Deck 20: Privacy

Full screen (f)
exit full mode
Question
The TIA program remains a key component of federal efforts to curtail terrorism and also remains a key concern of privacy advocates.
Use Space or
up arrow
down arrow
to flip the card.
Question
The Total Information Awareness tracking information system was created by ____.

A) the state of Illinois
B) the U.S.federal government
C) the United Nations
D) Microsoft
Question
The U.S.government maintains the largest repository of information about U.S.citizens.
Question
Citizens of free and democratic nations expect,at the least,privacy ____.

A) in the workplace
B) of commercial records
C) within the home
D) in their social profiles
Question
MATRIX-like information collection/data mining technology is still used in some states in the United States today.
Question
Data mining involves collecting and analyzing large amounts of information stored in large databases.
Question
A challenge for companies such as Google and Facebook is building software that can ____ over the next few years.

A) filter inappropriate material
B) sift through people's profiles
C) analyze large amounts of data
D) handle alphabetizing data
Question
The First Amendment to the Constitution of the United States protects an individual's right to privacy of person and possession against unreasonable searches.
Question
Through the use of ____,governments can keep an eye on criminals and monitor regions in their own countries.

A) throttling
B) satellite imagery
C) traffic shaping
D) RFID
Question
One-to-one marketing occurs when a business closely studies an individual's web behavior and then predicts what the individual may be interested in purchasing.
Question
MATRIX technology ____.

A) is known to have prevented at least eight major terror plots in the United States
B) was proposed but never developed
C) is still implemented at the federal level
D) is still implemented by some states
Question
The ease of access to information on the Internet has made it harder to maintain personal privacy.
Question
The Freedom of Information Act came about as a response to the Privacy Act of 1974.
Question
Throttling is a way that ISPs can shape traffic and rein in the heavy-bandwidth users.
Question
The Bill of Rights addresses privacy issues in the United States.
Question
In the United States,the fundamental law that specifies what kinds of information the government can keep about its citizens and the rights of citizens to know what's kept about them is the ____.

A) Privacy Act of 1974
B) Consumer Internet Privacy Protection Act of 1997
C) Freedom of Information Act of 1966
D) Information Protection and Security Act of 2005
Question
Surveillance cameras in public places are not considered a potential threat to privacy.
Question
Microblogging and lifestreaming are both forms of transparency.
Question
____ can tell more about a person than all other kinds of electronic surveillance.

A) Wiretapping
B) Data mining
C) GPS tracking
D) RFID surveillance
Question
The biggest challenge posed by Big Data is ____.

A) physical storage
B) viruses and malware
C) developing software to analyze the massive amount of data
D) traffic shaping
Question
Of the following,____ contains the most information about citizens of the United States.

A) Time Warner
B) LexisNexis
C) the federal government
D) Facebook
Question
____ is currently dampening the ability of government surveillance to grow.

A) Data transmission speed
B) Lack of funding and personnel
C) The "tech ceiling"
D) The poor quality of satellite images
Question
Of the following,____ is considered the most invasive.

A) traditional marketing
B) onsite behavioral marketing
C) network behavioral targeting
D) market segmentation
Question
____ is a form of traffic shaping.

A) Behavioral marketing
B) Wiretapping
C) Throttling
D) Full transparency
Question
Full transparency is a scenario in which surveillance and information are ____.

A) ended unequivocally and forever
B) held only in the hands of the federal government as caretakers of the information gathered
C) the responsibility solely of non-governmental organizations
D) easily available to every law-abiding member of a society
Question
A(n)____ lifestyle involves ridding oneself of all concerns about privacy.

A) traditional
B) transparent
C) opaque
D) semi-trust
Question
____ favor(s)an Internet that is open,with packets unexamined and unfiltered.

A) Network neutrality
B) ISPs
C) Comcast
D) The UN Office of Electronic Freedom
Question
Twitter is a ____ site.

A) behavioral marketing
B) microblogging
C) lifestreaming
D) network-neutral
Question
Studying the way people use the web-what sites they visit,what products they buy,etc.-is an example of ____.

