Information Privacy Chapter 5

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What type of right is privacy considered to be?

  • A fundamental right
  • A universal right
  • An inherent right
  • A prudential right (correct)

What is one challenge of modern life related to privacy?

  • Traveling alone in vehicles
  • Living with extended families
  • Increased public entertainment
  • Establishing reputations among strangers (correct)

What is a potential negative consequence of secretly monitoring nannies?

  • Improved child care quality
  • Reduced child safety
  • Increased job satisfaction
  • Higher turnover rates (correct)

Under social contract theory, why was the Sullivans' action considered wrong?

<p>It violated the nanny's expectation of privacy (B)</p> Signup and view all the answers

Which of the following is considered a remedy for privacy challenges in modern life?

<p>Establishing credentials (A)</p> Signup and view all the answers

What was one potential positive outcome of monitoring nannies?

<p>Increased trust from parents (B)</p> Signup and view all the answers

Which of these scenarios might lead to reduced quality of care from nannies?

<p>Increased monitoring (A)</p> Signup and view all the answers

What is the primary purpose of Facebook tags?

<p>To label individuals in photos (D)</p> Signup and view all the answers

What is the maximum location tracking accuracy required from cell phone providers in the United States?

<p>Within 100 meters (A)</p> Signup and view all the answers

What is a potential ethical concern regarding enhanced 911 services?

<p>Selling or sharing personal location information (C)</p> Signup and view all the answers

How do rewards programs generally benefit shoppers?

<p>By providing personalized service and savings (D)</p> Signup and view all the answers

What feature of 3-D body scanners in department stores is highlighted?

<p>They recommend clothing based on measurements (A)</p> Signup and view all the answers

What is one primary advantage of using RFID tags over traditional bar codes?

<p>They are more easily scanned and can hold more information (B)</p> Signup and view all the answers

What issue arises if RFID tags cannot be removed or disabled?

<p>They can be used to track individuals (C)</p> Signup and view all the answers

How do RFID tags benefit inventory processes in organizations?

<p>They make inventory faster and reduce errors (C)</p> Signup and view all the answers

What is a key concern regarding the facial recognition feature used by Facebook for tagging?

<p>The potential for incorrect tagging (D)</p> Signup and view all the answers

What was the main purpose of forming Cambridge Analytica?

<p>To assist conservative candidates and causes using data analytics (A)</p> Signup and view all the answers

How did Aleksandr Kogan gather data about American voters?

<p>By creating a survey app that required Facebook login (B)</p> Signup and view all the answers

What was a significant outcome of the data collected by Cambridge Analytica?

<p>Data was used to create psychographic profiles of voters (B)</p> Signup and view all the answers

What strategy did Cambridge Analytica employ for political campaigns?

<p>Microtargeting advertisements based on psychographic profiles (B)</p> Signup and view all the answers

What was the reaction of Facebook to the data sharing controversy involving Cambridge Analytica?

<p>Facebook stated users consented to the data sharing (A)</p> Signup and view all the answers

What is the purpose of the implanted microchip in dogs in Taiwan?

<p>To return lost dogs to their owners (C)</p> Signup and view all the answers

Which company specializes in analyzing data collected from mobile apps?

<p>Flurry (C)</p> Signup and view all the answers

What information can be accessed by an app developer when using Facebook Login?

<p>User's profile information including name and location (D)</p> Signup and view all the answers

What feature does OnStar provide to its subscribers?

<p>Security, navigation, and emergency services (A)</p> Signup and view all the answers

What data does a car's black box typically maintain?

<p>Speed of car and seat belt status (B)</p> Signup and view all the answers

What is a significant advantage of switching to electronic medical records?

<p>Faster sharing of information among caregivers (B)</p> Signup and view all the answers

What is a feature of RFID tags approved for use in humans?

<p>They can be used as a debit card (C)</p> Signup and view all the answers

How long does a black box maintain data after an incident?

<p>Five seconds (B)</p> Signup and view all the answers

What type of information is commonly sold by mobile apps to advertisers?

<p>User's location information (A)</p> Signup and view all the answers

What is one challenge of storing information electronically?

<p>More difficult control over information dissemination (D)</p> Signup and view all the answers

What factors influence the ads shown to users on Facebook?

<p>User's relationship status and job title (D)</p> Signup and view all the answers

What was the primary goal of the Netflix Prize?

<p>To find a better algorithm for predicting user ratings (A)</p> Signup and view all the answers

What led to a public outcry regarding the AOL Search Dataset?

<p>Users were easily identifiable from their search queries. (C)</p> Signup and view all the answers

What were consumers' reactions to Lotus Development Corporation's plan to sell a CD with household information?

<p>They complained about the invasion of privacy. (A)</p> Signup and view all the answers

What action did Netflix take after the controversy surrounding the Netflix Prize?

<p>They canceled the sequel to the Netflix Prize. (B)</p> Signup and view all the answers

What did researchers learn from the datasets released by Netflix and AOL?

<p>A little more information can make ratings identifiable. (D)</p> Signup and view all the answers

What was the consequence for Dr. Chowdhury after the AOL Search Dataset incident?

<p>He was fired from AOL. (C)</p> Signup and view all the answers

What type of information did Netflix release for the prize challenge?

<p>User ratings without private information (A)</p> Signup and view all the answers

What was the nature of the dataset that Lotus Development Corporation planned to sell?

<p>Information on 120 million Americans for mailing lists (B)</p> Signup and view all the answers

What outcome occurred after the public reaction to AOL's dataset?

