4.8 section 6: communication: consequences of computing Flashcards

1
Q

how are computers changing the work place

A

-a shift in demand for many low skilled workers to few highly skilled workers especially in IT

-complete replacing of low skilled workers in some fields
online banking
supermarket self checkouts

-increase in automated decision making
modern stock market-automatic trading
real time hotel pricing

-supporting decisions of qualified health practitioners
computers cannot yet legally make decisions alone in the medical filed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what moral and ethical questions would arise if a highly complex AI had a form of conscience

A
  • would the AI have rights
  • who would be responsible for it
  • should it and can it morally be terminated
  • will it have to abide by the law
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

how are computers effecting the environment

A
  • 2015: 350,000 computer devices where disposed of in Europe and the US everyday
  • only 20% of computer components are recycled the rest go to landfill
  • many of these components are hazardous and cannot be put in landfill in developed countries due to environmental laws
  • waste is often shipped to less developed countries with weaker environmental laws which effects the health of the poorest citizens there
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is the moral debate surrounding censorship

A
  • to what extent can governments censor media
  • UK government: requires internet providers to block sites infringing extremists terrorism and pornography as well as copy right laws
  • North Korean government: access to global internet is restricted to the political elite and the majority of all newspapers and broadcast comes from the Korean Central News Agency
  • Tim Berners-Lee is leading a group to make access to the internet a UN recognised human right
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what are the three categories of track and monitor techonology

A
  • category 1: chosen by user: smart watches
  • category 2: passive monitoring; CCTV

-category 3: forced tracking: internal monitors/ankle tags
company activity tracking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

how is personal information analysed

A
  • activity on the internet is tracked and logged
  • by the time your 18 your info is held on about 4 public and private databases
  • data mining is used to identify patterns and make predictions
  • Hyper scale computing is used to easily extract personal data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

how is personal information used

A

-business:
improve targeted customers
reduce waste
increase profits

-science, engineering, medicine:
make advancements in diagnosis and treatment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

how has computers/the internet caused cultural change

case study - Egypt 2011

A
  • June 6th 2010: Khaled Saeed was beaten to death by police
  • Feb 6th 2011: Facebook page We Are All Khaled arises with 400,000 followers
  • WAK calls for protest on Jan 25th 2011 with #jan25
  • Jan 26 201 1 government shuts down the Egyptian internet
  • Twitter launches SpeakToTweet allowing Egyptians to call a number and leave a message to be tweeted under #Egypt
  • government shuts down all cellular services
  • February 11 2011 Egyptian President Hosni Mubarak is driven out of office after 30 years
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what rules are put in place to protect people from having their personal data used against them

A

-2008 Right to be Forgotten in Europe
people can apply to have data removed from index pages

-2018 GDPR law in the EU
people have more rights over personal data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

responsibility of computer scientists ad software engineers case study
TOR browser

A
  • The Onion Router was created by Paul Syverson, Michael G. Reed and David Goldschlag, to protect U.S. intelligence communications online in he mid 1990s
  • it was released to the public in 2002 to give everyday internet users privacy form co-operations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what good came from TOR

A
  • used for secure military communication
  • media reports from dangerous locations
  • law enforcement use
  • privacy for friends and family
  • protection for activist groups
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

how are people negatively using TOR

A
  • illegal activities

- selling of narcotics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

how do advancements in computing effect legislation

A
  • virtual currency
  • totally virtual
  • hard to track
  • not produced, owned, managed or controlled by government, federal or royal mint
  • essentially exists outside the law
  • makes them most suitable for illegal use
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

name 6 legislations relating to computing

A

2018 UK data protection act:

EU general data protection regulation

2000 regulation of investigatory powers act

1990 computer misuse act

1988 copyright designs and patents act#

1988 malicious communications act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly