NPTEL Cyber Security and Privacy Week 12 Assignment Answers 2024

Sanket
By Sanket

NPTEL Cyber Security and Privacy Week 12 Assignment Answers 2024

1. Why is understanding the value that individuals assign to the protection of their personal data important for businesses?

  • To enable businesses to use personal data for maximum commercial gain
  • To help businesses develop privacy-enhancing initiatives that can provide a competitive advantage
  • To allow businesses to mandate strict data collection and usage policies without considering consumer preferences
  • To facilitate the creation of personal data trading markets where individuals can monetize their information
Answer :- For Answers Click Here 

2. Which of the following is true?

  • Privacy valuation is consistent across all individuals and contexts
  • Privacy valuation is influenced by external factors and remains stable over time
  • Privacy valuation can differ based on the specific context and circumstances
  • Privacy valuation is solely determined by economic factors and market trends
Answer :- For Answers Click Here 

3. What is the core idea behind the privacy calculus?

  • Individuals make irrational decisions about sharing personal information
  • Individuals engage in a cost-benefit analysis to decide whether to disclose personal data
  • Individuals do not have any control over the disclosure of their personal information
  • Individuals are solely motivated by the potential benefits of data sharing
Answer :- For Answers Click Here 

4. True or False: Willingness to accept tends to produce privacy valuations that are substantially lower than those produced by Willingness to pay.

  • True
  • False
Answer :- 

5. Which design approach is best recommended to address privacy concerns with digital contact tracing applications?

  • Implement a centralized architecture where all contact tracing data is stored and processed by a single authority
  • Develop a decentralized, privacy-preserving architecture that minimizes the sharing of personal data
  • Prioritize public health benefits over individual privacy protections in the design of contact tracing systems
  • Require mandatory participation in contact tracing programs to maximize the effectiveness of the technology
Answer :- 

6. What does Prospect Theory suggest about how people perceive gains and losses?

  • People value all gains and losses equally.
  • Individuals are more likely to take risks for potential gains.
  • Losses are typically felt more intensely than gains.
  • People only care about maximizing their financial gains
Answer :- For Answers Click Here 

7. Which of the following is/are considered recommended practices to protect privacy in AI systems?

  • Collect and handle data responsibly
  • Leverage on-device processing where appropriate
  • Appropriately safeguard data privacy inML models
  • All the above
Answer :- 

8. AI systems must comply with privacy laws such as the GDPR, such that: (1) it requires transparency about the collection, use, and storage of data. (2) it mandates that consumers have appropriate controls to choose how their data is used.

  • Only (1) is True
  • Only (2) is True
  • (1) and (2) are True
  • (1) and (2) are False
Answer :- 

9. ‘Ajay’ enters into a contract with ‘Bijoy’ to provide a service ‘ABC’ to ‘Bijoy’. As part of the contract, ‘Bijoy’ consents to processing of his personal data by ‘Ajay’. If ‘Bijoy’ withdraws his consent to processing of his personal data, ‘Ajay’ may stop offering the service ‘ABC’ to ‘Bijoy’. As per the Digital Personal Data Protection Bill, 2022, Bijoy is the _____________.

  • Data Principal
  • Data Processor
  • Data Fiduciary
  • Data Protection Officer
Answer :- 

10. What does Prospect Theory suggest about how people perceive gains and losses?

  • People value all gains and losses equally.
  • Individuals are more likely to take risks for potential gains.
  • Losses are typically felt more intensely than gains.
  • People only care about maximizing their financial gains
Answer :- For Answers Click Here 
Share This Article
Leave a comment