Chapter 19 - OMIS 3710

0.0(0)
studied byStudied by 0 people
0.0(0)
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/66

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 7:00 PM on 12/3/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

67 Terms

1
New cards

Term: deepfakes

Definition: Sophisticated media (audio, image, video) created by AI that attempts to look or sound like a real person or event.

2
New cards

What is the 'black box' problem in the context of AI?

It refers to the difficulty of understanding how AI systems, especially those using deep learning, arrive at their decisions, making their internal logic opaque.

3
New cards

Feeding incorrect data to an AI to generate incorrect results is known as _.

data poisoning

4
New cards

What is 'prompt-injection' in the context of generative AI?

It is the act of compromising a generative AI by entering prompts that cause it to behave in unintended ways.

5
New cards

What type of bias was discovered in Amazon's AI-based system for analyzing job applicant resumes?

The system had learned to favor male applicants and downgrade women.

6
New cards

What issue did a Bloomberg investigation find regarding generative AI and images of workers in different pay scales?

It found that AI generated images of lighter-skinned workers for higher-paying jobs and darker-skinned workers as the pay scale decreased.

7
New cards

Term: Hallucinations (AI)

Definition: A phenomenon where an AI generates incorrect or fabricated information but presents it as factual.

8
New cards

According to Richard O. Mason, what are the four ethical issues of the Information Age?

Privacy, Accuracy, Property, and Accessibility (PAPA).

9
New cards

The ethical issue of _ deals with who is responsible for the authenticity, fidelity, and accuracy of information.

Accuracy

10
New cards

The ethical issue of _ concerns what information an individual or organization has a right to obtain about others and under what conditions.

Accessibility

11
New cards

The ethical issue of _ relates to who owns information about individuals and how it can be sold and exchanged.

Property

12
New cards

The ethical issue of _ is concerned with what information about oneself a person must reveal to others and what can be kept to oneself.

Privacy

13
New cards

Term: cookie (web)

Definition: A small text file or line of uniquely identifying text given to a web browser by a web server, used for tracking and identification.

14
New cards

What is NORA (Nonobvious Relationship Awareness)?

A data analysis technology that can find obscure hidden connections between people or entities by analyzing information from multiple sources.

15
New cards

What is the difference between a first-party cookie and a third-party cookie?

A first-party cookie is set by the website you are currently visiting, while a third-party cookie is set by a different entity, often an ad network.

16
New cards

Term: zero-party data

Definition: Data that a customer explicitly and intentionally shares with a company, such as profile information or preferences.

17
New cards

Term: first-party data

Definition: Data collected by a firm directly through its interactions with its customers, such as browsing history on its own site.

18
New cards

Term: second-party data

Definition: Data that is collected by one firm and shared directly with a partner organization.

19
New cards

Term: third-party data

Definition: Data collected by a company that has no direct relationship with the customer from whom the data was gathered.

20
New cards

Term: geotargeting

Definition: The practice of identifying a user’s physical location to deliver tailored ads or other content.

21
New cards

Term: IP address

Definition: A unique value used to identify a device connected to the Internet, typically expressed as four numbers separated by periods.

22
New cards

What is a major limitation of using facial recognition systems trained primarily on Caucasian faces?

They have been shown to be weaker and less accurate in identifying people of color.

23
New cards

The high cost of training models like GPT-3, which consumes vast amounts of energy and water, is an example of what type of AI risk?

Scale that concentrates power and carries an environmental impact.

24
New cards

Term: Red Teaming

Definition: A security testing method where an unaffiliated group deliberately tries to undermine a system's safety procedures to find vulnerabilities before deployment.

25
New cards

Term: change management

Definition: Refers to techniques used to facilitate organizational change, including preparing individuals and offering training and support.

26
New cards

What is a key reason for the lack of diversity in AI development teams, which can contribute to biased AI systems?

AI education is predominantly male (80% male professors), and major tech firms have low representation of female and Black employees in their AI teams.

27
New cards

What international accord, signed by organizations like Amnesty International and Human Rights Watch, called on algorithms to respect human rights?

The Toronto Declaration.

28
New cards

What is a 'systems review board' recommended for deploying ethical systems?

A board with diverse voices involved in identifying, preventing, or responding to ethical issues that may arise from technology.

29
New cards

Term: audit trail

Definition: A record that exposes how and when information systems are used, allowing the reconstruction of how a particular outcome was reached.

30
New cards

What is COBIT?

A best-practices framework for IT governance that includes guidance on implementation, monitoring, and improving IT systems (Control Objectives for Information and Related Technologies).

31
New cards

What is ITIL?

IT Infrastructure Library, a framework covering best practices for delivering IT services.

32
New cards

What privacy concerns were raised by the method used to catch the Golden State Killer?

Using a public DNA database (GEDmatch) exposed the genetic information of the killer's relatives without their consent, raising questions about genetic privacy.

33
New cards

What are the three main factors driving the growth of online advertising?

Increased user time online, improved measurement and accountability, and advanced targeting capabilities.

34
New cards

Term: impressions (advertising)

Definition: Each time an ad is shown to a user.

35
New cards

Term: cost-per-click (CPC)

Definition: An advertising payment model where advertisers pay only when a user clicks on their ad.

36
New cards

Term: CPM (advertising)

Definition: Cost per mille, the amount an advertiser is charged for every 1,000 impressions of an advertisement.

37
New cards

Term: cost-per-action (CPA)

Definition: An advertising model where payment is based on a user performing a specified activity, like a purchase or sign-up.

