6.1 Ethical, Legal, Cultural And Environmental Impacts Of Digital Technology Flashcards
(29 cards)
Legal issues
A legal issue is a problem or dispute concerning the interpretation, application, or violation of laws.
Examples of legal issues in computing are:
Copyright - The use of other peoples content without permission
Cybersecurity - Protecting against hackings, data breaches and all other cybercrimes
Data protection - Responsible collection, storing and use of personal information
Ethical issues
An ethical issue is a situation that raises questions about what is right and wrong.
As technology advances and laws are slow to keep up, ethical issues are more prevalent.
Ethical issues call in a persons own morals and values as there is often a lack of an easy answer and decisions can have consequences for yourself and others.
Ethical issues (digital divide)
The increasing reliance on computers increases the digital divide, creating inequality between those who have access to technology and those who do not.
This can hinder opportunities for education, employment, and economic advancement for disadvantaged groups.
Ethical issues (algorithm bias)
Using algorithms in decision-making can unintentionally promote unfair biases, leading to discriminatory outcomes in areas such as:
Job seekers - Factors unrelated to qualifications such as post code or social media activity.
Loans - Denying lending to minority groups.
Criminal justice - Racial profiling, harsher sentences for certain groups.
Ethical issues (intellectual property)
The ease of digital copying and distribution raises ethical questions about protecting intellectual property rights and fair compensation for creators.
Digital piracy can lead to significant revenue loss for creators. When consumers access pirated content instead of purchasing it legally, creators are deprived of the revenues they deserve.
Ethical issues (Automation)
The automation of tasks through computers raises ethical concerns about job losses and the potential loss of livelihood for workers.
Cultural issues
A cultural issue is an issue that relates to the impact of technology on the nature and culture of society.
Advances in technology have changed the way people lead their lives, in areas such as: Online shopping, On-demand content/streaming, Navigation (Sat Nav), Gaming, Social media, Remote working.
Cultural issues (Digital divide)
An inequality in the access, use, education and confidence in new technologies exists.
Access to technology is limited by geography, some countries have limited/no access to the internet.
Use of technology can be limited by cost, the ability to purchases the latest technology is both a national and international issue, as more wealth means more access.
A lack of education in technology can limit employment, many employers now require good ICT skills.
Confidence to use new technologies can also widen the divide, older generations, lacking the confidence of growing up with technology like social media, can feel intimidated and excluded, while younger generations readily accept it.
Cultural issues (landscape employment)
Positive - Work-life balance - increased flexibility gives employees the ability to manage their personal and professional lives.
Global collaboration - working remotely increases opportunities to work with colleagues and clients across the world.
Diversity & Inclusion - remote working can remove barriers caused by geography and lead to job opportunities for people from diverse backgrounds.
Negative - Social isolation - working remotely can lead to a lack of social interaction and increase isolation.
Communication - remote working can sometimes make communication a challenge, this can impact on team dynamics and efficiency.
Boundaries - increased flexibility and freedom can blur the boundaries of work and personal time, which can lead to a mismanagement of time and/or burnout.
Cultural issues (Censorship)
Restricting access to online content based on different beliefs of what is acceptable or harmful can lead to social unrest.
Censorship can be used to preserve cultural identify and tradition, but can also stifle cultural expression and diversity.
Environmental issues
An environmental issue is an issue caused by manufacturing and use of computers that has a negative impact on the environment.
As technology becomes a bigger part of everyday life, the number of devices being manufactured increases.
Environmental issues examples
A great amount of natural resources (metals/plastic) are used during the manufacturing and distribution of components.
An increase in demand for 24/7 access to resources such as web servers and data centres means an increase in the energy needed to maintain them.
As consumption of technology increases and competition in the market expands, the rapid disposal of devices becomes a problem.
Pollution caused by the production, distribution and disposal of technology gets higher.
The volume of waste in landfill causes environmental contamination.
Privacy issues
A privacy issue is an issue that comes from collecting, accessing or using personal information without consent or control.
Who controls the data and how it is used raises crucial questions as technology becomes a bigger part of every day life.
