ethical , legal and enivronment impacts of digital technology on wider society, including issues of privacy Flashcards

1
Q

what are the benefits of the internet

A
  • vast repository of knowledge
  • helps good communication
  • education
    -research
  • E-commerce
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what are the drawbacks of the internet

A
  • increases piracy
    -distribution of illegal images
  • offensive content
    -fraud
    -hate speech
  • Dissemination of fake news
    -could cause anti-social behaviour in children at a young age
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what are some reasons FOR the internet to be regulated

A
  • The internet is no different to other media : radio , TV, newspapers etc
  • the internet has harmful, offensive and illegal content
  • children should be better protected - internet can cause children to become addicted and antisocial
  • profit-making organisations on the internet should share responsibility for policing the internet they have created
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

reasons AGAINST the internet being regulated

A

-Freedom of expression is an absolute right
- The internet is different to other media because anyone can be an author and broadcaster
- the internet grows too quickly for filtering to be effective
- censorship is bad for democracy
- parent should take more responsibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what are 3 of the acts of parliament

A

the data protection act - 2018

computer misuse act - 1990

copyright designs and patent acts - 1988

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is computer surveillance

A

act of monitoring what people are accessing on the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is internet censorship

A

when someone tries to control what other people can access on the internet - governments use censorship to restrict access to certain information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what are the criteria for being charged in the computer misuse act

A
  • gaining unauthorised access to a private network or device eg through hacking
  • gaining unauthorised access to a network or device in order to commit a crime eg stealing data or destroying the network
  • unauthorised modification of computer material eg deleting or changing files
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what are the different methods that hackers use to attack systems

A
  • passive attacks - monitoring data on a network eg using packet sniffers
  • active attack - using malware or other means to attack a system directly
  • brute force - automated software and trial - and - error to crack passwords
  • denial of service - preventing people from using a network by flooding it with useless traffic
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is digital divide

A
  • when some people have lesser access than others to certain technologies and so they are at a heavy disadvantage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what are causes of the digital divide

A
  • not everyone has the money to buy devices eg smartphones/tablets which can be costly
  • urban areas may have better network coverage than rural areas
  • some people ( specifically the older generations ) dont know how to use the internet and other new technologies and so are shut out of oportunities that they offer
  • people in richer countries have greater access to technology that people in poorer countries
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what are the data protection principles

A
  • data must only be used in a fair, lawful and transparent way
  • data must only be used for the specified purpose
  • data should be adequate , relevant and not excessive for the specified use
  • data must be accurate and kept up to date
  • data shouldnt be kept longer than necessary
  • data should be kept safe and secure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

State the ways how companies get hold of users data

A
  • From user sign-up details (like name, gender, email address, age), - users will accept privacy agreement before using websites/ software
  • CCTV
  • viewing habits with streaming services
  • paper registration forms
  • cookies track users as they browse websites, - 3rd parties - other companies can share or sell the data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

explain how cookies work

A

They are sent to a user’s computer from websites, allowing them to:
- Track you
- Target advertising to you
- Remember who you are
- Remember that you logged into a website
- Store data such as the contents of your shopping basket
Users must consent to receiving cookies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why is the disposal of old electronics badly done

A

because old computer equipment is often shipped to countries with lower environmental standards, to reduce the cost of disposal. The equipment is dumped in landfill, then leading to children collecting this discarded waste in order to find metals that can be recycled and sold - the interaction between the children and. These waste electronics can be hazardous for them and impact them long term

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does wireless network benefit remote workers

A

They can work anywhere, mobile internet can be used in places that don’t have good wired connection (allowing more people to work at home)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Briefly describe the use of cloud storage

A

Data is often now stored in data centres connected to the Internet. This allows data to be accessed from any device, and allows it to be accessed anywhere provided the Internet is available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the advantages of cloud storage

A
  • usually good security
  • cost-efficient
  • convenient, usable and accessible (simple interface, easy to use)
  • files can be conveniently shared from device to cloud
  • multiple users can collaborate on one file
  • cloud storage data can be synced with any device
    -scalable (you can easily upgrade your storage plan and have the addition of extra storage, without hassle)
  • reduced need and cost for secondary storage on each device
  • large quantity of storage available
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the disadvantages of cloud storage

A
  • Need for reliable, fast internet connection to access data properly
  • Individuals don’t have control over the security of the files, since it is up to the cloud service provider to keep it safe
  • the best cloud storage services are expensive
  • large data centres use a very large amount of energy and natural resources to store vast quantities of data
  • many data centres are outside the UK, US and EU where different data protection standards may apply, causing complications (eg. the cloud service provider may be storing data in a different country where the protections you expect in your country may not be there in the other country) - this leads to data privacy issues
  • many people store personal information using cloud storage which may be vulnerable to hacking or attacks
  • the cloud storage provider must be trustworthy
  • high bandwidth is required to access data and is not universally available
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are advantages of autonomous vehicles

