Consequences of computing Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What are moral issues?

A

Moral issues are those that concern an individual’s sense of right and wrong. For example, some people happily download and use paid software without purchasing a licence while others don’t feel that the practice is morally correct. A person’s morals can be influenced by the people around them. For example: friends, family or teachers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are ethical issues?

A

Ethical issues relate to society and its sense of what is right or wrong. Ethical issues include the use and misuse of personal data. In general, society believes that personal data should be stored securely and not used for anything other than the purpose for which it was collected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are cultural issues?

A

Cultural issues arise from the differences in moral values between people in different geographical areas. In the UK, people are generally happy for photographs containing them to be taken in public and shared online. In other countries, this would not be seen as acceptable. When creating a new computer system, computer scientists must consider where their system is going to be used and what people’s attitudes towards it would be.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are legal issues?

A

Legal issues are those that relate to the law. There are a number of laws in the UK that specifically relate to the use of computers and computer systems. Examples of these include: The Computer Misuse Act 1990, The Data Protection Act 1998, The Freedom of Information Act 2000 and The General Data Protection Regulation 2016.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is personal data?

A

Data that can be related to an identifiable living person.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is unathorised access?

A

When computer systems or data are used by people who are not the intended users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a code of conduct?

A

A voluntary set of rules that define the way in which individuals and organisations will behave.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Fake news

A

Facebook, Google and Twitter provide a platform for spreading false information.
Agents with links to the Russian set up millions of fake accounts and websites and purchased thousands of advertisements on Google to spread misinformation to people whose profiles suggest that they would be responsive to fake news and views.
The US election in 2017 and the UK Brexit referendum in 2016 were both targeted, potentially changing the outcomes of both.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Do algorithms make ethical decisions?

A

Algorithms are based on complex rules that make it difficult to predict or explain the decision-making logic.
The ethics of an algorithm may be ethically questionable because of this complexity.
Machine-learning algorithms, given new training data, can define or modify their decision-making.
The human operator does not need to understand how or why the algorithm makes a certain decision.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Environmental impacts of technology

A

The disposal of computer waste is a big problem because they
contain many toxic chemicals. Often old computing equipment
is illegally shipped for disposal to developing countries.
The growth in cloud computing means a greater need for storing
data online. For this data centres are used but they require huge
amounts of electricity, thereby contributing to climate change.
Cobalt is a key element requited for Lithium batteries for
powering mobile devices. Much of the World’s cobalt is mined in
the Congo even by very young children in appalling conditions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Environmental benefits of technology

A

Less reliance on paper, saving resources.
More opportunities for online global communication and
collaboration thereby saving on travel and associated pollution.
Greater insight of the environment and climate through using
computers to model, analyse and process environmental data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Computer Misuse Act (CMA)

A

The purpose of the CMA is to prevent:
* unauthorised access to computers by hackers
* intentionally impairing the operation of computer systems
through denial of service (DOS) attacks on web servers or
distributing viruses
* the theft of data
Three levels of offence:
1) Unauthorised access
2) Unauthorised access with intent to commit an offence
3) Unauthorised modification of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Copyright, designs and patents act (CDPA)

A

Copyright is a law that protects the creators of original pieces of
work. No one else has the right to use or copy it without permission
from the owner. This ensures that people can be rewarded for their
work.
Fair use allows copyrighted work to be used legally in certain
situations
* personal or educational use (not commercial use)
* use only a small amount of the work (e.g. a short quote)
* acknowledge original source of the work
Copyleft work can be copied, modified used even used for
commercial gain as long as the derived works are also distributed
under copyleft.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Plagiarism

A

To pass off someone’s work as one’s own.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Patent

A

Gives the inventor the exclusive right to create, use and sell their invention for a fixed period.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Piracy

A

Illegally copying and distributing copyrighted material.

15
Q

Creative commons licences (CCL)

A

Means that the creator has explicitly given everyone permission to use their work.

16
Q

Investigatory Powers Act

A

This is legislation that allows public authorities to carry out mass surveillance on electronic communications.
Justification - By monitoring electronic communications security
services can keep us safe from terrorists and other serious criminals
Concerns - Can infringe on our privacy and civil liberties

17
Q

What are some examples of the powers of the security services under the IPA?

A
  • can hack into computers, networks, mobile devices, servers
  • internet service providers have to store which websites users
    visit for 12 months and allow access to authorities when
    requested
  • carry out mass surveillance of communications; authorities can
    collect bulk data including data about people who are not
    suspected of anything.
  • demand that an internet service provider and other
    companies provide access to a customer’s communications
    including keys to encrypted data
18
Q

General Data Protection Regulation (GDPR)

A

The purpose of the GDPR is to ensure that personal information
collected by businesses and other organisations are protected.
Six principles of the GDPR
Personal information must:
* be used fairly and lawfully
* be used only for specific purposes for which it was collected
* be adequate, relevant and not excessive
* be accurate and kept up to date
* be kept for longer than is necessary and deleted when it is no
longer needed
* be kept secure against unauthorised access

19
Q

Challenges facing legislators

A

Technology can be used for illegal purposes in unforeseen ways.
And because technology changes rapidly the law cannot keep up
with these changes.
The Internet is global, so any activity that may be legal in one country
may be illegal in another.
Encryption allows the monitoring of criminal activity much more
difficult.
Crimes may be committed by states.
Powerful technology companies lobby for their own interests.

20
Q

Data protection act

A

The Data Protection Act 2018 is the UK’s implementation of the GDPR.

21
Q

Freedom of information act

A

The Freedom of Information Act extends the subject access rights of the Data Protection Act and gives general rights of access to information held by public authorities such as hospitals, doctors, dentists, the police, schools and colleges.
The Act gives individuals access to both personal and non-personal data held by public authorities. The idea behind the Act was to provide more openness between the public and government agencies. Therefore, to respond to individual requests for information. Much of this is done through websites and email communications.

22
Q

Privacy policies

A

Privacy policies are a legal requirement of any organisation handling data.
For most companies, the most efficient way to notify data subjects of your policy is through your company website, but privacy policies may also be provided by email or hard copy.
Under GDPR, businesses are obliged to notify individuals of what, how and why their personal data will be used and processed before collecting any personal data. If your organisation collects personal data on individuals, it needs a privacy policy on the company website.

23
Q

What are the main principles of the British Computer Society (BCS) code of conduct?

A

The main principles of the British Computer Society (BCS) code of conduct are that members should:
always operate in the public interest
have a duty to the organisation that they work for, or the college they attend
have a duty to the profession
maintain professional competence and integrity.