A) mass marketing
B) mass-market segmentation
C) one-to-one marketing
D) a crime
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/29
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 20: Privacy
1
The TIA program remains a key component of federal efforts to curtail terrorism and also remains a key concern of privacy advocates.
False
2
The Total Information Awareness tracking information system was created by ____.

A) the state of Illinois
B) the U.S.federal government
C) the United Nations
D) Microsoft
B
3
The U.S.government maintains the largest repository of information about U.S.citizens.
False
4
Citizens of free and democratic nations expect,at the least,privacy ____.

A) in the workplace
B) of commercial records
C) within the home
D) in their social profiles
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
5
MATRIX-like information collection/data mining technology is still used in some states in the United States today.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
6
Data mining involves collecting and analyzing large amounts of information stored in large databases.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
7
A challenge for companies such as Google and Facebook is building software that can ____ over the next few years.

A) filter inappropriate material
B) sift through people's profiles
C) analyze large amounts of data
D) handle alphabetizing data
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
8
The First Amendment to the Constitution of the United States protects an individual's right to privacy of person and possession against unreasonable searches.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
9
Through the use of ____,governments can keep an eye on criminals and monitor regions in their own countries.

A) throttling
B) satellite imagery
C) traffic shaping
D) RFID
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
10
One-to-one marketing occurs when a business closely studies an individual's web behavior and then predicts what the individual may be interested in purchasing.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
11
MATRIX technology ____.

A) is known to have prevented at least eight major terror plots in the United States
B) was proposed but never developed
C) is still implemented at the federal level
D) is still implemented by some states
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
12
The ease of access to information on the Internet has made it harder to maintain personal privacy.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
13
The Freedom of Information Act came about as a response to the Privacy Act of 1974.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
14
Throttling is a way that ISPs can shape traffic and rein in the heavy-bandwidth users.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
15
The Bill of Rights addresses privacy issues in the United States.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
16
In the United States,the fundamental law that specifies what kinds of information the government can keep about its citizens and the rights of citizens to know what's kept about them is the ____.

A) Privacy Act of 1974
B) Consumer Internet Privacy Protection Act of 1997
C) Freedom of Information Act of 1966
D) Information Protection and Security Act of 2005
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
17
Surveillance cameras in public places are not considered a potential threat to privacy.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
18
Microblogging and lifestreaming are both forms of transparency.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
19
____ can tell more about a person than all other kinds of electronic surveillance.

A) Wiretapping
B) Data mining
C) GPS tracking
D) RFID surveillance
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
20
The biggest challenge posed by Big Data is ____.

A) physical storage
B) viruses and malware
C) developing software to analyze the massive amount of data
D) traffic shaping
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
21
Of the following,____ contains the most information about citizens of the United States.

A) Time Warner
B) LexisNexis
C) the federal government
D) Facebook
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
22
____ is currently dampening the ability of government surveillance to grow.

A) Data transmission speed
B) Lack of funding and personnel
C) The "tech ceiling"
D) The poor quality of satellite images
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
23
Of the following,____ is considered the most invasive.

A) traditional marketing
B) onsite behavioral marketing
C) network behavioral targeting
D) market segmentation
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
24
____ is a form of traffic shaping.

A) Behavioral marketing
B) Wiretapping
C) Throttling
D) Full transparency
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
25
Full transparency is a scenario in which surveillance and information are ____.

A) ended unequivocally and forever
B) held only in the hands of the federal government as caretakers of the information gathered
C) the responsibility solely of non-governmental organizations
D) easily available to every law-abiding member of a society
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
26
A(n)____ lifestyle involves ridding oneself of all concerns about privacy.

A) traditional
B) transparent
C) opaque
D) semi-trust
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
27
____ favor(s)an Internet that is open,with packets unexamined and unfiltered.

A) Network neutrality
B) ISPs
C) Comcast
D) The UN Office of Electronic Freedom
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
28
Twitter is a ____ site.

A) behavioral marketing
B) microblogging
C) lifestreaming
D) network-neutral
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
29
Studying the way people use the web-what sites they visit,what products they buy,etc.-is an example of ____.

A) mass marketing
B) mass-market segmentation
C) one-to-one marketing
D) a crime
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 29 flashcards in this deck.