III Data Collection and Use Flashcards
Covert Surveillance
Things like web trackers, geolocation, etc.
Overt surveillance
CCTV, tollbooth transponders, etc
Positive Impact of surveillance
dissuade theft, prevent cheating in a casion
Negative impact of surveillance
Self-censoring, silences minority views, manipulates behaviour to further interests.
Asymmetric power relationship
When the questioner and questionee have an unbalanced power relationship.
Existing relationship
When the questioner and questionee know one another, but one nevertheless feels pressure to answer questions.
Reverse flow of information
Oversharing
Data insecurity
Can be the result of both negligence as well as threat actors. Risk assessments can help, as can implementing multifactor authentication.
Data identification
The act of linking pieces of identifiable information to an individual. Examples of this info includes zip code, DOB, recurring IP, etc.
Data aggregation
Data expressed in summary form (e.g. the Gmail FBL).
Frequency vs magnitude data
With frequency data, all individuals contribute equally to data. With magnitude data, contributions are unequal. Residents in an area is frequency data, while salary info is magnitude data.
Differential privacy
Ensure aggregated data is useful but non-specific enough to avoid revealing underlying identifiers. Algorithms help.
Differential identifiability
Like differential privacy, except it uses parameters for the algorithm to generate noise.
Secondary use
When data is shared with a third party in a way that’s outside the expectations of the data subject.
Exclusion
Either occurs when an individual’s data is used without their knowledge or when they’re unable to consent to its use.