Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

CITP EXAM QUESTIONS AND ANSWERS: LATEST UPDATE (ALREADY GRADED A+.)

Beoordeling
-
Verkocht
-
Pagina's
5
Cijfer
A+
Geüpload op
20-02-2025
Geschreven in
2024/2025

CITP EXAM QUESTIONS AND ANSWERS: LATEST UPDATE (ALREADY GRADED A+.) Active collection Data directly from subject Passive collection Data without the participant Knowing First Party Providing information directly to collector Surveillance Collecting data through observed behaviors like online searches or websites Repurposing Previously collected data used for a different purpose Third Party Previously collected data is transferred to a third party Explicit Consent User takes an action Implicit Consent Does not require user permission Privacy by design 1. Proactive not reactive, 2. Privacy by Default, 3. Privacy Embedded in Design, 4. Full Functionality (Positive Sum, not zero sum, 5. End to End Securty, 6. Visibility and Transparency, 7. Respect for privacy Fair Information Principles (FIPPS) A privacy risk model that restricts collection of data to only what is needed or for its intended purpose. Do not collect additional data that is not needed for intended purpose. Calo's Subjective/Objective Dichotomy A privacy risk model that focuses on privacy harms based on two categories: Subjective Harm (perceives a harm that may not be observable or measure and can cause fear and anxiety) and Objective Harm (privacy has been violated or direct harm is known and is measurable and observable). interrogation

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

CITP EXAM QUESTIONS AND ANSWERS:
LATEST UPDATE (ALREADY GRADED A+.)
Active collection

Data directly from subject

Passive collection

Data without the participant Knowing

First Party

Providing information directly to collector

Surveillance

Collecting data through observed behaviors like online searches or websites

Repurposing

Previously collected data used for a different purpose

Third Party

Previously collected data is transferred to a third party

Explicit Consent

User takes an action

Implicit Consent

Does not require user permission

Privacy by design

1. Proactive not reactive, 2. Privacy by Default, 3. Privacy Embedded in Design, 4. Full Functionality
(Positive Sum, not zero sum, 5. End to End Securty, 6. Visibility and Transparency, 7. Respect for privacy

Fair Information Principles (FIPPS)

A privacy risk model that restricts collection of data to only what is needed or for its intended purpose.
Do not collect additional data that is not needed for intended purpose.

Calo's Subjective/Objective Dichotomy

A privacy risk model that focuses on privacy harms based on two categories: Subjective Harm (perceives
a harm that may not be observable or measure and can cause fear and anxiety) and Objective Harm
(privacy has been violated or direct harm is known and is measurable and observable).

interrogation

, Actively questioning an individual or otherwise probing for information

Aggregation

combining multiple pieces of information about an individual to produce a whole that is greater than the
sum of its parts.

Contextual Integrity

A risk model that states that privacy problems arise out of disruption of informational norms. More
specifically, personal information should be in alignment with informational norms that apply to the
particular context.

Solove's Taxanomy

Model that attempts to order different harms that may arise from infringements in privacy. The
taxonomy is split into four categories: 1) Information Collection, 2) Information processing, 3)
Information dissemination and 4) Invasion.

NIST Privacy Risk Model

A risk model that is embedded in its Privacy Risk Assessment Methodology (PRAM) and explicitly
addrssees vulnerabilities, adverse events and the relative likelihoods and impacts of those events.

NICE Framework

Divides computer security into the following categories: Securely provision (Tasks to develop software to
be secure), Operate and Maintain, Protect and Defend and Investigate (plan for investigating an attack).

Factors Analysis in Information Risk (FAIR)

Model that breaks down risk by its constituent parts and then breaks it down further to estimate risk.
The model asks how often a violation occurs and over what time period and what impact will that
violation have?

Design Thinking Process

Five stages: Empathize (Research user's needs), Define (state users needs and problems, Ideate
(challenge assumptions and create ideas), prototype (create solutions) and Test (try out solution).

Value-Sensitive Design

Design approach that accounts for ethical values, such as privacy, in addition to usability-oriented design
goals. Here are the steps for Value-sensitive design: 1) Clarify project values, 2) Identify the direct and
Indirect stakeholders, 3) Identify the benefits and hams for stakeholders, 4) Identify and elicit potential
values 5) Develop working definistions of key values, 6) Identify potential value tensions and 7) Value-
oriented design and development.

Privacy Notices

External documents that informs users of an organizations practices, values and commitments
concerning their personal data.

Geschreven voor

Vak

Documentinformatie

Geüpload op
20 februari 2025
Aantal pagina's
5
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$10.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF


Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
SOLUTIONSCORE School of Pharmacy
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
13
Lid sinds
1 jaar
Aantal volgers
4
Documenten
1742
Laatst verkocht
5 maanden geleden
SOLUTIONSCORE

I Focus on creating high-quality, well-organized documents that accurately reflect the course content. I'm passionate about helping others succeed in their studies, and I create comprehensive summaries, study guides,Questions and answers and flashcards based on my class notes and lectures. My materials are designed to be clear, concise, and effective, so you can focus on understanding the material and ace your exams! Feel free to message me if you have any questions.

Lees meer Lees minder
4.9

295 beoordelingen

5
268
4
26
3
1
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen