CPSC 315 Final

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Public records help ensure that all citizens are being treated fairly by the government agencies. What are some examples of public record documents?

- Birth certificates - Marriage licenses - Motor vehicle records - Criminal records - Deeds to property - Salaries of state employees (includes professors if at a public institution aka CSUF)

Privacy Rights Evolve From Property Rights

- English law tradition has been that "a man's home is his castle" - 3rd amendment of the constitution: No Soldier shall, in time of peace be quartered in any house, without the consent of the Owner, nor the time of war, but in a manner to be prescribed by law.

What do kind of information do cookies contain?

- File can contain info about your visits to a website - Can have login names and passwords - Can have product preferences - Contents of virtual shopping carts

Why does the modern culture love privacy?

- Prosperity - Single-family home: allows physical separation from other people - Automobiles: allows to travel alone instead of public transit like buses or trains - Television: brings entertainment inside our homes - Computers: able to access information at home rather at a library

Why would too much privacy is also a bad thing?

- Society can be harmed if someone has too much privacy - Privacy can encourage social and economic inequities - Public at large may benefit if the group has less privacy

1st Formulation of Categorical Imperative

-act only from moral rules that you can at the same time will to be universal moral rules -mentally reverse roles -is there a contradiction?

2nd Formulation of Categorical Imperative

-act so that you always treat both yourself and other people as ends in themselves and never only as a means to an end -should never "use" another person

Virtue Ethics

-actions match those of a virtuous person -honesty, bravery, responsibility, forgiveness, kindness, etc. - Do good things and good things will happen back to you

Act Utilitarianism

-an action is good if its net effect is to produce more happiness than unhappiness -quantify benefits and costs -sum is positive = good -sum is negative = bad

Social Contract Theory

-morality consists in the set of rules, governing how people are to treat one another, that rational people will agree to accept, for their mutual benefit, on the condition that others follow those rules as well -think about the rights of the rational agents involved

Rule Utilitarianism

-we ought to adopt those moral rules that, if followed by everyone, lead to the greatest increase in total happiness over all affected parties -what would happen if everyone did it? -beneficial or hurtful?

What are the Privacy Act 4 principal limitations?

1) Applies only to govt databases 2) The privacy act only covers records indexed by a personal identifier 3) Nobody is in charge of enforcing the privacy act in the government 4) Privacy act allows one agency to do information sharing, as long as it is for routine use

What 3 of omnibus crime bill made wiretapping legal again in cases of national security?

1) Foreign intelligence surveillance act FISA 1978 2) ECPA (electronic communications privacy act) 3) Stored communications act

What are the 4 categories of Taxonomy of privacy proposed by Daniel Solove?

1) Information collection 2) Information processing: activities that store, manipulate, and use personal information 3) Information dissemination: activities that spread personal information 4) Invasion: activities that intrude upon a person's solitude/decision-making

What are 4 principal categories the Patriot Act accomplished?

1) Providing federal law enforcement and intelligence officials with greater authority to monitor communications 2) Giving the Secretary of the Treasury greater powers to regulate banks, preventing them from being used to launder foreign money 3) Making it more difficult for terrorists to enter the US 4) Defining new crimes and penalties for terrorist activity

4 steps of software engineering

1) to create a product specification 2) developing 3) validation 4) evolution

What are 6 examples of benefits of privacy?

1. Necessary for a person to blossom as an individual 2. Recognition of each person's true freedom 3. Let's us be ourselves 4. Lets us remove our public persona 5. Can foster intellectual activities (Allows us to shut out the rest of the world so that we can focus without interruption) 6. Privacy can be the "moral capital" (People use this capital to build intimate relationships ; Taking away privacy means taking away moral capital)

What are 4 examples of harms of privacy?

1. People can take advantage of privacy to plan and carry out illegal or immoral activities 2. Most wrongdoings happen under privacy 3. People in abusive or dysfunctional relationships may feel trapped and unable to ask others for help 4. Increasing privacy = unhappiness (Ex. people living on the fringes of society have "zone of inaccessibility")

National income tax enacted in _______ by ______ amendment, gives the fed govt the power to collect income tax. 2 trillion per year collected. IRS record contains a substantial amount of personal information

1913 16th

What is the max penalty for computer fraud and abuse?

20 years → prison, 250,000 fine

What are cyberlockers?

A file hosting service, cloud storage service, online file storage provider, or cyberlocker is an internet hosting service specifically designed to host user files. It allows users to upload files that could be accessed over the internet after a user name and password or other authentication is provided.

Ethical issues are relevant: A) Every time our actions affects others B) Because we should be nice to everyone C) Only when we are being observed D) To academics

A) Every time our actions affects others

In 2006 an _________ research team lead by Dr. Abdur Chowdhury used a file that had 3 months of searches from 650k ______ users and posted it onto the web. Purpose was to support university research, but anyone on web can download it. _______ tried to anonymize the data, but failed since SSN, addresses, etc. appeared in queries. (All 3 fill in's are the same)

AOL - As a consequence, people's data was stolen and reposted everywhere on the internet

As per the second formulation of the Categorical Imperative A) The moral worth of a person depends upon that person's intentions. B) It is wrong for one person to "use" another. C) One good turn deserves another. D) Act only according to that maxim whereby you can at the same time will that it should become a universal law.