38
New cards

Term: affiliate program

Definition: A cost-per-action program where sponsors pay referring websites a percentage of revenue earned from the referral.

39
New cards

Term: tracking pixels

Definition: Invisible single-pixel images served on a webpage or email that can report back if a user has visited the page or opened the message.

40
New cards

Term: retargeting

Definition: Also called remarketing, it is the practice of showing targeted ads to a user on other sites after they have already visited an advertiser's site.

41
New cards

Term: ad network

Definition: An entity that links advertisers to websites and other content providers willing to host advertisements in exchange for payment.

42
New cards

What is IDFA?

Identifier for Advertisers; a unique identifier that iOS developers use to track in-app user activity.

43
New cards

What is Apple's ATT framework?

App Tracking Transparency; Apple’s opt-in privacy framework that requires all iOS apps to ask users for permission before tracking their data.

44
New cards

What is the difference between an 'opt-in' and 'opt-out' privacy setting?

Opt-in requires a user to explicitly give permission for data tracking, whereas opt-out assumes permission is granted by default unless the user actively revokes it.

45
New cards

Term: tracking URL

Definition: A URL that includes additional information appended to the end, which allows activity (like clicks or shares) to be tracked.

46
New cards

What is a proxy server?

A third-party computer that passes traffic between a user and the internet, masking the user's original IP address.

47
New cards

Term: virtual private network (VPN)

Definition: A service that creates a private, encrypted connection across the public Internet, making a user's communication appear to originate from the VPN provider's network.

48
New cards

Besides an IP address, what is a highly accurate method for geolocating a device, provided it has a clear view of the sky?

Global Positioning System (GPS).

49
New cards

What is 'triangulation' in the context of cell phone location tracking?

It is a method of determining a device's location by measuring its distance from three or more nearby cell towers.

50
New cards

Term: ACR (television technology)

Definition: Automated Content Recognition; technology that identifies the content being played on a device by recognizing bits of an image, video, or audio.

51
New cards

Term: DAI (television technology)

Definition: Dynamic Ad Insertion; technology that inserts targeted video advertising into television programming.

52
New cards

What is the GDPR?

The General Data Protection Regulation, a comprehensive data protection law in the European Union that governs data privacy and security.

53
New cards

What unintended security consequence arose from the implementation of GDPR?

It led to a worldwide bombardment of cookie consent requests, causing 'banner blindness' where users click 'accept' without reading, potentially agreeing to insecure practices.

54
New cards

Term: data governance

Definition: The process to monitor and control an organization’s information technology and systems to ensure proper data management.

55
New cards

Term: data compliance

Definition: The practice of ensuring that an organization follows all external requirements and internal policies for data protection and security.

56
New cards

What is PIPEDA?

The Personal Information Protection and Electronic Documents Act, which is the federal privacy law for private-sector organizations in Canada.

57
New cards

Principle 3 of PIPEDA, 'Consent', requires that an individual's knowledge and consent are needed for the , , or _ of personal information.

collection, use, or disclosure

58
New cards

Principle 7 of PIPEDA, 'Safeguards', dictates that personal information must be protected by what?

Security safeguards appropriate to the sensitivity of the information.

59
New cards

Under the _ theory of business ethics, the primary goal is to maximize wealth for shareholders in legal and non-fraudulent ways.

Stockholder

60
New cards

What is the core principle of the Stakeholder theory of business ethics?

To maximize benefits to all stakeholders (e.g., employees, customers, suppliers, community) while weighing the costs to competing interests.

61
New cards

What is the main objective of the Social Contract theory of business ethics?

To create value for society in a manner that is just and nondiscriminatory.

62
New cards

In the context of AI, what is meant by the 'terrorist’s trifecta'?

The combination of vast digital data, user-friendly AI, and a community of miscreants sharing information, creating numerous ways to cause harm.

63
New cards

What was the consequence of Google's initial attempt to create an AI ethics board?

It collapsed almost immediately due to controversy over its members.

64
New cards

Why might a firm be legally liable if it uses an AI code generator that returns copyrighted code?

The use of copyrighted material without permission constitutes infringement, and the firm using the code could be held responsible.

65
New cards

A key skill for managers regarding AI will be knowing how to handle technology along a continuum of _, which includes discrimination, abuse, and power concentration.

extremes (or short- and mid-term risks)

66
New cards

The ability of generative AI to transform a photo of an Asian woman into a white woman when asked for a 'professional' photo is an example of what AI risk?

Algorithmic bias (specifically racial bias).

67
New cards

Explore top flashcards

OMM II Terms (4)
Updated 1012d ago
flashcards Flashcards (40)
peds exam 1
Updated 739d ago
flashcards Flashcards (95)
Cognition 2
Updated 1044d ago
flashcards Flashcards (60)
Final practice
Updated 1157d ago
flashcards Flashcards (106)
EP Test 1
Updated 1158d ago
flashcards Flashcards (63)
E1T2: La familia
Updated 87d ago
flashcards Flashcards (74)
OMM II Terms (4)
Updated 1012d ago
flashcards Flashcards (40)
peds exam 1
Updated 739d ago
flashcards Flashcards (95)
Cognition 2
Updated 1044d ago
flashcards Flashcards (60)
Final practice
Updated 1157d ago
flashcards Flashcards (106)
EP Test 1
Updated 1158d ago
flashcards Flashcards (63)
E1T2: La familia
Updated 87d ago
flashcards Flashcards (74)