A new Al-driven software package helps schools determine the best type of online learning support based on the current racial segments of students. The developer selected zip codes as a method for identifying specific groups.
Which source of bias does this approach introduce into the system?
An individual soils a used television on an e-commerce website without knowing or disclosing that it is damaged Which two ethical problems is the seller engaged in? Choose 2 answers.
A company builds a new artificial intelligence (Al) system that helps address drug and alcohol use disorders by developing an individualized plan to support people with one of these disorders. The system developers load nationwide information from the last 20 years to provide a baseline for the Al to analyze. Upon activating the system, the company receives complaints about bias against minorities with a drug or alcohol use disorder.
What introduced bias into the system?
The retail store manager of a telecommunications service provider has been manually entering the data record of device returns into the company's device database every time a subscriber swaps their old phone for a new one. A recent internal audit revealed that several device records are missing from the device database.
Which aspect of data management should the store employ to avoid this situation?
A cloud computing company uses machine learning software to screen the resumes of job seekers. The company's aim is to reduce potential human prejudice in the hiring process. To set up the software and train the machine learning model, the company provides information from its hiring decisions over the past five years. After several months of using the software, the company runs an audit and finds that the software screens out minority job seekers at a much higher rate.
Which behavior is the trained machine learning model displaying?
Employee A works as a developer for a software company. Their sibling is also a developer at a competitor company. Both companies are working on a similar application. The sibling's company struggles to get a feature to work, so the sibling copies the source code for the relevant sections of the application from Employee A's laptop after it was left unattended.
How should this behavior be classified?
A bank customer recently received a mailer from a third party affiliated with the customer's bank. The customer is concerned because the mailer includes information about the customer's remaining mortgage amount.
What is a rule or provision of the Gramm-Leach-Bliley Act (GLBA) that provides a process for the customer to control this type of information?
A customer places an order for a product on an e*commerce site after reviewing the quantity and pricing on the online form. The customer then receives an email confirmation that displays different pricing than the order form. The customer reports the discrepancy to customer service.
Which security practice is this customer addressing?
Which act prohibits U.S. government agencies from concealing the existence of personal data record-keeping systems?