B) It is wrong for one person to "use" another.

As per a KOP, The practice of government surveillance can be considered using the public as a means to an end under which theory? A) Act Utilitarianism B) Kantianism C) Social Contract Theory D) Ethical Egoism

B) Kantianism

If you want to use one program on thirty different computers, you should A) Buy two copies, in case one becomes damaged, and load it on all the computers B) Purchase a site license or buy enough copies for every computer C) Buy one copy and put it on all the computers D) Borrow it from another school, copy it, and send it back promptly

B) Purchase a site license or buy enough copies for every computer

___________ is trying all different combinations until something works

Brute-force searches

As per a KOP, Which theory classifies the Patriot Act as unethical because it produces more unhappiness than happiness? A) Kantianism B) Virtue Ethics C) Act Utilitarianism D) Rule Utilitarianism

C) Act Utilitarianism

Identify the best case that supports the divine theory. A) It is fallacious to equate "the good" with "God." B) The divine command theory is not based on reason C) God is all-knowing D) Some moral problems are not addressed directly in scripture

C) God is all-knowing

The Fair Credit Reporting Act A) permits consumers the right to request a free copy of their credit report every year B) ensures that information about criminal convictions does not ruin a consumer's credit report forever C) promotes the accuracy of credit reports D) lets consumers declare bankruptcy without harming their credit rating

C) promotes the accuracy of credit reports

___________ act made it so that digital phone networks could be searched, made it so that agencies could intercept digital lines via manufacturer

CALEA

_____________ surveillance system monitored internet traffic, Included emails, Could sniff packets from or directed to a particular ip address, Would set up with ISP of suspect

Carnivore - Carnivore system used about 25 times

_________ occurs every 10 years to ensure that there is fair representation in the House of reps.

Census records (information collected by government)

________ reduces the amount of information gathered from children online by services. Websites must get parental consent to collect information on children 12 or younger.

Children's online privacy protection act - COPPA

The __________________ act criminalizes, transmitting code (a virus or worm) that causes harm, accessing any computer without authorization which is connected to the internet, transmitting classified govt info, trafficking in computer passwords, computer fraud, and computer extortion

Computer Fraud and Abuse

___________ are a file placed on a user's computer's hard drive by a web browser

Cookies

Utilitarianism is considered as A) a non-consequentialist theory B) a relativistic theory C) the social contract theory D) a consequentialist theory

D) a consequentialist theory

_______________: attack is a DoS attack that uses multiple computers or machines to flood a targeted resource

DDoS

_____________ are companies that combine information gathered online with offline information to create profiles of people

Data Brokers

______________ is the process of searching through one or more databases looking for patterns or relationships among the data

Data mining

________ is the practice of searching records in databases for patterns or relationships in the data

Data mining - Create profile of individuals - Allows companies to build more personal relationships with customers

_________ is trying many random combinations until one works

Dictionary attacks

_______________: an attack that floods a server with traffic, making a website or resource unavailable

Dos

__________ is losing your credentials/details because someone was looking in at your keystrokes

Eavesdropping

______________ prohibits public employees from using lie detector tests in most situations

Employee polygraph protection act - EPPA 1988

_____________ is the study of morality, a rational examination into people's moral beliefs and behavior

Ethics

What is two methods that analyzes data to predict what a user may prefer?

Explicit method, Implicit method

(TRUE/FALSE) The Patriot Act allowed police to install internet pen registers WITH probable cause, allowed for court orders authorizing roving surveillance that WOULD describe the location, allows searches and seizures WITH a warrant, allowed for searches and seizures of institutional records WITH a warrant

FALSE

Electronic Privacy Information Center (EPIC) filed a complaint about __________...

Facebook Tag Suggestions with the Federal Trade Commission (FEC) in June, 2011. EPIC claimed that facebook uses facial data without user's consent.

Eric Butler released firefox extension, made it easy for people to sidejack web sessions. Person would simply connect to open wifi, click on button and listen for web sessions. What was the name of the app

Firesheep - As a result, it forced websites to take action to secure sessions more (Using HTTPS)

What act accomplished this? - Designed to prevent discrimination in areas of medical benefits and employment based on genetic information - Prohibits health insurance companies and health plan administrators from requesting genetic information from people or their family - Forbids them from using genetic information when making decisions on coverage, rates, pre existing conditions etc

Genetic information non-discrimination act

______________ keeps track of user's searches and the websites they've visited. It can use this information to infer what they are interested in and return pages that are more likely to be what they are seeking for.

Google's Personalized Search - If you don't have a google account, cookies stay for 180 days

_________ people at least some privacy is better than __________ people any privacy at all

Granting , denying

The ________________ Act required doctors and hospitals to move from paper records to electronic records by 2015 or face financial penalties

Health Information Technology for Economic and Clinical Health (HITECH)

What is Collaborative Filtering?

It is a form of data mining. Analyzes preferences of large number of people to predict what one person may prefer.

What are acceptable ethical theories?

