III Data Collection and Use Flashcards

1
Q

Covert Surveillance

A

Things like web trackers, geolocation, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Overt surveillance

A

CCTV, tollbooth transponders, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Positive Impact of surveillance

A

dissuade theft, prevent cheating in a casion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Negative impact of surveillance

A

Self-censoring, silences minority views, manipulates behaviour to further interests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Asymmetric power relationship

A

When the questioner and questionee have an unbalanced power relationship.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Existing relationship

A

When the questioner and questionee know one another, but one nevertheless feels pressure to answer questions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Reverse flow of information

A

Oversharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data insecurity

A

Can be the result of both negligence as well as threat actors. Risk assessments can help, as can implementing multifactor authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data identification

A

The act of linking pieces of identifiable information to an individual. Examples of this info includes zip code, DOB, recurring IP, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data aggregation

A

Data expressed in summary form (e.g. the Gmail FBL).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Frequency vs magnitude data

A

With frequency data, all individuals contribute equally to data. With magnitude data, contributions are unequal. Residents in an area is frequency data, while salary info is magnitude data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Differential privacy

A

Ensure aggregated data is useful but non-specific enough to avoid revealing underlying identifiers. Algorithms help.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Differential identifiability

A

Like differential privacy, except it uses parameters for the algorithm to generate noise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Secondary use

A

When data is shared with a third party in a way that’s outside the expectations of the data subject.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Exclusion

A

Either occurs when an individual’s data is used without their knowledge or when they’re unable to consent to its use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly