4.8.1 Individual (moral), social (ethical), legal and cultural issues and opportunities Flashcards

1
Q

What is personal data?

A

Data that can uniquely identify a living person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the difference between information and data?

A

Data is encoded information without meaning, it is raw facts that has to be submitted for processing. Information is the output of data, it is processed and structured so it is understandable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why is storing personal data on a computer good or bad?

A

Without access to a computer, the data is unreadable and it’s not stored in a human readable form. It is also easier to log who has accessed the data, it can be copied and transferred easily. But this makes data easier to steal as systems can be hacked and looked at remotely, and it’s difficult to tell how many copies of the data are in circulation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How have computers caused concerns over an individual’s privacy?

A

Computers can store a large amount of data that can be searched and accessed easily remotely. Networked computers means data can be more easily shared and they encourage more information to be stored online.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why might storing personal data concern privacy campaigners?

A

Data could be used to track location and activities of a person as it links them to a location, car etc
Burglary if a person’s routines are known
Information could be hacked
Concerns over identity theft, targeting bank accounts
Selling data to third parties, using it for marketing, unwanted phone calls etc
Person doesn’t know what their data may be used for

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

During public/private key encryption, state advantages/ disadvantages of allowing the keys to be available to trusted third parties

A

Increases security, helps the Government detect illegal activity
Creates ‘industrial spying’
The individual may see it as an intrusion of their privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What security methods are used to detect or prevent unauthorised access to computers?

A

Choosing strong passwords that aren’t easily guessed
Locking out of account after three incorrect password guesses
Logs on movement on confidential files
Encryption of sensitive files
CCTV
Swipe cards for accessing rooms
Bio-metric logons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What sort of things could happen to data if security fails?

A

Unauthorised access, deliberate corruption and loss of data. Theft or damage to the hardware, causing a hardware failure that destroys data
Loss of data through natural hazards e.g fires

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What failures result in weak data integrity?

A

Errors on data entry due to insufficient validation checks on entered data
Virus or program error corrupting the files
Transmission errors
Data not up to date or is duplicated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What could a store use a customer’s data for?

A

Selling on their information
Try to sell unsolicited services
Target customers with offers, leading to more sales

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the effects on young people by allowing unrestricted access to the internet?

A

Allow them to learn about others
Encourage them to form goals / expectations
Educational benefit
Less socialising because they’re on the computer
May break copyright laws
Exposed to bad influences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is backing up and archiving?

A

Backup is making a copy of files so that if a file is lost or corrupted it can be restored. Usually done onto a removable storage device so it is safe such as SSD, CD, and performed regularly, such as once a week
Archive is removing the file from regular use to free up storage space but keeping it in case you need it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does a company return to operation quickly after a system failure?

A

Uses a strong recovery / restore procedure, such as easily gaining access to their backup files or using alternative hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a biometric property?

A

A biological / physical property of a person that can be used to uniquely identify them, such as fingerprint, retina, dna, voice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is DRM?

A

Access management system for digital media that encrypts so that only those with the key can use the file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How is DRM used in music?

A

Music files are encrypted, when the user purchases the music they are given a key to decrypt it that only works for them. The key may be authenticated using a server online, or there may be a time lock so the file can only be played a certain number of times or before a certain date.
Playback tied to a particular (set of) hardware device(s);

17
Q

What are the arguments for and against using DRM?

A

Protects copyright as it’s harder to pirate the file
Ensures creators receive money for their work, so they continue to be incentivised to produce new things
Allows an online rental service to continue to operate

You can’t sell items that you’ve purchased
You can’t play on any device you own
You can’t make backups of your file
You may have a time limit or use limit
You can’t load the file into any software
You don’t have full control over your file so it discourages reworking and remixing people’s work

18
Q

What information should you check before installing software so you don’t break the Copyright, Design and Patents act?

A

Number of licenses the software has
Type of license
If it’s an official copy

19
Q

What are the principles of the Data Protection Act?

