Issues Relating to Computer Science Flashcards
Academic Dishonesty
in computing, this refers to the uncredited usage of AI in the academic environment
Academic Integrity
describes values held to be essential in the UK’s academic environment
Academic Misconduct
in computing, this refers to the uncredited usage of AI in the academic environment
Associated Article
refers to any tangible object that you have created, such as a song or computer program
Business Critical
where something is necessary for a business to maintain operations, can occur when people become too reliant on databases or computers
Computer Misuse Act 1990
legislation that protects personal data held by organisations from hackers, making unauthorised access to computers, unauthorised access to computer data and unauthorised modification of data illegal, or making supplying or obtaining anything which could be used in a computer misuse act, but intent has to be proven
Copyright
a legal precedent that allows the creator to protect a piece of original artistic, literary, dramatic or musical work and comes into effect as soon as work is created. It is also possible to register your own copyright material, which makes it easier to prove ownership if someone copies your work
Copyright, Designs and Patents Act 1988
regulates copyright in the UK, protects intellectual property and associated article
Creative Commons Licencing
an organisation that provides licences to individuals or organisations that want to give the public the ability to legally share and develop their work without needing to ask the owner’s permission to do this
CC-Attribution
allows work to be shared, copied and modified, but the creator must be credited
CC-Share-Alike
allows work to be shared, copied and modified, but the creator must be credited and released under the same terms as the original
CC-Non-Commercial
allows work to be shared, copied and modified, but the creator must be credited and work cannot be used to make a profit
CC-No-Derivatives
allows work to be shared and redistributed but not modified in any way
Data Controller
the person who determines the purposes and means of processing of personal data
Data Protection Act 2018
laws about personal data held by an organisation, stating that personal data must be kept up-to-date and accurate, not held for any longer than is necessary, that individuals relating to that information can access it and correct it and that they can receive compensation if the law is not followed regarding their data
First Data Protection Principle
processing of personal data for any of the law enforcement purposes must be lawful and fair
Second Data Protection Principle
the law enforcement purpose for which personal data is collected on any occasion must be specified, explicit and legitimate, and personal data so collected must not be processed in a manner that is incompatible with the purpose for which it was collected
Third Data Protection Principle
personal data processed for any of the law enforcement purposes must be adequate, relevant and not excessive in relation to the purpose for which it is processed
Fourth Data Protection Principle
personal data processed for any of the law enforcement purposes must be adequate, relevant and, where necessary, kept up to date, and every reasonable step must be taken to ensure that personal data that is inaccurate, having regard to the las enforcement purpose for which it is processed, is erased and rectified without delay
Fifth Data Protection Principle
personal data processed for any law enforcement purposes must be kept for no longer than is necessary for the purposes for which it is processed
Sixth Data Protection Principle
personal data processed for any of the law enforcement purposes must be so processed in a manner that ensures appropriate security of the personal data, using appropriate technical and organisational measures
Data Subject
the person to whom the data relates
Design Rights
this is granted if something is different from any other design and allows the same protections as content creators, protecting their designs from infringement, meaning people can make careers out of designing without fear of monetary losses
Deskilling
where people lose skills because they become too reliant on computer systems
Digital Divide
the divide between people who have access to computers and the internet and those who don’t
Electronic Signature
data that is logically associated with other data and which is used by the signatory to sign the associated data
Ethics
shared morals that a particular group of people recognise as necessary to ensure that the group behaves positively based on its own context
Fair Use
a concept included in the Copyright, Designs and Patents Act of 1988 which governs the acceptable uses of a piece of copywrited work if you are not the author, allow creators to safeguard their content but not hoard it
Freedom of Information Act 2000
was introduced to end a culture of secrecy in government, as it allows anyone to request information from the government and its associated organisations; prior to this law, there was nothing that required the government to reveal its processes and conduct to the general public
GDPR
General Data Protection Regulations
EU framework for data protection laws, came into force on 25th May 2018
ICO
Information Commissioner’s Office
since the Data Protection Act was updated, it is a legal requirement to register your data collection with the ICO, and any data breaches must be reported to them
Intellectual Property
refers to any idea that an individual or group can own; it is a legal term and is used to give precedent for the possession of ideas
Job Displacement
where people lose their jobs due to technological advances
Morals
internal principles that an individual uses to make decisions about what is right and wrong, which generally originate from commonly held views in society
Patent
protects innovations and designs, unlike copyright, which protects artistic and literary works
Personal Data
any information related to an identified or identifiable living individual, such as name, ID number, location data or online identifier, or factors related to physical, physiological, genetic, mental, economic, cultural or social identity
Piracy
recreational downloading of copyrighted materials
Plagiarism
where a copyrighted item is not copied exactly, but is used as the basis for something somebody else has created, without creditation
Recipient
a third party who receives the personal data
Redeployment
where someone is given a new job in the same company after their old job got displaced
Regulation of Investigatory Powers Act 2000
law that regulates the powers of public bodies to carry out surveillance and investigation, covering the purpose for which they may be used, which authorities can use the power, who should authorise each use of the power, the use that can be made of the material gained, independent judicial oversight, the means of redress for the individual
RIPA Power 1
powers concerning the interception of communications
RIPA Power 2
powers concerning the acquisition of communications data
RIPA Power 3
powers concerning intrusive surveillance
RIPA Power 4
powers concerning covert surveillance in the course of specific operations
RIPA Power 5
powers concerning the use of CHIS and UCOs
RIPA Power 6
powers concerning access to encrypted data
Rights of the Individual
the rights that the person the data is about has under the Data Protection Act 2018
- Right to see what data of theirs is held by the organisation within a reasonable timescale, but the organisation can charge a small processing fee
- Right to update or correct inaccurate data
- Right to be compensated if the organisation damages them by breaking the act
Skills Gap
where people are unable to learn basic skills due to those being done by computers so then are unable to advance and learn more advanced skills
Society
one or more groups of people that exists with shared beliefs, practices, and ethic
Telecommunications Act 1984
govern the collection of telecommunications data by the government and the police, in particular, section 94 allows broad regulation of telecommunications in secret in the interests of national security. Any secretary of state can issue commands to telecommunications providers with very little restrictions on what they can be
Ten Commandments of Computer Ethics
published by the Computer Ethics Institute in 1992
Commandment 1
thou shalt not use a computer to harm other people
Commandment 2
thou shalt not use a computer to interfere with other people’s work
Commandment 3
thou shalt not snoop around in other people’s computer files
Commandment 4
thou shalt not use a computer to steal
Commandment 5
thou shalt not use a computer to bear false witness
Commandment 6
thou shalt not copy or use proprietary software for which you have not paid (without permission)
Commandment 7
thou shalt not use other people’s computer resources without authorization or proper compensation
Commandment 8
thou shalt not appreciate other people’s intellectual output
Commandment 9
thou shalt think about the social consequences of the program you are writing or the system you are designing
Commandment 10
thou shalt always use a computer in ways that ensure consideration and respect for other humans