Module 7 Flashcards

Technology Challenges for Privacy

1
Q

Artificial Intelligence

A

Simulation of human intelligence created by machines and computers. With the ability to learn, reason and evaluate. Despite advantages, AI also has the ability (when used unethically) to mislead, exploit, manipulate, influence decisions and cause damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Machine Learning

A

Learn by experience and develop skills without the direct involvement of humans. Machine learning can be prone to bias if using biased algorithms or biased data. When designing Machine learning models, here are three guiding principles that a privacy technologist should consider:

o Define and document fairness goals, ensuring that data fed to algorithms are drawn from unbiased sources, and automated decisions remain in line with those goals and policy choices.
o Recognize that machine learning is not always the appropriate solution to a problem. Consider value-sensitive design. Does it meet the organization’s ethical values?
o Consider the privacy implications by which machine learning has the ability to impact all three types of interference, and design algorithms that address the risk to minimize or eliminate it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Deep Learning

A

A subset of AI and machine learning, deep learning learns by performing a task repeatedly, adjusting along the way, adding layer of data to improve the outcome. Deep learning can create audio, video or photographs that appear real and can learn to recognize people’s faces and tag them in photos autoatically, raising consent isuues. Deep learning algorithms (Neural Networks) that try to copy the way the human brain works.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Context-aware computing

A

When hardware adapts to its environment. This is a type of context awareness (location, video, audio and overall activity) and has privacy implications. A technologist needs to consider how context-aware computing affects individual’s emotional well-being and self-image with its potential to intrude into sensitive personal information. This technology needs to allow the user to make adjustments, set time limits and even disable the function.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Internet Monitoring

A

Tools for monitoring internet activity that is placed along the path from source to its destination across intermediate networking devices (hubs, switches, repeaters and routers).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Authoritative

A

Type of internet monitoring; Some countries, employers and schools monitor network traffic to enforce policies for security and appropriate behavior. An example of this is when certain keywords or addresses are monitored and added to blacklists or control lists to block access to certain websites deemed inappropriate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Wi-Fi Eavesdropping

A

Type of internet monitoring; When unsecured communication sent over a network is intercepted via packet sniffing and analysis tool.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Behavioral

A

Type of internet montioring; When companies monitor browsing history, geo data and behavior for targeted advertising.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Secure Transfer

A

A monitoring practice; Secure sockets layer (SSL) and transport layer security (TLS) can be used to encrypt data when transmitting over internet. An example would be to use HTTPS instead of HTTP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Secure Wi-Fi networks

A

A montioring practice; Only use a secure Wi-Fi networks. Emails should be encrypted to provide an additional layer of protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Deep Packet Inspection

A

A monitoring practice; DPI is a method of examining and analyzing data within a packet before it leaves a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Anthropomorphism

A

The attribution of human traits, feeling and behaviors to inanimate objects, nonhuman animals or nature. With technology, having voice recognition software that responds or robotics expressing emotions can have privacy issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Speech Recognition

A

This technology recognizes a person’s voice and relay information. Since speech recognition is on many devices used in living areas and personal spaces, this raises privacy concerns. Speech recognition devices that send information to remote servers for processing are of particular concern as conversations may be inadvertently or maliciously recorded and transmitted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Natural Language Understanding

A

Utilizes machine reading comprehension through algorithms to identify and extract natural language the computer can understand.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Natural Language Generation

A

Information is transformed into content, enabling such functions as text-to-speech, automation of reports and the production of content for a web or mobile application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Chatbots

A

Simulate as human interaction in a conversation. Individuals may interact with a chatbot in the form of automated customer service or information inquiry. A chatbot will match keyworks from a database and attempt to create a personalized customer experience. Mismanagement of chatbots can lead to fabricated information or deceptive personal ads on dating or friend sites.

17
Q

Robots

A

Designed with the ability to observe, process and record and while they are a human tool, they are sometimes used to see things and go places where humans cannot. Since robots store and record information, it is important that the data collected is necessary, securely stored and deleted within a reasonable timeframe.

18
Q

Ubiquitous computing

A

Ubiquitous computing, in simple terms, means having technology or computers everywhere around us, but so naturally integrated that we barely notice them. The idea is that computers and devices work in the background, helping us in our daily lives without needing much attention.

For example, smart home devices like Alexa or Google Home are a form of ubiquitous computing. They control lights, thermostats, and music, responding to voice commands or even adjusting things automatically, making technology feel like a seamless part of your home. You don’t always realize it’s there, but it’s working to make things easier for you.

19
Q

Internet of Things (IoT)

A

The Internet of Things (IoT) is when everyday objects are connected to the internet, allowing them to send and receive data. These “smart” devices can talk to each other and be controlled remotely through apps or other devices, making them more useful and efficient.

For example, a smart thermostat in your home is part of the IoT. It connects to the internet, allowing you to adjust the temperature from your phone, even when you’re not home. It can also learn your preferences and adjust the heating or cooling automatically to save energy.

20
Q

Augmented reality (AR)

A

Augmented Reality (AR) is when digital images or information are placed on top of the real world around you, usually through a screen like a smartphone or special glasses. It’s like adding virtual things to your physical environment that you can see and interact with.

An example of AR is the game Pokémon GO. In the game, you look through your phone’s camera, and it shows digital Pokémon characters appearing in real places, like in your backyard or at the park. You see the real world, but the game adds virtual characters for you to catch.

21
Q

Virtual Reality (VR)

A

Completely replaces the real world with a virtual world. Both augmented reality and mixed reality feature a combination of computer-generated content and real-world elements. The key difference between mixed reality and augmented reality is the user’s ability to interact with the digital display. For example, a technician wearing an AR headset can view the holographic image of the engine, but can’t virtually take it apart.

22
Q

Geo-tagging

A

The practice of embedding metadata regarding the location where a photo or video was taken into the photo itself. If that photo or video is shared, the location can also be shared, and individuals may not realize that this has occurred. Privacy and security issues could arise if, for example, someone gives away the location of their home, or if it is clear that someone is far away from their home where that empty house could be broken into. Geo-tagging has also given away the location of secret military bases and other confidential locations.

23
Q

Geo-social patterns

A

Geo-social patterns refer to how people behave, move, and interact based on where they are and who they’re with. It’s about understanding people’s habits and connections in specific places using location data.

For example, a social media app like Facebook might notice that a group of friends frequently visits the same coffee shop on Saturday mornings. This pattern shows not only where they go (the “geo” part) but also their social habits (meeting together at the same time and place). Businesses or apps can use these patterns to offer special promotions or recommendations based on where people usually go and who they’re with.