Ethics for the Information Age Chapter 5

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What are the four ways in which computers, databases, and the Internet enable ever-improving information?

  • input, output, processing, and storage
  • encryption, decryption, authentication, and authorization
  • collection, exchange, combination, and distribution (correct)
  • storage, processing, retrieval, and transmission

The English common law tradition states that "A man's home is his castle" in regards to privacy.

True (A)

The Third Amendment of the US Constitution safeguards against unwarranted searches of private property by government officials.

False (B)

What is the main argument in favor of a natural right to privacy?

<p>The right to privacy may have originated from property rights, particularly the historical view of the home as a sanctuary.</p> Signup and view all the answers

What is the main argument against a natural right to privacy?

<p>Defining privacy definitively is difficult, making it hard to establish a natural right to it. Also, when privacy is violated, other rights might also be violated, which indicates that privacy might not be a fundamental, independent right.</p> Signup and view all the answers

Judith Jarvis Thomson believes that privacy is a natural right that should be codified in law.

<p>False (B)</p> Signup and view all the answers

A prudential right is a right that everyone is inherently entitled to, regardless of societal benefit.

<p>False (B)</p> Signup and view all the answers

In what way does modern life present a challenge to privacy?

<p>Modern life increasingly thrusts individuals into interactions with strangers, making it challenging to establish trust and manage privacy.</p> Signup and view all the answers

The US government requires all cellphone service providers to track the locations of their customers with a range of 100 meters.

<p>True (A)</p> Signup and view all the answers

The use of Facebook Login to access third-party apps allows developers to gain access to a user's friends list.

<p>True (A)</p> Signup and view all the answers

OnStar provides subscribers with two-way communication and GPS functionalities alongside emergency, security, and diagnostic services.

<p>True (A)</p> Signup and view all the answers

Explain what "secondary use" is in the context of data collection.

<p>Secondary use occurs when information collected for one purpose is later used for a different purpose. For example data collected for search engine optimization might also be used for targeted advertising.</p> Signup and view all the answers

Google uses data mining to collect information about its users' online behavior.

<p>True (A)</p> Signup and view all the answers

Google's "Privacy Checkup" allows users to completely erase all personal data collected by Google.

<p>False (B)</p> Signup and view all the answers

The "opt-in" approach requires users to explicitly grant permission for data to be shared.

<p>True (A)</p> Signup and view all the answers

The "opt-out" approach requires users to explicitly deny permission for data to be shared.

<p>True (A)</p> Signup and view all the answers

Targeted direct mail involves businesses advertising to specific individuals based on their personal preferences and interests.

<p>True (A)</p> Signup and view all the answers

Mic targeting involves utilizing data about voters to tailor campaigns to their specific values and concerns.

<p>True (A)</p> Signup and view all the answers

Social Network Analysis gathers information from social media platforms to understand the dynamics and behaviors of users.

<p>True (A)</p> Signup and view all the answers

Facebook's "Privacy Settings" allow users to restrict who can access their friends list, view future posts, and look them up using their email or phone number.

<p>True (A)</p> Signup and view all the answers

Facebook's "Ads - Based On" section reveals that Facebook collects and uses information about its users' relationship status, employer, education, and even social actions.

<p>True (A)</p> Signup and view all the answers

The Netflix Prize was canceled after it was revealed that users' movie ratings were not truly anonymous.

<p>True (A)</p> Signup and view all the answers

The Lotus Development Corporation faced legal action from users after they released sensitive personal data.

<p>False (B)</p> Signup and view all the answers

Facebook Beacon was initially launched as an "opt-in" service, meaning users had to explicitly consent to the sharing of their purchase information with their friends.

<p>False (B)</p> Signup and view all the answers

Facebook switched to an "opt-in" model for Facebook Beacon after a public backlash.

<p>True (A)</p> Signup and view all the answers

In 2011, two malls recorded shoppers' movements using their cell phones to analyze visitor patterns.

<p>True (A)</p> Signup and view all the answers

Path, an app that uploaded iPhone address books without permission in 2012, was acquired by Instagram after the controversy.

<p>False (B)</p> Signup and view all the answers

Cambridge Analytica, a data analytics firm, was accused of acquiring data from Facebook users without their consent.

<p>True (A)</p> Signup and view all the answers

The data gathered by Cambridge Analytica was used for both political campaigning and commercial marketing.

<p>True (A)</p> Signup and view all the answers

The Cambridge Analytica scandal led to Facebook facing scrutiny from US Congress and Mark Zuckerberg testifying for 10 hours in front of congressional committees.

<p>True (A)</p> Signup and view all the answers

Cambridge Analytica ceased operations and filed for bankruptcy after facing extensive criticism and legal challenges.

<p>True (A)</p> Signup and view all the answers

Information technology has made it more difficult to collect and transmit personal information.

