Legal and Ethical Concerns

Help Questions

AP Computer Science Principles › Legal and Ethical Concerns

Questions 1 - 10
1

A government agency proposes a system to track citizens' locations using their mobile phone data to monitor compliance with a public health order. While the stated goal is public safety, this raises a major ethical debate concerning...

the balance between individual privacy and collective well-being.

the computational efficiency of processing large amounts of geographic data.

the reliability of cellular networks in providing accurate location data.

the copyright status of the software used to analyze the location data.

Explanation

This scenario presents a classic ethical conflict between the government's goal of ensuring public safety (a collective good) and the citizens' right to privacy (an individual right). This is a significant social and political issue amplified by computing technology. Computational efficiency (A) and network reliability (C) are technical challenges, and copyright (D) is an unrelated legal issue.

2

An online retail company uses an algorithm to set prices for its products. The algorithm detects that a user is accessing the site from a device and location associated with a high-income demographic and displays higher prices than it shows to other users. This practice, known as dynamic pricing, raises ethical concerns related to...

the security risks of transmitting financial data over a public network.

the computational cost of running a complex pricing algorithm for every user.

the intellectual property of the algorithm used to determine the prices.

fairness and potential discrimination based on data collected about users.

Explanation

The primary ethical issue is that the algorithm is treating individuals differently based on their perceived economic status, which can be seen as a form of discrimination. It challenges the principle of fairness in the marketplace. Security risks (B), computational cost (C), and IP rights for the algorithm (D) are all valid but separate concerns that do not address the ethical problem of discriminatory pricing.

3

A city government uses an algorithm to predict which neighborhoods are most likely to experience crime. The algorithm is trained on historical arrest data. This leads to increased police presence in certain neighborhoods, which in turn leads to more arrests in those areas, further reinforcing the algorithm's predictions. This situation raises a significant ethical concern primarily related to which of the following?

The lack of security in the system, as the historical arrest data could be stolen by unauthorized individuals.

The potential for the algorithm to create a feedback loop that reinforces and amplifies existing societal biases.

The inefficiency of the algorithm, as it consumes too many computational resources to be practical for city-wide use.

The infringement of intellectual property, as the algorithm may have been developed using copyrighted techniques.

Explanation

The primary ethical concern is that using biased historical data can create a feedback loop where the algorithm's predictions lead to actions (increased policing) that generate more of the same biased data, amplifying the initial bias. This is a well-known ethical issue with predictive algorithms. Inefficiency (A), data security (B), and intellectual property (D) are all valid computing concerns, but they do not address the core ethical problem described in the scenario.

4

An online news platform uses algorithms to personalize the content shown to each user based on their past reading history. An ethical concern of this practice is that it can...

make it difficult for users to find articles on topics they have shown no prior interest in.

decrease the website's server load by only showing a limited set of articles.

require users to create an account, which can be a barrier for some individuals.

inadvertently trap users in 'filter bubbles' by reinforcing their existing views and limiting exposure to diverse perspectives.

Explanation

A major ethical concern with content personalization is the creation of 'filter bubbles' or 'echo chambers,' where users are only shown content that aligns with their existing beliefs. This can limit critical thinking and exposure to different viewpoints, which has significant social and political implications. Decreasing server load (A) is a technical benefit. Difficulty finding new topics (B) is a usability issue but not the core ethical problem. Requiring an account (C) is a design choice, not an ethical issue related to the personalization itself.

5

A passage in Arial describes AI and Surveillance in a city transit system. It explains an AI system that uses facial recognition and gait analysis to flag “anomalous” behavior, then alerts human security staff. It defines a privacy law as rules governing collection and processing of personally identifiable information, and notes some jurisdictions require notice, limits on retention, and proportional use for public safety. Stakeholders include commuters, transit authorities, AI vendors, civil liberties groups, and courts. The passage gives scenarios: (1) a false match leading to a brief detention; (2) data retained for years “just in case”; and (3) an audit request for bias testing results. How does the passage illustrate an ethical dilemma in AI surveillance?