Privacy issues (face recognistion)
The increase in cameras and advances in technology means face recognition is possible, whilst this can mean an advantage in crime prevention/detection, people are concerned about privacy.
Privacy concerns include, what else is being watched? and who is watching?
Privacy issues (GPS)
GPS is built in to most smart phones and brings with it a number of features that many see as a benefit, ‘find my phone’ for when it gets lost/stolen, location tagging in photos and for navigation software.
Some users are concerned with where this data is kept? ,who might have access to it? and is it being used for any other purposes?
Privacy issues (internet monitoring)
Most schools and businesses use monitoring software to track their students’ and employees’ internet activity.
Social media companies also employ similar tools to detect and remove illegal or harmful content like hate speech, misinformation, or violent threats.
Arguments for, these measures promote responsible online behaviour and prevent cyberbullying.
Arguments against, concerns about limitations to free speech, potential abuse by authorities who control the monitoring systems, and biased algorithms leading to censorship.
Data protection act 2018
The Data Protection Act (DPA) is a law that protects personal data from being misused.
Examples of personal data would include: Name, Address, Date of Birth, Race, Religion.
Most people that store personal data has to follow the Data Protection Principles although there are a few exemptions.
Exemptions of DPA
Domestic purposes – if you only use personal data for such things as writing to friends and family or taking pictures for your own enjoyment, you are not subject to the DPA.
Law enforcement – the Police investigating a crime is not subject to the DPA. E.g. if someone has been suspected of a crime they can request to see the evidence about them.
Intelligence services processing – personal data processed by the intelligence services (e.g. MI5) is not covered by the DPA.
Data protection principles
Personal data must be fairly and lawfully processed.
A company has to be clear about what personal data they wish to collect and what they want to use it for.
Personal data must be collected for specified and lawful purposes.
A company cannot use personal data for any purpose other than what they stated originally. They also cannot pass this data on without permission.
Personal data must be adequate, relevant and not excessive.
A company cannot request personal data that they do not need right away.
Personal data must be kept accurate and up to date.
If a company holds personal data that is wrong or out of date then you have a right to have it corrected or deleted.
Personal data will not be kept for longer than is necessary.
A company must delete personal data once they no longer have a need for it.
Personal data must be processed in line with people’s rights.
If requested a company must provide a customer with all the personal data they hold on them.
Computer misuse act 1990
The Computer Misuse Act (CMA) concerns the malicious use of computers.
The act was originally created to make sure that computer hacking was covered within the law.
It has been updated regularly to ensure it remains relevant.
Firewalls can be used to prevent external people accessing the system. They are key in preventing DoS or DDos attacks.
Primary offences under CMA
The Computer Misuse Act has 3 primary offences:
Unauthorised access to computer materials.
Unauthorised access with intent to commit further offences.
Unauthorised modification of computer files.
The consequences of each offence are worse depending on whether it’s offence 1, 2 or 3 with each offence being punishable with time in prison.
Copyright Designs & Patents Act (1988)
This protects the intellectual property of an individual or a company.
It makes it illegal to copy, modify or distribute software or other intellectual property without the relevant permission.
If original work is original, copyright will be automatically applied and will not expire until 25 - 70 years from the death of the creator depending on the type of work.
If an individual believes that their work has been copied it is their responsibility to take action under the Copyright Designs and Patents Act.
Many sites online offer free downloads of copyrighted software/videos which prevents the intellectual copyright holder from earning their income on the work they have created.
E.g. If someone downloaded videos from Netflix and shared them with others, they would be breaching the act.
The act covers videos and audio where peer-to-peer streaming prevents a copyright owner from receiving an income.
Primary breaches
Copying an original work.
Issuing the copy of the original work to the public.
Renting/lending the copy of the original work to the public.
Performing, showing or playing the original work in public.
Making an adaptation of the original work.
Secondary breaches
Importing a copy of original work.
Possessing or dealing with a copy of the original work.
Providing means to make copies of the original work.
Permitting the use of premises for making copies of the original work.
Provision of props/equipment for a performance of a copy of the original work.