1.2.3 social and ethical issues associated with a networked world Flashcards
when can issues of social and ethical significance arise?
whenever information technology is used. these issues have positive and negative ethical and social impacts. it can be difficult to identify person who is responsible
What are the IT subjects of ethical and social significance?
reliability, integrity, inconsistency, security, authenticity, privacy, anonymity, intellectual property, the digital divide and equality access
what is reliability?
how well an IT system functions. computer failures cause data loss, time loss, money loss, injury. reliability of IT systems determines confidence in their value.
what is integrity?
refers to protecting the completeness and accuracy of data. data lacks integrity if its incomplete, out of date, or has been purposely or unintentionally altered
what is inconsistency?
problems may arise if information is duplicated in a database and only one copy is updated causing inconsistency
what is security?
refers to protection of hardware, software, peripherals, and computer networks from unauthorized access. biometrics, passwords, firewalls, and locks are some of the most common security systems placed to restrict access to IT systems
what is authenticity?
involves a person proving their identity to gain access to a computer system. requiring more than one independent factor increases the difficulty of providing false credentials
what is privacy?
ability to control how and to what extent data is used. includes things such as: how long data is stored, who has access to the data and how its used
what is anonymity?
privacy becomes anonymity when individuals use an IT system to conceal their true identity in order to cyberbully another person, commit illegal actions or crimes, hack computers
what is intellectual property?
refers ro ideas, discoveries, photographs, films, essays, etc. copyright laws are designed to protect intellectual property from unauthorized and illegal reproduction. copy paste and file sharing practices and devices make it easy to break copyright laws