Chapter #5 Flashcards

1
Q

Three Privacy Types
(Things)

A

Consumer Privacy
Medical/Healthcare Privacy
Employee/Workplace Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Privacy concerns have been (exacerbated) increased by cybertechnology in at least four ways

A
  1. amount of personal data that can now be collected
  2. speed at which personal information can now be transferred and exchanged
  3. duration of time in which personal information can be retained
  4. kind of personal information that can be acquired (ex transactional)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Personal Privacy? What can happen to it?

A

lost,
diminished,
intruded upon,
invaded,
violated,
breached.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Classic Theories of Privacy

A

non-intrusion (into one’s space),
non-interference (with one’s decisions),
having control over/restricting access to one’s personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Non-intrusion theories view privacy as either:
or Accessibility Privacy

A

being left alone,
being free from government intrusion (into one’s physical space).

This view is also sometimes referred to as accessibility privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Informational Privacy

A

is concerned with protecting personal information in computer databases

Most people wish to have some control over their personal information.
In some cases, “privacy zones” have been set up either to restrict or limit access to one’s personal data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Decisional Privacy

A

Privacy is defined in terms of freedom from interface in ones choices and desisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Moor’s Comprehensive Theory of Privacy

A

“an individual has privacy in a situation if in that particular situation the individual is protected from intrusion, interference, and information access by others.”

Mary Examples

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Nissenabum’s Theory of Privacy as “Contextual Integrity”

A

Helen Nissenbaum’s “privacy as contextual integrity” framework requires that the processes used in gathering and disseminating information are
“appropriate to a particular context”
comply with norms that govern the flow of personal information in a given context.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Is Privacy an Intrinsic or an Instrumental Value

A

Privacy does not seem to be valued for its own sake, and thus does not appear to have intrinsic worth.

But privacy also seems to be more than merely an instrumental value because it is necessary (rather than merely contingent) for achieving important human ends.

Moor believes that privacy can be viewed as an expression of a “core value” – viz., security, which is essential for “human flourishing.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Privacy as a Universal Value

A

Privacy has at least some importance in all societies, but it is not valued the same in all cultures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Privacy as an Important Social Value

A

Priscilla Regan notes that we tend to underestimate the importance of privacy as an important social value (as well as an individual value).

Regan also believes that if we frame the privacy debate in terms of privacy as a social value (essential for democracy), as opposed to an individual good, the importance of privacy is better understood.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cybertechology-related Techniques that Threaten Privacy

A

Data-gathering techniques: used to collect and record personal information, often without the knowledge and consent of users.

Data analysis techniques: including data mining, used to manipulate large data sets of personal information to discover patterns and generate consumer profiles (also typically without the knowledge and consent of users).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Dataveillance

A

captures, surveillance (data-monitoring) and data-recording.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Big Data

A

Large volumes of data, but is also measured by variety, velocity, veracity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Data Mining

A

Data mining involves the indirect gathering of personal information via an analysis of implicit patterns discoverable in data.

Data-mining activities can generate new and sometimes non-obvious classifications or categories.

Individuals whose data is mined could become identified with or linked to certain newly created groups that they might never have imagined to exist.

Ex: Data mining finds that someone lives in a area and doesnt give them a loan because of it. Or findout that they are more likely to start a buisness and fail in 3 months so they dont get a loan.

17
Q

Non-Public Personal Information (or NPI)

A

refers to sensitive information such as in one’s financial and medical records.

NPI currently enjoys some legal protection.

18
Q

Public Personal Information (or PPI).

A

is non-confidential and non-intimate in character, and is generally not legally protected.

19
Q

Search engines can be used to:

A
  1. acquire personal information about individuals (as illustrated in the discussion of the Gawker/Stalker site in the text).
  2. reveal to search facilities data about which Web sites you have visited, as illustrated in the controversial incident in which describes how Google users’ search requests were subpoenaed by the U.S. Government.
20
Q

Privacy Enhancing Technologies (PETs)

A

are tools that users can employ to protect:
their personal identity, while navigating the Web;
the privacy of their communications (such as email) sent over the Internet.
Other kinds of PETs, e.g., used in e-commerce contexts, include “trust marks/ seals” such as TRUSTe.

21
Q

A Right to “Be Forgotten” or to “Erasure”

A

The right for your data to eventually disappear off the internet after a period of time. Since currently whatever is put on the internet is there forever.