Emerging trends, Issues & Impacts Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Environmental issues

A
  • Manufacturing: Non-renewable, toxic materials are used. Releases greenhouse gases
  • Disposal: Dumped into landfill sites, can pollute the land and water.
  • Energy consumption: Vast amounts of energy are used during manufacturing and use
  • Short replacement cycle
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Privacy concerns

A

It is not always obvious who is collecting and analysing personal data and who that data is being passed to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Discrimination

A
  • Analysis of shared data could result in some groups of individuals being discriminated against
  • Technology has to be inclusive to reduce the disadvantage in society because more people have access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Patents

A
  • Protect new inventions.
  • A patent holder has the exclusive right for 20 years
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Licensing

A

The copyright holder of a work can grant a license that permits a third party to use it.
A software license is a legally binding contract that specifies how software can be used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Legislation (Data Protection Act)

A
  • Lawfulness, fairness, and transparency
  • Purpose limitation
  • Data minimisation
  • Accuracy
  • Storage limitation
  • Security
  • Accountability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data subject rights

A
  • Be informed about the collection and use of data
  • Access their data
  • Have inaccurate data corrected
  • Have data erased
  • Withdraw consent at any time
  • Restrict the way in which their data is processed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Computer misuse act

A
  • Unauthorised access to computer material
  • Unauthorised access with intent to commit further offenses
  • Unauthorised access with intent to impair the running of a computer or damage/destroy data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cookies

A
  • A small text file that enables the website to recognise the user’s device
  • The website must warn the users, cookies are being used
  • Users can opt-out
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Lawfulness, fairness, and transparency

A
  • Have a legitimate reason for processing someone’s data
  • Must warn the user and must get consent
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Purpose limitation

A
  • Only use data for the purpose it was collected
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data minimisation

A
  • Only collect as much data as is necessary
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Accuracy

A
  • Ensure that the data collected is accurate
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Storage limitation

A
  • Not keep data for longer than necessary
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Security

A
  • Keep data secure and protect it
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Accountability

A
  • Demonstrate that data protection measures are adequate
17
Q

Backup

A
  • Allows for data recovery
  • Make a copy of data and store it on a different device in different location
  • Full or Incremental
18
Q

Recovery

A
  • The process of restoring data and/or system states from the backup copy
19
Q

Full backup

A
  • A full copy is made of all the data
20
Q

Incremental

A
  • Only copies of new files and those that have changed are made
21
Q

Virus

A
  • Malicious code that’s hidden within other file
  • Designed to replicate and inserted into other files
22
Q

Worms

A
  • Malicious software programs
  • Replicate themselves
  • Can distribute independently
23
Q

Trojans

A
  • Malicious software programs
  • Don’t replicate
  • Camouflaged as legitimate software
24
Q

Ransomware

A
  • Type of malware that blocks users from using using their computer or accessing he data stored until a ransom is paid
25
Q

Key loggers

A
  • Spyware
  • Monitoring software that record keys pressed
26
Q

Physhing

A
  • Attempt to get sensitive, confidential information
27
Q

Pretexting (blagging)

A
  • Inventing a scenario with malicious intetns
28
Q

WEEE

A
  • Waste Electrical and Electronic Equipment
  • Sets targets for the collection and recycling and recovery of computing technology and other electronic items
29
Q

Positive impact of technology on the environment

A
  • Less CO2 released by people travelling to work since remote work
  • Energy efficient homes since smart switches can turn off lights