<p>The dataset was removed but replicated elsewhere. (D)</p> Signup and view all the answers

What is privacy primarily related to?

<p>Knowledge about a person's background (B), Physical space around a person (C)</p> Signup and view all the answers

How might excessive individual privacy negatively impact society?

<p>It can hide illegal activities (D)</p> Signup and view all the answers

What does data mining often create for marketers?

<p>Detailed profiles of individuals (C)</p> Signup and view all the answers

What is a potential harm of privacy according to the content?

<p>It can burden the nuclear family (B)</p> Signup and view all the answers

Which of the following statements reflects a view on privacy?

<p>Too much privacy can hinder societal understanding. (C)</p> Signup and view all the answers

What might be a downside to organizations collecting personal information?

<p>It can lead to consumer distrust. (B)</p> Signup and view all the answers

How can the concept of privacy serve as a double-edged sword?

<p>It can hide dysfunctional families. (B)</p> Signup and view all the answers

What is one benefit of privacy for individuals?

<p>It enhances creativity and focus. (B)</p> Signup and view all the answers

Which description aligns with the historical view of privacy in Europe?

<p>The home is regarded as a sanctuary. (C)</p> Signup and view all the answers

What did Warren and Brandeis define as the essential aspect of privacy?

<p>The right to be let alone. (D)</p> Signup and view all the answers

Which argument is presented against the natural right to privacy?

<p>Defining privacy is problematic and ambiguous. (C)</p> Signup and view all the answers

What did the Coercive Acts contribute to in American privacy rights?

<p>The creation of the 3rd Amendment. (C)</p> Signup and view all the answers

How did Warren's experience with the newspaper coverage affect privacy rights?

<p>It highlighted the need for privacy protections. (D)</p> Signup and view all the answers

What is a potential downside of defining privacy too narrowly?

<p>It could lead to less legal protection. (B)</p> Signup and view all the answers

What is the risk associated with defining privacy too broadly?

<p>It may overlap with other rights like assault. (D)</p> Signup and view all the answers

What does the phrase 'a man's home is his castle' imply?

<p>Homes are places of safety and privacy. (A)</p> Signup and view all the answers

What implication arises from the rule allowing secret monitoring of employees?

<p>It makes secret monitoring impractical if universalized. (A)</p> Signup and view all the answers

How do virtue ethics evaluate the Sullivans' decision to monitor the nanny?

<p>It portrays them as possessing good parental characteristics. (D)</p> Signup and view all the answers

Which of the following is an example of a public record?

<p>Criminal records. (B)</p> Signup and view all the answers

What is the primary function of the implanted microchip in dogs in Taiwan?

<p>To contain the owner's contact information (D)</p> Signup and view all the answers

What has facilitated easier access to public records?

<p>Digitalization of records. (B)</p> Signup and view all the answers

What service does OnStar provide to its subscribers?

<p>Emergency, security, navigation, and diagnostics (D)</p> Signup and view all the answers

What type of information is commonly disclosed by private organizations?

<p>Loyalty card purchases. (C)</p> Signup and view all the answers

Which of the following technologies is used for privacy implications from data gathering?

<p>Digital video recorders. (D)</p> Signup and view all the answers

What type of data do modern automobiles' black boxes typically maintain?

<p>Speed of car and brake pressure (D)</p> Signup and view all the answers

What is one advantage of electronic medical records over paper-based records?

<p>Faster sharing of information among caregivers (A)</p> Signup and view all the answers

How should parents ideally approach monitoring a nanny according to virtue ethics?

<p>Monitor only if concerns arise. (D)</p> Signup and view all the answers

What common concern arises from the use of body scanners?

<p>Invasion of personal privacy. (C)</p> Signup and view all the answers

Which application type is known for collecting and selling location information to advertisers?

<p>Mobile games and flashlight applications (A)</p> Signup and view all the answers

What is a primary usage of RFID tags?

<p>Facilitating inventory processes. (B)</p> Signup and view all the answers

Which of the following is an implication of online loyalty programs?

<p>Tracking customer behavior. (B)</p> Signup and view all the answers

Why might monitoring nannies lead to a higher turnover rate?

<p>It negatively impacts their job satisfaction. (D)</p> Signup and view all the answers

What privacy expectation did the nanny have regarding her time inside the Sullivan home?

<p>Some privacy while caring for the child. (B)</p> Signup and view all the answers

What is a key conclusion regarding the Sullivans' secret monitoring of their nanny?

<p>It violated the nanny's privacy rights. (A)</p> Signup and view all the answers

What emotional impact might monitoring have on nannies while they are working?

<p>It causes increased stress. (D)</p> Signup and view all the answers

Which of the following is a potential social challenge of modern life related to privacy?

<p>Living with fewer extended family members. (C)</p> Signup and view all the answers

Which factor is likely to be considered when evaluating the consequences of monitoring nannies?

<p>Improved behavior from nannies due to monitoring. (D)</p> Signup and view all the answers

What approach might be taken to establish a reputation in modern society?

<p>Performance-based evaluations. (C)</p> Signup and view all the answers

What is a consequence of granting privacy rights in society?

<p>A potential decrease in transparency of actions. (C)</p> Signup and view all the answers

Under rule utilitarian evaluation, why was monitoring nannies deemed wrong?

<p>The potential harm outweighed the benefits. (A)</p> Signup and view all the answers

What does privacy, as discussed, most accurately represent?

