POTPOURRI FOR THEE
SUCH INSIGHT, MANY GUESTS
IN THE LAND OF LETTERS
CYBERSECURITY 101
Artifactually Incorrect
100

Biometric data often includes a person’s retina scans, facial geometry, or these unique patterns on one's digits.

What are fingerprints?

100

Assuming Langdon Winner were a guest speaker, he'd have argued that Artifacts have this.

What are politics?

100

GDPR

What is the General Data Protection Regulation?

100

When an unauthorized person hacks into a system and obtains data, it’s known as a data this.

What is a data breach?

100

Winner argues some technologies are “inherently political” because they require a particular form of social ________.

What is order?

200

These AI models, trained on massive text corpora, rely on probability distributions to predict the next most likely word or token.

What are large language models (LLMs)?

200

Carolyn Krol, who spoke about counseling on AI research, currently works at this tech company and previously worked at Meta.

What is Google?

200

CFPB

What is the Consumer Financial Protection Bureau?

200

Malicious software designed to damage or disrupt computer systems is commonly called this.

What is malware?

200

In Winner’s most famous example-story, low overpasses are said to block this vehicle type from reaching certain beaches.

What are buses?

300

One concern with generative AI is its ability to create realistic but fabricated audio or video—commonly referred to by this portmanteau.

What is a “deepfake”?

300

The Managing Director of IAPP DC, who joined us virtually for a discussion on all things FTC, consumer protection, and digital governance.

Who is Cobun Zweifel-Keegan?

300

COPPA

What is the Children's Online Privacy Protection Act?

300

This process scrambles data so only those with the proper key can read it.

What is encryption?

300

Winner points to this energy technology as tending toward centralized control and security regimes.

What is nuclear power?

400

In privacy enforcement, the FTC and FCC can order companies to pay monetary penalties or sign these legally binding agreements if they mishandle user data.

What are consent decrees?

400

FTC representative Danica Noble also has an affiliation with this UW center dedicated to combating misinformation.

What is the UW Center for an Informed Public?

400

FOIA

What is the Freedom of Information Act?

400

A system that monitors and blocks suspicious incoming traffic can be referred to by this fortress-related name.

What is a firewall?

400

Bowker and Star's book "Sorting Things Out" opens with the argument that this fundamental human cognitive activity — grouping things into types — is inherently political.

What is classification?

500

The fall Testimony Practicum had you watch actual committee proceedings on this Washington State public affairs television network.

What is TVW?

500

Representative Shelley Kloba of the Washington State House of Representatives, who joined us for a conversation on privacy lawmaking, represents this Legislative District.

What is District 1?

500

UDAP

What are Unfair and Deceptive Acts or Practices?

500

This security method requires users to verify their identity using two or more different types of evidence—such as a password plus a code sent to their phone—before gaining access to an account.

What is multi-factor authentication?

500

This phrase, from Gitelman and Jackson, reminds us that data are never truly neutral or unmediated.

What is “Raw data is an oxymoron”?

M
e
n
u