learning aim F Flashcards
whats is netiquette
set of guidelines for polite and appropriate behaviour.
examples of netiquette
be respectful, considerate, clear and aware.
what is email etiquette
set of guidelines for how to communicate professionally and effectively via email
examples of email etiquette
using a professional email address. maintain a professional tone and use a clear and concise and clear subject line
what is online behaviour
any actions a person takes while online, which includes how they interacts with others and non-human elements
privacy on the internet
what this does is it protects for an individuals personal information and data while connected to the internet. includes security of personal and financial data, communication and preferences
what os freedom of speech online
the right to express oneself, access info and share ideas without interference. however, can be restricted if what they say is threatening, grossly offensive or encourages hateful activity
what is censorship
legal or other control of what be accessed, published, or viewed on the internet
whats the impacts of censorship
computer networking, security, social sciences, privacy, internet access and freedom of speech
what does censorship cover
regulations regarding indecent images of children. English defamation law, regulations against incitement to terrorism and copyright law
what is acceptable use online
there is something called an acceptable use policy (AUP) is a doc that outlines what is considered acceptable use of network or service
examples of acceptable use
following cybersecurity, not downloading illegal or offensive material and not invading person’s privacy
what is globalisation
the process by which the worlds’ economies, cultures and populations become interconnected
what are winners in globalisation
they are consumer tend to win, unless low process lead to job losses. companies and emerging economies have developed rapidly
what are the losers in globalisation
they are low-skilled workers may lose jobs to immigration. those with stagnant or falling income and people who see globalisation as a threat
what is a problem of globalisation
compliance, encouraging an environment that exploits worker in countries that do not offer sufficient protection
what is unequal access to IT
a circumstance where some people have more access to technology than others
the impacts of unequal access to IT
can discourage skills accumulation, choke economic and social mobility and depress economic growth
what are environmental issues of IT
there are disruptions to the environment cause by humans technology
environmental impacts of IT
tech systems produce air, water, heat and noise pollution. if not recycle properly it can increase landfill
positive environmental issue
more people use renewable energy. using new tech like vertical farming, solar glass and green construction material
what is disposal of devices
process of getting rid of unwanted digital and electronic equipment in a safe and environmentally responsible manner
what does WEEE regulation stand for
the waste electrical and electronic equipment
what is WEEE regulations
made a requirement producer’s and retailers of electrical and electronic equipment. they ensure a proper disposal and they mark products with a crossed out wheeled bin symbol and a date mark
what does the computer misuse act 1990 deal with
with the issues of accessing or modifying without permission
how many amendments were made in the computer misuse act
3
what dates were the amendments made in computer misuse act
2008, 2015 and 2022
what was amended in the 2008 cma 1990
clarified the law on denial-of-service and the supply of hacking tools.
what was amended in the 2015 cma 1990
aligned the CMA with the serious crime act
what was amended in the 2022 cma 1990
prohibit the unlawful sharing of child-related info, hate speech, sending or sharing of unsolicited r malicious info
what did section 3 amended
unauthorised acts with intent to impair or with recklessness as to impairing, operation of computer
meaning of protecting users and their data
implementing robust security measures like encryption, strong password management, access controls, regular security audits, data backups and limiting data collection to only what is necessary. while maintain transparency with users about how their data is handled
what is copyright, designs and patents act 1988
protects the intellectual property of creators and gives them the rights to control how their work is used.
the rights of copyright, designs and patents act 1988
creators have the exclusive rights to copy, adapt, communicate, lend or sell their work. also control how their work is broadcast or publicly performed
what is the computer programs regulations 1992
regulation established in the UK, aiming to expand the level of copyright protection available for computer software, recognising them as subject to copyright as literacy works
what is fair dealing
acts which are permitted to a certain degree without infringing the work