CIS 290 Exam 1

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Defend either side of the three selected questions in ITIF report

1) Are tech companies destroying consumer privacy 2) Does social media facilitate disinformation? 3) Is IT destroying jobs?

What are the three steps to protect ourselves from big tech

1.) Acknowledge we are persuadable 2.) Create more methods of accountability for social media 3.)A design renaissance to support our desires

What are the Fair information Principles?

1.Inform people when you collect information 2.Collect only the data needed 3.Offer a way for people to opt out 4.Keep data only as long as needed 5.Maintain accuracy of data 6.Protect security of data 7.Develop policies for responding to law enforcement requests for data

Recommended Company Actions to Protect Data

1.Require a unique ID / password 2.Assign specific access rights for employees 3.Maintain audit trails 4.Request external privacy audits 5.Use trusted third-parties to handle data 6.Publish privacy policies 7.Respond to "peer pressure" to follow best practices

What are the ethical theories 3 assumptions

1.people are rational 2.People make free choices 3.People are responsible for their actions

Anonymizer

A device or service designed to obfuscate traffic between a client and the Internet. Generally used to make activity on the Internet as untraceable as possible.

What is informed Consent?

A key principle for ethical treatment of personal information. Each person can decide whether to interact with a business or organization that collects their data based on personal values.

What is spyware?

A type of Malware that locates and saves data from users without them knowing about it.

Customer call center representatives are being replaced by what type of software?

AI Chat bots

Describe three tech "innovations" to protect individual privacy

Access control, encryption, 2 factor verification.

What is Reidentification?

An attack that combines a deidentified dataset with other data sources to discover how secure the deidentification method used is

What is invisible info gathering?

Collection of personal information without consent is called

What is computer matching?

Combining and comparing information from different databases, often using an identifier such as a person's Social Security number or his or her computer's Internet address to match records.

How has cheaper data storage influenced digital privacy?

Companies can create larger databasesData storage used to be expensive and companies had to decide what to store.Privacy is now under threat

How can computing professionals better anticipate potential consequences of their technology?

Computer science and social science should be more synergistic to reduce unintended consequences of technology. Computing professionals should be educated to consider not only what is possible but what is responsible. Computing professionals, like all people, have blind spots about the implications of the technology they create.

Is Google likely to agree or disagree with the "right to be forgotten"?

Disagree. Google operates as a search engine that thrives off of data so they would not want to lose consumer data with a 'forgotten' feature.

Humans being replaced by machines has been occurring for over a hundred years. How do humans best adapt

Education we need to relearn/retrain.

Describe three actions a company should take to protect customer data

Encryption: Implement strong encryption protocols to safeguard customer data both in transit and at rest. Access Control: Restrict access to customer data by using role-based permissions and authentication methods. Regular Auditing: Conduct routine security audits and vulnerability assessments to identify and address potential weaknesses in data protection measures.

All actions that result in harm to someone else are unethical. (T or F)

False

Explain "If you're not paying for the product, you ARE the product"

It means that sometimes, when you get something for free, the company or person giving it to you might be using you or your information in some way to make money, like showing you ads or learning about your interests. It's like you're the special thing they're paying attention to, even though you thought you were just getting a free toy. That's why it's essential to be careful about what you share online and understand how companies might use your information.

What are advantages for employers to hire robots instead of humans?

Machines don't fall ill, they don't need to isolate to protect peers, they don't need to take time off work

Why do most websites now display cookie alerts when a visitor first arrives?

Most websites display cookie alerts to comply with data privacy regulations like the GDPR and inform visitors about the site's data collection and tracking practices.

Is it ethical for a developer to bypass OS safeguards for location tracking?

No, because the safeguards for location tracking are create for a reason to protect the consumer using the content. Although there is cases to be made in regards to law enforcement I do not believe in consumer applications is there the need to bypass location tracking.

What is Opt-Out?

One must check or click a box on a contract, membership form, or agreement or possibly contact the organization to request that the organization not use one's information in a particular way.

A security technique that tracks all data access OPTION A audit trails OPTION B encryption OPTION C trojan horse OPTION D anonymizer

Option A

The seven fair information practices described in the textbook are OPTION A recommendations for best practices OPTION B legal requirements in the U.S. OPTION C discouraged in Europe OPTION D only apply to targeted advertising

Option A

According to the textbook, select ALL expected outcomes from self-driving cars. OPTION A fewer deaths from traffic accidents OPTION B more traffic congestion OPTION C more autonomy for people with disabilities OPTION D more cars will be purchased by individuals

Option A & C

Select ALL true statements regarding the Time magazine article about jobs being lost to robots and AI. OPTION A the pandemic has contributed to new uses of workforce automation OPTION B surprisingly, robots are less productive OPTION C workforce retraining and upskilling is needed OPTION D call centers are human-centered and therefore immune to automation

Option A & C

Select ALL true statements about ethics rules OPTION A they apply to everyone OPTION B they are usually a burden to follow OPTION C they lead to simple yes / no answers OPTION D they have the goal of making our lives better

Option A & D

Select ALL true statements. Ethical theory assumes OPTION A people are rationale OPTION B people make free choices OPTION C people are responsible for their own actions OPTION D there must be winners and losers

