Information Systems and Privacy Issues
24 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following is NOT a primary privacy issue?

  • Accuracy
  • Transparency (correct)
  • Property
  • Access
  • What type of information do telephone companies typically compile?

  • Credit scores
  • Search history
  • Purchase history
  • Call logs and GPS locations (correct)
  • What is one of the risks of social networking?

  • Improved communication
  • Increased privacy settings
  • Sharing private information (correct)
  • Better job prospects
  • Which of the following best describes information resellers?

    <p>Companies that analyze and sell personal data</p> Signup and view all the answers

    What assumption do people often make about using personal computers online?

    <p>They are completely anonymous</p> Signup and view all the answers

    Which organization typically collects purchase history and payment records?

    <p>Supermarkets</p> Signup and view all the answers

    What can errors in credit history result from?

    <p>Incorrect data entry</p> Signup and view all the answers

    What is a common practice among employers regarding employee monitoring?

    <p>They must inform employees of monitoring</p> Signup and view all the answers

    What is a common technique used by cybercriminals to manipulate individuals into revealing sensitive information?

    <p>Social engineering</p> Signup and view all the answers

    Which type of malware self-replicates over a network and can cause system overload?

    <p>Worms</p> Signup and view all the answers

    What is the function of first-party cookies in web browsing?

    <p>Generated and accessed by the current website</p> Signup and view all the answers

    Which anti-cybercrime law makes it illegal to access unauthorized computer systems?

    <p>Computer Fraud and Abuse Act</p> Signup and view all the answers

    What is a characteristic of a Trojan horse in cybersecurity?

    <p>Attaches itself to legitimate software</p> Signup and view all the answers

    Which of the following describes rogue Wi-Fi hotspots?

    <p>Fake Wi-Fi networks collecting user data</p> Signup and view all the answers

    What are cookies primarily used for?

    <p>Storing information about preferences and browsing habits</p> Signup and view all the answers

    Which type of cookie is created by advertising companies?

    <p>Third-party cookies</p> Signup and view all the answers

    What is the primary purpose of using security software?

    <p>To detect and remove threats</p> Signup and view all the answers

    Which online privacy concept refers to the mistaken belief that one cannot be tracked online?

    <p>The illusion of anonymity</p> Signup and view all the answers

    What is a web bug?

    <p>An invisible image or HTML code used to transmit information</p> Signup and view all the answers

    Which of the following is NOT an aspect of computer security?

    <p>Creating distractions in user interfaces</p> Signup and view all the answers

    What is the main purpose of antispyware programs?

    <p>To detect and remove spyware</p> Signup and view all the answers

    Which form of cybercrime involves assuming someone's identity?

    <p>Identity theft</p> Signup and view all the answers

    What does encrypting data accomplish?

    <p>It encodes data to make it unreadable to unauthorized users</p> Signup and view all the answers

    Which ethical issue is related to using someone else's work without credit?

    <p>Plagiarism</p> Signup and view all the answers

    Study Notes

    Information Systems

    • Information systems consist of people, procedures, software, hardware, data, and the internet
    • Positive impacts of technology are widely acknowledged
    • Negative impacts are also important to acknowledge and address

    Effective Implementation of Computer Technology

    • Maximizing positive effects while minimizing negative effects is crucial
    • Key concerns are privacy, security, and ethics

    Privacy

    • Technology enables collection and use of vast data about individuals
    • Web browsing, shopping, and phone calls generate data
    • Concerns arise regarding data collection, usage, and accuracy
    • Issues include accuracy (correctness of data), property (ownership of data), and access (control)

    Large Databases

    • Large organizations constantly compile information about individuals
    • Government agencies alone have over 2,000 databases
    • Daily data collection includes phone calls, GPS locations, credit card transactions
    • Recording of shopping habits, financial records, and search histories

    Privacy Concerns

    • Accuracy: Responsibility of data collectors to maintain data correctness.
    • Property: Determining ownership of data.
    • Access: Determining who can access and use the data.

    Information Resellers

    • Information resellers are a new industry that collects and sells personal data.
    • These individuals use public and private databases to create profiles about people.
    • Employers may use social media profiles for decision-making concerning employment.
    • Social networks facilitating information sharing create risks.

