Podcast
Questions and Answers
What are the four ways in which computers, databases, and the Internet enable ever-improving information?
What are the four ways in which computers, databases, and the Internet enable ever-improving information?
- input, output, processing, and storage
- encryption, decryption, authentication, and authorization
- collection, exchange, combination, and distribution (correct)
- storage, processing, retrieval, and transmission
The English common law tradition states that "A man's home is his castle" in regards to privacy.
The English common law tradition states that "A man's home is his castle" in regards to privacy.
True (A)
The Third Amendment of the US Constitution safeguards against unwarranted searches of private property by government officials.
The Third Amendment of the US Constitution safeguards against unwarranted searches of private property by government officials.
False (B)
What is the main argument in favor of a natural right to privacy?
What is the main argument in favor of a natural right to privacy?
What is the main argument against a natural right to privacy?
What is the main argument against a natural right to privacy?
Judith Jarvis Thomson believes that privacy is a natural right that should be codified in law.
Judith Jarvis Thomson believes that privacy is a natural right that should be codified in law.
A prudential right is a right that everyone is inherently entitled to, regardless of societal benefit.
A prudential right is a right that everyone is inherently entitled to, regardless of societal benefit.
In what way does modern life present a challenge to privacy?
In what way does modern life present a challenge to privacy?
The US government requires all cellphone service providers to track the locations of their customers with a range of 100 meters.
The US government requires all cellphone service providers to track the locations of their customers with a range of 100 meters.
The use of Facebook Login to access third-party apps allows developers to gain access to a user's friends list.
The use of Facebook Login to access third-party apps allows developers to gain access to a user's friends list.
OnStar provides subscribers with two-way communication and GPS functionalities alongside emergency, security, and diagnostic services.
OnStar provides subscribers with two-way communication and GPS functionalities alongside emergency, security, and diagnostic services.
Explain what "secondary use" is in the context of data collection.
Explain what "secondary use" is in the context of data collection.
Google uses data mining to collect information about its users' online behavior.
Google uses data mining to collect information about its users' online behavior.
Google's "Privacy Checkup" allows users to completely erase all personal data collected by Google.
Google's "Privacy Checkup" allows users to completely erase all personal data collected by Google.
The "opt-in" approach requires users to explicitly grant permission for data to be shared.
The "opt-in" approach requires users to explicitly grant permission for data to be shared.
The "opt-out" approach requires users to explicitly deny permission for data to be shared.
The "opt-out" approach requires users to explicitly deny permission for data to be shared.
Targeted direct mail involves businesses advertising to specific individuals based on their personal preferences and interests.
Targeted direct mail involves businesses advertising to specific individuals based on their personal preferences and interests.
Mic targeting involves utilizing data about voters to tailor campaigns to their specific values and concerns.
Mic targeting involves utilizing data about voters to tailor campaigns to their specific values and concerns.
Social Network Analysis gathers information from social media platforms to understand the dynamics and behaviors of users.
Social Network Analysis gathers information from social media platforms to understand the dynamics and behaviors of users.
Facebook's "Privacy Settings" allow users to restrict who can access their friends list, view future posts, and look them up using their email or phone number.
Facebook's "Privacy Settings" allow users to restrict who can access their friends list, view future posts, and look them up using their email or phone number.
Facebook's "Ads - Based On" section reveals that Facebook collects and uses information about its users' relationship status, employer, education, and even social actions.
Facebook's "Ads - Based On" section reveals that Facebook collects and uses information about its users' relationship status, employer, education, and even social actions.
The Netflix Prize was canceled after it was revealed that users' movie ratings were not truly anonymous.
The Netflix Prize was canceled after it was revealed that users' movie ratings were not truly anonymous.
The Lotus Development Corporation faced legal action from users after they released sensitive personal data.
The Lotus Development Corporation faced legal action from users after they released sensitive personal data.
Facebook Beacon was initially launched as an "opt-in" service, meaning users had to explicitly consent to the sharing of their purchase information with their friends.
Facebook Beacon was initially launched as an "opt-in" service, meaning users had to explicitly consent to the sharing of their purchase information with their friends.
Facebook switched to an "opt-in" model for Facebook Beacon after a public backlash.
Facebook switched to an "opt-in" model for Facebook Beacon after a public backlash.
In 2011, two malls recorded shoppers' movements using their cell phones to analyze visitor patterns.
In 2011, two malls recorded shoppers' movements using their cell phones to analyze visitor patterns.
Path, an app that uploaded iPhone address books without permission in 2012, was acquired by Instagram after the controversy.
Path, an app that uploaded iPhone address books without permission in 2012, was acquired by Instagram after the controversy.
Cambridge Analytica, a data analytics firm, was accused of acquiring data from Facebook users without their consent.
Cambridge Analytica, a data analytics firm, was accused of acquiring data from Facebook users without their consent.
