1.5 Ethics Flashcards
Describe the purpose of Regulation of Investigatory Powers Act (3)
It limits the extent (1) to which public bodies (1) can use technological surveillance (1). This includes monitoring internet activity (1) electronic communications (1) and forcing users to hand over encryption keys (1)
Advantages of self-driving cars
Safer than a human driver due to quicker reaction speeds (1). Cheaper as no wage to cover (1). Less likely to make mistakes with the route (1).
Disadvantages of self-driving cars
May not be able to understand natural speech (1). May be limited in terms of the roads which it can operate (1). Vulnerable to hacking (1). A bug in the code could cause accidents (1). May prioritise safety of pedestrians over the passenger (1).
Describe how Regulation of Investigatory Powers Act allows the government to monitor communications (2)
Organisations can monitor electronic communications (1). Allows interception of communications (1). Allows them to get communications information from ISP (1). Allows them to perform surveillance (1).
Describe what is meant by IP address (2)
A numerical address made of 4 numbers each between 0 and 255 (1). It uniquely identifies any device on a network (1).
Explain why programmers may store IP address of the users (2)
IP address can help identify a user (1) so the company can track users attempting to gain unauthorised access (1).
State 4 legal responsibilities companies have about their employee’s data (4)
Ensure only relevant data is held about them (1). It is kept up to date (1). It is accurate (1). Data must be kept securely (1). Must not be held longer than necessary (1).
Describe 1 legal implication of adding soundtracks to videos (2)
Copyright of the music belong to the original artist (1). Permission must be given to use it (1). Otherwise copyright law is broken (1).
Measures to make a website accessible
Making it friendly to screen readers and different screen sizes. Using alternate text for images. Changing styles using CSS. Avoiding combining colours that may be industinguishable by those with colour blindness. Using character sets and fonts that support different alpabets.
Measures to secure customer’s data
Encrypting data. Using a firewall. Penetration testing.
Protecting data in databases (6)
Passwords needed to access the database which restricts access to those who are authorised (2). Using a secure protocol like HTTPS/SSL which allows for an encrypted link between devices to stop thrid party access (2). Encrypting the data so even if accessed data cannot be read (2). Backing up data which provides a copy of the data in case of corruption (2).
Artificial Intelligence
AIis often used to perform a task that would usually require human intelligence. Intelligence is how far removed the original programmer is from the output.
Machine Learning
Machine learningis a way of using large data sets (sometimes referred to asBig Data) totrainAI by analysing the data in order to make more accurate predictions about what to output for a particular input.
Algorithmic Bias
The measure of error that shows how far away theactualoutput is from thepredictedoutput. If the error is significant themodelhas not reflected the real-world relationship between the input data and what the model predicts. The model is therefore said to haveprediction bias— favouring one output over others.
AI Techniques
Neural networks. machine learning. evolutionary computation. Bayesian networks