3.8 Consequences Flashcards
What are ethical issues?
Considerations about right and wrong, morality and power.
What are legal issues?
Technology provides opportunities to criminals. To help protect people, their data, and their work, several laws have been introduced in the UK.
What are cultural issues?
How have society and the ways we interact been impacted?
What are environmental issues?
The effect that technology has on the world around us.
What are privacy issues?
Once data is put on a computer, it can be easily copied or shared. In some cases, people have a right to choice in this matter.
What is the data protection act 1988?
It controls how personal information can be used and your rights to ask for information about yourself.
Illegal for:
• Companies to share or sell your data without permission from you.
• Companies to have poor computer security
• Forces companies to only store relevant information about you.
What is the computer misuse act 1990?
This attempts to discourage people from using computers for illegal purposes. It makes hacking and data theft illegal.
• It is illegal to access data stored on a computer unless you have permission to do so.
• It is illegal to access data on a computer when that material will be used to commit further illegal activity, such as fraud of blackmail.
• It is illegal to make changes to any data stored on a computer when the user does not have permission to do so.
What is the copyright designs and patents act 1988?
Prevents people and organisations from copying each other’s work without permission.
What is the Creative Commons licensing?
Allows people and and organisations to allow others to use their work for non-profit purposes. This allows the copyright owner to say exactly what people can do with their work.
What is the freedom of information act 2000?
Allows members of the public to request information from large organisations such as the government.
What is propriety software?
Owned by a company with the view to making money. Proprietary software is close source because the company doesn’t want anyone to be able to view the source code. It’s usually copyright protected.
What is open source software?
Open source allows other people to access the original source code. People can view, edit and pass on the source code. Open source software means that a large community of programmers can make improvements to a code. Open source software is usually free and a Creative Commons licence allows users to use it for non-profit is often attached with it.
What is a Stakeholder?
A person with an interest (usually financial) in a company.
Mobile technologies
Our ubiquitous use of mobile technologies such as mobile phones and tablets has made them a primary source for collecting data about users such as:
• The number of calls and texts made, to whom and also at that time and location.
• The location of a person (which can be tracked in real time through GPS data on phones)
• Applications on phones that access users’ data beyond that which is necessary
• Web browsing information.
Additionally, mobile technologies are rapidly updated and replaced by user on one of two year contracts; this is in obvious environmental impact on the need for metals and plastics to create the devices and the problems surrounding safe disposal or recycling of of old phones.
Wireless technology
The following points are important when understanding the particular issues surrounding the ethical use of wireless networks:
• A wireless network can be password-protected to limit the users who can connect to it.
• A wireless network can filter the devices connected to it using MAC address filtering: white box filtering permits only listed devices to join whereas black box filtering prohibits specific devices from joining.
• A wireless network can use encryption to ensure that every device can communicate with the wireless access point securely.
Wireless networking, particularly public networks, raise ethical questions such as who governs and who is responsible for the material that users can access? Additionally, the wireless network provider could be retaining and using information on its users such as information about their device and the web pages they are accessing.