3.8 Ethical, legal and environmental impacts of digital technology on wider society, including issues of privacy Flashcards

1
Q

Cyber security - what is it

A

Cyber security relates to the protection of digital data on networks, including the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security measures (cyber security) are in regard to three main areas

A

people
processes
technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cyber attack prevention

- people

A
  • Making sure that people understand how to protect their data is an important first step to protecting a network.
  • Encouraging people to use strong passwords, not to open emails from unknown addresses, and to back up their data all helps.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cyber attack prevention

- processes

A
  • An organisation is likely to have a plan in place for what to do if a cyberattack should happen. This
  • could be as simple as ensuring data backups are available to rebuild the system, or having technical advisers on hand to help.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cyber attack prevention

- technology (2)

A
  • Additional network hardware such as firewalls to prevent unauthorised access from outside the network,
  • and software such as an intrusion detection system are both examples of using technology to improve the security of a network.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Ethically + environmentally

- importance of cyber security

A

Ethically: prevents against identity theft, loss/damage to personal or corporate data, protects individual privacy and security.

Environmentally: if industrial or utility systems are hacked, there may be disastrous environmental consequences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

2 examples of mobile malware

A

Just like phishing emails, which trick people into giving personal details, text messages can also be used to trick users into handing over personal information.

Mobile malware can also take the form of Trojan software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Benefits of mobile technologies

A

Use in emergencies, convenience, remote working, payments can be accepted wirelessly which is more convenient than physical money, greater access to services (eg. uber when on the go), location flexibility, increased productivity since working can be done when not at a computer

we can stream video and music anywhere we want,
we can connect to the web and receive e-mail whenever we want

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How do mobile technologies impact the environment? (2)

A
  • They use large amounts of rare and harmful materials

- Many devices are not sent for recycling but disposed of instead, increasing the demand for these materials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What ethical issues are opened up by mobile technologies?

A
  • Personal privacy issues, with tracking and use of data

- Sharing personal data can have unforeseen, potentially harmful consequences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Positive and negative

- What legal impacts do mobile technologies have?

A

Positive: mobile technologies can be used to track criminal behaviour and individuals
Negative: mobile technologies open up means for trolling and other abusive or illegal activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Wired network adv, and disadv. (3, 3)

A

• Connection speeds are typically faster
• Typically have higher bandwidth
• Typically have better security/fewer
security risks

  • Cables can be hazardous and unsightly
  • Not all devices can connect via cable eg some tablets
  • Can be expensive to set up
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Wireless network adv (5)

A

• Typically lower setup costs
• No wires/cables are required
• It is easy to connect new devices
• Users not confined to a single
location // Users can connect to the network as long as they are within range
• Can connect multiple devices without the need for extra hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Wireless network disadv. (5)

A
• Connection speeds can be slower
• Connection speeds can reduce
the further from the WAP you are
• Subject to interference from walls,
objects and other nearby
electronic devices
• Typically less secure
• Connections are not as stable as
wired networks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Wired network security issues

Vs wireless

A

WIRED
• Typically more secure than wireless as need physical access to the network to intercept data

WIRELESS
• Risk of theft of bandwidth by neighbouring users within range
• Risk of data loss/data being stolen unless encryption is used
• Typically easier to intercept data/‘hack’ network // Wireless transmissions can be intercepted by anyone within range of the router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

EEL points for anyone allowing wireless access:

- too many

A

• Websites – need to restrict access to inappropriate websites
• Time – limit amount of time, they may not want to provide indefinite access or may want to
charge for access after the time limit has expired.
• Preventing file sharing and illegal sharing\use of copyrighted materials.
• Accountability – identification of users and actions on a network by preventing anonymous
access.
• Prevention of illegal activities such as terrorism and fraud.
• The responsibility to keep children safe and protected.
• Responsibility to keep users (customers) data safe and secure. Risk that data may be recorded
and used for marketing etc…
• Spoofing of websites, phishing. Responsibility of organisation to put some kind of protection in
place, eg filtering of known fraudulent sites. Risk of malware or other risk to hardware
• Recording of private messages or details if not encrypted.
• Recording of usernames and passwords that the user may also use to access other systems.
• Responsibility of organisation to secure their systems from possible attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

There are a number of ways to create extra security for wireless networks that can be used in both home and office networks: (2)

A
  • ensure the wireless network uses encryption, so it is not easy for someone to eavesdrop on the traffic being sent to and from a mobile device
  • create a MAC address whitelist so that only specific devices can access a particular network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Benefits of cloud storage

A

Usually good security, cost-efficiency, convenient, usability and accessibility (simple interface, easy to use), files can be conveniently shared, multiple users can collaborate on one file, cloud storage data can be synced with any device, scalable (you can easily upgrade your storage plan and have the addition of extra storage, without hassle)

  • the ability to access files from any location or any device, so long as an internet connection exists
  • access can be granted to another user so they can remotely access another person’s data
  • reduced need to make backups - cloud storage services back up the data for users
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are some issues associated with cloud storage? EEL!!