<p>A prudential right with societal benefits. (B)</p> Signup and view all the answers

What change did Facebook make to its advertising policy after an online campaign from MoveOn.org?

<p>Switched to an opt-in policy for users (D)</p> Signup and view all the answers

What was the main reason for the quick halt of the cell phone tracking study at the malls in 2011?

<p>There was significant public protest against the study (C)</p> Signup and view all the answers

What was the consequence of the discovery that Path was uploading iPhone address books?

<p>The app was rewritten and CEO apologized (C)</p> Signup and view all the answers

What was a significant concern raised regarding Instagram's proposed changes to its terms of service in late 2012?

<p>Photos could be used in advertisements without user permission (D)</p> Signup and view all the answers

Which of the following behaviors was criticized across multiple apps like Twitter and Foursquare in 2012?

<p>Uploading users' address books without permission (C)</p> Signup and view all the answers

How does privacy contribute to an individual's personal development?

<p>It allows individuals to grow intellectually and spiritually. (B)</p> Signup and view all the answers

What aspect of privacy is highlighted by Warren and Brandeis?

<p>The legal system's role in protecting the right to be let alone. (D)</p> Signup and view all the answers

Which argument does Judith Jarvis Thomson present against a defined right to privacy?

<p>Privacy rights are always in conflict with other rights. (B)</p> Signup and view all the answers

What historical view of privacy is associated with English common law?

<p>A person's home is viewed as their sanctuary. (A)</p> Signup and view all the answers

What concern does the definition of privacy as 'the right to be let alone' present?

<p>It is too narrow and does not encompass forms of invasive observation. (A)</p> Signup and view all the answers

Which of the following is NOT a benefit of privacy mentioned in the content?

<p>Helps in maintaining social norms. (C)</p> Signup and view all the answers

What is the significance of the Coercive Acts (1773) in relation to privacy rights?

<p>They prompted the creation of the 3rd Amendment to the U.S. Constitution. (C)</p> Signup and view all the answers

What role does facial recognition play in Facebook tagging?

<p>It suggests names of friends appearing in photos. (D)</p> Signup and view all the answers

What risk is associated with the enhanced 911 services related to cell phone tracking?

<p>Potential unauthorized selling or sharing of location data. (D)</p> Signup and view all the answers

How do rewards programs typically use customer data?

<p>To provide personalized shopping experiences. (A)</p> Signup and view all the answers

What is a notable feature of 3-D body scanners in department stores?

<p>They can recommend clothes based on scanned measurements. (A)</p> Signup and view all the answers

What advantage do RFID tags offer over traditional bar codes?

<p>RFID tags can be scanned more easily and contain more information. (B)</p> Signup and view all the answers

What issue may arise if RFID tags cannot be removed or disabled?

<p>They could gather personal data on customers perpetually. (A)</p> Signup and view all the answers

In what way can body scanners contribute to clothing shopping?

<p>They provide a virtual fitting room experience. (B)</p> Signup and view all the answers

What is a major concern regarding the use of facial recognition for tagging in social media?

<p>It could increase the chances of improper tagging. (C)</p> Signup and view all the answers

How do RFID tags improve inventory processes?

<p>They enable quicker inventory checks with fewer errors. (A)</p> Signup and view all the answers

What does the Privacy Checkup feature enable users to do?

<p>Limit the information Google saves about activities (A)</p> Signup and view all the answers

Which method involves asking people to rank their preferences in collaborative filtering?

<p>Explicit method (A)</p> Signup and view all the answers

What is the primary difference between 'opt-in' and 'opt-out' regarding information sharing?

<p>Opt-in requires permission before sharing, while opt-out allows sharing until stated otherwise (A)</p> Signup and view all the answers

How did Target utilize data mining to predict pregnant customers?

<p>By identifying purchasing patterns related to specific products (D)</p> Signup and view all the answers

Which type of data mining method observes behavior rather than directly asking for input?

<p>Implicit method (B)</p> Signup and view all the answers

Why do direct marketing organizations often prefer an 'opt-out' model?

<p>It allows for broader data collection without initial consent (B)</p> Signup and view all the answers

Which item was commonly found in Target's predictive mailings to expectant parents?

<p>Diapers and baby clothes (B)</p> Signup and view all the answers

What information does Google pause collection of during a Privacy Checkup?

<p>Location data and search queries (A)</p> Signup and view all the answers

What aspect of consumer behavior does collaborative filtering specifically analyze?

<p>The preferences and choices of large groups (D)</p> Signup and view all the answers

How do organizations typically handle consumer transaction information in an 'opt-in' scenario?

<p>They must obtain explicit consent from consumers before sharing (A)</p> Signup and view all the answers

What feature of implanted microchips for dogs in Taiwan helps reunite lost pets with their owners?

<p>Containing the owner's name and address (B)</p> Signup and view all the answers

How do mobile applications typically use location information?

<p>To sell it to advertisers and data brokers (D)</p> Signup and view all the answers

What advantage do electronic medical records have over paper-based records?

<p>Faster access and lower sharing costs (A)</p> Signup and view all the answers

What services does OnStar provide to its subscribers?

<p>Emergency, security, navigation, and diagnostics services (D)</p> Signup and view all the answers

What data is recorded by an automobile's black box?

<p>Speed of the car and seat belt status (B)</p> Signup and view all the answers

What is a potential use of RFID tags approved for humans?

<p>Storing medical information (C)</p> Signup and view all the answers

What is one function of Facebook Login for app developers?

