Deck 5: Information Privacy

Full screen (f)
exit full mode
Question
Manufacturers are replacing bar codes with because they give more information about the product and are easier to scan.
Use Space or
up arrow
down arrow
to flip the card.
Question
The process of searching through one or more databases, looking for patterns or relationships, is called .
Question
With enhanced 911 service, cell phone providers are able to of active cell phone users.
Question
An example of a public record is

A) a birth certificate.
B) a marriage license.
C) a deed to a house.
D) a record of a criminal conviction.
E) All of the above
Question
When information collected for one purpose is put to another purpose, that is called a of the data.
Question
Most commentators cite the benefits of privacy as a reason why people ought to have some privacy rights. A right that benefits society is called a

A) Constitutional right.
B) legal right.
C) natural right.
D) prudential right.
E) social right.
Question
A public record contains information about an incident or action reported to a government agency for the purpose of

A) enhancing public safety.
B) informing the public.
C) protecting the innocent.
D) regulating the economy.
E) upholding the law.
Question
Who wrote an influential paper in the 1890s urging that privacy rights be enacted into law?

A) Benn and Brandeis
B) Benn and Thomson
C) Levine and Benn
D) Thomson and Warren
E) Warren and Brandeis
Question
When information is put to another purpose, that is called a

A) backdoor exploit.
B) collaborative filter.
C) cookie.
D) data leveraging opportunity.
E) secondary use of the data.
Question
A contains information about an incident or action reported to a government agency for the purpose of informing the public.
Question
An RFID is

A) a magnetic bar code.
B) a microscopic bar code.
C) a wireless transmitter.
D) a biometric identification device.
E) a random field interferometry device.
Question
A policy that requires the consumer to explicitly give permission before an organization can share information with another organization is called

A) fair use.
B) full disclosure.
C) nondisclosure.
D) opt-in.
E) opt-out.
Question
Flash cookies are controversial, in part, because

A) they are commonly used by identify thieves to steal credit card numbers.
B) they consume huge amounts of hard disk space.
C) they allow online retailers such as Amazon.com to track online shopping on other Web sites.
D) they are not controlled by the privacy controls of most Web browsers.
E) All of the above
Question
The Third Amendment to the U.S. Constitution has to do with

A) freedom of speech and religion.
B) search warrants.
C) the right to bear arms.
D) quartering of soldiers in private homes.
E) self-incrimination.
Question
Who wrote that every violation of a "privacy right" is also a violation of another right?

A) Stanley Benn
B) Louis Brandeis
C) Morton Levine
D) Judith Jarvis Thomson
E) Samuel Warren
Question
The OnStar system allows

A) a vehicle owner to initiate a conversation with an OnStar representative.
B) the vehicle to automatically send a message to an OnStar representative after an accident.
C) an OnStar representative to disable the gas pedal of the vehicle without the driver's permission.
D) a and b
E) a, b, and c
Question
suggested that we do not have to define privacy rights because every "privacy right" violation is a violation of another right as well.
Question
In 1890 Harvard-trained lawyers wrote a highly influential article in the Harvard Law Review stating that people in modern society have a right to privacy and that this right ought to be respected.
Question
The process of searching through many records in one or more databases looking for patterns or relationships is called

A) credit reporting.
B) data mining.
C) information gathering.
D) microtargeting.
E) pattern matching.
Question
A is a file containing information about your visits to a Web site that is placed on your computer's hard drive by a Web server
Question
Thanks to , you can get a credit card from a bank or store with which you have never done business.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/21
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 5: Information Privacy
1
Manufacturers are replacing bar codes with because they give more information about the product and are easier to scan.
RFIDs / RFID tags
2
The process of searching through one or more databases, looking for patterns or relationships, is called .
data mining
3
With enhanced 911 service, cell phone providers are able to of active cell phone users.
determine the location
4
An example of a public record is

A) a birth certificate.
B) a marriage license.
C) a deed to a house.
D) a record of a criminal conviction.
E) All of the above
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
5
When information collected for one purpose is put to another purpose, that is called a of the data.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
6
Most commentators cite the benefits of privacy as a reason why people ought to have some privacy rights. A right that benefits society is called a

A) Constitutional right.
B) legal right.
C) natural right.
D) prudential right.
E) social right.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
7
A public record contains information about an incident or action reported to a government agency for the purpose of

A) enhancing public safety.
B) informing the public.
C) protecting the innocent.
D) regulating the economy.
E) upholding the law.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
8
Who wrote an influential paper in the 1890s urging that privacy rights be enacted into law?

A) Benn and Brandeis
B) Benn and Thomson
C) Levine and Benn
D) Thomson and Warren
E) Warren and Brandeis
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
9
When information is put to another purpose, that is called a

A) backdoor exploit.
B) collaborative filter.
C) cookie.
D) data leveraging opportunity.
E) secondary use of the data.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
10
A contains information about an incident or action reported to a government agency for the purpose of informing the public.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
11
An RFID is

A) a magnetic bar code.
B) a microscopic bar code.
C) a wireless transmitter.
D) a biometric identification device.
E) a random field interferometry device.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
12
A policy that requires the consumer to explicitly give permission before an organization can share information with another organization is called

A) fair use.
B) full disclosure.
C) nondisclosure.
D) opt-in.
E) opt-out.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
13
Flash cookies are controversial, in part, because

A) they are commonly used by identify thieves to steal credit card numbers.
B) they consume huge amounts of hard disk space.
C) they allow online retailers such as Amazon.com to track online shopping on other Web sites.
D) they are not controlled by the privacy controls of most Web browsers.
E) All of the above
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
14
The Third Amendment to the U.S. Constitution has to do with

A) freedom of speech and religion.
B) search warrants.
C) the right to bear arms.
D) quartering of soldiers in private homes.
E) self-incrimination.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
15
Who wrote that every violation of a "privacy right" is also a violation of another right?

A) Stanley Benn
B) Louis Brandeis
C) Morton Levine
D) Judith Jarvis Thomson
E) Samuel Warren
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
16
The OnStar system allows

A) a vehicle owner to initiate a conversation with an OnStar representative.
B) the vehicle to automatically send a message to an OnStar representative after an accident.
C) an OnStar representative to disable the gas pedal of the vehicle without the driver's permission.
D) a and b
E) a, b, and c
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
17
suggested that we do not have to define privacy rights because every "privacy right" violation is a violation of another right as well.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
18
In 1890 Harvard-trained lawyers wrote a highly influential article in the Harvard Law Review stating that people in modern society have a right to privacy and that this right ought to be respected.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
19
The process of searching through many records in one or more databases looking for patterns or relationships is called

A) credit reporting.
B) data mining.
C) information gathering.
D) microtargeting.
E) pattern matching.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
20
A is a file containing information about your visits to a Web site that is placed on your computer's hard drive by a Web server
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
21
Thanks to , you can get a credit card from a bank or store with which you have never done business.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 21 flashcards in this deck.