4.8 section 6: communication: consequences of computing Flashcards
how are computers changing the work place
-a shift in demand for many low skilled workers to few highly skilled workers especially in IT
-complete replacing of low skilled workers in some fields
online banking
supermarket self checkouts
-increase in automated decision making
modern stock market-automatic trading
real time hotel pricing
-supporting decisions of qualified health practitioners
computers cannot yet legally make decisions alone in the medical filed
what moral and ethical questions would arise if a highly complex AI had a form of conscience
- would the AI have rights
- who would be responsible for it
- should it and can it morally be terminated
- will it have to abide by the law
how are computers effecting the environment
- 2015: 350,000 computer devices where disposed of in Europe and the US everyday
- only 20% of computer components are recycled the rest go to landfill
- many of these components are hazardous and cannot be put in landfill in developed countries due to environmental laws
- waste is often shipped to less developed countries with weaker environmental laws which effects the health of the poorest citizens there
what is the moral debate surrounding censorship
- to what extent can governments censor media
- UK government: requires internet providers to block sites infringing extremists terrorism and pornography as well as copy right laws
- North Korean government: access to global internet is restricted to the political elite and the majority of all newspapers and broadcast comes from the Korean Central News Agency
- Tim Berners-Lee is leading a group to make access to the internet a UN recognised human right
what are the three categories of track and monitor techonology
- category 1: chosen by user: smart watches
- category 2: passive monitoring; CCTV
-category 3: forced tracking: internal monitors/ankle tags
company activity tracking
how is personal information analysed
- activity on the internet is tracked and logged
- by the time your 18 your info is held on about 4 public and private databases
- data mining is used to identify patterns and make predictions
- Hyper scale computing is used to easily extract personal data
how is personal information used
-business:
improve targeted customers
reduce waste
increase profits
-science, engineering, medicine:
make advancements in diagnosis and treatment
how has computers/the internet caused cultural change
case study - Egypt 2011
- June 6th 2010: Khaled Saeed was beaten to death by police
- Feb 6th 2011: Facebook page We Are All Khaled arises with 400,000 followers
- WAK calls for protest on Jan 25th 2011 with #jan25
- Jan 26 201 1 government shuts down the Egyptian internet
- Twitter launches SpeakToTweet allowing Egyptians to call a number and leave a message to be tweeted under #Egypt
- government shuts down all cellular services
- February 11 2011 Egyptian President Hosni Mubarak is driven out of office after 30 years
what rules are put in place to protect people from having their personal data used against them
-2008 Right to be Forgotten in Europe
people can apply to have data removed from index pages
-2018 GDPR law in the EU
people have more rights over personal data
responsibility of computer scientists ad software engineers case study
TOR browser
- The Onion Router was created by Paul Syverson, Michael G. Reed and David Goldschlag, to protect U.S. intelligence communications online in he mid 1990s
- it was released to the public in 2002 to give everyday internet users privacy form co-operations
what good came from TOR
- used for secure military communication
- media reports from dangerous locations
- law enforcement use
- privacy for friends and family
- protection for activist groups
how are people negatively using TOR
- illegal activities
- selling of narcotics
how do advancements in computing effect legislation
- virtual currency
- totally virtual
- hard to track
- not produced, owned, managed or controlled by government, federal or royal mint
- essentially exists outside the law
- makes them most suitable for illegal use
name 6 legislations relating to computing
2018 UK data protection act:
EU general data protection regulation
2000 regulation of investigatory powers act
1990 computer misuse act
1988 copyright designs and patents act#
1988 malicious communications act