Chapter 5: Information Privacy

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What advertising policy did Facebook initially implement with Beacon in 2007?

  • No advertising policy
  • Opt-in policy
  • Limited advertising policy
  • Opt-out policy (correct)

What was the primary concern regarding the tracking of shoppers' cell phones in malls in 2011?

  • Accuracy of sales data
  • Effectiveness of mall promotions
  • Safety of shoppers' personal information (correct)
  • Compliance with advertising standards

What practice was discovered regarding Path's upload of iPhone address books in 2012?

  • Uploading with user consent
  • Deleting user data upon request
  • Uploading without permission (correct)
  • Encrypting user data

What did Instagram change back to in response to misunderstanding of its proposed terms of service in late 2012?

<p>Original advertising section of terms (D)</p> Signup and view all the answers

Who led the campaign to change Facebook's Beacon policy from opt-out to opt-in?

<p>MoveOn.org (D)</p> Signup and view all the answers

What does privacy relate to according to the content?

<p>Access to personal information (B)</p> Signup and view all the answers

Which of the following best describes privacy violations?

<p>An affront to human dignity (D)</p> Signup and view all the answers

What potential negative effect of individual privacy is mentioned?

<p>Hiding dysfunctional families (A)</p> Signup and view all the answers

What is indicated as a tension regarding privacy?

<p>Need to know about others vs. right to privacy (B)</p> Signup and view all the answers

According to the content, how can privacy be misused?

<p>To cover illegal or immoral activities (A)</p> Signup and view all the answers

What role does data mining play in relation to privacy?

<p>It creates detailed consumer profiles (A)</p> Signup and view all the answers

What is the 'zone of inaccessibility' in the context of privacy?

<p>A privacy layer protecting individuals from others (B)</p> Signup and view all the answers

What is considered a prudential right according to the content?

<p>Privacy (D)</p> Signup and view all the answers

What challenge is mentioned regarding modern privacy?

<p>Living among strangers (B)</p> Signup and view all the answers

What is a common method to establish reputation mentioned in the content?

<p>Credentialing (A)</p> Signup and view all the answers

What outcome is anticipated if all nannies were monitored with cameras?

<p>Nannies behaving better (D)</p> Signup and view all the answers

Why is the Sullivan’s decision to monitor the nanny viewed as wrong?

<p>It violates the nanny's privacy (B)</p> Signup and view all the answers

What negative consequence of monitoring nannies is noted in the content?

<p>Higher turnover rates (D)</p> Signup and view all the answers

What aspect of modern life contributes to increased privacy compared to past centuries?

<p>Automobiles enabling solitude (D)</p> Signup and view all the answers

What is the primary concern of the Sullivans regarding their nanny?

<p>Performance and care quality (B)</p> Signup and view all the answers

What balance is suggested regarding privacy and monitoring in caregiving?

<p>Monitoring should respect privacy (C)</p> Signup and view all the answers

What do credit bureaus primarily keep track of?

<p>Individual assets, debts, and bill payment history (A)</p> Signup and view all the answers

What is one consequence of having poor credit?

<p>Reduced employment prospects (B)</p> Signup and view all the answers

How do businesses utilize targeted direct mail?

<p>To send advertisements only to likely purchasers (A)</p> Signup and view all the answers

What type of data do political campaigns use for microtargeting?

<p>Voter registration and consumer data (A)</p> Signup and view all the answers

What purpose does social network analysis serve for businesses and organizations?

<p>To collect information for decision-making (B)</p> Signup and view all the answers

Which of the following can be controlled through Facebook privacy settings?

<p>Who can see your friends list (B)</p> Signup and view all the answers

What is one likely outcome of analyzing shopping and dining habits?

<p>Inferring health-related patterns like obesity (A)</p> Signup and view all the answers

How does combining social network data with credit reports help banks?

<p>To determine creditworthiness (B)</p> Signup and view all the answers

Why might two shoppers pay different prices on the same website?

<p>Based on inferences about their affluence (C)</p> Signup and view all the answers

Which of the following data types do political campaigns NOT typically analyze for microtargeting?

<p>Social media preferences (B)</p> Signup and view all the answers

What is the primary purpose of the microchip implanted in domesticated dogs in Taiwan?

<p>To allow lost dogs to be returned to owners (D)</p> Signup and view all the answers

Which of the following is a feature of the OnStar communication system?

<p>It offers emergency, security, navigation, and diagnostics services (C)</p> Signup and view all the answers

What type of data do modern automobile black boxes maintain?