A
  • Large data centres use a very large amount of energy to store vast quantities of data
  • Many data centres are outside the UK, US and EU where different data protection standards may apply, causing complications (eg. the cloud service provider may be storing data in a different country where the protections you expect in your country may not be there in the other country)
  • Many people store personal information using cloud storage which may be vulnerable to hacking or attacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are some disadvantages of cloud storage?

A
  • cloud storage hosts could be targeted by hackers
  • people have less control over their data
    access to data is only - possible with an internet connection - no connection means no access to data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Law introduced in responses to a rise in computer hacking

A

Computer Misuse Act 1990

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
  • What is hacking

- why is it done

A

Hacking is the unauthorised access to computer systems and the data they contain. This is sometimes done deliberately to disrupt a system or to steal data and is illegal - it is covered by the Computer Misuse Act 1990.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

3 purposes of hacking - on data

A

an activity that involves trying to gain access to computer systems in order to steal, modify or damage the data that the systems contain

24
Q

3 types of hacker + what they do

A

A hacker who illegally attempts to access a computer system can be described as a black-hat hacker.

Other hackers do so out of intellectual curiosity (“grey-hat hackers”)

White-hat hackers, also known as ethical hackers, are computer security experts that attempt to hack computer systems with the permission of the owner. While attempting to hack systems, they look out for security weaknesses and help to put appropriate measures in place to remove these.

25
Q

One - political - type of hacker

A

Another group of hackers do so in order to highlight a social or political cause of some kind. Known as hacktavism, the aim of this is to target a government or company website in order to highlight a particular issue - perhaps a human rights or environmental issue.

26
Q

5 examples of wearable tech

A
  • smart watches - which can play audio and video if connected to mobile phones but also be used to monitor health
  • health and fitness monitors - record heart rates, movement etc…
  • these include insulin monitors which are worn on the arm and monitor the level of glucose that diabetics have in their blood
  • smart glasses - containing cameras and screens in the lens (for example, Google Glasswiki link)
  • smart clothing or jewellery - which can have sensors built in to record key data (for example, clothing for athletes which acts in a similar way to a fitness sensor or smart socks for runners which records details about the way a person runs, allowing issues with running action to be adjusted)
27
Q

Benefits of wearable technologies

A

Portability, convenience, fitness tracking, health and safety (eg. wearable technology can monitor heart rate, may soon monitor oxygen level), can control IoT devices like TV, radio, speakers, lights

28
Q

What issues do wearable technologies open up?

Incl EEL

A
  • Potential compromise of personal privacy through tracking of a wearer’s activity and location, tracking causes controversy. Via apps and websites, health and activity data is shared with family and friends- the websites and apps need to be secured and trustworthy. A lot of personal info (health data, activity, name, age, location) is contained on wearable technologies)
  • Wearable devices, like mobile ones, contain rare and harmful materials meaning careful recycling is important
29
Q

Use of data in wearable technology ?

A

When these devices are in use, the data is not only stored on the device but will also use cloud services. People are likely to want to ensure that any data saved by these devices is kept secure and the software that allows wearable technology to share data usually uses encryption to provide privacy

30
Q

Why wearable technology becoming increasingly common?

A

These devices seem to be getting increasingly common, helped by the ability to make smaller and smaller computing devices.

31
Q

Define computer implants

A

Computer implants are small, computing devices that can be implemented into people’s bodies, allowing them to be used to monitor the user or for other purposes.

32
Q

4 example computer implants

A
  • cochlear implants - which have been used to restore hearing to profoundly deaf users
  • heart implants - use electrodes to regulate heartbeat and warn of heart attacks
  • diabetes monitoring implants - these are similar to the devices discussed on the wearable technologies page
  • under-skin RFID chips - these allow people to use their bodies as you would a device such as a car or door key or credit card which requires the device to be close to something - 1 minute BBC videowiki link
33
Q

How computer implants are implanted?

A

All of these devices needs to be surgically implanted in the user.

34
Q

When a person adds implanted technology to their body for a non-medical reason, this is known as __.