<p>False (B)</p> Signup and view all the answers

Public records are considered information that everyone has the right to access.

<p>False (B)</p> Signup and view all the answers

Companies often collect more information about their customers than is necessary for their primary purposes, with some pushing the boundaries of social tolerance.

<p>True (A)</p> Signup and view all the answers

Flashcards

Information Privacy

The right to control how personal information is collected, used, and shared.

Information Technology's Impact on Privacy

Computers, databases, and the internet make it easier to collect, share, and combine information about individuals.

Defining Privacy

Privacy is the zone of inaccessibility to physical proximity and knowledge about a person.

Privacy and Trust

Balancing the right to privacy with the need to know enough about others to trust them.

Signup and view all the flashcards

Natural Right to Privacy

A philosophical debate questioning whether privacy is a fundamental right inherent to individuals.

Signup and view all the flashcards

Public Records

Information about incidents or actions reported to a government agency.

Signup and view all the flashcards

Data Mining

Searching databases for patterns and relationships to create individual profiles.

Signup and view all the flashcards

Collaborative Filtering

Using data about preferences to predict what someone might like.

Signup and view all the flashcards

Information Disclosures

The sharing of information by individuals or organizations.

Signup and view all the flashcards

Opt-in Policy

A policy requiring explicit consent before sharing personal information.

Signup and view all the flashcards

Opt-out Policy

A policy allowing sharing of information until explicitly forbidden by the user.

Signup and view all the flashcards

Microtargeting

Identifying voters or consumers likely to support a candidate or purchase a product.

Signup and view all the flashcards

Secondary Uses of Information

Using data collected for one purpose for another.

Signup and view all the flashcards

Public Record

Information legally required or made available by a government entity; it is open for public scrutiny and access.

Signup and view all the flashcards

Privacy Checkup (Google)

A Google tool allowing users to limit the amount of information collected about their activity.

Signup and view all the flashcards

General Data Protection Regulation (GDPR)

A set of rules governing data collection for EU citizens.

Signup and view all the flashcards

Study Notes

Chapter 5: Information Privacy

  • Chapter 5 of "Ethics for the Information Age" focuses on information privacy.
  • Information technology's impact on privacy is explored. Technology has made it easier to collect, combine, exchange, and distribute information about individuals.
  • The book highlights differing perspectives on privacy. The tension between an individual's right to privacy and the need to know enough about others to trust them is a recurring theme.
  • The role of organizations in collecting and using personal information, from daily activities to complex data mining techniques, is examined.
  • The creation of individual profiles through data mining is a key topic in the chapter. This includes how marketers use this data for profit.
  • The text examines how data mining techniques and practices affect various areas, including consumer and political spheres.
  • Defining privacy and whether there's a natural right to privacy is discussed.
  • Balancing the desire for personal privacy with the needs of society is also explored as is how to measure the impact of privacy.
  • Information technology can be used to monitor, and the ethical implications of this are evaluated using various ethical frameworks.
  • The chapter includes case studies, including one about monitoring behavior of a nanny. Ethical frameworks like rule utilitarianism, social contract theory, and Kantian ethics are used to evaluate these situations.
  • Public records are defined as information about events reported to a government agency to inform the public. This covers birth records, marriage licenses, motor vehicle records, criminal records, deeds of property and how computer databases and internet have made these records more accessible.
  • Private organizations also collect information, like credit card purchases, loyalty card purchases, voluntary disclosures, and information posted to social media.
  • Data gathering practices like Facebook tags, enhanced 911 services, loyalty points programs, body scanners, RFID tags, implanted chips, and mobile apps are discussed in terms of their privacy implications.
  • Issues like Facebook Login, OnStar systems, automobile "black boxes", medical records, digital video recorders, and cookies raise concerns about how these systems collect and use information.
  • GDPR, or General Data Protection Regulation, and its impact on companies operating within the European Union, and the broader adoption of similar privacy guidelines by large American companies are further explored in the chapter.
  • Defining data mining and its use to create profiles of individuals are covered as are different aspects of data mining and secondary uses of information.
  • Collaborative filtering and ownership of transaction information are explored as examples of how information is collected, stored, and used.
  • Real-world examples of consumer and political backlash to these practices are described, such as the experiences of Lotus Development or Facebook Beacon.
  • Data collection in malls and the associated privacy issues are highlighted as are the practices of iPhone apps uploading address books.
  • Instagram's policy changes, Cambridge Analytica's practices (including the activities of Robert Mercer, and Aleksandr Kogan) and how they raised privacy concerns, are also discussed.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Like This

Information Privacy Laws Quiz
10 questions
IT2028 Information Privacy Concepts
37 questions
Chapter 5: Information Privacy
41 questions
Use Quizgecko on...
Browser
Browser