<p>Car speed, brake pedal pressure, and seat belt status (B)</p> Signup and view all the answers

What is a disadvantage of transitioning from paper-based to electronic medical records?

<p>It makes controlling information dissemination more difficult (B)</p> Signup and view all the answers

What benefit do RFID tags provide when used on humans?

<p>They can store medical information (B)</p> Signup and view all the answers

Which of the following apps is known for collecting location data for advertisers?

<p>Angry Birds (C)</p> Signup and view all the answers

What information does a developer gain access to when a user logs in using Facebook Login?

<p>User's name, location, email address, and friends list (D)</p> Signup and view all the answers

Which of these statements about Flurry is true?

<p>It has access to data from more than 500,000 apps (C)</p> Signup and view all the answers

What is a common use of the microchip implanted in dogs?

<p>To assist in finding lost pets (A)</p> Signup and view all the answers

Which capability is NOT a feature of the OnStar system?

<p>Remote control of vehicle speed (D)</p> Signup and view all the answers

Flashcards

Information Privacy

The concept of controlling access to personal information and maintaining a zone of inaccessibility regarding one's activities and data.

Information Technology (IT) and Privacy

Computers, databases, and the internet have made gathering, sharing, and combining information about individuals easier than ever, potentially diminishing privacy.

Privacy as a Zone of Inaccessibility

Privacy is related to limited access to a person's information, both physical and informational.

Privacy Violations

Actions that infringe upon an individual's right to privacy and human dignity.

Signup and view all the flashcards

Concerns about too much privacy

Excessive privacy can hinder societal progress by potentially concealing illegal or harmful activities or failing to provide necessary social support.

Signup and view all the flashcards

Data Mining

The process of collecting and analyzing large sets of data to create profiles of individuals or groups.

Signup and view all the flashcards

Privacy as a Prudential Right

Privacy is a right that benefits society, but is not a fundamental right.

Signup and view all the flashcards

Privacy in Modern Life

Modern life, despite technology, might offer more privacy than past eras, due to factors like decreased extended family living, and personal transportation.

Signup and view all the flashcards

Establishing Reputation vs. Privacy

Building a good reputation often comes at the cost of reduced privacy.

Signup and view all the flashcards

Secret Nanny Monitoring

The Sullivans secretly monitoring their nanny through a camera in their home demonstrates a conflict between privacy and parental concern.

Signup and view all the flashcards

Rule Utilitarian Evaluation of Monitoring

A rule utilitarian would likely consider the negative consequences of widespread nanny monitoring (reduced job satisfaction, turnover, potentially poorer quality care) to outweigh any benefits.

Signup and view all the flashcards

Social Contract Theory and Nanny Monitoring

In the eyes of social contract theory, the nanny has a right to reasonable privacy inside her workplace (the home), and secretly monitoring her is therefore wrong.

Signup and view all the flashcards

Implanted Microchips (Dogs)

Tiny chips implanted in dogs' ears containing owner information, enabling lost dog recovery.

Signup and view all the flashcards

RFID Tags (Humans)

Radio-frequency identification tags used in humans, storing medical info and acting as a digital payment.

Signup and view all the flashcards

Mobile App Data Collection

Many mobile apps gather location data and sell it to advertisers and data brokers.

Signup and view all the flashcards

Flurry Data Analysis

A company that analyzes data from various mobile apps, accessing data from > 500,000 apps.

Signup and view all the flashcards

Facebook Login for Apps

Users log into sites/apps with their Facebook accounts, allowing app access to personal Facebook data.

Signup and view all the flashcards

OnStar Vehicle System

An integrated communication system in cars providing emergency, security, and navigational services.

Signup and view all the flashcards

Automobile "Black Box"

A car component that records driving data (speed, brake pressure, seatbelts) for post-accident investigation.

Signup and view all the flashcards

Electronic Medical Records (EMR)

Digital medical records, quicker and cheaper for data sharing among caregivers, leading to potentially lower costs and improved care quality.

Signup and view all the flashcards

Credit Reports

Records of an individual's assets, debts, and payment history, sold to lenders.

Signup and view all the flashcards

Credit Bureaus

Organizations that track and sell credit information.

Signup and view all the flashcards

Targeted Direct Mail

Advertisements sent only to potential customers likely to purchase.

Signup and view all the flashcards

Data Brokers

Companies that gather and sell consumer data.

Signup and view all the flashcards

Microtargeting

Identifying voters most likely to support a candidate, using various data.

Signup and view all the flashcards

Social Network Analysis

Using social media data for various purposes, from promotions to investigations.