A

biohacking.

35
Q

Exmpalin 2 key examples of implantable technology

A

RFID chips Microchip inserted under the skin - could be used in the place of a contactless bank card, to hold medical information, or as ID.

Cochlear implants An enhanced version of a hearing aid that connects to the auditory nerve behind the ear. Advancements in these are looking to add noise cancelling and voice command AI (artificial intelligence).

36
Q

Benefits of computer based implants (2/3)

A
  • The health benefits of the medical devices are clear. They are generally small and don’t cause significant issues for most users - and can change the life of the user.
  • RFID chips are more a matter of convenience + security - car keys lost/stolen
37
Q

RFID stands for

A

RFID stands for Radio-Frequency IDentificatio

38
Q

Drawbacks of computer based implants (2/3)

- including EEL

A
  • Many implants - such as the medical ones - collect and transmit data. That data has to be secured so that hackers can’t access it. Legislation such as GDPR and the Data Protection Act should help to do this, but data breaches and individual hacks are still a concern.
  • In some cases, hacking this type of device could be a major health issue - researchers showed in 2019 that it was possible to hack insulin pump
  • As with all technology, security levels, including patching any vulnerabilities, is crucial. Researchers have shown that it’s possible to infect RFID implants with viruses and malware. Car keys can already be “cloned”, allowing criminals access to people’s vehicles; the same possibilities exist with any similar RFID implant.
  • The cost of implants is an issue which can keep the technology out of reach for many people. A single cochlear implant costs £23,000 for one ear, £38,000 for two
  • The use of RFID chips in industry has the potential to create a number of data privacy problems, as well as vastly increasing the ability of employers to monitor what their workers are doing.
  • The usual environmental concerns apply to this technology as well. It all has to be made and powered, as do the data centres behind it

(Quizlet nab. they require specialised recycling because of the rare and harmful materials they contain.
There could be harmful side effects for health, there could be electrical hazards or adverse tissue reactions. )

39
Q

What is the legal issue with autonomous cars?

A

In the case of an accident, there is ambiguity surrounding who is liable; is it the owner of the vehicle or developer of the AI system?

40
Q

What is the ethical issue with autonomous cars?

A

Autonomous vehicles use AI to monitor other vehicles and road users- the question of what happens to this data is controversial.

41
Q

Benefits of autonomous cars

A

If the majority of vehicles are autonomous, they can communicate and cooperate to produce a safe environment.

  • Reduction in traffic deaths
  • Less traffic accidents = less congestion = less emissions
  • Faster parking, reduced insurance costs and reduced running costs leading to UK consumer market saving £5bn a year
  • Increase in lane capacity
  • Less travel time
42
Q

PAUL LOng:

Autonomous vehicles could lead to significant benefits to society, including:

A
  • Commuters will be able to use their travel time usefully, such as for sleeping or working, providing more efficient use of their time and the opportunity for more leisure time.
  • The priority of driverless cars is safety and is not prone to human error. This could lead to a lot less accidents on the road.
  • Driverless cars can react more quickly than humans which can cause less accidents.
  • The traditional car configuration of all seats facing forward can be adapted to make journeys more interactive with other passengers.
  • Human drivers usually have a single goal – to get to their destination safely and in a short time. This can involve ignoring the needs of other drivers, such as those waiting to turn across a traffic lane. The same human driver will then be held up waiting to make a similar turn later in their journey. Computerised vehicles can be programmed to work towards a shared goal of keeping traffic moving as efficiently as possible which could reduce journey times for all vehicles. They can do this by communicating with each other.
  • An autonomous car does not need to find a convenient parking space. It can drop off the passengers and then park further away from the destination and collect the passengers later.
43
Q

Paul,
Arguments that some people would use against driverless cars include:
(There’s a good environmental one here, and an ethical one)

A
  • They will not work until they are able to deal with unusual and unexpected situations (ones which they have not been programmed to deal with) in the same way a human would do.
  • They could be hacked and present a physical danger to other road users.
  • It costs more to replace human taxi drivers with very expensive equipment.
  • It is more likely that the technology will develop more computer-assisted drivers rather than fully autonomous vehicles. This includes auto-pilot features such as lane-assist and keeping a set distance between the car in front.
  • Human drivers will ‘bully’ autonomous vehicles knowing that the autonomous vehicle will submit to being cautious meaning that autonomous vehicles could take a lot longer to arrive at a destination.
  • Driverless cars could encourage less people to use public transport because they can work or sleep while commuting. This could mean more cars on the road and have an adverse environmental effect.
  • It will be impossible to prove that driverless cars can ever be safe, despite there being only one death caused by an autonomous car where the backup driver was not concentrating on the road in 2018.
  • How would an autonomous car make an ethical decision? If it had to swerve to avoid an accident, how would it decide on the least bad option to minimise harm?
44
Q

The three good-to-know laws - with years

A
  • Data Protection Act 2018
  • Computer Misuse Act 1990
  • Copyright, Designs and Patents Act 1988?
45
Q

What is the Data Protection Act 2018?

