You are on page 1of 4

Question 1

Complete
Mark 1.00 out of 1.00

Flag question

Question text
The danger with information matching is that no one knows who will use the
built profiles from the matched information and where it will be used
Select one:
True
False

m
Question 2

er as
Complete

co
Mark 1.00 out of 1.00

eH w
o.
rs e
ou urc
Flag question

Question text
o

It is an invasion of privacy by wrongful entry, seizing, or acquiring possession


aC s

of the property of others


v i y re

intrusion
Answer:

Question 3
ed d

Complete
ar stu

Mark 1.00 out of 1.00


sh is
Th

Flag question

Question text
Individuals whose data are mined cannot be identified with or linked to
certain newly created groups.
Select one:
True
False

Question 4
Complete
Mark 1.00 out of 1.00

This study source was downloaded by 100000780038900 from CourseHero.com on 09-20-2021 10:42:20 GMT -05:00

https://www.coursehero.com/file/81082311/SocialProfessionalIssues2docx/
Flag question

Question text
There are different strands of information to be protected, which does not
belong to a group:

Select one:
a.
Medical Information

b.

m
er as
Employment Information

co
eH w
c.
Personal Information

o.
d.
rs e
ou urc
Financial Information

Question 5
o

Complete
Mark 0.00 out of 1.00
aC s
v i y re
ed d

Flag question
ar stu

Question text
If the codes of conduct focuses on rules and guidelines, autonomy focuses
decision m
on Answer
sh is

Question 6
Th

Complete
Mark 1.00 out of 1.00

Flag question

Question text
It is the core of human dignity and autonomy
privacy
Answer:

This study source was downloaded by 100000780038900 from CourseHero.com on 09-20-2021 10:42:20 GMT -05:00

https://www.coursehero.com/file/81082311/SocialProfessionalIssues2docx/
Question 7
Complete
Mark 1.00 out of 1.00

Flag question

Question text
It is the application of data mining techniques to discover patterns from the
Web
w eb mining
Answer:

Question 8
Complete
Mark 1.00 out of 1.00

m
er as
co
eH w
o.
rs e
Flag question
ou urc
Question text
One of the contributing factors in the cause of violations is when consumers
lack the ethics of how what they consider a little bit of information can turn
o

into a big invasion of privacy


aC s

Select one:
v i y re

True
False
ed d

Question 9
ar stu

Complete
Mark 1.00 out of 1.00
sh is
Th

Flag question

Question text
Under what condition can data collections become an invasion of privacy?

Select one:
a.
there is no limit to what one can do

This study source was downloaded by 100000780038900 from CourseHero.com on 09-20-2021 10:42:20 GMT -05:00

https://www.coursehero.com/file/81082311/SocialProfessionalIssues2docx/
b.
when information is used for unauthorized access

c.
when information is used for unauthorized purposes

d.
sold to the highest bidder

Question 10
Complete
Mark 1.00 out of 1.00

Flag question

m
er as
Question text

co
It involves the indirect gathering of personal information through an analysis

eH w
of implicit patterns discoverable in data.

o.
rs e
ou urc
Select one:
a.
o

Web Mining
aC s
v i y re

b.
Data Mining

c.
ed d

Information Matching
ar stu

d.
Data Bidding
sh is
Th

This study source was downloaded by 100000780038900 from CourseHero.com on 09-20-2021 10:42:20 GMT -05:00

https://www.coursehero.com/file/81082311/SocialProfessionalIssues2docx/
Powered by TCPDF (www.tcpdf.org)

You might also like