Chapter 5: Information Privacy
41 Questions
0 Views

Chapter 5: Information Privacy

Created by
@IntelligentJasper852

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What advertising policy did Facebook initially implement with Beacon in 2007?

  • No advertising policy
  • Opt-in policy
  • Limited advertising policy
  • Opt-out policy (correct)
  • What was the primary concern regarding the tracking of shoppers' cell phones in malls in 2011?

  • Accuracy of sales data
  • Effectiveness of mall promotions
  • Safety of shoppers' personal information (correct)
  • Compliance with advertising standards
  • What practice was discovered regarding Path's upload of iPhone address books in 2012?

  • Uploading with user consent
  • Deleting user data upon request
  • Uploading without permission (correct)
  • Encrypting user data
  • What did Instagram change back to in response to misunderstanding of its proposed terms of service in late 2012?

    <p>Original advertising section of terms</p> Signup and view all the answers

    Who led the campaign to change Facebook's Beacon policy from opt-out to opt-in?

    <p>MoveOn.org</p> Signup and view all the answers

    What does privacy relate to according to the content?

    <p>Access to personal information</p> Signup and view all the answers

    Which of the following best describes privacy violations?

    <p>An affront to human dignity</p> Signup and view all the answers

    What potential negative effect of individual privacy is mentioned?

    <p>Hiding dysfunctional families</p> Signup and view all the answers

    What is indicated as a tension regarding privacy?

    <p>Need to know about others vs. right to privacy</p> Signup and view all the answers

    According to the content, how can privacy be misused?

    <p>To cover illegal or immoral activities</p> Signup and view all the answers

    What role does data mining play in relation to privacy?

    <p>It creates detailed consumer profiles</p> Signup and view all the answers

    What is the 'zone of inaccessibility' in the context of privacy?

    <p>A privacy layer protecting individuals from others</p> Signup and view all the answers

    What is considered a prudential right according to the content?

    <p>Privacy</p> Signup and view all the answers

    What challenge is mentioned regarding modern privacy?

    <p>Living among strangers</p> Signup and view all the answers

    What is a common method to establish reputation mentioned in the content?

    <p>Credentialing</p> Signup and view all the answers

    What outcome is anticipated if all nannies were monitored with cameras?

    <p>Nannies behaving better</p> Signup and view all the answers

    Why is the Sullivan’s decision to monitor the nanny viewed as wrong?

    <p>It violates the nanny's privacy</p> Signup and view all the answers

    What negative consequence of monitoring nannies is noted in the content?

    <p>Higher turnover rates</p> Signup and view all the answers

    What aspect of modern life contributes to increased privacy compared to past centuries?

    <p>Automobiles enabling solitude</p> Signup and view all the answers

    What is the primary concern of the Sullivans regarding their nanny?

    <p>Performance and care quality</p> Signup and view all the answers

    What balance is suggested regarding privacy and monitoring in caregiving?

    <p>Monitoring should respect privacy</p> Signup and view all the answers

    What do credit bureaus primarily keep track of?

    <p>Individual assets, debts, and bill payment history</p> Signup and view all the answers

    What is one consequence of having poor credit?

    <p>Reduced employment prospects</p> Signup and view all the answers

    How do businesses utilize targeted direct mail?

    <p>To send advertisements only to likely purchasers</p> Signup and view all the answers

    What type of data do political campaigns use for microtargeting?

    <p>Voter registration and consumer data</p> Signup and view all the answers

    What purpose does social network analysis serve for businesses and organizations?

    <p>To collect information for decision-making</p> Signup and view all the answers

    Which of the following can be controlled through Facebook privacy settings?

    <p>Who can see your friends list</p> Signup and view all the answers

    What is one likely outcome of analyzing shopping and dining habits?

    <p>Inferring health-related patterns like obesity</p> Signup and view all the answers

    How does combining social network data with credit reports help banks?

    <p>To determine creditworthiness</p> Signup and view all the answers

    Why might two shoppers pay different prices on the same website?

    <p>Based on inferences about their affluence</p> Signup and view all the answers

    Which of the following data types do political campaigns NOT typically analyze for microtargeting?

    <p>Social media preferences</p> Signup and view all the answers

    What is the primary purpose of the microchip implanted in domesticated dogs in Taiwan?

    <p>To allow lost dogs to be returned to owners</p> Signup and view all the answers

    Which of the following is a feature of the OnStar communication system?

    <p>It offers emergency, security, navigation, and diagnostics services</p> Signup and view all the answers

    What type of data do modern automobile black boxes maintain?