<p>To access users' friends list and personal information (A)</p> Signup and view all the answers

What is a notable disadvantage of converting to electronic medical records?

<p>More difficulty controlling data dissemination (B)</p> Signup and view all the answers

What element is essential for the function of OnStar’s communication system?

<p>Two-way communication and GPS (C)</p> Signup and view all the answers

Which mobile app was mentioned as one that collects location information?

<p>Angry Birds (B)</p> Signup and view all the answers

What was the primary response from Facebook regarding user privacy after the backlash from Beacon?

<p>They switched to an opt-in policy. (B)</p> Signup and view all the answers

Which action did the malls take in response to protests against tracking shoppers' cell phones?

<p>They halted the tracking study. (B)</p> Signup and view all the answers

What was a notable result of the privacy violations discovered in 2012 regarding Path and similar apps?

<p>The CEOs publicly apologized and the apps were revised. (D)</p> Signup and view all the answers

What significant change did Instagram announce in late 2012 regarding its terms of service?

<p>They misunderstood new advertising rights. (A)</p> Signup and view all the answers

Which factor contributed most to the public's concern regarding Facebook Beacon?

<p>The automatic enrollment of users in the advertising scheme. (D)</p> Signup and view all the answers

What would be a consequence of universalizing the rule of secret monitoring by employers?

<p>There would be no expectation of privacy by employees. (C)</p> Signup and view all the answers

How can the decision to monitor a nanny be characterized from a virtue ethics perspective?

<p>It demonstrates a characteristic of good parenting. (B)</p> Signup and view all the answers

Which of the following is classified as a public record?

<p>Marriage licenses (D)</p> Signup and view all the answers

What implication does the availability of computerized databases have on public records?

<p>It makes public records easier to access. (C)</p> Signup and view all the answers

Which of the following involves voluntary disclosures of personal information?

<p>Posts to social network sites (A)</p> Signup and view all the answers

What is a key ethical concern surrounding body scanners in public places?

<p>The potential for misuse of personal images. (A)</p> Signup and view all the answers

Which of the following describes a common practice of data gathering in modern life?

<p>Utilizing customer loyalty programs for tracking purchases. (A)</p> Signup and view all the answers

What is the purpose of Privacy Checkup in relation to personal information?

<p>To pause the collection of personal information (D)</p> Signup and view all the answers

Which method of collaborative filtering involves tracking purchase history?

<p>Implicit method (A)</p> Signup and view all the answers

What is the primary difference between opt-in and opt-out approaches regarding consumer information?

<p>Opt-in requires consumer consent before sharing, while opt-out allows sharing until consent is revoked (A)</p> Signup and view all the answers

What target audience did Target focus on using data mining for promotional strategies?

<p>Pregnant women (A)</p> Signup and view all the answers

What type of data is commonly used in explicit collaborative filtering methods?

<p>User rankings of preferences (D)</p> Signup and view all the answers

How can organizations using an opt-out policy affect new businesses?

<p>It creates barriers preventing data collection unless opted out (B)</p> Signup and view all the answers

What type of information can be tracked about a user through location data collection?

<p>Trips taken and duration of stay (A)</p> Signup and view all the answers

Which of the following best describes the role of data mining in online retail?

<p>It helps in predicting individual preferences based on collective data (A)</p> Signup and view all the answers

What significant items did Target identify as indicators for pregnant women in their promotional strategies?

<p>Unscented lotion and nutritional supplements (D)</p> Signup and view all the answers

What factor did Facebook utilize to tailor advertisements to users?

<p>Data from partner sources (D)</p> Signup and view all the answers

What was a significant reason for Netflix canceling the sequel to the Netflix Prize?

<p>A U.S. Federal Trade Commission complaint and lawsuit (B)</p> Signup and view all the answers

What oversight led to the public outcry regarding the AOL Search Dataset?

<p>Random integers were deemed insufficient for anonymity (D)</p> Signup and view all the answers

What was the public's reaction to Lotus Development Corporation's planned CD sales?

<p>Over 30,000 complaints about privacy invasion (A)</p> Signup and view all the answers

What was a consequence for Dr. Chowdhury following the AOL Search Dataset incident?

<p>He was fired from his position (C)</p> Signup and view all the answers

What was the primary characteristic of the dataset released by Netflix for the contest?

<p>It contained over 100 million movie ratings (C)</p> Signup and view all the answers

Why was the attempt to sell a CD of household information considered a failure?

<p>It sparked significant public complaints (B)</p> Signup and view all the answers

What type of queries were included in the AOL Search Dataset?

<p>Random integers for personal labeling (C)</p> Signup and view all the answers

What was one main concern raised by researchers about the movie ratings from Netflix?

<p>They were not truly anonymous with additional information (B)</p> Signup and view all the answers

What was the main intent behind the development of the CD by Lotus Development Corporation?

<p>To create mailing lists for small businesses (A)</p> Signup and view all the answers

What is a potential consequence of having poor credit?

<p>Reduced borrowing options (B)</p> Signup and view all the answers

How do businesses typically create targeted direct mail campaigns?

<p>Using data brokers to gather customer data for personalized mailing lists (B)</p> Signup and view all the answers

What type of data do political campaigns often analyze for microtargeting voters?

<p>Voter registration, voting frequency, and consumer data (A)</p> Signup and view all the answers

How can social network analysis be beneficial for businesses?

<p>It informs promotional strategies by identifying influencers (D)</p> Signup and view all the answers

What can individuals do to manage their privacy on social networks like Facebook?

