Ch 13 - Emerging Issues: Big Data & the IoT Flashcards
Benefits of using big data include which of the following?
a. Can be obtained from a large variety of sources
b. Low cost to store data
c. Available for data mining as a basis for analytics
d. All of the above
d. All of the above
Which of the following aspects of data mining provide the basis of analytics?
a. Providing transparency
b. Drawing connections
c. Making predictions
d. All of the above
d. All of the above
Which of the following best describes a reason using big data for modern analytics may make it difficult to adhere to Fair Information Privacy Practices?
a. The data may be incomplete
b. No clear notice of data use to the data subject
c. Data may have been disclosed to a third party
d. None of the above
b. No clear notice of data use to the data subject
Which of the following is an example of a data collecting device?
a. Cell phones
b. Street light sensors
c. Car fuel injectors sensors
d. All of the above
d. All of the above
Moore’s Law is used to predict which of the following?
a. Number of transactions performed by a teller machine
b. Increase of the expanding universe
c. Exponential increase of computing power and data
d. All of the above
c. Exponential increase of computing power and data
Gordon Moore, Cofounder of Intel predicted the exponential increase in computing power when he observed the number of transistors on a circuit board doubled every 18 to 24 months.
What is the relationship between Moore’s Law and Big Data?
a. Moore’s Law predicts that Big Data will eventually drop off and become a thing of the past
b. Moore’s Law predicts the amount of data produced doubles about every 12 months
c. Moore’s Law predicts the amount of data collected is equal to the amount of data used
d. None of the above
b. Moore’s Law predicts the amount of data produced doubles about every 12 months
How frequently is data produced predicted to double by 2025?
Data produced is predicted to double every 12 hours at its current rate by 2025.
What are the “3 Vs”?
Characteristics of big data:
- Velocity (how fast the data is available)
- Volume (how much data is available)
- Variety (different forms from different sources being analyzed)
An important positive aspect of having a large variety of sources of big data is:
a. The ability to turn data from different sources into more uniform categories for analysis
b. The cycle time to turn data into distinct categories
c. The ability to quickly review the data records
d. None of the above
a. The ability to turn data from different sources into more uniform categories for analysis.
What is Asimov’s Law of Robotics as it pertains to Artificial Intelligence?
A robot:
- may not injure a human being or allow a human being to come to harm;
- must obey an order given by a human being, except when it would cause a human being harm;
- must protect its own existence except when it would cause harm or prevent it from obeying an order given by a human being.
Which of the following is a privacy related rule added to the rules of Asimov’s Law of Robotics by EPIC founder, Marc Rotenberg?
a. A robot should always reveal the name of the programmer
b. A robot should always reveal the basis of their decisions
c. A robot should always reveal their identities
d. b and c
A robot:
- should always reveal the basis of their decisions; and
- should always reveal their identities.
Which of the following is a standard included in Satya Nadella’s design principles for AI designed to help humans?
a. Must be designed for intelligent privacy
b. Must be transparent
c. Includes algorithmic accountability to undo unintended harm
d. All of the above
d. All of the above
- Which of the following is a financial risk of a security breach on big data?
a. Responding to and providing notice
b. Fraudulent account activity
c. Identity theft
d. All of the above
d. All of the above
What are the 2 primary security risks related to big data?
- Insiders stealing information
2. External hackers
Which of the following is not an important preventive consideration during development of a comprehensive information security plan?
a. Firewalls
b. Surveillance cameras
c. Intrusion detection
d. Threat models
b. Surveillance cameras
- Which of the following is an important Fair Information Privacy Principle especially relevant to big data?
a. Collection limitation
b. Use limitation
c. Purpose specification
d. All of the above
d. All of the above
Which of the following is an important standard for limiting collection of personal information?
a. Collection conducted by lawful and fair means
b. Collection conducted at the data subject’s consent, when possible
c. Collection with the data subject’s knowledge, when possible
d. All of the above
d. All of the above
What are the 3 most important standards for limiting use of personal information?
Personal information:
- should not be used or disclosed beyond its intended purposes;
- may be used for other purposes with the data subject’s consent;
- may be used under the authority of law.
Which of the following is an important standard for ensuring personal information is used for the purpose specified?
a. Used for the purpose initially intended
b. May be used for other purposes when they are compatible with the original purpose intended
c. Should be limited when secondary uses are involved
d. All of the above
d. All of the above
Which of the following is an important theme of Fair Information Principles?
a. Data minimization
b. Additional security measures for big data
c. Deidentification
d. Only a and c
d. Only a and c
Which of the following is not a control that can be used to prevent a big data breach?
a. Access – only employees with a need to know
b. Segregation databases
c. Identify compliance challenges
d. Guiding principles based on best practices
c. Identify compliance challenges
Which of the following is a guiding principle for preventing a big data breach?
a. Legal rules
b. Company policy
c. FIPPs (esp. Collection Limitation, Purpose Specification, and Use Limitation)
d. All of the above
d. All of the above
Which of the following is not a principle for reducing privacy risk?
a. Only collect data necessary
b. Disclose data to third parties without a contract
c. Collect only less sensitive data
d. De-identify data once it is collected
b. Disclose data to third parties without a contract
Which of the following describes the goal of data de-identification, pseudonymization, and anonymization?
a. Gain benefits from analyzing data while suppressing data that can reveal an individual’s identity
b. Reduce costs of marketing by disclosing consumer data to third parties
c. Ensure better information security through encryption
d. Only a and c
a. Gain benefits from analyzing data while suppressing data that can reveal an individual’s identity