    <p>Car speed, brake pedal pressure, and seat belt status</p> Signup and view all the answers

    What is a disadvantage of transitioning from paper-based to electronic medical records?

    <p>It makes controlling information dissemination more difficult</p> Signup and view all the answers

    What benefit do RFID tags provide when used on humans?

    <p>They can store medical information</p> Signup and view all the answers

    Which of the following apps is known for collecting location data for advertisers?

    <p>Angry Birds</p> Signup and view all the answers

    What information does a developer gain access to when a user logs in using Facebook Login?

    <p>User's name, location, email address, and friends list</p> Signup and view all the answers

    Which of these statements about Flurry is true?

    <p>It has access to data from more than 500,000 apps</p> Signup and view all the answers

    What is a common use of the microchip implanted in dogs?

    <p>To assist in finding lost pets</p> Signup and view all the answers

    Which capability is NOT a feature of the OnStar system?

    <p>Remote control of vehicle speed</p> Signup and view all the answers

    Study Notes

    Chapter 5: Information Privacy

    • Information technology is making collecting, exchanging, and combining information about others easier.
    • Privacy is decreasing, but still important.
    • Some individuals, like Scott McNealy, believe privacy is a thing of the past.

    Learning Objectives

    • Introduction to information privacy
    • Different perspectives on privacy
    • Information disclosures
    • Data mining and privacy implications
    • Consumer/political backlash examples

    5.1 Introduction

    • Information Technology Erodes Privacy: Computers, databases, and the internet enable ever-improving collection, exchange, and distribution of information.

    5.2 Perspectives on Privacy

    • Defining Privacy is related to the notion of access. This includes physical proximity to a person and knowledge about a person.
    • Privacy is described as a "zone of inaccessibility," implying a protected space.
    • Privacy violations are affronts to human dignity.
    • Excessive privacy can harm society.
    • Harms of Privacy: can be a cover for illegal activities, a burden on nuclear families, hiding dysfunctional families, and ignoring people on society's margins.
    • Benefits of Privacy: necessary for individual growth, signals individual responsibility, recognizes freedom, and lets people focus, be creative, and build relationships.

    5.3 Information Disclosures

    • Public Records: Information reported to government agencies for public awareness. Examples include birth certificates, marriage licenses, motor vehicle records, and criminal records.
    • Computerized databases and the internet have made accessing public records easier.
    • Information Held by Private Organizations: Includes credit card purchases, loyalty card purchases, voluntary disclosures (social media posts), and other data.

    5.4 Data Mining

    • Data Mining Defined: Searching records in databases for patterns or relationships to create individual profiles.
    • Data mining enables companies to build more personal relationships with customers.
    • Google's Personalized Search: Google tracks search queries and visited websites to infer interests for better search results and direct marketing.
    • Google's "Privacy Checkup" lets users limit collected information.
    • Collaborative Filtering: Analysis of data about people's preferences to predict preferences of other users. Used by various online retailers and movie sites.
    • Ownership of Transaction Information: Who controls transaction information (e.g., buyers, sellers, or both)? Opt-in vs. opt-out systems for data sharing.

    5.5 Examples of Consumer or Political Backlash

    • Marketplace: Households: Lotus Development's plans to sell a CD containing information about 120 million Americans faced consumer complaints about privacy violations. Lotus eventually ceased these plans.
    • Facebook Beacon: Facebook's 2007 "Beacon" service, which publicly broadcast purchases to friends, prompted negative response and a later policy change to opt-in rather than opt-out.
    • Malls Track Shoppers' Cell Phones: Malls tracked shoppers' movements with cell phones. Mall study suspended after public protests.
    • iPhone Apps Upload Address Books: Developers uploaded address books without permission, citing violation of Apple guidelines.
    • Instagram's Proposed Terms of Service Changes: Controversial proposal on how photos could be used in advertisements prompted Instagram to revert back to the original version of terms of service.
    • Cambridge Analytica: Data firm gathered personal and psychographic data from 270,000 and 87 million individuals, resulting in privacy concerns and public outcry leading to a bankruptcy filing.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Explore the intricacies of information privacy in the digital age in this quiz. Understand the impacts of information technology on privacy, various perspectives on privacy, and the implications of data mining. Test your knowledge on consumer and political responses to privacy issues.

    More Like This

    Information Privacy Laws Quiz
    10 questions
    IT2028 Information Privacy Concepts
    37 questions
    Ethics for the Information Age Chapter 5
    34 questions
    Information Privacy Chapter 5
    164 questions

    Information Privacy Chapter 5

    IntelligentJasper852 avatar
    IntelligentJasper852
    Use Quizgecko on...
    Browser
    Browser