Ethics Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Ethics vs law

A

Ethics:
social guidelines based on moral principles and values

Laws:
Rules and regulations with specific consequences and penalties if violated (illegal)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Copyright law

A

Copyright law protects the owner of creative work from having it illegally exploited meaning you are not allowed to copy or redistribute this work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Applying law to software

In terms of copyright laws with software it is illegal to..

A

It is illegal to:
Copy software
Run pirated software
Transmit copyrighted software, by creating a copy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Examples of infringement

A

Making a copy of a games software as backup because the license says you can. Then you email the back up to your friends

You pay a fee to join a film-sharing network that is not authorised to distribute copyrighted video. The you you download unauthorised copies of the film you want to watch.

It is okay to copy music you have bought onto your computer but you can not sell or make a copy of it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do people get caught

A

Every computer has an IP address. ISPs can send out advisory letters to those who download copyright material

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Plagiarism

Def..

Copyright vs. Plagiarism…

Software and plagiarism…

A

Copying someone else’s work and presenting it as your own, ideas, words, images, music etc.

It has a lot in common with copyright infringement but is not the same

In general copyright is illegal and plagiarism is unethical

Software to detect plagiarism:
Universities, publishers and other institutions use software to detect plagiarism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Enforcing codes of ethics

who does and can

what might they restrict

A

Company or school AUPs (acceptable use policy)

  • social networking
  • posting offensive images
  • performing large file downloads
  • failure to scan an external drive before using it with a
    new network
  • deleting files of another pupil or colleague
  • using the internet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Copyright and computer systems

what about computer systems can be subject to copyright laws

A

Computer programs are subject to copyright laws
the user interface and “look” and “feel” of an OS can also be copyrighted.

It is illegal to to copy software such as an application or game.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cloud computing and benefits

A

Software provided via online cloud services help to reduce the amount of piracy.
Software manufacturers have greater control over the distribution of their products
Usage can be easily monitored
although users can still share their login credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Computer laws about personal data collected

A

Countries have laws that protect data collected about individuals:
data collected must be accurate and up to date
you have the right to see the data about you
the data must also be protected from unauthorised access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why data needs protecting, how this affects computer design

A

Personal data that is held about us should be accurate and only held for a specific purpose.
A lot of this data is private and confidential so it should not be available to anyone and especially criminals to look at.

There must be procedures to keep up to date information and correct incorrect data.
Login codes and passwords should be used to prevent unauthorised access.
Personal data no longer relevant should be deleted from the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Computer misuse in terms of hackers and software developers

A

Laws are designed to prosecute hackers for gaining unauthorised access. Software developers should not create that are capable of gaining unauthorised access to other programs or data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Types of computer systems

A

Information systems:
Library systems, health and educational databases, online maps and search engines

Communications systems:
Email, social networking forums, mobile phones, sat navs and the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Computers and the environment

Computer disposal rules

Computer Energy usage

Computer manufacturer deisgn

A

Organisations like schools and hospitals can have obligations to dispose of old computers by recycling them.

Older computers with CRT screens use up a lot of energy even when not being used.

Computer manufacturers now design equipment to use as little energy as possible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Digital footprint and marketing
eg. loyalty cards

What companies can find from your digital footprint

A

The internet is used everyday to buy goods, find directions etc.
every time this occurs companies build a better picture of:
what you like
where you like to go
when you like it
what you buy and eat
who you speak to and when

Supermarkets that offer loyalty cards for points are also tracking what you buy, when you buy and how much you buy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Pop-ups and advertisements

Web worth
Advertising to children

A

The number of visitors help to determine a website’s worth. At what age is it “fair” to direct advertising at children.

17
Q

Destruction of jobs

A

Online service software accessible from a mobile phone are beginning to “eat” conventional service providers.

18
Q

Click farms

A

Click farms employ cheap third-world labour to falsely generate likes, shares, views and follows on social media forums.

19
Q

Communication methods

ethical issues with online communication

A

The ease at which we can communicate globally in the modern world has brought significant changes.
It has bought ethical questions such as:
who owns an email
who owns your social media posts when you die
should you gain the permission of the sender before forwarding an email
should you gain the permission of the recipient before sending an email
should organisations or government have a right to monitor your actions

20
Q

Bulk emailing and email overload

A

Mass unsolicited and often non targeted email is often referred to as spam.

Some people are spending greater and greater sections of their day responding to emails.

21
Q

Cyber Bullying and inappropriate content

A

Bullying others through the use of a device

  • don’t reply
  • block the sender
  • keep evidence
  • tell somebody
  • “report”
Posting inappropriate content:
- malicious or personal attacks
- impersonating another person or company without 
  permission 
- personal or confidential information
- sexually explicit material
22
Q

Inaccurate content

A

Sites like wikipedia are managed and edited by the general public.
Not all information is accurate

23
Q

Online ethics

network misuse and ethics of how to deal with it

A

When a network is created some people will misuse it

Should the creators be forced to monitor activity?

24
Q

Internet trolls and replying

A

Trolling is regarded as the act of deliberately posting inflammatory content on the internet with aims to provoke or upset.

Electronic communication requires the same manners as communication face to face , Netiquette

25
Q

The dark side of the web

A

Trolls, misogyny and cyberbullying have become a part of everyday internet use though it was not meant to be this way.

26
Q

Political activists online

A

During political uprisings people have resorted to social media to report and broadcast activity.

Unethical political groups are also using social media to find their new recruits.