<p>Adjust privacy settings to restrict audience visibility (C)</p> Signup and view all the answers

In the context of credit reports, what role do credit bureaus play?

<p>They compile and sell credit reports to lenders (C)</p> Signup and view all the answers

What inference might a business make about a customer who frequently dines at fast-food restaurants?

<p>They may have a higher probability of being obese (B)</p> Signup and view all the answers

What strategy do banks often use in conjunction with credit reports to assess creditworthiness?

<p>Combine data from social networks and credit histories (A)</p> Signup and view all the answers

What is one of the primary purposes of targeted direct mail in marketing?

<p>To tailor advertisements to individuals most likely to buy (C)</p> Signup and view all the answers

Which of the following statements about privacy settings on social media platforms is true?

<p>Adjusting privacy settings can minimize who can see shared content (D)</p> Signup and view all the answers

Flashcards

Privacy as a prudential right

Privacy is not a natural right, but a right that is beneficial to society. Rational people recognize it's important to have privacy protections.

Privacy vs. Modern Life

Modern life, despite advances in technology, might be more private than historical societies, due to reduced extended family living, more individual transportation, and different entertainment options.

Establishing Reputation

In a world of strangers, people use methods like credentials and tests to establish their trustworthiness and build reputations.

Rule Utilitarianism

A way to judge if an action is morally right or wrong by considering the overall consequences of everyone acting in that way.

Signup and view all the flashcards

Nanny Monitoring Case

The Sullivans secretly monitored their nanny using a camera in their family room, without informing her.

Signup and view all the flashcards

Social Contract Theory

People have expectations of privacy, especially within their own homes. This theory suggests society has a responsibility to protect those expectations.

Signup and view all the flashcards

Privacy Violation (Nanny Case)

Secretly monitoring the nanny violated her reasonable expectation of privacy in their home.

Signup and view all the flashcards

Facebook Tags

Labels identifying people in photos on Facebook.

Signup and view all the flashcards

Facial Recognition (Facebook)

Facebook uses facial recognition to suggest friends in photos.

Signup and view all the flashcards

Enhanced 911 Services

Cell phone providers track locations for emergency response.

Signup and view all the flashcards

Rewards Program

Programs that offer discounts to frequent shoppers.

Signup and view all the flashcards

Personalized Service (Rewards)

Computers analyze purchase history to tailor offers.

Signup and view all the flashcards

Body Scanners (Retail)

3-D scanners used to recommend and produce custom clothes.

Signup and view all the flashcards

RFID Tags

Radio-frequency identification tags used for tracking inventory and information.

Signup and view all the flashcards

RFID Tag Tracking

RFID tags can be used to track items if they cannot be removed.

Signup and view all the flashcards

RFID Tag Speed

Employees can quickly and more accurately track inventory using RFID Tags.

Signup and view all the flashcards

Facebook Timeline & Tagging Data

Facebook collects data on who sees tag suggestions in photos, posts you're tagged in, and tags added to your posts.

Signup and view all the flashcards

Facebook Ads Targeting

Facebook uses various factors, like relationship status, job, education, and data from partners, to target ads.

Signup and view all the flashcards

Netflix Prize

Netflix offered a $1 million prize for a better algorithm to predict user movie ratings, using user data, including movie ratings.

Signup and view all the flashcards

AOL Search Dataset Privacy Concerns

AOL released user search query data, which raised privacy issues and led to user identification despite anonymity measures.

Signup and view all the flashcards

Consumer Backlash (Lotus)

Lotus Development's plans to sell a consumer database drew complaints and concerns about personal info privacy, leading to abandoning the plans.

Signup and view all the flashcards

Data Privacy Issues

Data collections, like those of Netflix, AOL searches, and consumer databases, can compromise privacy if not handled carefully.

Signup and view all the flashcards

Implanted microchips in dogs

Small chips implanted in domesticated dogs in Taiwan, containing owner's information for lost dog recovery.

Signup and view all the flashcards

RFID tags in humans

Radio-frequency identification tags used in humans to store medical information or act as a debit card.

Signup and view all the flashcards

Mobile app data collection

Many mobile apps collect location data and sell it to advertisers. Examples are Angry Birds or flashlights.

Signup and view all the flashcards

Flurry data analysis

A company that analyzes data collected from over 500,000 mobile apps, gaining access to location and user data.

Signup and view all the flashcards

Facebook login for other apps

A method of logging into other websites or apps using Facebook credentials, giving app access to user information.

Signup and view all the flashcards

OnStar system features

OnStar provides emergency, security, navigation, and diagnostics services, often integrated into car mirrors with two-way communication and GPS.

Signup and view all the flashcards

Automobile black boxes

Devices in modern cars, recording data like speed, braking pressure, and seat belt status for accident investigation.

Signup and view all the flashcards

Electronic medical records

Digital medical records, offering quick and cheap information sharing among caregivers, potentially impacting medical costs and quality.

Signup and view all the flashcards

Cambridge Analytica

A political consulting firm that used data analytics to target voters.

Signup and view all the flashcards

SCL Group

A firm that partnered with Robert Mercer to form Cambridge Analytica.

Signup and view all the flashcards

Aleksandr Kogan

A developer who created a Facebook app to collect user data.

Signup and view all the flashcards

Data Collection (Cambridge Analytica)

Gathering personal data of millions of Facebook users via an app.

Signup and view all the flashcards

Psychographic Profiling

Classifying voters based on personality traits.

Signup and view all the flashcards

Microtargeting

Tailoring political ads based on voter data.

