Privacy in Cyberspace
Cybersecurity
Cybercrime
IP in Cyberspace
Speech & Commerce Regulation in Cyberspace
100

Describe the distinction between Public Personal Information (PPI) and Nonpublic Personal Information (NPI).

PPI refers to information that is publicly accessible, while NPI is information that is not meant for public access and is typically protected by privacy policies or laws.

100

What are the three components of the CIA triad in cybersecurity?

Confidentiality, Integrity, and Accessibility

100

What is the distinction between a hacker and a cracker?

A hacker is someone who accesses a computer system or network without authorization, which can be considered allowable if it has an ethical motivation and does not cause harm. A cracker, or black hat hacker, performs malicious hacking, breaking security on a system, and often engaging in theft and vandalism.

100

What are the two main differences between a physical property (a house) and an IP (an authored book)?

 IPs are intangible objects (manifestations/expressions of ideas); non-exclusionary. Not subject to scarcity.

100

What are the positive and negative impacts of generative AI on mis/disinformation?

Positive impacts include generating diverse content and verifying information, while negative impacts involve creating fake news, misleading content, and deepfakes.

200

What is the difference between descriptive privacy and normative privacy?

Descriptive privacy refers to contexts that are naturally or descriptively private, while normative privacy pertains to contexts that are deemed private based on societal norms and expectations.

200

What are the three areas of security, as summarized by Table 6-1 in Tavani's Chapter 6?

Data security, system security, and network security

200

Name three categories of genuine cybercrimes.

Cyberpiracy, cybertrespass, and cybervandalism.

200

What are fair-use and first-sale as two important provisions of IP?

Fair-Use: Allows for the limited use of copyrighted material without the permission of the copyright holder for the following purposes: comment, criticism, news, reporting, research, scholarship, and teaching. Not an absolute right.

First-Sale: Allows the purchaser of a copyrighted work to sell, lend, or otherwise dispose of that particular copy of the work without the permission of the copyright holder. Applies only to the particular copy of the work that was lawfully obtained. Not applies to digital downloads, subscription-based services, etc.

200

Name the two categories of cyberspace regulation.

Regulating content and regulating process.

300

What are the three views of privacy listed in Table 5-1 of the Tavani text?

Accessibility privacy (freedom from unwarranted intrusion), decisional privacy (freedom from interference in one’s personal affairs), and informational privacy (control over the flow of personal information).

300

Name one of the four security or ethical considerations of cloud computing.

Control over data stored in the cloud, integrity of the data, access to the data, or ownership of the data.

300

How do cyber-exacerbated crimes differ from cyber-assisted crimes?

Cyber-exacerbated crimes are traditional crimes made worse by digital tools, while cyber-assisted crimes are specifically enabled by digital tools.

300

What is a potential consequence of strict copyright laws on information commons?

Underutilization of resources

300

What are the four modalities for regulation according to the Lessig Model?

Laws, social norms, market pressures, and architecture (or code).

400

Name the four major ways cybertechnology changes privacy considerations.

The amount of personal information that can be collected, the speed at which information can be transmitted, the duration of time it can be retained, and the kind of information that can be acquired and exchanged.

400

List and describe one technology or tool used to combat cybercrime.

Encryption, which secures data by converting it into an unreadable format, protecting it from unauthorized access during transmission or storage.

400

Describe the concept of data monetization and how it differs from other data-related activities.

Data monetization involves generating revenue directly from data, either by selling data or leveraging it for business operations, as opposed to other activities like data analysis or storage, which may not directly generate revenue.

400

What are 3 philosophical theories of property?

Labor Theory. Utilitarian Theory. Personality Theory.

400

What is digital rights management (DRM), and how does it relate to intellectual property disputes in cyberspace?

DRM is a set of access control tools to regulate the flow of digital information by embedding "digital locks" that restrict how it can be accessed, copied, and distributed.

500

Name 3 key privacy laws and regulations discussed in the course and explain one in detail.

GDPR, HIPAA, and CCPA. (Example for GDPR: It sets rules for the protection of personal data, requiring companies to obtain consent for data collection, allowing individuals to request access to or deletion of their data, and enforcing strict penalties for non-compliance.)

500

What is the difference between hacktivism, cyberterrorism, and information warfare?

Hacktivism is politically motivated, cyberterrorism involves using cyber attacks to incite fear or damage, and information warfare targets information systems or networks to disrupt or manipulate.

500

What is the main challenge of implementing cybercrime regulation?

Generative AI automates content creation in various industries, including economic models and financial forecasting, generates synthetic data for healthcare diagnostics, and produces realistic imagery and videos for the adult entertainment industry.

500

Describe the concept of the information commons and its role in digital ethics.

The information commons refers to a body of knowledge and information available for public use, without requiring permission, as long as its use adheres to specific conditions. It plays a role in digital ethics by promoting access to information and mitigating exclusionary practices.

500

What are two types of cyberspace censorship? Example of each.

Censorship by suppression: outright prohibits the publication, display, or circulation of texts or materials deemed objectionable.

Censorship by deterrence: using legal or social penalties to discourage the dissemination of objectionable content without outright banning it.