Which of the following is NOT a principle in Information Ethics addresses the ethical,
Data Ethics? legal, and societal concerns about using
information and communication technology.
Retention
True
It is a principle of Data Ethics that refers to
the right of a data owner to know how an Business controls, data content, and metadata
organization collects, and use their data. management for a set of data assets are the
responsibility of Data Custodians.
Transparency
False
Which of the following is NOT one of the V’s
associated as a characteristic of Big Data? Big data can be processed through traditional
data-processing software applications.
Validation
False
This characteristic refers to the reliability of
data; level of accuracy and/or uncertainty Information privacy refers to the security of
any data a user makes or sends while using a
Veracity mobile or desktop device to surf the web.
A core element of Data Ownership that states False
how an organization will control data and
who will have access to it that includes both Data Ethics and Information Ethics cover the
recovery procedures and access restrictions same topics and issues.
Data Management False
A core element of Data Ownership that The Digital Revolution refers to the change
describes what happens to the data once an from digital technology to analog and
agreement with a supplier expires. mechanical electronics.
Data Rights and Retention False
According to the presentation, _________ Social media use can enhance feelings of
refers to the security of any data a user makes social isolation by substituting face-to-face
or sends while using a mobile or desktop social contacts with a screen or exposing them
device to surf the Internet to inaccurate or deceptive representations of
their connections' lives.
Digital Privacy
True
_________ provides information on a
customer’s experience with a company’s Consumer data collected by businesses can be
product or service. divided into four categories: Personal,
Engagement, Behavioral, and Sensory data.
Behavioral Data
False
According to the _________, frequent misuse
of data entails disregarding permissions Data misuse does NOT always occur as a
provided by the user. result of a cyberattack or when data is taken
without the owner’s knowledge.
Computer Misuses Act
True
_________ covers the moral obligations of
gathering, protecting, and using personally Collecting activity logs is the most basic
information and how it affects individuals. method of monitoring user behavior.
Data Ethics True
Explain the difference between Data have to process large volumes of low-
Ethics and Information Ethics. density and unstructured data. This can
range from tens of terabytes to hundreds of
Data ethics, for example, is petabytes.
concerned with people's data based
on third-party activities, as opposed Velocity – velocity attributes to the rate of
to media and journalistic ethics, which data is created and received. Not only
which are the subject of information does the amount of data produced by
ethics. Big data ethics is primarily existing sources grow continuously, but as
concerned with structured or new technologies enter the field, new types
unstructured data collectors, such as of data are also created. Moreover, as users’
data brokers, governments, and behavior change over time, not only may
major organizations. In contrast, this affect the quantity of data produced, but
information ethics is more concerned also its quality and value.
with issues of intellectual property
and concerns relating to libraries, Variety – in connection to the sources of
archivists, and journalists. It covers data, variety refers to the many types of data
topics such as information available. It is concerned with the qualitative
ownership, intellectual property aspects of big data, consisting of a
access, and people's freedom to combination between structured,
browse and use the Internet as they unstructured, and semi-structured data.
please. While structured data often comes in the
form of traditional data types, thus easier to
- Data ethics is a type of ethics that standardize and process, unstructured and
examines and analyzes moral issues in data, semi-structured are more difficult to deal
algorithms, and related activities to with (e.g., text, audio, and video).
determine and promote ethical or moral
solutions. It is concerned more with data Value – value simply refers to the worth of
users who collect structured or unstructured the data once processed. In other words,
data. Those users can be from different what it brings of value to serve the purposes
people or organizations and governments of an organization.
etc. According to group 2, it is considered Veracity – data itself would largely be
critical because it determines what is correct useless if it isn’t reliable. Veracity is
and incorrect in the use of information. On concerned with the level of accuracy and/or
the other hand, information ethics studies uncertainty of big data. It is
more on the connection between information
generation, organization, ethical norms, and - According to the discussion, there are
moral rules. It also discusses people's rights five characteristics of data discussed. I will
to read and use platforms such as the discuss 3 of them: Volume, Variety, and
internet as they please and access Value. Volume is the large scope of digital
intellectual property. datasets that must be examined and
processed. It can range from tens of
Give and discuss at least 3 characteristics terabytes to hundreds of petabytes. Variety
of Big Data. focuses on big data characteristics, including
Volume – volume refers to the most defining structured, unstructured, and semi-structured
criterion of big data: the immense scope data. It has the capacity to categorize
found in digital datasets. Data analysts will incoming data into multiple groups. Lastly,
the value pertains to the data's value after
being examined and processed. It relates to terms of its relationship to internet usage. It
the value of the data obtained for a business. protects data when users use the internet to
transport information using mobile or
Explain digital privacy and provide desktop devices. - According to group 2, an
examples of what is included within it. example of digital privacy is creating an
Digital privacy refers to the security of any account on social media wherein users are
data a user makes or sends while using a required to fill up a form and provide
mobile or desktop device to surf the web. In information about themselves. Another
fact, digital privacy concerns all the example is when a user subscribes to
information created as we use the web. It applications such as YouTube, Spotify,
includes: Netflix, etc., where they also need to provide
information about themselves to proceed
Any personal information you type in a form with subscription.
when creating an account on any
website/social media platform Provide and explain 3 causes of data
abuse/misuse.
Anything we post on our websites/social
media Employees that do not have proper data
handling practices are frequently the cause
Anything we react to with emojis or likes of data abuse. Employees, for example,
Anything we subscribe to (playlists on make private work files or data available
Spotify, monthly wine deliveries or other outside of their intended, secure setting
subscription boxes, SaaS plans) when they transfer them to their devices.
This data can be stolen or mistakenly
All search queries and browsing history disclosed if suitable safeguards are not in
place.
Predictions and quiz results (yeah, all those
“Who were you in your previous life?” and Data abuse might also result from collection
“What actor do you look like” kind of tests) mistakes. Inaccurate algorithms can lead to a
corporation collecting data it wasn't
Data we receive from the connected IoT
supposed to, putting customers at risk and
software devices (fitness trackers, implanted
putting enterprises out of compliance.
medical devices, etc.)
Another example of information abuse is
Websites we use and block, posts we read,
incorrect filing. Depending on how your
how much time we spend on them
systems categorize them, some datasets may
Audio messages, voice samples, voice be kept in areas where they're accessible to
commands, fingerprints the wrong teams or people.
Content you share with your colleagues over - An example of the cause of data
a CRM abuse/misuse is when mistakes or
errors occur in data collection.
Scannable data (shipping package codes,
tracking IDs, QR codes, etc.) Human error or Incorrect algorithms
inputted on data or the organization’s
The idea of digital privacy is best described system may result in major problems
as the security of private persons' where it puts the business, client, and
information when using digital means. customers at risk. Another cause of
Digital privacy is frequently discussed in data abuse is when employees are
not properly trained in handling
important data that may cause an
error. Employees should have
enough training and practice before
handling the organization's data to
lessen human error or error in the
system. Data is very important to
businesses because it could provide
them with a summary and ideas on
what to improve, so employees and
business owners should reduce
mistakes to avoid data abuse.