Signup and view all the flashcards

Data Privacy Violation

Unauthorized sharing of personal data without consent.

Signup and view all the flashcards

Facebook Response (Cambridge Analytica)

Facebook's response to the data breach, suspending accounts involved.

Signup and view all the flashcards

Mark Zuckerberg Testimony

Zuckerberg's Congressional testimony about the data scandal.

Signup and view all the flashcards

Information Privacy

The right to control access to and use of one's personal information.

Signup and view all the flashcards

Data Mining

The process of analyzing large datasets to identify patterns, trends, and insights.

Signup and view all the flashcards

Privacy Violation

Any action that infringes on an individual's right to control their personal information.

Signup and view all the flashcards

Defining Privacy

Privacy relates to controlling who has access to your information.

Signup and view all the flashcards

Information Technology

Computers, databases, and the internet increasingly collect, share, and combine information about individuals.

Signup and view all the flashcards

Privacy as a fundamental right

The belief that people possess a natural right to be free from unwanted intrusion into their personal lives, thoughts, and possessions. This is rooted in the concept of autonomy and self-determination.

Signup and view all the flashcards

Warren and Brandeis' concept of privacy

The right to be let alone; a legal concept recognizing the importance of individuals' seclusion and freedom from unwarranted observation.

Signup and view all the flashcards

Argument against a natural right to privacy

The challenging of the idea that privacy is a fundamental right, often questioning how privacy can be defined or whether violation of privacy always leads to a violation of rights.

Signup and view all the flashcards

Home as a sanctuary

A concept suggesting the home provides a space for privacy and refuge from outside intrusions.

Signup and view all the flashcards

Benefits of privacy

The advantages of personal seclusion, including fostering personal growth, self-reliance, and intimate relationships.

Signup and view all the flashcards

Privacy as a prudential right

Privacy is a right that benefits society, not a natural right.

Signup and view all the flashcards

Modern Privacy vs. Past

Modern life might be more private than earlier eras, despite technology.

Signup and view all the flashcards

Reputation in Modern Life

In a world of strangers, establishing reputation is crucial.

Signup and view all the flashcards

Rule Utilitarianism

Judging an action's morality by considering the overall consequences if everyone acted that way.

Signup and view all the flashcards

Nanny Monitoring Case

The Sullivans secretly monitored their nanny with a camera.

Signup and view all the flashcards

Social Contract Theory

Society protects an individual's privacy expectations, especially at home.

Signup and view all the flashcards

Privacy Violation (Nanny)

Secretly monitoring the nanny violated her reasonable expectation of privacy.

Signup and view all the flashcards

Kantian Evaluation

A method of evaluating actions by universalizing the rule behind them, testing for self-defeating outcomes.

Signup and view all the flashcards

Virtue Ethics Evaluation

An approach evaluating an action by considering if the action aligns with the character of a virtuous person.

Signup and view all the flashcards

Public Record

Information about an event or action reported to a government agency to inform the public.

Signup and view all the flashcards

Private Organization Information

Data held by private companies, often through voluntary actions or purchases.

Signup and view all the flashcards

Data Gathering and Privacy

The process of collecting information and the implications it has on personal privacy.

Signup and view all the flashcards

Implanted dog microchips

Small chips implanted in dogs in Taiwan, containing owner's information, to help reunite lost pets with their owners.

Signup and view all the flashcards

RFID tags in humans

Radio-frequency identification tags used in humans to store medical information or act as a debit card.

Signup and view all the flashcards

Mobile app data collection

Many mobile apps collect location data and sell it to advertisers.

Signup and view all the flashcards

Flurry data analysis

A company that analyzes data from many mobile apps, gaining access to user location and other data.

Signup and view all the flashcards

Facebook login for other apps

A way to log into websites or apps using Facebook credentials, allowing the app access to your Facebook account information.

Signup and view all the flashcards

OnStar system

A communication system in cars, providing services such as emergency, security, navigation, and diagnostics.

Signup and view all the flashcards

Automobile black boxes

Devices in cars that maintain data, including speed and braking information, for accident investigations.

Signup and view all the flashcards

Electronic medical records

Digital medical records, used to share information efficiently among caregivers.

Signup and view all the flashcards

Benefits of Privacy

Privacy enables personal growth, responsibility, freedom, self-expression and development of meaningful relationships.

Signup and view all the flashcards

Warren and Brandeis' Privacy

The right to be left alone; a legal concept focusing on seclusion and freedom from unwanted observation.

Signup and view all the flashcards

Argument Against Natural Privacy Right

Challenges the idea that privacy is a fundamental right, questioning its definition and whether privacy violations always implicate other rights.

Signup and view all the flashcards

Home as a Sanctuary

The concept of the home offering privacy and refuge from unwanted intrusions.

Signup and view all the flashcards

Facebook Tags

Labels used to identify people in photos on Facebook.

Signup and view all the flashcards

Enhanced 911 Services

Cell phone providers track location data to aid emergency response.

Signup and view all the flashcards

Rewards Programs

Loyalty programs offering discounts to frequent shoppers.

Signup and view all the flashcards

Personalized Service (Rewards)

Computers use purchase history to offer tailored deals.

Signup and view all the flashcards

Body Scanners (Retail)

3-D scanners in stores use measurements to recommend clothes.

Signup and view all the flashcards

RFID Tags

Radio-frequency tags used to track inventory and information.

Signup and view all the flashcards

RFID Tag Tracking

RFID tags enable item tracking if not removable.

