Chapter 7: Interference Flashcards

1
Q

Define interference

A

Any disruption of individual autonomy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List the 3 types of interference

A

Type 1: Obstruction
Type 2: Intrusion
Type 3: Self-representation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe interference type 1: obstruction

A

AKA decisional interference
Interfere with decisions that affect the person’s daily life, such as whether to allow the person to travel, to borrow money or to obtain lawful employment

May not be easily recognizable by the person about whom the decision is made as they may be unaware of the decision-making process, or the decision itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe interference type 2: intrusion

A

Intrusion into physical, psychological, or informational spaces—any action that affects a person’s solitude, including their desire to be alone or to be among a few confidantes of their choosing, and their desire to control who has access to their visual and thoughtful attention or who has access to their information

Searches of private spaces, curfews or other restrictions of movement, alerts and notifications that grab and divert the attention of the person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe interference type 3: self-representation

A

Interference with representation of self—any action that alters how an individual is represented, such as a person’s marriage, financial or employment status, their race, gender or sexual orientation, political views or any other affinity toward specific ideas or social groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An act of intrusion that involves the person who’s privacy is most affect is called

A

Direct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An act of intrusion that affects someone significantly removed form the effects is called

A

Indirect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

List William Prosser’s four kinds of torts

A
  • Intrusion upon seclusion or solitude
  • Public disclosure of private facts
  • Presentation of an individual in a false light
  • Use of an individual’s name or likeness without permission
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What type of interference does unwanted messaging represent?

A

Type 2: Intrusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of interference does select software APIs represent?

A

Type 2: Intrusion

Type 3: Self-representation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What type of interference does behavioural profiling represent?

A

Type 1: Obstruction
Type 2: Intrusion
Type 3: Self-representation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What type of interference does machine learning bias and fairness represent?

A

Type 1: Obstruction
Type 2: Intrusion
Type 3: Self-representation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What type of interference does cyberbullying represent?

A

Type 2: Intrusion

Type 3: Self-representation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What type of interference does social engineering represent?

A

Type 1: Obstruction

Type 3: Self-representation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What type of interference does administrative intrusions represent?

A

Type 1: Obstruction

Type 2: Intrusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What law in the US controls spam?

A

CAN-SPAM

Controlling the Assault of Non-Solicited Pornography and Marketing

17
Q

What is the major difference between US anti-spam law and European anti-spam law?

A

Europe is opt-in

US is opt-out

18
Q

What is contextual advertising?

A

Uses an algorithm to examine the content of a page and determine which ad is most relevant to that content

If you were reading an email on Gmail about genealogy, you might be served an advertisement for genealogy software

19
Q

How is behavioural advertising different than contextual advertising?

A

By constructing a longitudinal profile of an individual’s interests and serving ads based on that profile rather than the content on the page

20
Q

List the 2 approaches to behavioural advertising

A
  • First party

* Third party

21
Q

What is first party behavioural advertising?

A

The party with which the user initiated communication is also the party collecting user behavior to create the profile

Amazon.com’s recommendation service illustrates first-party behavioral advertising

22
Q

What is third party behavioural advertising?

A

The ad is delivered by a party different from the party with which the user initiates the communication

23
Q

What 2 techniques can advertisers using third-party behavioural advertising use to construct behavioural profiles?

A
  • Web-based

* Network-based

24
Q

How does web-based profiling work?

A

Uses browser-based technology to track users as they surf the internet

This technique can only collect information on websites with which the advertiser has partnered

25
Q

How does network-based profiling work?

A

Provides more access to user behavior by partnering with internet service providers (ISPs), who provide users with connectivity to the internet

With this level of access and deep packet inspection (DPI), these advertisers can create behavior profiles based on all of a user’s network traffic

26
Q

Why is network-based profiling more dangerous?

A

Browser plug-ins that users may employ to obstruct behavioral advertisers from monitoring their website usage behavior are ineffective against network-based behavioral advertising

27
Q

What are the 3 high-level guiding principles for applying fairness in machine learning?

A
  • Organizations should define and document their goals for fairness along with their rationale and approach to achieving those goals
  • Practitioners must be able to recognize when machine learning systems are not an appropriate solution to a problem
  • Machine learning systems are capable of all three types of interference
28
Q

What is catfishing?

A

Creating fake interactions ranging from a single fake profile targeted to deceive a single person

29
Q

What is sockpuppeting or astroturfing?

A

Creating whole armies of fake profiles designed to change public opinion

30
Q

How can social bots interfere with an individual’s privacy?

A
  • Social bots can “mislead, exploit, and manipulate social media discourse with rumors, spam, malware, misinformation, slander, or even just noise.”
  • Social bots have been used to stoke political unrest, manipulate the stock market and systematically abuse women and minorities online
  • Efforts to sway public opinion are inherently Type 1 violations because their goal is to affect decision-making
  • Abusive examples, are Type 2 violations seeking to intrude on or damage psychological or informational space
31
Q

What are deepfakes?

A

Extremely realistic—but entirely fake—audio, video and photographic content

32
Q

How can deepfakes be detected?

A

The most effective means of detecting deepfakes uses the same technology that created them: neural networks

33
Q

Though companies cannot catch all deepfakes, what can they do to help users?

A
  • Include features to report abuses

* contractually obligate users to conform to a code of conduct

34
Q

What is social engineering?

A

Any means of using psychology to manipulate people to do something that divulges valuable information or provides access to valuable property

35
Q

What 6 design recommendations can mitigate the chance of or impact of interference?

A
  1. Understand the privacy preferences of those directly or indirectly impacted
  2. Notify the individual about the purpose and, if possible or required by law, allow the individual to opt in or opt out
  3. Ensure the technology provides an opportunity for the person to control or limit the intrusion to appropriate times
  4. If data is used to make critical decisions that can deny individuals specific benefits, introduce safeguards to detect inaccuracies - Allow individuals to be aware of the decisions through notices, and allow them access to provide opportunities to review the data for accuracy
  5. React quickly to customer concerns
  6. Assume that interference will occur, and plan for it