Information Systems and Privacy Issues
24 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following is NOT a primary privacy issue?

  • Accuracy
  • Transparency (correct)
  • Property
  • Access

What type of information do telephone companies typically compile?

  • Credit scores
  • Search history
  • Purchase history
  • Call logs and GPS locations (correct)

What is one of the risks of social networking?

  • Improved communication
  • Increased privacy settings
  • Sharing private information (correct)
  • Better job prospects

Which of the following best describes information resellers?

<p>Companies that analyze and sell personal data (C)</p> Signup and view all the answers

What assumption do people often make about using personal computers online?

<p>They are completely anonymous (D)</p> Signup and view all the answers

Which organization typically collects purchase history and payment records?

<p>Supermarkets (D)</p> Signup and view all the answers

What can errors in credit history result from?

<p>Incorrect data entry (A)</p> Signup and view all the answers

What is a common practice among employers regarding employee monitoring?

<p>They must inform employees of monitoring (D)</p> Signup and view all the answers

What is a common technique used by cybercriminals to manipulate individuals into revealing sensitive information?

<p>Social engineering (A)</p> Signup and view all the answers

Which type of malware self-replicates over a network and can cause system overload?

<p>Worms (D)</p> Signup and view all the answers

What is the function of first-party cookies in web browsing?

<p>Generated and accessed by the current website (C)</p> Signup and view all the answers

Which anti-cybercrime law makes it illegal to access unauthorized computer systems?

<p>Computer Fraud and Abuse Act (D)</p> Signup and view all the answers

What is a characteristic of a Trojan horse in cybersecurity?

<p>Attaches itself to legitimate software (D)</p> Signup and view all the answers

Which of the following describes rogue Wi-Fi hotspots?

<p>Fake Wi-Fi networks collecting user data (B)</p> Signup and view all the answers

What are cookies primarily used for?

<p>Storing information about preferences and browsing habits (D)</p> Signup and view all the answers

Which type of cookie is created by advertising companies?

<p>Third-party cookies (D)</p> Signup and view all the answers

What is the primary purpose of using security software?

<p>To detect and remove threats (D)</p> Signup and view all the answers

Which online privacy concept refers to the mistaken belief that one cannot be tracked online?

<p>The illusion of anonymity (B)</p> Signup and view all the answers

What is a web bug?

<p>An invisible image or HTML code used to transmit information (B)</p> Signup and view all the answers

Which of the following is NOT an aspect of computer security?

<p>Creating distractions in user interfaces (A)</p> Signup and view all the answers

What is the main purpose of antispyware programs?

<p>To detect and remove spyware (A)</p> Signup and view all the answers

Which form of cybercrime involves assuming someone's identity?

<p>Identity theft (B)</p> Signup and view all the answers

What does encrypting data accomplish?

<p>It encodes data to make it unreadable to unauthorized users (B)</p> Signup and view all the answers

Which ethical issue is related to using someone else's work without credit?

<p>Plagiarism (C)</p> Signup and view all the answers

Flashcards

Personal Data

Information about an individual, such as name, address, and phone number.

Privacy

The right to control how personal information is collected, used, and shared.

Privacy Issues

Issues related to the accuracy, ownership, and access of personal data.

Personally Identifying Information (PII)

Information that can be used to identify an individual, even if it's publicly available.

Signup and view all the flashcards

IP Address

A unique numerical address assigned to every device on the internet that allows communication.

Signup and view all the flashcards

Cookies

Files stored by websites on your computer to remember information about you, such as your preferences or login details.

Signup and view all the flashcards

Employee Monitoring

The practice of employers monitoring employee emails and computer activity.

Signup and view all the flashcards

Electronic Profile

A detailed electronic profile of an individual created by information resellers using publicly available data.

Signup and view all the flashcards

First-party cookie

Cookies created and accessed only by the website you're visiting.

Signup and view all the flashcards

Third-party cookie

Cookies created by other websites, often for tracking your activity across multiple websites.

Signup and view all the flashcards

Web bugs

Invisible images or HTML code that track your online activity without your knowledge.

Signup and view all the flashcards

Spyware

Software that secretly records your online activity and potentially makes changes to your browser settings.

Signup and view all the flashcards

Keyloggers

Programs that record every keystroke you make, including passwords and credit card information.

Signup and view all the flashcards

Ethics

Standards of moral conduct that guide the use of computers.

Signup and view all the flashcards

Computer security

Protecting information, hardware, and software from unauthorized access, damage, and theft.

Signup and view all the flashcards

Strengthening Passwords

Creating complex and difficult-to-guess passwords to protect accounts from unauthorized access.

Signup and view all the flashcards

Using Security Software

Using software like antivirus, spyware detection, and firewalls to protect your computer and data from online threats.

Signup and view all the flashcards

Social Engineering

Techniques used by attackers to trick people into revealing sensitive information, often through social interaction.

Signup and view all the flashcards

Malicious Software

Programs designed to intentionally damage computer systems, steal data, or disrupt operations.

Signup and view all the flashcards

The Illusion of Anonymity

The perception that online activity is private when, in reality, IP addresses can be tracked, leaving a digital footprint.

Signup and view all the flashcards

Privacy Mode

A browser setting that temporarily prevents information from being saved on a hard drive, offering short-term privacy.