Signup and view all the flashcards

RFID Tag Speed

RFID tags speed up inventory processes and reduce errors.

Signup and view all the flashcards

Implanted dog microchips

Small chips implanted in dogs in Taiwan, containing owner information for lost pet recovery.

Signup and view all the flashcards

RFID tags in humans

Radio-frequency identification tags used in humans to store medical info or act as a debit card.

Signup and view all the flashcards

Mobile app data collection

Many mobile apps collect location data and sell it to advertisers.

Signup and view all the flashcards

Flurry data analysis

A company that analyzes data from many mobile apps, gaining user location and other data.

Signup and view all the flashcards

Facebook login for other apps

Log into websites/apps with Facebook credentials, granting app access to your Facebook info.

Signup and view all the flashcards

OnStar system

Car communication system offering emergency, security, navigation, and diagnostics services.

Signup and view all the flashcards

Automobile black boxes

Devices in cars recording data like speed & braking for accident investigations.

Signup and view all the flashcards

Electronic medical records

Digital medical records, allowing quick info sharing among healthcare providers.

Signup and view all the flashcards

Facebook Beacon

A targeted advertising tool where Facebook automatically broadcast purchase information of users to their friends.

Signup and view all the flashcards

Opt-out policy (Beacon)

A policy that automatically enrolled users in the advertising program unless they opted out.

Signup and view all the flashcards

Mall shopper tracking

Malls tracked shopper movement by tracking cell phone locations in 2011.

Signup and view all the flashcards

iPhone address book upload (Path)

Path app uploaded users' iPhone address books without permission.

Signup and view all the flashcards

Instagram's terms of service

Instagram's 2012 proposed terms allowed use of photos in ads without permission.

Signup and view all the flashcards

Limiting Google Information

Users can control the amount of data Google collects about their activities.

Signup and view all the flashcards

Privacy Checkup

A Google tool to pause the collection of personal data, including search queries, location, contacts, and recordings.

Signup and view all the flashcards

Location Information (Google)

Google tracks device location, including travel patterns, frequency, duration, and routes.

Signup and view all the flashcards

Collaborative Filtering

Analyzing user preferences to predict others' preferences, commonly used by online retailers and movie sites.

Signup and view all the flashcards

Explicit Method (Filtering)

Directly asking users to rank their preferences.

Signup and view all the flashcards

Implicit Method (Filtering)

Tracking purchases to infer preferences.

Signup and view all the flashcards

Ownership of Transaction Data

Determining who controls information about purchases (buyer, seller, or both).

Signup and view all the flashcards

Opt-in

Consumers explicitly grant permission for companies to share information.

Signup and view all the flashcards

Opt-out

Companies can share information until consumers forbid it.

Signup and view all the flashcards

Target Marketing (Pregnancy)

Identifying and targeting potential customers (pregnant women) by observing their shopping habits.

Signup and view all the flashcards

Credit Reports

Records of an individual's assets, debts, and payment history, sold to lenders to assess creditworthiness.

Signup and view all the flashcards

Credit Bureaus

Organizations that compile and maintain credit reports for individuals.

Signup and view all the flashcards

Targeted Direct Mail

Sending advertisements only to potential customers likely to purchase.

Signup and view all the flashcards

Data Brokers

Companies that collect and sell information about individuals for marketing purposes.

Signup and view all the flashcards

Microtargeting

Personalizing political campaigns or marketing efforts by targeting specific groups.

Signup and view all the flashcards

Social Network Analysis

Using social network data for various purposes, such as promotions, deploying officers, and assessing creditworthiness.

Signup and view all the flashcards

Privacy Settings (Facebook)

Options on Facebook to control who sees your information and activities.

Signup and view all the flashcards

Kantian Evaluation

A way to judge if an action is morally right or wrong by checking if the rule behind it would create problems if everyone applied it.

Signup and view all the flashcards

Virtue Ethics

A way to evaluate actions by considering whether they're consistent with the qualities of a virtuous person.

Signup and view all the flashcards

Public Record

Information a government agency makes available to the public about an event or action.

Signup and view all the flashcards

Private Organization Information

Data held by private companies, often about purchases or voluntary disclosure.

Signup and view all the flashcards

Data Gathering and Privacy

The process of collecting information and its impact on personal privacy.

Signup and view all the flashcards

Nanny Monitoring Case

A case where employers secretly monitored an employee, raising privacy concerns.

Signup and view all the flashcards

Limiting Google Information

Users can control the amount of data Google saves about their activities.

Signup and view all the flashcards

Privacy Checkup

A Google tool that lets users pause the collection of personal information and activity data.

Signup and view all the flashcards

Search Queries (Google)

Information about searches performed through Google.

Signup and view all the flashcards

Location Information (Google)

Google collects data about device location, including travel patterns, frequency, duration, and routes.

Signup and view all the flashcards

Contact and Calendar Information

Data related to contacts and calendar entries.

Signup and view all the flashcards

Voice and Audio Recordings (Google)

Google collects recordings from devices with voice activated features.

Signup and view all the flashcards

YouTube Search Queries

Information about searches performed on YouTube.

Signup and view all the flashcards

YouTube Videos (Watched)

Data about the YouTube videos you have watched.

Signup and view all the flashcards

Collaborative Filtering

A data mining technique that analyzes vast amounts of user preference data to predict what others will like.

Signup and view all the flashcards

Explicit Method (Filtering)

A method of collaborative filtering to predict preferences where users explicitly state their preferences.

