Study Quiz
This quiz covers all key concepts from the Privacy Issues in Cyberspace chapter ā including past exam questions and instructor-style questions. Answer all questions, then click Submit Quiz to see your score and detailed explanations for every question.
Multiple Choice Questions
Question 1 Ā· MCQ
Which of the following best defines Information Privacy?
Question 2 Ā· MCQ
Which of the following is NOT listed as a category of private information?
Question 3 Ā· MCQ
Cookies that communicate your data to advertising agencies which share it with other
online marketers are called:
Question 4 Ā· MCQ
Which tracking method is considered the hardest to block and leaves no evidence
on the user's computer?
Question 5 Ā· MCQ
The technique of extracting information from two or more unrelated databases and
integrating it into a composite file is called:
Question 6 Ā· MCQ
RFID stands for:
Question 7 Ā· MCQ
What is the PRIMARY goal of cross-device tracking?
Question 8 Ā· MCQ
The Platform for Privacy Preferences (P3P) was developed by:
Question 9 Ā· MCQ
Which of the following is a major privacy risk unique to biometrics that does
NOT apply to passwords or credit card numbers?
Question 10 Ā· MCQ
Which of the following describes computer matching?
True / False
Question 11 Ā· True / False
Flash cookies (supercookies) can be deleted using normal browser cookie-clearing
procedures.
Question 12 Ā· True / False
Privacy is considered important because it is a necessary condition for other rights
such as freedom and personal autonomy.
Question 13 Ā· True / False
Device fingerprinting leaves a traceable file on the user's computer that can be
detected and removed with anti-spyware software.
Question 14 Ā· True / False
When a user provides information to one government agency, they automatically authorize
that information to be shared with all other government agencies.
Question 15 Ā· True / False
Cloud computing increases privacy concerns because both data and programs are online,
and it is not always clear which law is applicable to the stored data.
Fill in the Blank
Question 16 Ā· Fill in the Blank
The term used to describe computer-enabled surveillance techniques such as video cameras
and employee monitoring software is called __________.
Question 17 Ā· Fill in the Blank
A __________ is a summary of the software and hardware settings
collected from a computer or other device that can uniquely identify that device online without placing
any file on the device.
Question 18 Ā· Fill in the Blank
When organisations merge personal information about you without your specific
authorisation, the __________ of your information has been violated.
Question 19 Ā· Fill in the Blank
Under the principle of implicit informed consent, when companies inform
users about data uses and the user does not respond, their silence implies __________.
Matching
Question 20 Ā· Matching
Match each term on the left to its correct definition on the right.
Term
A. Dataveillance
B. Data Mining
C. Biometrics
D. RFID
Your Answer
Short Answer
Question 21 Ā· Short Answer
List and briefly explain four ways in which cybertechnology has changed
privacy concerns compared to the pre-computer era.
Question 22 Ā· Short Answer
Explain the difference between first-party cookies and
third-party cookies. Give one concern associated with third-party cookies.
Question 23 Ā· Short Answer
What is data profiling and what are two potential harms it can cause to
individuals?
Question 24 Ā· Short Answer
What ethical obligation does an information professional have when they merge personal
data from one database into another that the individual did not originally authorize?
Question 25 Ā· Short Answer
Describe two advantages and two disadvantages of using
surveillance drones from a privacy perspective.
Extended Written Response (Exam-Style)
Question 26 Ā· Extended Response
Scenario: A retail company collects customer purchasing data through
loyalty cards. They sell this data to a health insurance company, which uses it to deny coverage to
customers whose shopping patterns suggest unhealthy habits.
Using concepts from the chapter, identify the privacy violations involved and explain which ethical guidelines for information professionals have been breached.
Using concepts from the chapter, identify the privacy violations involved and explain which ethical guidelines for information professionals have been breached.
Question 27 Ā· Extended Response
Compare and contrast computer merging and computer
matching. Why might both practices be considered ethically problematic even if the data
collected by each individual agency was gathered lawfully?
Question 28 Ā· Extended Response
"Privacy is not just a personal preference ā it is a social value." Explain this
statement using at least three concepts from the chapter to support your argument.
Question 29 Ā· Extended Response
A government proposes installing RFID chips in all national ID cards and embedding
surveillance drones in all major cities. From a privacy standpoint, analyze the ethical implications of
this proposal. Reference at least two specific privacy concerns from the chapter.
Question 30 Ā· Extended Response
Why is location data from mobile devices considered particularly sensitive
compared to other forms of personal data? Discuss the potential real-world harms that could result from
unauthorised access to someone's location data.
Review all your answers before submitting. You can only submit once.