Signup and view all the flashcards

Privacy Settings

Options for controlling how your information is shared on social networks.

Signup and view all the flashcards

Facebook Beacon

A Facebook advertising tool that shared user purchase information with friends, initially operated on an opt-out basis.

Signup and view all the flashcards

Mall Cell Phone Tracking

Malls tracked shoppers' movements by monitoring their cell phone locations to analyze shopping patterns.

Signup and view all the flashcards

iPhone Address Book Upload

Certain apps, like Path, uploaded users' iPhone address books without explicit permission.

Signup and view all the flashcards

Instagram Terms Change

Instagram proposed changes to their terms of service, concerning the use of photos in advertisements without permission.

Signup and view all the flashcards

Opt-out Policy

A policy where users are automatically enrolled in a service unless they explicitly opt-out.

Signup and view all the flashcards

Opt-in Policy

A policy where users must actively choose to participate in a service.

Signup and view all the flashcards

Advertising Revenue

Money generated from advertisements displayed for gaining user attention and interest in a product or service.

Signup and view all the flashcards

Online Campaign

A coordinated effort to raise awareness and encourage action through online channels.

Signup and view all the flashcards

Study Notes

Chapter 5: Information Privacy

  • Information technology is making collecting, exchanging, and combining information about others easier.
  • Privacy is decreasing, but still important.
  • Some individuals, like Scott McNealy, believe privacy is a thing of the past.

Learning Objectives

  • Introduction to information privacy
  • Different perspectives on privacy
  • Information disclosures
  • Data mining and privacy implications
  • Consumer/political backlash examples

5.1 Introduction

  • Information Technology Erodes Privacy: Computers, databases, and the internet enable ever-improving collection, exchange, and distribution of information.

5.2 Perspectives on Privacy

  • Defining Privacy is related to the notion of access. This includes physical proximity to a person and knowledge about a person.
  • Privacy is described as a "zone of inaccessibility," implying a protected space.
  • Privacy violations are affronts to human dignity.
  • Excessive privacy can harm society.
  • Harms of Privacy: can be a cover for illegal activities, a burden on nuclear families, hiding dysfunctional families, and ignoring people on society's margins.
  • Benefits of Privacy: necessary for individual growth, signals individual responsibility, recognizes freedom, and lets people focus, be creative, and build relationships.

5.3 Information Disclosures

  • Public Records: Information reported to government agencies for public awareness. Examples include birth certificates, marriage licenses, motor vehicle records, and criminal records.
  • Computerized databases and the internet have made accessing public records easier.
  • Information Held by Private Organizations: Includes credit card purchases, loyalty card purchases, voluntary disclosures (social media posts), and other data.

5.4 Data Mining

  • Data Mining Defined: Searching records in databases for patterns or relationships to create individual profiles.
  • Data mining enables companies to build more personal relationships with customers.
  • Google's Personalized Search: Google tracks search queries and visited websites to infer interests for better search results and direct marketing.
  • Google's "Privacy Checkup" lets users limit collected information.
  • Collaborative Filtering: Analysis of data about people's preferences to predict preferences of other users. Used by various online retailers and movie sites.
  • Ownership of Transaction Information: Who controls transaction information (e.g., buyers, sellers, or both)? Opt-in vs. opt-out systems for data sharing.

5.5 Examples of Consumer or Political Backlash

  • Marketplace: Households: Lotus Development's plans to sell a CD containing information about 120 million Americans faced consumer complaints about privacy violations. Lotus eventually ceased these plans.
  • Facebook Beacon: Facebook's 2007 "Beacon" service, which publicly broadcast purchases to friends, prompted negative response and a later policy change to opt-in rather than opt-out.
  • Malls Track Shoppers' Cell Phones: Malls tracked shoppers' movements with cell phones. Mall study suspended after public protests.
  • iPhone Apps Upload Address Books: Developers uploaded address books without permission, citing violation of Apple guidelines.
  • Instagram's Proposed Terms of Service Changes: Controversial proposal on how photos could be used in advertisements prompted Instagram to revert back to the original version of terms of service.
  • Cambridge Analytica: Data firm gathered personal and psychographic data from 270,000 and 87 million individuals, resulting in privacy concerns and public outcry leading to a bankruptcy filing.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Like This

Information Privacy Laws Quiz
10 questions
IT2028 Information Privacy Concepts
37 questions
Ethics for the Information Age Chapter 5
34 questions
Information Privacy Chapter 5
164 questions

Information Privacy Chapter 5

IntelligentJasper852 avatar
IntelligentJasper852
Use Quizgecko on...
Browser
Browser