It concludes that longer data retention always improves civil liberties outcomes

It argues that commuters, not authorities, must fund independent audits

It balances public safety benefits against risks to privacy and unequal treatment

It shows that surveillance is ethical if the vendor owns the training data

Explanation

This question tests understanding of legal and ethical concerns in computing, focusing on the ethical tensions in AI surveillance systems. Legal concerns in computing often involve compliance with laws like privacy regulations, while ethical concerns focus on moral implications such as balancing competing values of safety and privacy. In this passage, the text discusses an AI system that monitors transit passengers as a case of conflicting ethical priorities. Choice A is correct because it accurately reflects the passage's emphasis on weighing public safety benefits against privacy risks and potential unequal treatment, as shown by scenarios of false matches and prolonged data retention. Choice D is incorrect because it contradicts the ethical concern about excessive retention, a common error when students assume more data always equals better outcomes. To help students, encourage critical analysis of stakeholder perspectives and emphasize how ethical dilemmas often involve trade-offs between legitimate but competing values. Practice identifying when technological capabilities create tensions between security and civil liberties.

6

A passage in Arial examines Intellectual Property and Open Source in a robotics club using code from a public repository. It describes students modifying an open-source motor-control program and combining it with a proprietary sensor module donated by a company. It defines intellectual property as protected code and inventions, and notes open-source licenses can impose conditions on redistribution, while proprietary modules may be protected as trade secrets. Stakeholders include students, the donating company, maintainers, competition organizers, and judges. Scenarios include posting the combined code online, receiving a takedown request, and debating whether to publish only the open-source portion. According to the passage, what are the potential consequences of redistributing code while ignoring license conditions?

Mandatory government approval before any code can run on a robot

A guarantee that proprietary trade secrets become unenforceable worldwide

Takedown demands and loss of permission to use or share the licensed code

Automatic eligibility for scholarships due to public sharing

Explanation

This question tests understanding of legal and ethical concerns in computing, focusing on intellectual property violations in mixed open-source and proprietary code environments. Legal concerns in computing often involve compliance with both open-source licenses and proprietary restrictions, while ethical concerns focus on moral implications such as respecting creators' rights and maintaining trust in the developer community. In this passage, the text discusses combining open-source motor control with proprietary sensor code as a case of complex licensing obligations. Choice A is correct because it accurately reflects the passage's emphasis on potential takedown demands and loss of permission to use the code, as shown by the scenario of receiving a takedown request after posting combined code online. Choice C is incorrect because it confuses the consequences of sharing code with changes to trade secret law, a common error when students misunderstand how intellectual property protections work. To help students, encourage careful consideration of license compatibility and emphasize that mixing code with different licenses requires understanding each set of obligations. Practice identifying potential conflicts between open-source and proprietary licenses and understanding the legal remedies available to rights holders.

7

A passage in Arial discusses AI and Surveillance at a school campus using AI video analytics to detect fights and trespassing. The system creates risk scores and sends alerts to administrators. It defines a privacy law as legal constraints on collecting and storing personal data, and notes policies often require clear purpose limits, retention schedules, and access controls. Stakeholders include students, parents, school administrators, AI vendors, and local regulators. Scenarios include a student misidentified due to poor lighting, administrators expanding use to track tardiness, and a request to disclose how long footage is stored. What ethical considerations are highlighted in the discussion of this AI system?

A claim that ethical issues disappear if cameras are high resolution

A conclusion that vendors, not schools, must set all disciplinary policies

A requirement that all students learn to code the model to graduate

Purpose creep and fairness concerns when risk scores affect students’ opportunities

Explanation

This question tests understanding of legal and ethical concerns in computing, focusing on ethical issues in AI surveillance within educational settings. Legal concerns in computing often involve compliance with privacy laws and data protection regulations, while ethical concerns focus on moral implications such as fairness, purpose limitation, and the impact on student opportunities. In this passage, the text discusses AI video analytics creating risk scores as a case of potential purpose creep and fairness concerns. Choice A is correct because it accurately reflects the passage's emphasis on how the system might expand beyond its original purpose (from detecting fights to tracking tardiness) and create unfair impacts on students' opportunities, as shown by the misidentification scenario and expanded use cases. Choice C is incorrect because it confuses technical quality with ethical considerations, a common error when students assume better technology automatically resolves ethical issues. To help students, encourage critical thinking about how surveillance systems can evolve beyond their initial purpose and emphasize the importance of considering long-term impacts on affected populations. Practice identifying when technological capabilities enable mission creep and understanding the ethical implications for vulnerable groups like students.

8

A passage discusses cybersecurity regulations requiring organizations to implement “reasonable security” controls for customer data. It defines a privacy law as governing personal data handling, and distinguishes it from security rules that mandate safeguards like access controls, logging, and incident response. The legal issue involves reporting timelines after breaches and penalties for negligent protection, referencing state breach-notification statutes as a general category. The ethical dilemma contrasts rapid disclosure to users with the need to verify facts and prevent panic. Stakeholders include companies, users, insurers, regulators, and incident responders. A scenario describes delayed notification after ransomware disrupts operations. Based on the passage, what ethical considerations are highlighted in breach notification decisions?