Kantianism, utilitarianism, virtue ethics, social contract theory

___________ is rules which dictate what people ought to and not to do

Morality

What is an example of Covert activities after 9/11

NSA performed wiretapping of al-qaeda members List of persons being monitored expanded Monitored 500 people in the USA, and 5k-7k people outside Two al-qaeda plots foiled

Collection of reports related to crime, databases supporting the activities of federal state and local law enforcement agencies in the usa, canada and american territories. Criminal database with > 39 mill records

National crime information center (est. 2000) - NCIC - FBI

is managed by us dept of justice and provides local police officers with information supplied by fbi, dea, atf, us marshals, and bureau of prisons. Stores incident reports, interrogation summaries, and other info not avail. through NCIC, different db

One DOJ DB Critics of one doj db say it gives law enforcement access to info about people who have not committed a crime

________ policy requires the consumer to explicitly give permission for the organization to share the information with another organization.

Opt-in - Opt-In policies are preferred by privacy advocates

_________ policy requires the consumer to explicity forbid an organization from sharing information with other organizations.

Opt-out - Direct marketing associations prefer the opt-out policy because opt-in is a barrier for new businesses.

What is one success and one controversy about the Patriot Act

PRO: helped in fight against terrorism by allowing more information sharing CON: led to terrorism charges

In 1970s, elliot richardson created a group to help develop govt databases which would protect privacy of american citizens. This led to the __________ act of 1974

Privacy

__________ is a social arrangement that allows individuals to have some level of control over who is able to gain access to their physical selves and their personal information.

Privacy

What is TALON?

Purpose of TALON database was to collect reports of suspicious activities or terrorist threats near military bases. Database contained information on protests, student emails. Shut down in 2007

_____________ is to Hijack open web session by capturing a user's cookie, giving same level of permissions as the user

Sidejack

_______________ used to collect information used to search for missing people, control illegal immigration, pursue fugitives, and performing surveillance

Small drones

________________ provides employers with background checks on potential employees by searching the Internet for posts and photos by the job candidates that reveal negative activities specified by the employer: Racist remark or activities, Sexually explicit photos or videos, Illegal activities

Social Intelligence Corporation

_____________ is gaining a password via asking questions, getting it out of someone

Social engineering

(TRUE/FALSE) The value of information is getting more important as organizations refine their data-mining techniques. As a result, people are trying to fight back whenever a company has gone too far when it comes to collecting information

TRUE

(TRUE/FALSE) Unencrypted networks do not protect session outside of logins

TRUE

______________ provides a collection of rules to identify moral standards.

Virtue Ethics ethics ethic Rule Utilitarianism Kantianism Act Utilitarianism Social Contract Theory

A __________ is a piece of self-replicating code, spreads quickly, embedded in a program called the host, is not spread through networks. Must be embedded in a program.

Virus

___________________ sharing private information to the public

Whistleblowing

A _________ is self-contained program (does not have a host program) and spreads via computer network by exploiting security holes

Worm

Kantianism

an ethical philosophy claiming that motives and universal rules are important aspects in judging what is right or wrong

Use of __________ began in western new york in 1968. Today >30 mill are operating

cctv (closed-circuit tv cameras)

Netflix had a $1 million prize for whoever can make a _______________ algorithm that was 10 percent better than Netflix's OG algorithm at predicting user ratings for movies.

collaborative filtering

Congress reformed patriot act via _________ act in _______

freedom 2015

According to Morris, the purpose of the worm was to ____________...

gauge the size of the precursor "Internet" of the time - ARPANET

In a technique called ________________, a campaign combines data about voter registration, voting frequency, and contributions with consumer data and information available from a geographic information system to gain insights into which candidate the voter is likely to favor. The campaign then uses _________, _______, ______________, or ___________ to encourage likely supporters to vote.

microtargeting direct mailings, email, text messages, home visits

Philosophers disagree whether there is a ________________ but commentators agree that __________ is a prudential right. (people agree to it because it benefits society)

natural right to privacy, privacy

Opt-_____ are more common than opt-______

out in

9/11 attacks resulted in _________ act being passed by congress. Undermining what amendment?

patriot 4th

Information Privacy focuses on _____________...

perspectives on privacy, information disclosures, and data mining

What are some occupations with an exception to the EPPA 1998?

pharma companies, security firms (specific jobs), government jobs

What are inacceptable ethical theories?

relativism, egoism, divine command theory

The antonym of virtue is

vice

Congress made ______________ illegal in 1934, federal communications act passed because it might violate the 4th amendment

wiretapping

Robert Morris created the first _______ and was sentenced to ________________, fined 10k

worm, 3 years probation

Privacy is a "zone of inaccessibility". You have privacy to an extent that you can control who is allowed in your zone of inaccessibility. Give an example:

you exercise your privacy when you lock the door when using the bathroom, not giving the clerk at a hotel front desk your SSN, etc.


Set pelajaran terkait

Medical Terminology Py- (o) through Sinistr- (o)

View Set

172.4 Ethical and patient safety

View Set

2023 Intake/Interview and Quality Review Exam

View Set

Exam # 1 - International Business

View Set

Maternal Child Online Book Questions Ch. 29

View Set