The data gathered by Cambridge Analytica was used for both political campaigning and commercial marketing.
The data gathered by Cambridge Analytica was used for both political campaigning and commercial marketing.
The Cambridge Analytica scandal led to Facebook facing scrutiny from US Congress and Mark Zuckerberg testifying for 10 hours in front of congressional committees.
The Cambridge Analytica scandal led to Facebook facing scrutiny from US Congress and Mark Zuckerberg testifying for 10 hours in front of congressional committees.
Cambridge Analytica ceased operations and filed for bankruptcy after facing extensive criticism and legal challenges.
Cambridge Analytica ceased operations and filed for bankruptcy after facing extensive criticism and legal challenges.
Information technology has made it more difficult to collect and transmit personal information.
Information technology has made it more difficult to collect and transmit personal information.
Public records are considered information that everyone has the right to access.
Public records are considered information that everyone has the right to access.
Companies often collect more information about their customers than is necessary for their primary purposes, with some pushing the boundaries of social tolerance.
Companies often collect more information about their customers than is necessary for their primary purposes, with some pushing the boundaries of social tolerance.
Flashcards
Information Privacy
Information Privacy
The right to control how personal information is collected, used, and shared.
Information Technology's Impact on Privacy
Information Technology's Impact on Privacy
Computers, databases, and the internet make it easier to collect, share, and combine information about individuals.
Defining Privacy
Defining Privacy
Privacy is the zone of inaccessibility to physical proximity and knowledge about a person.
Privacy and Trust
Privacy and Trust
Signup and view all the flashcards
Natural Right to Privacy
Natural Right to Privacy
Signup and view all the flashcards
Public Records
Public Records
Signup and view all the flashcards
Data Mining
Data Mining
Signup and view all the flashcards
Collaborative Filtering
Collaborative Filtering
Signup and view all the flashcards
Information Disclosures
Information Disclosures
Signup and view all the flashcards
Opt-in Policy
Opt-in Policy
Signup and view all the flashcards
Opt-out Policy
Opt-out Policy
Signup and view all the flashcards
Microtargeting
Microtargeting
Signup and view all the flashcards
Secondary Uses of Information
Secondary Uses of Information
Signup and view all the flashcards
Public Record
Public Record
Signup and view all the flashcards
Privacy Checkup (Google)
Privacy Checkup (Google)
Signup and view all the flashcards
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
Signup and view all the flashcards
Study Notes
Chapter 5: Information Privacy
- Chapter 5 of "Ethics for the Information Age" focuses on information privacy.
- Information technology's impact on privacy is explored. Technology has made it easier to collect, combine, exchange, and distribute information about individuals.
- The book highlights differing perspectives on privacy. The tension between an individual's right to privacy and the need to know enough about others to trust them is a recurring theme.
- The role of organizations in collecting and using personal information, from daily activities to complex data mining techniques, is examined.
- The creation of individual profiles through data mining is a key topic in the chapter. This includes how marketers use this data for profit.
- The text examines how data mining techniques and practices affect various areas, including consumer and political spheres.
- Defining privacy and whether there's a natural right to privacy is discussed.
- Balancing the desire for personal privacy with the needs of society is also explored as is how to measure the impact of privacy.
- Information technology can be used to monitor, and the ethical implications of this are evaluated using various ethical frameworks.
- The chapter includes case studies, including one about monitoring behavior of a nanny. Ethical frameworks like rule utilitarianism, social contract theory, and Kantian ethics are used to evaluate these situations.
- Public records are defined as information about events reported to a government agency to inform the public. This covers birth records, marriage licenses, motor vehicle records, criminal records, deeds of property and how computer databases and internet have made these records more accessible.
- Private organizations also collect information, like credit card purchases, loyalty card purchases, voluntary disclosures, and information posted to social media.
- Data gathering practices like Facebook tags, enhanced 911 services, loyalty points programs, body scanners, RFID tags, implanted chips, and mobile apps are discussed in terms of their privacy implications.
- Issues like Facebook Login, OnStar systems, automobile "black boxes", medical records, digital video recorders, and cookies raise concerns about how these systems collect and use information.
- GDPR, or General Data Protection Regulation, and its impact on companies operating within the European Union, and the broader adoption of similar privacy guidelines by large American companies are further explored in the chapter.
- Defining data mining and its use to create profiles of individuals are covered as are different aspects of data mining and secondary uses of information.
- Collaborative filtering and ownership of transaction information are explored as examples of how information is collected, stored, and used.
- Real-world examples of consumer and political backlash to these practices are described, such as the experiences of Lotus Development or Facebook Beacon.
- Data collection in malls and the associated privacy issues are highlighted as are the practices of iPhone apps uploading address books.
- Instagram's policy changes, Cambridge Analytica's practices (including the activities of Robert Mercer, and Aleksandr Kogan) and how they raised privacy concerns, are also discussed.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.