hello quizlet
Home
Subjects
Expert solutions
Create
Study sets, textbooks, questions
Log in
Sign up
Upgrade to remove ads
Only $35.99/year
CIS 125 - Ch. 9
Flashcards
Learn
Test
Match
Flashcards
Learn
Test
Match
Terms in this set (35)
information privacy
confidentiality of information collected by organizations about individuals using their services
- data collection
- secondary use of information (data sharing)
List two information privacy threats
- cookies (faster, easier, hidden)
- clickstream (usage tracking)
- proliferation of data sources
List three examples of data collection
- function creep
- opt-in vs. opt-out
List two examples of data sharing
data sharing
secondary use of information is also known as...
identity theft
a consequence of privacy violations
- credit card fraud
- other identity theft
- loan or lease fraud
- phone or utilities fraud
- bank fraud
- employment/tax-related fraud
- government docs/benefits fraud
List a few types of identity theft
- do not use your Social Security Number unless it is absolutely needed.
- Shred everything that has any data about you.
- Place outgoing mail at the post office or locked collection box.
- Password protect financial accounts with strong passwords and two-factor authentication, if available.
- Really check the statements you receive.
- Request photo identification when someone asks for your information, and do not give it out over the phone, Internet, or mail unless you initiated the contact.
- Destroy digital data by going beyond a simple delete.
- Limit the information provided on your checks.
- Request your annual credit report and check it.
List a few ways you can "protect yourself."
The reputation of the organization
What is a consequence of identity theft or other crimes within an organization?
- cookie managers
- privacy statement/policy
- security vs. privacy seals
- privacy or reputation seals
List examples of privacy tools.
- delete unwanted or dangerous cookies
- can use setting not to accept cookies
What do cookie managers do?
anonymous browsing
not allowing websites to track what you do online
anonymous browsing
use settings to block or delete cookies
anonymous browsing
use settings to not send location information to websites
anonymous browsing
use anonymous search engine (e.g., DuckDuckGo)
anonymous browsing
turn off settings "personalizing" your searches
anonymous browsing
use anonymous browsing (e.g., InPrivate browsing - IE Explorer; Incognito - Chrome; etc.)
- Fair Information Practice Principles (FIPPS)
- a method of self-regulation
List the contents of privacy statement/policies.
- notice/awareness
- choice/consent
- access/participation
- integrity/security
- enforcement/redress
List the Fair Information Practice Principles (FIPPS)
- what data we are collecting
- how the data are collected
- what we are doing with the data
- why we are collecting the data
- which other companies we may or may not share the data with
List the privacy policies of Notice/awareness.
How you can (or cannot) opt out of us collecting these data about you.
List the privacy policy of Choice/consent.
How you can access the data we have about you.
List the privacy policy of Access/participation.
What actions we are taking to protect the data.
List the privacy policy of Integrity/security.
How you can fix errors in our data about you.
List the privacy policy of Enforcement/redress.
Security vs Privacy Seals
VeriSign and McAfee Secure are examples of...
Privacy or reputation seals
BBBOnLine, ESRB Privacy Online, TrustArc, TrustUK (UK), and eTICK (Australia) are examples of...
- collection without awareness
- fewer regulations
- enormous amounts of personal data on devices
- downloading apps without evaluating them
List a few issues in Mobile Environments regarding Mobile Information Privacy.
personal data
The world of IoT provides huge amounts of...
- enhance user control regarding the data collected by IoT devices and services and how they are managed
- improve transparency and notification by providing clear, accurate, relevant, and detailed information to users
- privacy laws and policies should keep up with technology and include the use of IoT sensors and continuous monitoring.
- involve a broad variety of stakeholders in IoT privacy discussions to address the diversity of IoT risks and benefits
What things does the Internet Society suggest regarding IoT and privacy?
privacy
how the confidentiality of the data collected about you is maintained
accuracy
whether the data about you is what it is supposed to be and does not include errors
property
who owns the data about you
accessibility
who has access to the information systems and the data that they hold about you
- policies, procedures
- laws and regulations
- universal values
- satisfies
(PLUS)
List the components of Ethical Decision Making.
- is consistent with organizational POLICIES, PROCEDURES, and guidelines
- is acceptable under applicable LAWS AND REGULATIONS
- conforms to UNIVERSAL VALUES such as empathy, integrity, and justice
- SATISFIES your personal definition of what is good, right, and fair
Ethical Decision Making determines whether the decision...
Sets found in the same folder
CIS 125 - Ch. 1 Slides
29 terms
CIS 125 - Ch. 2 Slides
36 terms
CIS 125 - Ch. 3
34 terms
CIS 125 - Ch. 5
51 terms
Other sets by this creator
BLAW Ch. 5 - Moegle
56 terms
CIS 125 - Ch. 13
31 terms
CIS 125 - Ch. 8
68 terms
CIS 125 - Ch. 5, A&B, 7 Quizzes
30 terms
Verified questions
chemistry
How may reaction rates be measured?
engineering
Water from a faucet fills a 16 -oz glass (volume = 28.9 $\text{in}^{3}$. ) in 20 s. If the diameter of the jet leaving the faucet is 0.60 in. what is the diameter of the jet when it strikes the water surface in the glass which is positioned 14 in. below the faucet?
chemistry
a. Relating Cause and Effect What causes the seasons? b. Comparing and Contrasting What are solstices and equinoxes? How are they related to the seasons? c. Predicting How would the seasons be different if Earth were not tilted on its axis?
engineering
Suppose the acceleration of an object moving along a line is given by $a(t)=-k v(t)$, where $k$ is a positive constant and $v$ is the object's velocity. Assume that the initial velocity and position are given by $v(0)=10$ and $s(0)=0$, respectively. (a). Use $a(t)=v^{\prime}(t)$ to find the velocity of the object as a function of time. (b). Use $v(t)=s^{\prime}(t)$ to find the position of the object as a function of time. ($c$). Use the fact that $d v / d t=(d v / d s)(d s / d t)$ (by the Chain Rule) to find the velocity as a function of position.