Chapter 3: Privacy Threats and Violations Flashcards
what is interrogation?
Questioning or probing
individuals for personal information in this way is known as interrogation
What are the different types of interrogation
asymmetrical power relationship
existing relationships
reverse flow of information
What is asymmetrical power relationship
One feels compelled to answer questions posed by a person of authority
what is existing relationship:
Questions are out of context within the social norms of the relationship
what is reverse flow of information
A person overshares unsolicited information
what is the difference between disclosure and insecurity
, insecurity is the result of negligence, while disclosure is
the result of intentionally revealing information about an individual.
what is the difference between distortion and disclosure
distroation- false, inaccurate
disclosure- revealing true information
what is the purpose of surveillance
surveillance is used in a myriad of modalities throughout everyday lives. Advertisers track web surfers, parents use geolocation technology to know where their children are, and store specific loyalty cards track consumers’ buying trends.
What is the positive impact of surveillance
Deters people from cheating in casinos
Dissuades theft from convenience stores
Tempers behaviors in recorded conversations
What is the negative impact of surveillance
Causes self-censoring
Silences minority viewpoints
Manipulates behavior to further self-interests
What are the privacy violation in uses
Insecurity Identification Identification: Privacy technologist’s role Secondary use Exclusion
What is the use of insecurity
o Data insecurity can be the result of negligence or threat actors, such as cybercriminals or amateur hackers
o Disregarding threat actors, along with failing to design a process, product or service with access prevention, leads to data insecurity. The application of risk assessment tools is useful in identifying areas of information insecurity within a system.
What is the use of Identification
o Identification is linking unique identifying information to specific individuals; personally identifiable information can be pieced together with a few unique identifiers, such as zip code, date of birth, age range, weight and income level to identify an individual.
o Identification can also be achieved by cross-referencing timestamps on websites or databases, or the use of recurring IP addresses or cookies to identify browsing history.
What is secondary use of privacy violation
o Secondary use occurs when the intended recipient of personal information shares it with another party outside of the expectations of the individual whose information was shared.
what is the use of exclusion
o Exclusion happens when an individual’s information is used without their knowledge, or they are unable to consent to the handling or use of their information.
o Exclusion can also occur in the form of discrimination