Signup and view all the flashcards

Implicit Method (Filtering)

A method of collaborative filtering to predict preferences by tracking user actions and behaviors.

Signup and view all the flashcards

Ownership of Transaction Information

The question of who controls information associated with transactions.

Signup and view all the flashcards

Opt-in

A permission-based approach where a consumer explicitly grants consent.

Signup and view all the flashcards

Opt-out

An approach where organizations can share information unless explicitly disallowed by the consumer.

Signup and view all the flashcards

Facebook Beacon

Automatic targeted advertising where Facebook broadcasts purchase information of users to their friends.

Signup and view all the flashcards

Facebook Timeline & Tagging Data

Facebook collects data on who sees tag suggestions in photos, posts you're tagged in, and tags added to your posts.

Signup and view all the flashcards

Facebook Ads Targeting

Facebook uses factors like relationship status, job, education, and data from partners to target ads.

Signup and view all the flashcards

Opt-out Policy (Beacon)

Users were automatically enrolled in Facebook's advertising program unless they opted out.

Signup and view all the flashcards

Netflix Prize

Netflix offered a $1 million prize for a better algorithm to predict user movie ratings, using user data, including movie ratings.

Signup and view all the flashcards

Mall Shopper Tracking

Malls tracked shopper movement by monitoring location using shoppers' cell phones in 2011.

Signup and view all the flashcards

iPhone Address Book Upload (Path)

Path app uploaded users' iPhone address book data without their permission in 2012.

Signup and view all the flashcards

AOL Search Dataset Privacy Concerns

AOL released user search query data, raising privacy issues and leading to user identification despite anonymity measures.

Signup and view all the flashcards

Consumer Backlash (Lotus)

Lotus's plans to sell a consumer database drew complaints about privacy concerns regarding personal information, leading to abandoning the plans.

Signup and view all the flashcards

Instagram's Terms of Service

Instagram's 2012 proposed terms allowed use of photos in ads without permission.

Signup and view all the flashcards

Study Notes

Chapter 5: Information Privacy

  • This chapter discusses information privacy, including perspectives on privacy, information disclosures, data mining, and examples of consumer or political backlash.

  • Technology, especially computers, databases, and the internet, has made information collection, exchange, and distribution easier than ever, potentially eroding individual privacy.

  • Scott McNealy's quote, "You have zero privacy anyway. Get over it," reflects a perspective on the diminished nature of privacy in the digital age.

  • The tension between the right to privacy and the need to have enough knowledge of others to trust them is explored, along with how organizations collect information about daily activities.

  • The chapter examines how data mining creates profiles of individuals and how this benefits marketers.

  • Methods of collecting personal information are explored, including public records like birth certificates, marriage licenses, and criminal records and information held by private organizations, such as credit card purchases, loyalty cards, voluntary disclosures, and social media posts.

  • The use of data in various applications, such as enhanced 911 service, rewards or loyalty programs, body scanners, RFID tags, implanted chips, mobile apps, and Facebook login and Onstar systems, are discussed.

  • The concept of "cookies," which are small files placed on a computer's hard drive by a web server to store information about user visits to a website, are examined.

  • The General Data Protection Regulation (GDPR) is a set of rules for governing information collection in the European Union that requires companies to disclose information and reasons for collection, as well as obtaining user consent.

  • Data mining is defined as searching records in one or more databases to identify patterns and relationships. This can be used to create profiles of individuals and personalize services for customers.

  • Google's personalized search uses secondary use of collected data, keeping track of search queries and visited web pages to infer interest and suggestions.

  • Collaborative filtering is a form of data mining that analyzes information about user preferences to predict what others may prefer.

  • The question of who controls transaction information (buyer, seller, or both) is raised, and the distinction in privacy between opt-in and opt-out policies is discussed within the ownership of such information.

  • The "Target"-ing pregnant women case study examines how data mining can be used to predict customer behavior, including purchases of items related to pregnancy.

  • The concept of credit reports as a form of information about customers that becomes a commodity is discussed, including how credit bureaus track individual assets, debts, and paying-bill histories and how credit is sold to various lenders.

  • Targeted direct mail is explored as a method of using data to send advertisements only to those most likely to purchase or use the products. This includes an example comparing consumers' shopping habits, frequent fast-food consumption, and subscriptions to premium cable TV with their likelihood of being obese.

  • Microtargeting in politics, examining how political campaigns target voters most likely to support candidates based on voter registration, voting frequency, consumer data, and geographic information system (GIS) data is explained.

  • Social network analysis using collected data from social networks to inform decisions is explained with an example of how Bharti Airtel uses influencers to promote special promotions in India.

  • Ways to control Facebook information are described, including privacy settings and timeline and tagging options.

  • Case studies, such as the Netflix Prize, AOL Search Dataset, and Cambridge Analytica, are discussed, illustrating privacy issues in specific contexts.

  • The conclusion in the chapter summarizes modern information technology advancements impacting information collection and transmission and the evolving relationship between personal desires and business motives.

  • An example of privacy backlash in the real world (Lotus case study) is presented, which describes consumer backlash toward a company's decision to sell personal consumer information.

  • Other issues in the use of technologies like Facebook Beacon and mall-based tracking using cell phones are detailed and provide some context surrounding privacy infringements.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Like This

IT2028 Information Privacy Concepts
37 questions
Ethics for the Information Age Chapter 5
34 questions
Chapter 5: Information Privacy
41 questions
Use Quizgecko on...
Browser
Browser