Chapter 15: Emerging Issues Flashcards

(26 cards)

1
Q

Big Data

A

A term to describe the ubiquitous collection of data about individuals from a multitude of sources, coupled with new storage, data mining, and predictive techniques.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

It is challenging to apply the FIPPs to Big Data because…

A

There may not be a clear understanding of how the data is used, and advanced analytics may fall outside the scope of the original purpose of collection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Moore’s Law (1975)

A

The notion that the number of transistors on a circuit board doubles every 18 to 24 months.

Translates to big data which, as of 2025, doubles by 12 hours.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Three problematic characteristics of Big Data

A
  • velocity
  • volume
  • variety
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

“Friends and Family” Test

A

When creating a big data base, would data managers want themselves or their loved ones information in it?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which two Fair Information Practice Principles are particularly important to Big Data?

A

“Data Minimization” and “De- Identification”

  • organizations should process beneficial data, while suppressing portions of records that can reveal individuals identities.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Direct Identifiers

A

Data that identifies an individual with little or no additional effort.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Indirect Identifiers

A

Data (such as gender or age) that can increase the likelihood of identifying an individual.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Pseudonymous Data

A

When direct identifiers have been eliminated, but indirect identifiers remain in tact.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

De-Identified Data

A

When direct and known indirect identifiers have been removed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Anonymous Data

A

When direct and indirect identifiers have been removed for technically manipulated to prevent re-identification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Blurring

A

This technique reduces the precision of disclosed data to reduce the certainty of individual identification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Masking

A

Replacing the original values in a data set.

(ex. perturbation)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Differential Privacy

A

Uses a mathematical approach to ensure the risk to an individuals privacy is not substantially increased as a result of being part of a data base.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

3 products offered by data brokers, according to the FTC:

A
  • marketing
  • risk mitigation
  • location of individuals
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

FTC suggestions to data brokers:

A
  • minimize data
  • carefully review collection practices related to children and teens
  • take precautions against downstream users abusing the data for discrimination or crime
17
Q

Internet of Things

A
  • there is no universally accepted definition
  • when devices can connect to the internet without need for human interaction
18
Q

FTC definition of “Internet of Things”

A

Devices or sensors (other than computers, smartphones, or tablets) that connect, communicate, or transmit information with or between each other through the internet.

19
Q

Notable “Internet of Things” Characteristics

A
  • The devices interact with software running elsewhere (often in the cloud) and function autonomously.
  • When coupled with data analysis, the devices may take proactive steps and make decisions about or suggest next steps for users.
20
Q

Internet of Things Cybersecurity Concerns

A

1.) Limited used interfaces in products

2.) Lack of industry experience with privacy and cybersecurity

3.) Lack of industry incentives to deploy updates after the product has been purchased

4.) Limitation of the devices, like hardware security

21
Q

Privacy concerns regarding wearables:

A
  • right to forget
    -impact of location disclosure
  • shoulder surfing
  • video and audio recording
  • lack of control of data
  • auto-syncing with social media
  • facial recognition
22
Q

2017 FTC advice to smart watch consumers

A
  • secure watch with a PIN or lock pattern
  • lock the watch if it is too far from the associated phone
23
Q

Which federal agencies have all considered regulating connected cars?

A
  • The National Highway Traffic Safety Administration
  • The Federal Trade Commission
  • The Federal Communication Commission
24
Q

Smart Cities

A

Municipalities and other government entities using sensors to monitor functions and improve government functions.

25
DHS 2015 cyber security risks regarding smart cities:
- evolving connection points between systems, organizations, and technologies - inconsistent adoption - increased automation creates new security challenges
26
Broadband Internet Technical Advisory Group Report Recommendations on Internet of Things (2016)
- should follow security and encryption practices - should be tested in different possible configurations - should be designed to facilitate automated secure software updates - should be secured by default by the inclusion of a password - should be shipped originally with reasonably up-to-date software - should be shipped with a comprehensible and easy to find privacy policy - should communicate restrictive rather than permissive protocols - should continue to function if internet connectivity is disrupted or if cloud backup fails.