Chapter 2 Quiz IT Ethics

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/28

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

29 Terms

1
New cards

What does “privacy” mean in the context of technology?

The ability to control personal information and limit who can access, use, and share it, especially as new technologies create new risks.

2
New cards

Name two privacy risks introduced by search engines or smartphone apps.

Tracking via cookies, unauthorized data collection, profiling, data resale, and location tracking.

3
New cards

What is “informed consent” in data privacy?

When users are fully aware of what data is collected, how it will be used, and they voluntarily agree.

4
New cards

Define “secondary use of data.”

Using data for a purpose different from the one for which it was originally collected.

5
New cards

Give an example of “data mining” or “matching.”

Combining shopping history with demographic data to predict purchases; linking databases to profile users.

6
New cards

What is “profiling”?

Building a digital profile of an individual based on their behaviors, purchases, and online activities.

7
New cards

How do companies make money from consumer information?

Selling or sharing data to advertisers, marketers, and other businesses for targeted ads or analytics.

8
New cards

What are the responsibilities of “free services” like social media?

To handle data ethically, protect user privacy, and clearly disclose how information is used.

9
New cards

What privacy issue do location tracking and implanted chips raise?

Loss of anonymity and potential government or corporate surveillance.

10
New cards

What does the Fourth Amendment protect?

People’s right to be secure against unreasonable searches and seizures; requires probable cause and warrants.

11
New cards

Why are new technologies challenging for the Fourth Amendment?

Laws were written before mobile tracking, drones, and mass surveillance — courts must reinterpret protections.

12
New cards

Give an example of government overreach in privacy.

Secret surveillance programs, warrantless wiretapping, or excessive data collection from private companies.

13
New cards

Name two risks of government use of private sector data.

Privacy violations (e.g., data leaks), misuse for surveillance or profiling.

14
New cards

What is the difference between SSN and Real ID systems?

SSN is not designed for identification; Real ID creates a standardized national ID system.

15
New cards

What is encryption’s role in protecting privacy?

It secures data so unauthorized parties cannot read or tamper with it.

16
New cards

What is the debate between free market view vs. consumer protection view of privacy?

Free market: people choose how much data to share; Consumer protection: laws must safeguard privacy regardless.

17
New cards

What is the “right to be forgotten”?

The ability to have certain personal data removed from search results or databases.

18
New cards

How do EU privacy regulations differ from U.S. regulations?

EU has stronger, comprehensive protections (e.g., GDPR), U.S. has sector-specific and less uniform privacy laws.

19
New cards

What is “opt-in” vs. “opt-out”?

Opt-in: users must actively agree to data collection. Opt-out: data is collected by default unless users disable it.

20
New cards

How does informed consent relate to browser “Do Not Track”?

Users must be aware of tracking and have a choice to allow or reject it.

21
New cards

What ethical issue is raised when attorneys search jurors’ social media?

Potential manipulation of arguments and invasion of jurors’ privacy.

22
New cards

When might posting someone’s photo online require permission?

When it could harm reputation, disclose private information, or violate their consent (ethical obligation).

23
New cards

Should drones over private backyards require warrants?

Many argue yes — it raises Fourth Amendment issues and property rights concerns.

24
New cards

What are benefits of RFID and facial recognition?

Security, convenience, faster identification.

25
New cards

What are risks of RFID and facial recognition?

Tracking without consent, data breaches, misuse by governments or hackers.

26
New cards

Name three major privacy-related U.S. regulations.

FERPA (student records), HIPAA (medical data), COPPA (children’s online data).

27
New cards

Which privacy regulation is most effective and why?

HIPAA — strong penalties and clear rules for safeguarding medical data (or answer can vary if argued well).

28
New cards

Give one pro and one con of businesses providing “free” services in exchange for tracking data.

Pro: Access to useful services without paying. Con: Exploits privacy, especially for low-income users.

29
New cards

What are guidelines for emotion-detection systems?

Use only with informed consent, restrict manipulative use, ensure transparency and data protection.