Option A, B, & C

Select ALL that apply. According to the textbook and class discussion, Computing professionals in the U.S. are encouraged to: OPTION A provide individuals the ability to opt-out of data collection OPTION B inform people about personal information gathering OPTION C improve digital safety belts OPTION D support invisible information gathering

Option A,B, & C

Select ALL true statements regarding the GDPR. OPTION A It requires opt-in for most data collection OPTION B It supports the right to be forgotten OPTION C It is less strict than U.S. privacy laws OPTION D It is more strict than U.S. privacy laws

Option A,B, & D

According to the textbook, internet of thing (IoT) devices such as light bulbs, smart watches and appliances have many benefits. Select ONE of the potential harms with IoT devices described in the textbook. OPTION A too expensive OPTION B security threats OPTION C incompatibility with older devices OPTION D health hazzards

Option B

Choose the most accurate response. Analyzing data to determine characteristics of people most likely to engage in certain activities. OPTION A computer matching OPTION B computer profiling OPTION C reidentification OPTION D data mining

Option B

Each of the following are protected rights in the CCPA EXCEPT OPTION A request data not be sold OPTION B it requires all data collection to be opt-in OPTION C receive services even if declined to have data sold OPTION D request data be deleted

Option B

Choose ONE. Searching and analyzing large amounts of information to find patterns OPTION A data profiling OPTION B data matching OPTION C data mining OPTION D invisible information gathering

Option C

Collection of personal information without consent is called OPTION A opt-out OPTION B spyware OPTION C opt-in OPTION D invisible information gathering

Option D

Privacy audits

Privacy audits check for leaks of information and review company's privacy policy.

Takeaways from the social dilemma

Story about the facebook like button, these products take on a life of their own, we are in the age of disinformation false information spreads 6x faster, their goal is to capture our attention, a few technology companies will steer what a billion people are thinking today, if you are not paying for the product you are the product, facebook can affect real world behavior and emotions without the user's awareness

What is Opt-In?

The collector of the information may not use it for certain secondary uses unless the person explicitly checks or clicks a box or signs a form permitting the use.

Describe three concerns some recent college graduates have about working for Big Tech.

The moral qualities, the potential to harm more individuals, Tesla's contract with ICE.

What is ethics?

The study of "doing the right thing" Rules about interactions with others to make our lives better Generally, not a burden to follow

What is Secondary Use?

The use of personal information for a purpose other than the one for which the person supplied it Examples: sale of consumer information to marketers

What are cookies?

They are small pieces of data stored on the user's computer by the web browser while browsing a website.

What responsibilities do computing professionals have with respect to digital privacy?

To protect data from misuses and to anticipate risks and prepare for them. These groups must continually update security policies to cover new technologies and new potential threats, and employers must train those who carry around personal data about the risks and proper security measures.

According to the textbook, technology brings change and change disrupts the status quo. (T or F)

True

Is it ethical to create or use ad blocking software? Support both positions

Yes it is ethical to use ad blocking software because you have the right to block content and if a website does not like this idea they can just limit your access. It's unethical in the sense that companies rely on ads to generate profit.

Should Facebook make new features such as "auto tagging" opt-in or opt-out?

Yes, not everyone is comfortable being automatically tagged in a post strictly based off of an algorithm recognizing their picture

Should an app exist that allows anyone to track any other phone?

Yes, there should be in the context that if you're a parent and you want to be able to track your children's location in order to know they're safe.

Audit Trail

a report that traces who has accessed electronic information, when information was accessed, and whether any information was changed

What is Computer Profiling?

analyzing data to determine characteristics of people most likely to engage in a certain behavior

Encryption Keys

are stored and exhanged using digital certificates

Digital Signatures

electronic certificates that are used to authenticate the validity of individuals and companies conducting business electronically

Is the GDPR opt-in or opt-out?

opt-in

Ad Blocker

software that consumers install to prevent advertising messages from being visible

What is TechLash?

techlash is the growing distrust of Big Tech and technology innovations that are contributing to a variety of social ills.

What is Data Mining?

the process of analyzing data to extract information not offered by the raw data alone

Your scientists were so busy figuring out if they could..."

they didn't stop to think if they should

Is targeted marketing ethical?

yes and no. it is good at getting more traction and interaction with businesses but is also kind of an invasion of privacy

What are examples of Digital Privacy Risks?

´Everything we do in cyberspace is recorded ´Our location ´Alexa voice recordings ´Surveillance cameras ´Search engines collect terabytes of data ´Most people are not aware of data collection ´Data can be stolen or leaked ´Re-identification has become much easier due to the power of data analysis ´Data collected for one purpose will find other uses (secondary use) ´We cannot directly protect our information and must rely on businesses to protect it

GDPR (General Data Protection Regulation)

´General Data Protection Regulation ´applies to European Union citizens ´opt-in for most data collection ´"Right to be forgotten" ´Search engine results can be removed ´Limit on freedom of speech? Right to know?


Set pelajaran terkait

PNU 128 Videbeck PrepU Chapter 10: Grief and Loss

View Set

Health Chapter 3 : Health Policy Provisions, Clauses, And Riders

View Set

Intro to Biology: Chapters 18-20

View Set

Discovering Geometry Chapter 5 Polygon Properties

View Set