ethical , legal and enivronment impacts of digital technology on wider society, including issues of privacy Flashcards
what are the benefits of the internet
- vast repository of knowledge
- helps good communication
- education
-research - E-commerce
what are the drawbacks of the internet
- increases piracy
-distribution of illegal images - offensive content
-fraud
-hate speech - Dissemination of fake news
-could cause anti-social behaviour in children at a young age
what are some reasons FOR the internet to be regulated
- The internet is no different to other media : radio , TV, newspapers etc
- the internet has harmful, offensive and illegal content
- children should be better protected - internet can cause children to become addicted and antisocial
- profit-making organisations on the internet should share responsibility for policing the internet they have created
reasons AGAINST the internet being regulated
-Freedom of expression is an absolute right
- The internet is different to other media because anyone can be an author and broadcaster
- the internet grows too quickly for filtering to be effective
- censorship is bad for democracy
- parent should take more responsibility
what are 3 of the acts of parliament
the data protection act - 2018
computer misuse act - 1990
copyright designs and patent acts - 1988
what is computer surveillance
act of monitoring what people are accessing on the internet
what is internet censorship
when someone tries to control what other people can access on the internet - governments use censorship to restrict access to certain information
what are the criteria for being charged in the computer misuse act
- gaining unauthorised access to a private network or device eg through hacking
- gaining unauthorised access to a network or device in order to commit a crime eg stealing data or destroying the network
- unauthorised modification of computer material eg deleting or changing files
what are the different methods that hackers use to attack systems
- passive attacks - monitoring data on a network eg using packet sniffers
- active attack - using malware or other means to attack a system directly
- brute force - automated software and trial - and - error to crack passwords
- denial of service - preventing people from using a network by flooding it with useless traffic
what is digital divide
- when some people have lesser access than others to certain technologies and so they are at a heavy disadvantage
what are causes of the digital divide
- not everyone has the money to buy devices eg smartphones/tablets which can be costly
- urban areas may have better network coverage than rural areas
- some people ( specifically the older generations ) dont know how to use the internet and other new technologies and so are shut out of oportunities that they offer
- people in richer countries have greater access to technology that people in poorer countries
what are the data protection principles
- data must only be used in a fair, lawful and transparent way
- data must only be used for the specified purpose
- data should be adequate , relevant and not excessive for the specified use
- data must be accurate and kept up to date
- data shouldnt be kept longer than necessary
- data should be kept safe and secure
State the ways how companies get hold of users data
- From user sign-up details (like name, gender, email address, age), - users will accept privacy agreement before using websites/ software
- CCTV
- viewing habits with streaming services
- paper registration forms
- cookies track users as they browse websites, - 3rd parties - other companies can share or sell the data
explain how cookies work
They are sent to a user’s computer from websites, allowing them to:
- Track you
- Target advertising to you
- Remember who you are
- Remember that you logged into a website
- Store data such as the contents of your shopping basket
Users must consent to receiving cookies
Why is the disposal of old electronics badly done
because old computer equipment is often shipped to countries with lower environmental standards, to reduce the cost of disposal. The equipment is dumped in landfill, then leading to children collecting this discarded waste in order to find metals that can be recycled and sold - the interaction between the children and. These waste electronics can be hazardous for them and impact them long term
How does wireless network benefit remote workers
They can work anywhere, mobile internet can be used in places that don’t have good wired connection (allowing more people to work at home)
Briefly describe the use of cloud storage
Data is often now stored in data centres connected to the Internet. This allows data to be accessed from any device, and allows it to be accessed anywhere provided the Internet is available.
What are the advantages of cloud storage
- usually good security
- cost-efficient
- convenient, usable and accessible (simple interface, easy to use)
- files can be conveniently shared from device to cloud
- multiple users can collaborate on one file
- cloud storage data can be synced with any device
-scalable (you can easily upgrade your storage plan and have the addition of extra storage, without hassle) - reduced need and cost for secondary storage on each device
- large quantity of storage available
What are the disadvantages of cloud storage
- Need for reliable, fast internet connection to access data properly
- Individuals don’t have control over the security of the files, since it is up to the cloud service provider to keep it safe
- the best cloud storage services are expensive
- large data centres use a very large amount of energy and natural resources to store vast quantities of data
- many data centres are outside the UK, US and EU where different data protection standards may apply, causing complications (eg. the cloud service provider may be storing data in a different country where the protections you expect in your country may not be there in the other country) - this leads to data privacy issues
- many people store personal information using cloud storage which may be vulnerable to hacking or attacks
- the cloud storage provider must be trustworthy
- high bandwidth is required to access data and is not universally available
What are advantages of autonomous vehicles
they can communicate and cooperate to produce a safe environment.
- Reduction in traffic deaths
- Less traffic accidents = less congestion = less emissions
- Faster parking, reduced insurance costs and reduced running costs leading to UK consumer market saving £5bn a year
- Increase in lane capacity
- Less travel time
- Eliminates risk of drunk driving
- No need to own a car, cars could be shared between people, less cars neede
what are the drawbacks of the internet
Increase in piracy
Children / young children can become addicted to to online usage and become
what are weak and default passwords
usernames and passwords that are too simple or never changed from their original settings
what is unpatched software
software that is not updated - = any bugs or security weaknesses can be used by a hacker to gain access to information.
what are misconfigured access rights