Signup and view all the flashcards

Study Notes

Information Systems

  • Information systems consist of people, procedures, software, hardware, data, and the internet
  • Positive impacts of technology are widely acknowledged
  • Negative impacts are also important to acknowledge and address

Effective Implementation of Computer Technology

  • Maximizing positive effects while minimizing negative effects is crucial
  • Key concerns are privacy, security, and ethics

Privacy

  • Technology enables collection and use of vast data about individuals
  • Web browsing, shopping, and phone calls generate data
  • Concerns arise regarding data collection, usage, and accuracy
  • Issues include accuracy (correctness of data), property (ownership of data), and access (control)

Large Databases

  • Large organizations constantly compile information about individuals
  • Government agencies alone have over 2,000 databases
  • Daily data collection includes phone calls, GPS locations, credit card transactions
  • Recording of shopping habits, financial records, and search histories

Privacy Concerns

  • Accuracy: Responsibility of data collectors to maintain data correctness.
  • Property: Determining ownership of data.
  • Access: Determining who can access and use the data.

Information Resellers

  • Information resellers are a new industry that collects and sells personal data.
  • These individuals use public and private databases to create profiles about people.
  • Employers may use social media profiles for decision-making concerning employment.
  • Social networks facilitating information sharing create risks.

Sharing Information Inadvertently

  • Sharing personal data without knowledge or consent is becoming more frequent.
  • Examples: Being tagged in photos on social media.

Spreading Inaccurate Information

  • Mistakes can lead to inaccurate information, which can lead to denial of services like home loans, or job opportunities.
  • Errors in record-keeping can create erroneous profiles and prevent people from obtaining or retaining employment

Privacy Threats

  • Examples include spyware, phishing information, web bugs, and malicious hardware.

The Internet and The Web

  • Illusion of anonymity is commonplace: people think their information remains private
  • IP (Internet Protocol) addresses uniquely identify every computer and trace activities
  • Usage of IP addresses for tracking internet activities and determining origins of illegal crimes is common

Cookies

  • Cookies are small data files deposited on a user's computer by websites visited.
  • First-party cookies track user activity on the current website
  • Third-party cookies track user activity across multiple websites.

Deleting Browsing History

  • Users can delete their browsing history to protect privacy
  • Browsers offer various privacy modes, like Incognito Mode and Private Browsing.

Web Bugs

  • Invisible images or code used to transmit information without user knowledge.
  • Examples of usage are tracking email openings, or web activity.

Spyware

  • Programs designed to track user activity on the internet without consent.
  • Spyware can record keystrokes, passwords, and other sensitive information.

Malicious Software

  • Includes viruses, worms, and Trojan horses
  • Designed to disrupt or damage computer systems

Viruses

  • Designed to spread through networks or operating systems
  • Attach themselves to existing programs
  • May be harmless or very damaging

Worms

  • Self-replicating programs that clog networks until they slow or stop functioning

Trojan Horses

  • Seem like harmless software but cause harm
  • These can be carriers of viruses, which cause more harm.

Malicious Hardware

  • Examples include zombie botnets, rogue Wi-Fi hotspots, and infected USB flash drives

Security

  • Computer security involves protecting information, hardware, and software from theft, damage, and unauthorized use.
  • Care is needed regarding hardware, and software security

Cybercrime

  • Illegal activities conducted using computer systems and networks, targeting millions each year
  • Costs billions and affects many lives worldwide
  • Identity theft is one of the most significant types
  • Additional cybercrimes: internet scams, data manipulation, ransomware, and denial of service attacks (DDoS)

Ethics

  • Moral conduct guidelines for computer usage
  • Ethical concerns for maintaining accuracy, data ownership and access control.
  • Copyright: Legal rights of content creators for use and distribution of their created content.
  • Content creators have legal rights to control use and distribution of their work (music, films, video games)
  • Violations include unauthorized copying which is a copyright violation
  • Software piracy involves unauthorized copying and distribution of software
  • Digital rights management (DRM) used to restrict access and control the number of devices using a given file

Cyberbullying

  • Using the internet, smartphones, or other devices to hurt or embarrass someone
  • Cyberbullying can affect reputations, negatively impact well being, and lead to severe legal repercussions.

Plagiarism

  • Presenting another person's work or ideas as one's own without proper credit
  • Computer tech has made it easier to copy without proper acknowledgement.

Preventing Data Loss

  • Data can be replaced; however, a company's data may not be irreplaceable
  • Backups, redundancy, and off-site storage protect data from threats, like theft, fire, or floods.

Measures to Protect Computer Security

  • Criminals can access computer systems in several ways, including viewing data (and potentially damaging)
  • Using passwords, restricting access and encrypting data can mitigate this risk

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Description

Explore the intricate world of information systems and their impact on society. This quiz addresses both the benefits and pitfalls of computer technology, with a particular focus on privacy, data accuracy, and ethics. Understand the dynamics of data collection and the implications for individuals.

More Like This

Privacy and Security in eConestoga
10 questions
Health Information Systems Security Quiz
26 questions
IT ENGLISH: Research Topic - 5G Technology
100 questions
Use Quizgecko on...
Browser
Browser