Module 3 Flashcards
Where does technology play a significant role in human activities?
Education: e-learning
Economic/Economy: e-commerce, e- business, online shopping, e-governance, telecommuting
Entertainment: culture, gaming
Health Care: e-surgery
Safety and Security: Privacy, surveillance
——-
What are some IT/Cybersecurity threats/crimes?
electronic eavesdropping; cyber terrorism, cyber
bullying, hacking; identity theft, spoofing, phishing, hardware theft and vandalism, piracy, information theft, spam, denial of service, pharming, propaganda, industrial sabotage.
How can hardware and software be vulnerable to cybercrime/ or damage?
Hardware: Theft, Vandalism, Destruction
Software: Glitches, Misuse, Abuse, Tampering, Bugs.
What are some other computer crimes?
Identity theft: Stealing one’s identity,
Manipulation of information to give false representations/ Disinformation
Invasion of privacy
Phishing: This is where a target is contacted by email, text message by a person posing as a legitimate institution to lure them into providing sensitive data
Pharming: This is where the traffic of a website is manipulated and confidential information is stolen.
+++++
What are some mitigation strategies to these cybercrimes/theft/destruction risks?
disaster recovery plan, backup;
uninterruptible power supply (UPS); surge
protectors, firewalls; authentication: usernames,
passwords, key cards, biometric devices, encryption, anti-virus.
Transaction Log: Records everything done in the database.
Intrusion Detection Software: Intrusion detection involves the process of identifying attempts to penetrate a system and gain unauthorized access.
Audit trails: Maintain a record of system activity and user activity. It records interactions with tools and procedures.
What are some policies and practices that can safeguard an organization’s information?
Internet policies:
Educating staff on malware
Email policies: Follow the rules regarding sending emails.
Security measures: Firewall, Biometrics, Physical protection, Access Control.
What are some health and safety risks
Carpal Tunnel Syndrome: A condition in which the median nerve is compressed at the wrist, leading to pain, numbness, and muscle weakness in the hand.
CVS (Computer vision syndrome): A condition where someone is experiencing eye and vision problems due to computer use. This can happen when constantly using the monitor for a long period in a poor lit area.
Repetitive Strain Injury: Repetitive strain injury is damage to your muscles, tendons or nerves caused by repetitive motions and constant use.
Computer addiction: A disorder in which an individual turns to the internet/games to change moods, overcome anxiety and reduce isolation or loneliness.
~~~~~
What are computer security risks?
Computer security risks including Internet and
network attacks, unauthorized access and use,
hardware theft and vandalism; software and
information theft,
What are some environmental risks?
High energy consumption
Environmental pollution
Air pollution
What are some intellectual properties?
Copyright: Copyright is the legal ownership of intellectual property such as original works of fiction and non-fiction and conveys the right to control its reproduction and distribution.
Patent: A patent is a right granted to the owner of an invention that prevents others from making, using, importing or selling the invention
Trademark: A sign that you can use to distinguish a business’ goods or services from those of other trades.
What are some licensing arrangements?
- Open Source Software
Definition: Software whose source code is freely available for modification and redistribution. - Proprietary Software
Definition: Software owned by a company or individual; users cannot modify or redistribute it. - Freeware
Definition: Software that is free to use but not open source. - Shareware
Definition: Software distributed freely on a trial basis, but requires payment for continued use. - Software Licensing Agreements
Definition: Legal contract between software provider and user.
Product Activation
Definition: Process of verifying a legal copy of software (to prevent piracy).
Digital Rights Management (DRM)
Definition: Technology to control the use of digital content.
What is plagiarism? and the types?
Plagiarism is the act of using someone else’s work, ideas, or intellectual property without proper acknowledgment, presenting it as one’s own.
(e.g. word-for-word, paraphrasing, failure to cite,
incorrect citation, claiming sole ownership),
digital media as intellectual property.
What are some negative implications of plagarism?
Destroyed students reputation- Plagiarism allegations can cause a student to be suspended or expelled.
Destroy Professional Reputation: A professional business person, politician, or public figure may find that the damage from plagiarism follows them for their entire career.
Destroy Academic Reputation- Once scared with plagiarism allegations, an academic career can be ruined.
Legal Repercussions- The Legal repercussions of plagiarism can be quite serious, some plagiarism may also be deemed a criminal offense, possibly leading to a prison sentence.
Plagiarized Research- If the research is medical in nature the consequences of plagiarism could mean the loss of people’s lives. This kind of plagiarism is particularly heinous
What are the consequences of software piracy?
If caught, they can be held liable under civil and criminal laws.
The owner can seek injunction that can stop the distribution of the pirated software, and seek compensation. (damages cost).
Developers lose revenue.
What are the implications of interacting with the online environment?
Positives: Global connectivity, Enhanced communication, Community building
Negatives: Cyberbullying and harassment, Misinformation, Isolation and addiction
Lack of privacy, Adult content
What is wearable computing
Wearable computing refers to electronic devices worn on the body that integrate computing, connectivity, and sensor technologies to enhance user experience. These devices are becoming increasingly important in healthcare, fitness, communication, and workplace efficiency.
What is HMI?
HMI, or Human-Machine Interface, is a user interface that allows operators to interact with machines or processes.
What are some examples of HMI
Customer service bots, Chatbots, ChatGPT, Siri, Google Assistant Bumass generative AI
ATMS, Reservations, Virtual nurses