Privacy Issues in Cyberspace

ETHC303 Ā· Chapter Study Quiz Ā· 30 Questions

Study Quiz

This quiz covers all key concepts from the Privacy Issues in Cyberspace chapter — including past exam questions and instructor-style questions. Answer all questions, then click Submit Quiz to see your score and detailed explanations for every question.

Multiple Choice Questions
Question 1 Ā· MCQ
Which of the following best defines Information Privacy?
Question 2 Ā· MCQ
Which of the following is NOT listed as a category of private information?
Question 3 Ā· MCQ
Cookies that communicate your data to advertising agencies which share it with other online marketers are called:
Question 4 Ā· MCQ
Which tracking method is considered the hardest to block and leaves no evidence on the user's computer?
Question 5 Ā· MCQ
The technique of extracting information from two or more unrelated databases and integrating it into a composite file is called:
Question 6 Ā· MCQ
RFID stands for:
Question 7 Ā· MCQ
What is the PRIMARY goal of cross-device tracking?
Question 8 Ā· MCQ
The Platform for Privacy Preferences (P3P) was developed by:
Question 9 Ā· MCQ
Which of the following is a major privacy risk unique to biometrics that does NOT apply to passwords or credit card numbers?
Question 10 Ā· MCQ
Which of the following describes computer matching?
True / False
Question 11 Ā· True / False
Flash cookies (supercookies) can be deleted using normal browser cookie-clearing procedures.
Question 12 Ā· True / False
Privacy is considered important because it is a necessary condition for other rights such as freedom and personal autonomy.
Question 13 Ā· True / False
Device fingerprinting leaves a traceable file on the user's computer that can be detected and removed with anti-spyware software.
Question 14 Ā· True / False
When a user provides information to one government agency, they automatically authorize that information to be shared with all other government agencies.
Question 15 Ā· True / False
Cloud computing increases privacy concerns because both data and programs are online, and it is not always clear which law is applicable to the stored data.
Fill in the Blank
Question 16 Ā· Fill in the Blank
The term used to describe computer-enabled surveillance techniques such as video cameras and employee monitoring software is called __________.
Question 17 Ā· Fill in the Blank
A __________ is a summary of the software and hardware settings collected from a computer or other device that can uniquely identify that device online without placing any file on the device.
Question 18 Ā· Fill in the Blank
When organisations merge personal information about you without your specific authorisation, the __________ of your information has been violated.
Question 19 Ā· Fill in the Blank
Under the principle of implicit informed consent, when companies inform users about data uses and the user does not respond, their silence implies __________.
Matching
Question 20 Ā· Matching
Match each term on the left to its correct definition on the right.

Term

A. Dataveillance
B. Data Mining
C. Biometrics
D. RFID

Your Answer

Short Answer
Question 21 Ā· Short Answer
List and briefly explain four ways in which cybertechnology has changed privacy concerns compared to the pre-computer era.
Question 22 Ā· Short Answer
Explain the difference between first-party cookies and third-party cookies. Give one concern associated with third-party cookies.
Question 23 Ā· Short Answer
What is data profiling and what are two potential harms it can cause to individuals?
Question 24 Ā· Short Answer
What ethical obligation does an information professional have when they merge personal data from one database into another that the individual did not originally authorize?
Question 25 Ā· Short Answer
Describe two advantages and two disadvantages of using surveillance drones from a privacy perspective.
Extended Written Response (Exam-Style)
Question 26 Ā· Extended Response
Scenario: A retail company collects customer purchasing data through loyalty cards. They sell this data to a health insurance company, which uses it to deny coverage to customers whose shopping patterns suggest unhealthy habits.

Using concepts from the chapter, identify the privacy violations involved and explain which ethical guidelines for information professionals have been breached.
Question 27 Ā· Extended Response
Compare and contrast computer merging and computer matching. Why might both practices be considered ethically problematic even if the data collected by each individual agency was gathered lawfully?
Question 28 Ā· Extended Response
"Privacy is not just a personal preference — it is a social value." Explain this statement using at least three concepts from the chapter to support your argument.
Question 29 Ā· Extended Response
A government proposes installing RFID chips in all national ID cards and embedding surveillance drones in all major cities. From a privacy standpoint, analyze the ethical implications of this proposal. Reference at least two specific privacy concerns from the chapter.
Question 30 Ā· Extended Response
Why is location data from mobile devices considered particularly sensitive compared to other forms of personal data? Discuss the potential real-world harms that could result from unauthorised access to someone's location data.

Review all your answers before submitting. You can only submit once.

0
out of 30 questions graded