U.S. Supreme Court interpreted the Fourth Amendment to apply only to physical intrusion.

True

Briefly describe what an "opt-in" policy is and an "opt-out" policy is. Let's say you were filling out a survey for an online magazine. Give an example of what you'd see that would distinguish an opt-in from an opt-out policy. (Your answer should be 4 - 6 sentences maximum).

"Under an opt-out policy, one must check or click a box on a contract, membership form, or agreement or contact the organization to request that they not use one's information in a particular way" (Baase 59). "Under an opt-in policy, the collector of the information may not use it for secondary uses unless the person explicitly checks or clicks a box or signs a form permitting use" (Baase 59). Usually, a survey is sent via email. The email may ask you to check a box if they can use your information and your answer to the survey for future use. This is an example of an opt-in policy. An example of an opt-out policy would be a check box at the bottom of the email to unsubscribe so that you would not receive any more emails from the magazine, and delete your from their database.

Why did the Supreme Court find the Communications Decency Act of 1996 unconstitutional?

1. The worst material was already banned for children. 2. It was too vague and broad 3. It did not use the least restrictive means of accomplishing the goal of protecting children.

What is WikiLeaks?

A website that provides leaks to the public

Many countries have tried to censor the Internet. Which country issued the following edict in 2001: The office of communications is ordered to find ways to ensure that the use of the Internet becomes impossible.

Afghanistan

What areas is covered by the topics of Free Speech?

All of the above

Select an application referenced in the book for speech recognition.

All the above

It is always wrong to lie would reflect the utilitarian theory of ethics.

False

Miller v. California (1973) ruled that community standards could not play a role in whether or not material was deemed obscene.

False

Type the First Amendment:

Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances

What is Deontology theory?

Deontonlogists tend to emphasize duty and absolute rules, to be followed whether they lead to good or ill consequences in particular cases

When one goes behind Rawl's veil of ignorance, what is one ignorant of?

Each person does not know his/her own gender, race, age, talents, wealth, and so on.

A Turing Test determines the strength of an encryption method.

False

Broadcast media traditionally has had the strongest First Amendment protection (meaning the fewest regulatory restrictions) while print media has the weakest First Amendment protection

False

Generally, a deontologist would be more comfortable breaking a rule in circumstances where doing so would have good consequences.

False

In a short paragraph (4-5 sentences), list two arguments against and two arguments in favor of anonymity on the Internet.

Here I will list two arguments against and two arguments in favor of anonymity on the Internet. First, I will list two arguments against anonymity on the Internet. One is that "anonymity in cyberspace protects criminals and antisocial activities," and two is that "anonymity can mask illegal surveillance by government agencies" (Baase 161). Finally, I will list two arguments in favor of anonymity. One is that "anonymity provides protection against retaliation and embarrassment," and two is that anonymity protects individuals privacy, protects "against identity theft and consumer profiling," and protects "against oppressive goverments"

What are some "pros" and "cons" to having a national ID card that can access all of one's financial and medical information? (Your answer should be within 4 - 5 sentences maximum.)

Here are some "pros" and "cons" to having a national ID card that can access all of one's financial and medical information. First, I will list some of the "pros." A person would need the actual card to verify their identity, "the cards would be harder to forge than Social Security cards", and a person "would need to carry only one card" (Baase 93). Furthermore, I will list some of the "cons." The cards carry a large amount of personal information which gives the card more potential for abuse. It also creates more "opportunities for overzealous surveillance and serious privacy abuses" (Baase 93, 94).

Describe a useful productive activity for which you use the World Wide Web for on a daily or frequent basis.

I use the World Wide Web daily to take online classes from FSU. I also use it for communication via email with my wife, my daughters' soccer teams, and my daughters' schools.

How popular are cellphones?

In 2011, there were approximately five billion cellphone subscriptions worldwide.

What happens during invisible information gathering?

It describes the collection of personal information without the person's knowledge

What did the Privacy Act of 1974 establish?

It establish the main law about the federal gov't's use of personal data.

What was the ruling in Miller v. California (1973)?

It established a three-part guideline for determining whether material is obscene under law. The 1st Amendent does not protect obscene material. The criteria are that (1) it depicts sexual (or excretory) acts whose depiction is specifically prohibited by state law, (2) it depicts these acts in a patently offensive manner, appealing to prurient interest as judged by a reasonable person using community standards, and (3) it has no serious literary, artistic, social, political, or scientific value.

What does CAN-SPAM limit?

It limits commercial spam from using deceptive subject lines and fake "From" lines.

What doe the CAN-SPAM provide?

It provides regulation of spam and commericial messages. It prohibits deceptive subject lines and covers labeling of advertising messages, opt-out provisions, and methods of generating emailing lists.

What are the key provision requirements of the Children's Internet Protection Act (CIPA)?

It requires libraries and schools to use filter software on Internet terminals.

What does a Turing Test determine?

Let a person converse (over a network) with the system on any topics the person chooses. If the computer convinces the person that it is human, the computer passes the test.

Which one of the media areas has the most First Amendment protection?

Print

In Kyllo v. United States (2001), the U.S. Supreme Court ruled that when the government uses a device that's not in use by the general public to 'see' things it could not without intrusion, that is a 'search' and requires a warrant.

True

Katz v. United States

The Supreme Court reversed its position and ruled that the 4th Amendment does apply to conversations and that it applies in public places in some situations

In Kyllo v United States

The Supreme Court ruled that police could not use thermal-imaging devices to search a home from the outside without a search warrant.

Briefly describe the difference between negative and positive rights (liberties and claim rights). Give an example of a negative right and a positive right.

The difference between a negative and positive right is that negative rights, or liberties, are rights to act without interference, and positive rights, or claim rights, impose an obligation on some people to provide certain things for others. An example of a negative right is the right to use your labor, skills, and mind to create goods and services. An example of a positive right is that the right to life means that some people are obligated to pay for food or medical care for others who cannot pay for them.

Accelerometers are used for what?

Tiny motion-sensing and gravity-sensing devices collect status data. Complex computer software interprets the data and determines the necessary motions, and then sends signals to motors. (used in robots and Segways)

Brain-computer interfaces are used for what?

To help severly handicapped people operate a computer and control appliances with their thoughts

What are two problems with Social Security Numbers?

Too widely used Easy to falsify

What is the Golden Rule?

Treat others as you would have them treat you.

Accelerometers help robots stay upright.

True

What type of business model does Wikipedia use?

Wikipedia carries no advertising - donations pay for its hardware and bandwidth

What is Informed Consent?

You are aware and agree to the data being collected about you.

Which of the following is an example of a negative right or liberty?

all of these

The USA Patriot Act

eased gov't access to many kinds of personal information, including library and financial records, without a court order

Claim rights or positive rights

impose an obligation on some people to provide certain things for others

What are claim rights or positive rights?

impose an obligation on some people to provide certain things for others

A negative right is also known as a _________________.

liberty

If a business follows an "opt-in" policy for handling personal data, information about a customer __________

may not be released unless the customer gives permission

What are negative rights or liberties?

rights to act without interference

Anonymizers allow a user to

send email and surf the Web anonymously


Ensembles d'études connexes

Networking - Chapter 11: Network Operations and Management

View Set

Age of exploration and the Americans test study guide

View Set