A

Kept secure so wrong people can’t access it
Processed fairly and lawfully so alterations can’t be made
Obtained for lawful purposes so that junk mail isn’t encouraged
Adequate, relevant and not excessive
Accurate / kept up to date so that people aren’t wrongly labelled
Not be kept longer than necessary in case a customer leaves an organisation
Not be transferred to countries without adequate protection
Processed in accordance to the rights of the data subject

20
Q

Between 2008 and 2010, a company that was gathering data for an online mapping system, using cars fitted with cameras and WiFi equipment, collected some information that was being transmitted on personal WiFi networks. The company apologised for doing this and an investigation found that a small number of software developers had been responsible for adding this functionality to the mapping system data collection software.

In the context of this example, discuss:
• how it was possible for this data to be collected.
• what steps the owners of the networks could have taken to prevent the data from being collected.

A
  1. How it was possible for data to be collected
    WiFi signals can travel outside of property // over wide area
    Any WiFi receiver in range can read the data packets
    No need to physically “tap” into a WiFi connection, unlike a cabled connection
    A protocol that does not encrypt the transmissions may have been used
  2. Steps to prevent
    Use a protocol that encrypts data transmissions
    Example of secure protocol eg WPA, WPA2
    Disable broadcast of SSID to make network harder to identify
    Limit power of transmitter so data does not travel outside premises
    Use cabled network instead of WiFi.
21
Q

The growing level of public concern over data stored in computer systems led the government to pass The Data Protection Act 1984. The Act was introduced to protect
the right of individuals to privacy.
Give three reasons relating to the nature of computing systems that give rise to this concern.

A

Computing systems can store vast amounts of data; Computing systems can manipulate/access/search data quickly/easily;
Computing systems can give access to data far from the site where data are stored//remote access possible
Data is more easily shared because computers can be networked;
Computer systems encourage more information to be stored;

22
Q

What is meant by a robot?

A

a mechanical, moveable structure that can sense its surroundings/environment; can interact with things;
makes dextrous coordinated movements, has some degree of intelligence or ability to make choices based on environment;
Is programmable; a device that automatically performs complicated/repetitive tasks;

23
Q

What tasks do robots often do?

A
repetitive tasks;
tasks that require precision;
tasks that are dangerous for humans;
produces consistent quality
continuous operation;
24
Q

What is a code of conduct?

A

Rules that an employee must follow//a member of an
organisation is bound by
Usually a (written) document/contract;
Contents of a code (may) not be legal requirement;
Breaking rules could result in disciplinary action or losing their job

25
Q

Why does a company have a code of conduct?

A

To set out points of good practice for employees//set out rules that are not legal requirements;
To ensure employees are aware of legal requirements
To relate legal requirements to the work that the employee does
To make clear consequences of breaking the rules

26
Q

What are machines good and bad at, in comparison to humans?

A

GOOD AT :
Can make precise/accurate/complex calculations/actions;
More consistent than humans;
Repetitive tasks;
Can work in conditions too dangerous for a human; Working with large volumes of data;
Fast processing of data / calculations; Can perform tasks for longer than humans;

BAD AT:
Image recognition;
Shape detection;
If the conditions change they adapt poorly
Poor at coping with emergencies/unexpected
circumstances;
Creativity // invention // lateral thinking;
Bad at discriminating;
Processing qualitative data;
Recognising human concepts e.g. emotion;

27
Q

What are the principles of the Computer Misuse Act?

A

Unauthorised access to computer materials
Unauthorised modification of computer materials
Unauthorised access with criminal intent;

28
Q

Most methods of data encryption involve the use of a key or keys. The EU and some
governments want to make it law that these keys should be made available to ‘trusted’ third
parties. Explain why this might be seen as a good thing or a bad thing

A

Individual – not welcomed - intrusion of privacy;
Corporation – not welcomed - fear of lack of privacy
/ ‘industrial spying’;
Government - welcomed - help in detecting terrorist / paedophiliac / drug activity;

29
Q

What is the Regulation of Investigatory Powers Act?

A
Allows government (police) to access computer systems without prior authorisation
Right to intercept computer communications if they are suspected of criminal activities
Can request encryption keys
30
Q

What is the Freedom of Information Act?

A

Allows the public to request information from government organisations for a small fee
Personal and non-personal data can be publicly accessed