A

they can communicate and cooperate to produce a safe environment.
- Reduction in traffic deaths
- Less traffic accidents = less congestion = less emissions
- Faster parking, reduced insurance costs and reduced running costs leading to UK consumer market saving £5bn a year
- Increase in lane capacity
- Less travel time
- Eliminates risk of drunk driving
- No need to own a car, cars could be shared between people, less cars neede

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

what are the drawbacks of the internet

A

Increase in piracy
Children / young children can become addicted to to online usage and become

21
Q

what are weak and default passwords

A

usernames and passwords that are too simple or never changed from their original settings

22
Q

what is unpatched software

A

software that is not updated - = any bugs or security weaknesses can be used by a hacker to gain access to information.

23
Q

what are misconfigured access rights

24
what is cyber security
related to the protection of digital data on networks including the internet
25
What three areas does cyber security create rules for to keep systems safe?
people , processes and technology
26
what is the rule for people to ensure safety of devices and system
- making people aware and understand how to protect their data by encouraging people to use strong passwords, not to open emails from unknown addresses and to back up all their data
27
what is the rule for process to ensure safety of devices and system
- ensure data is backed up and are available to rebuild the system
28
what is the rule for people to ensure safety of devices and system
Additional network hardware such as firewalls to prevent unauthorised access from outside the network, and software such as an intrusion detection system
29
what are the disadvantages of autonomous vehicles
- ethical questions - if an accident occurs whose fault is it -the programmer, the car manufactures, no one? - can result in loss of jobs - may not be able to cope with the unpredictable human drivers / predestrians/ animals - there is also a risk that autonomous vehicles could be hacked , raising questions on the sustainability of them
30
what are examples of wearable technologies
- Virtual reality headsets - touch sensitivity which can be addd to clothing to control smartphones and electronic can be added to shoes to automatically fasten them - exoskeletons allow people to work more safely or have additional strength
31
what are computer based implants used for and how are they used
- pacemakers - control irregular heart rhythm - Cochlear implants - restore hearing for deaf people by taking electric signals straight to hearing nerve - brain implants - link to exoskeletons allowing quadriplegics to walk
32
what raw materials is a hard disk made from
- aluminium - steel - fibreglass - plastic
33
what raw materials is a game controller made from
- plastic -rubber -lithium
34
what raw materials is a USB cable made from
- copper -plastic
35
what raw materials is a CPU made from
- fibreglass - aluminium - Gold
36
what raw materials is a heat sink made from
- aluminum
37
what raw materials is RAM made from
- fibreglass - Gold
38
what is the lifecycle of a smartphone in order
- mining for raw materials - manufacture - purchase and use - recycling centre - reprocessing plant
39
what are the impacts of e - waste on the environment
- very harmful to humans and the environment if not processed correctly - lithium batteries can catch fire and may be hard to recover - if components costs too much to recover they go to landfill - mining materials damages the environment
40
what are the ways to reduce the impacts that E- waste have
- make devices that can be fixed with modular components - use removable batteries - use modern recycling facilities
41
what are the privacy concerns of autonomous vehicles
- concerns may arise where cars enable location tracking for navigation and security - car ownership data may be able to authenticate authorised use of the vehicle for safety and insurance - matching the two data sets, however, provides a very accurate view of who goes where, when's and with whom
42
what are the environmental concerns of autonomous vehicles
43
what are reasons for lawful processing and their definitions
- consent - a person has agreed to their data being used - legal obligation- - processing the data is needed to meet the law - public task - for performing an official task - contract - processing is needed for a contract - vital interests - processing is needed to protect someones life clear benefit to the user or company
43
why must data be stored
-so that the data is kept accurate and up to date - so it is not kept longer than necessary - must not be transferred to other countries unless they can keep it protected
44
what are some methods of securing data
- using passwords for any systems with access to the data - encrypting the data - only allowing access to those users that need it ( if the data is more sensitive some methods eg CCTV, security guards, two factor authentication are used )
45
what are the punishes from the Data protection Act
- issuing warnings to the organisation - order the organisation to comply - fines up to 20 millions euros
46
what is unauthorised access definition
where a person gains access to a computer system without permission - eg a hacker
47
what are the features of unauthorised modification
- deleting another user's files - changing the content of documents - altering the content of web pages - rewriting computer programs to remove activation keys
48
what are the ways that software is made harder to copy without permissions
- licence keys , activation keys and serial numbers - holograms on physical products to show they are genuine - online registration or activation will prevent the software from working if a licence has not been purchased