Prioritizing transparency while avoiding inaccurate, premature disclosures

Maximizing profits by concealing breaches indefinitely

Ensuring copyright ownership of all incident reports

Allowing only governments to access any security information

Explanation

This question tests understanding of legal and ethical concerns in computing, focusing on ethical considerations in cybersecurity breach notifications. Legal concerns involve compliance with breach notification statutes and timelines, while ethical concerns focus on balancing transparency with accuracy and preventing panic. In this passage, the text discusses the tension between rapid disclosure to users and the need to verify facts before notification. Choice A is correct because it accurately captures the ethical dilemma presented - prioritizing transparency while avoiding inaccurate or premature disclosures that could cause unnecessary panic. Choice C is incorrect because it represents an unethical approach of concealing breaches for profit, which contradicts both legal requirements and ethical principles discussed in the passage. To help students, emphasize the importance of balancing multiple stakeholder interests in security incidents. Practice analyzing real breach scenarios to understand the complexities of responsible disclosure.

9

A passage (Arial) covers Cybersecurity and Government Regulations for a small business using a managed email service. It describes phishing-resistant login keys, employee training, and centralized logging. It defines a privacy law as rules limiting use and disclosure of personal data, and describes a regulation requiring “reasonable” safeguards plus documentation showing due diligence. Stakeholders include the business, employees, customers, the email provider, and regulators. Scenarios include a phishing incident exposing customer invoices, an investigation asking for security logs, and a debate about monitoring employee email for threats. How does the passage illustrate an ethical dilemma in cybersecurity compliance?

It weighs threat monitoring for security against intrusions into employee privacy

It claims only customers, not regulators, may request breach documentation

It suggests compliance is unnecessary if a provider advertises strong security

It equates ethical conduct with maximizing profits from cybersecurity tools

Explanation

This question tests understanding of legal and ethical concerns in computing, focusing on the ethical balance between cybersecurity monitoring and employee privacy. Legal concerns in computing often involve compliance with privacy regulations and security requirements, while ethical concerns focus on moral implications such as balancing legitimate security needs against individual privacy rights. In this passage, the text discusses monitoring employee email for threats as a case of competing ethical priorities. Choice A is correct because it accurately reflects the passage's emphasis on weighing necessary threat monitoring against intrusions into employee privacy, as shown by the debate about monitoring employee communications. Choice D is incorrect because it confuses ethical conduct with profit maximization, a common error when students conflate business interests with ethical decision-making. To help students, encourage analysis of situations where security and privacy conflict and emphasize that ethical dilemmas often lack perfect solutions. Practice identifying stakeholder interests and understanding how to balance legitimate but competing concerns in cybersecurity contexts.

10

A passage in Arial addresses Intellectual Property and Open Source in a startup’s mobile app. It describes the app using an open-source encryption library and a proprietary recommendation model. It defines intellectual property as legally protected creations of the mind (e.g., copyrighted code, patents, trade secrets) and notes open-source licenses may require attribution and, in some cases, sharing modifications under the same license. Stakeholders include the startup, open-source maintainers, users, investors, and app-store reviewers. Scenarios include failing to include license notices, copying code snippets from a forum without checking license terms, and receiving a compliance request from maintainers. Based on the passage, what is the primary legal concern associated with using the open-source library?

Ensuring police obtain warrants before downloading the app

Complying with license duties such as attribution and sharing required modifications

Avoiding sales tax liability for in-app purchases across all countries

Preventing users from criticizing the app under defamation statutes

Explanation

This question tests understanding of legal and ethical concerns in computing, focusing on open-source license compliance in software development. Legal concerns in computing often involve compliance with intellectual property laws and license terms, while ethical concerns focus on moral implications such as respecting creators' rights and contributing back to the community. In this passage, the text discusses using an open-source encryption library as a case of potential license violations. Choice A is correct because it accurately reflects the passage's emphasis on complying with license duties like attribution and sharing modifications, as shown by scenarios of failing to include license notices and receiving compliance requests. Choice B is incorrect because it confuses defamation law with intellectual property concerns, a common error when students mix different areas of technology law. To help students, encourage careful reading of license terms and emphasize that 'open source' doesn't mean 'no obligations.' Practice identifying specific requirements of different open-source licenses and understanding the legal consequences of non-compliance.

Page 1 of 3