    Sharing Information Inadvertently

    • Sharing personal data without knowledge or consent is becoming more frequent.
    • Examples: Being tagged in photos on social media.

    Spreading Inaccurate Information

    • Mistakes can lead to inaccurate information, which can lead to denial of services like home loans, or job opportunities.
    • Errors in record-keeping can create erroneous profiles and prevent people from obtaining or retaining employment

    Privacy Threats

    • Examples include spyware, phishing information, web bugs, and malicious hardware.

    The Internet and The Web

    • Illusion of anonymity is commonplace: people think their information remains private
    • IP (Internet Protocol) addresses uniquely identify every computer and trace activities
    • Usage of IP addresses for tracking internet activities and determining origins of illegal crimes is common

    Cookies

    • Cookies are small data files deposited on a user's computer by websites visited.
    • First-party cookies track user activity on the current website
    • Third-party cookies track user activity across multiple websites.

    Deleting Browsing History

    • Users can delete their browsing history to protect privacy
    • Browsers offer various privacy modes, like Incognito Mode and Private Browsing.

    Web Bugs

    • Invisible images or code used to transmit information without user knowledge.
    • Examples of usage are tracking email openings, or web activity.

    Spyware

    • Programs designed to track user activity on the internet without consent.
    • Spyware can record keystrokes, passwords, and other sensitive information.

    Malicious Software

    • Includes viruses, worms, and Trojan horses
    • Designed to disrupt or damage computer systems

    Viruses

    • Designed to spread through networks or operating systems
    • Attach themselves to existing programs
    • May be harmless or very damaging

    Worms

    • Self-replicating programs that clog networks until they slow or stop functioning

    Trojan Horses

    • Seem like harmless software but cause harm
    • These can be carriers of viruses, which cause more harm.

    Malicious Hardware

    • Examples include zombie botnets, rogue Wi-Fi hotspots, and infected USB flash drives

    Security

    • Computer security involves protecting information, hardware, and software from theft, damage, and unauthorized use.
    • Care is needed regarding hardware, and software security

    Cybercrime

    • Illegal activities conducted using computer systems and networks, targeting millions each year
    • Costs billions and affects many lives worldwide
    • Identity theft is one of the most significant types
    • Additional cybercrimes: internet scams, data manipulation, ransomware, and denial of service attacks (DDoS)

    Ethics

    • Moral conduct guidelines for computer usage
    • Ethical concerns for maintaining accuracy, data ownership and access control.
    • Copyright: Legal rights of content creators for use and distribution of their created content.
    • Content creators have legal rights to control use and distribution of their work (music, films, video games)
    • Violations include unauthorized copying which is a copyright violation
    • Software piracy involves unauthorized copying and distribution of software
    • Digital rights management (DRM) used to restrict access and control the number of devices using a given file

    Cyberbullying

    • Using the internet, smartphones, or other devices to hurt or embarrass someone
    • Cyberbullying can affect reputations, negatively impact well being, and lead to severe legal repercussions.

    Plagiarism

    • Presenting another person's work or ideas as one's own without proper credit
    • Computer tech has made it easier to copy without proper acknowledgement.

    Preventing Data Loss

    • Data can be replaced; however, a company's data may not be irreplaceable
    • Backups, redundancy, and off-site storage protect data from threats, like theft, fire, or floods.

    Measures to Protect Computer Security

    • Criminals can access computer systems in several ways, including viewing data (and potentially damaging)
    • Using passwords, restricting access and encrypting data can mitigate this risk

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    Explore the intricate world of information systems and their impact on society. This quiz addresses both the benefits and pitfalls of computer technology, with a particular focus on privacy, data accuracy, and ethics. Understand the dynamics of data collection and the implications for individuals.

    More Like This

    Data Integrity Quiz
    10 questions

    Data Integrity Quiz

    CelebratedBeige avatar
    CelebratedBeige
    Privacy and Security in eConestoga
    10 questions
    Health Information Systems Security Quiz
    26 questions
    Use Quizgecko on...
    Browser
    Browser