A

A law dictating how data should be used, ie. transparency of data usage, data must be kept up to date, data must be kept no longer than necessary, data must be used fairly and according to the law, data should have accurate protections and security measures etc.

46
Q

What is the Computer Misuse Act 1990?

A

An act designed to illegalise damage and harm to computers. It is a criminal offence to: gain unauthorised access, gain unauthorised access with intent to commit further crime like blackmail, gain unauthorised access with intent to modify computer material (eg. using malware to damage software or hardware)

47
Q

What is the Copyright, Designs and Patents Act 1988?

A

An act protecting intellectual property; it cannot be modified, copied, or distributed without relevant permission. This includes marketing or downloading free books, movies or similar (downloading is called piracy) because no money is going to the actual creator of the content.

48
Q

2 good environmental problems that can be said about any example on the spec really

A
  • Technology consumes energy. Computers require electricity, and most smartphones and tablets require recharging after just a few hours of use. Tablets and mobile phones use less energy than desktops and laptops as the hand-held devices use flash memory instead of hard drives and RISC CPUs instead of CISC CPUs.
  • Technological waste - also known as e-waste - sometimes contains poisonous chemicals and can be an environmental hazard.
49
Q

Disposing of electronic devices abroad ?

A

In the UK, the average lifespan of an electronic device is two years. It is often easier to buy a new device and discard the old one than to maintain or upgrade an old device. If the item isn’t recycled or resold, it will end up in a landfill site. Sometimes electrical items are sent to countries which have less strict laws about recycling. For example, in Ghana there have been reports of highly-toxic dumping grounds for old technology.

50
Q

Why is the assembly of electronics so harmful to the environment?

A

They are often made from rare or valuable physical resources, which may be non-renewable. Computers may contain toxic materials like cadmium, mercury, chromium, radioactive isotopes, airborne dioxins and polychlorinated biphenyls (PCBs). Their disposal can create environmental issues

51
Q

Why is the disposal of old computer equipment often badly done?

A

It is badly done because old computer equipment is often shipped to countries with lower environmental standards, to reduce the cost of disposal. The equipment is dumped in landfill, then leading to children collecting this discarded waste in order to find metals that can be recycled and sold.

52
Q

List 5 positive effects of computers on the environment

A
  1. They reduce the volume of paper we use
  2. Computers allow working from home, which reduces work travel and CO2 emissions
  3. Computers can be used to research renewable energy sources
  4. Smart meters are useful for reporting water and energy use so we can reduce consumption
  5. Computers manage renewable/low energy-use technology
53
Q

Why is privacy such a major issue with computers?

A

People want privacy, however apps and websites tend to store a lot of personal information and may even share it with third parties (which we may accidentally agree to by pressing ‘accept’ on terms and conditions)

54
Q

List ways in which individuals are monitored via technology

A
  • With wrong privacy settings, a person’s social media activity can be seen by anyone
  • Use of CCTV and facial recognition
  • Mobile phone call records are stored and can be accessed by law enforcement agencies if requested
  • Mobile phone companies can track an individual’s location even when they don’t use their phone
  • Automatic number plate recognition (ANPR)
  • Companies can monitor what employees do on the computers
  • Websites can track a lot of your info, eg. your IP address, your location, your browser, browsing history, operating system, your searches. They may use this to provide insight, eg. targeted advertising
55
Q

How do social media and camera apps take our data?

A

Whenever we check into social media, time and location are logged unless specifically turned off. Many apps track location of our mobile phone. When phone cameras take a picture, time and location is logged; if these images are uploaded to social media, the companies can access location and time info, and may use facial recognition to detect who was in the picture.

56
Q

PENULTIMATE, SPEC

- what do ordinary citizens normally value, so what may they not like

A

Ordinary citizens normally value their privacy so may not like it when governments or security services have too much access

57
Q

SPEC

- what do governments and security services often argue

A

Governments and severity services often argue that they cannot keep their citizens safe from terrorise and other attacks unless they have access to private data