Exam 11: Cybercrimes and Cyberliberties: Surveillance, Privacy and Crime Control

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

This was the name of the program that allowed the NSA to access the servers of companies and services like Yahoo!, Google, Facebook, and YouTube for user data.?

Free
(Multiple Choice)
4.8/5
(35)
Correct Answer:
Verified

A

_______________ are those who specialize in creating datasets of information about individuals which can then be sold.?

Free
(Multiple Choice)
4.7/5
(32)
Correct Answer:
Verified

B

What was the purpose in the creation of the European Union's General Data Protection Regulation (GDPR)?

Free
(Multiple Choice)
4.9/5
(36)
Correct Answer:
Verified

B

The USA PATRIOT Act expended the powers provided by this law to conduct electronic searches without probably cause when gathering foreign intelligence.?

(Multiple Choice)
4.8/5
(33)

What is the 'Going Dark' phenomenon?

(Multiple Choice)
4.9/5
(35)

What is the basic premise of Michel Foucault's (1977) 'panopticism'?

(Multiple Choice)
4.9/5
(24)

This organization gained and retained data on up to 87 million Facebook users without their permission and are accused of having used that data to engage in "psychographic targeting" advertisements, including during the 2016 Trump presidential campaign.?

(Multiple Choice)
4.8/5
(38)

A _______________ attack attempts to break cryptographic protections by using a computer to run through all possible combinations of a key to break a cipher.?

(Multiple Choice)
4.7/5
(28)

This is a method where data is reordered according to a pattern specified by a key where, without access to this key, one does not know how to rearrange and view the content.?

(Multiple Choice)
5.0/5
(45)

This was an esoteric initiative where a network of satellite interception stations, microwave ground stations, spy satellites, radio listening posts, and secret facilities could examine almost any telephone call, fax transmission, and email around the world, daily.?

(Multiple Choice)
4.8/5
(28)

The first internet surveillance technology was _______________.?

(Multiple Choice)
4.7/5
(31)

Individuals leave behind data generated as a by-product of people's online activities in what Zuboff (2015) calls _______________.?

(Multiple Choice)
4.8/5
(41)

_______________ are small files created every time a user visits a website.?

(Multiple Choice)
4.8/5
(46)

Government actors have tried to introduce a so-called 'key deposit' or 'key-escrow' system, where _______________.?

(Multiple Choice)
4.9/5
(35)

What is Castells (1996) idea of the 'space of flows'?

(Multiple Choice)
4.9/5
(41)

How do most current social media platforms generate revenue?

(Multiple Choice)
4.7/5
(31)

A _______________ is a person or organization that collects massive amounts of personal data and sells them to companies.?

(Multiple Choice)
4.9/5
(31)

This individual used to be an employee for the US National Security Agency (NSA) where he leaked to journalists the details of a massive surveillance apparatus operated by the US government.?

(Multiple Choice)
4.8/5
(36)
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)