Chapter 7: Interference Flashcards
Define interference
Any disruption of individual autonomy
List the 3 types of interference
Type 1: Obstruction
Type 2: Intrusion
Type 3: Self-representation
Describe interference type 1: obstruction
AKA decisional interference
Interfere with decisions that affect the person’s daily life, such as whether to allow the person to travel, to borrow money or to obtain lawful employment
May not be easily recognizable by the person about whom the decision is made as they may be unaware of the decision-making process, or the decision itself
Describe interference type 2: intrusion
Intrusion into physical, psychological, or informational spaces—any action that affects a person’s solitude, including their desire to be alone or to be among a few confidantes of their choosing, and their desire to control who has access to their visual and thoughtful attention or who has access to their information
Searches of private spaces, curfews or other restrictions of movement, alerts and notifications that grab and divert the attention of the person
Describe interference type 3: self-representation
Interference with representation of self—any action that alters how an individual is represented, such as a person’s marriage, financial or employment status, their race, gender or sexual orientation, political views or any other affinity toward specific ideas or social groups
An act of intrusion that involves the person who’s privacy is most affect is called
Direct
An act of intrusion that affects someone significantly removed form the effects is called
Indirect
List William Prosser’s four kinds of torts
- Intrusion upon seclusion or solitude
- Public disclosure of private facts
- Presentation of an individual in a false light
- Use of an individual’s name or likeness without permission
What type of interference does unwanted messaging represent?
Type 2: Intrusion
What type of interference does select software APIs represent?
Type 2: Intrusion
Type 3: Self-representation
What type of interference does behavioural profiling represent?
Type 1: Obstruction
Type 2: Intrusion
Type 3: Self-representation
What type of interference does machine learning bias and fairness represent?
Type 1: Obstruction
Type 2: Intrusion
Type 3: Self-representation
What type of interference does cyberbullying represent?
Type 2: Intrusion
Type 3: Self-representation
What type of interference does social engineering represent?
Type 1: Obstruction
Type 3: Self-representation
What type of interference does administrative intrusions represent?
Type 1: Obstruction
Type 2: Intrusion
What law in the US controls spam?
CAN-SPAM
Controlling the Assault of Non-Solicited Pornography and Marketing
What is the major difference between US anti-spam law and European anti-spam law?
Europe is opt-in
US is opt-out
What is contextual advertising?
Uses an algorithm to examine the content of a page and determine which ad is most relevant to that content
If you were reading an email on Gmail about genealogy, you might be served an advertisement for genealogy software
How is behavioural advertising different than contextual advertising?
By constructing a longitudinal profile of an individual’s interests and serving ads based on that profile rather than the content on the page
List the 2 approaches to behavioural advertising
- First party
* Third party
What is first party behavioural advertising?
The party with which the user initiated communication is also the party collecting user behavior to create the profile
Amazon.com’s recommendation service illustrates first-party behavioral advertising
What is third party behavioural advertising?
The ad is delivered by a party different from the party with which the user initiates the communication
What 2 techniques can advertisers using third-party behavioural advertising use to construct behavioural profiles?
- Web-based
* Network-based
How does web-based profiling work?
Uses browser-based technology to track users as they surf the internet
This technique can only collect information on websites with which the advertiser has partnered
How does network-based profiling work?
Provides more access to user behavior by partnering with internet service providers (ISPs), who provide users with connectivity to the internet
With this level of access and deep packet inspection (DPI), these advertisers can create behavior profiles based on all of a user’s network traffic
Why is network-based profiling more dangerous?
Browser plug-ins that users may employ to obstruct behavioral advertisers from monitoring their website usage behavior are ineffective against network-based behavioral advertising
What are the 3 high-level guiding principles for applying fairness in machine learning?
- Organizations should define and document their goals for fairness along with their rationale and approach to achieving those goals
- Practitioners must be able to recognize when machine learning systems are not an appropriate solution to a problem
- Machine learning systems are capable of all three types of interference
What is catfishing?
Creating fake interactions ranging from a single fake profile targeted to deceive a single person
What is sockpuppeting or astroturfing?
Creating whole armies of fake profiles designed to change public opinion
How can social bots interfere with an individual’s privacy?
- Social bots can “mislead, exploit, and manipulate social media discourse with rumors, spam, malware, misinformation, slander, or even just noise.”
- Social bots have been used to stoke political unrest, manipulate the stock market and systematically abuse women and minorities online
- Efforts to sway public opinion are inherently Type 1 violations because their goal is to affect decision-making
- Abusive examples, are Type 2 violations seeking to intrude on or damage psychological or informational space
What are deepfakes?
Extremely realistic—but entirely fake—audio, video and photographic content
How can deepfakes be detected?
The most effective means of detecting deepfakes uses the same technology that created them: neural networks
Though companies cannot catch all deepfakes, what can they do to help users?
- Include features to report abuses
* contractually obligate users to conform to a code of conduct
What is social engineering?
Any means of using psychology to manipulate people to do something that divulges valuable information or provides access to valuable property
What 6 design recommendations can mitigate the chance of or impact of interference?
- Understand the privacy preferences of those directly or indirectly impacted
- Notify the individual about the purpose and, if possible or required by law, allow the individual to opt in or opt out
- Ensure the technology provides an opportunity for the person to control or limit the intrusion to appropriate times
- If data is used to make critical decisions that can deny individuals specific benefits, introduce safeguards to detect inaccuracies - Allow individuals to be aware of the decisions through notices, and allow them access to provide opportunities to review the data for accuracy
- React quickly to customer concerns
- Assume that interference will occur, and plan for it