Section 7-Issues Flashcards
What are computer ethics?
Moral guidelines that govern the use of computers and information systems
What is a computer addiction?
A growing health problem that occurs when the computer consumes someone’s entire social life
What are ethical issues?
Issues that would be considered right or wrong by society
What are legal issues?
Issues which are actually right or wrong in the eyes of the law
What are environmental issues?
Issues about how we impact the natural world
How have smartphones raised ethical issues?
Smartphones have allowed us to keep in touch much more easily, but have also allowed people to neglect face-to-face interactions. Some might say this is making people more rude and less sociable
How have wearable technology raised ethical issues?
It has many positive effects-for example, wireless headsets may stop people from using their phone while driving and fitness trackers can help promote healthy lifestyles. However, it can also cause problems-for example, smart glasses with built-in cameras have sparked controversy because it can be seen as invasion of privacy
How have computer based implants raised ethical issues?
(Chips that are surgically inserted into the body) may become more common in the future. They could allow better monitoring of our health and may make our daily lives more convenient, but will likely be expensive and may lead to less privacy
What is digital divide?
People who have limited access to technology are divided from those that have a greater access to new digital technology
How does the internet create issues in technology?
The internet gives people greater anonymity, which can enable anti-social and abusive behavior.
For example;cyber bullying is when somebody uses the internet to deliberately intimidate, insult or humiliate someone.
Another example is trolling. This is where somebody tries to cause public arguments with others online, only making comments which frustrate other people for amusement or to gain attention
How does technology change how we access services?
1) The ability to wirelessly stream music and television has allowed customers to access media conveniently and cheaply, either for free or through a subscription service. But users of these services often do not own what they are paying for and they can lose access to it easily
2) The rise in popularity of smartphones has lead to certain apps becoming very successful; like Uber
3) These services are often cheap and convenient, but they draw customers away from traditional businesses. Also they may be more risky for customers as they are not necessarily regulated as strictly as traditional businesses were
4) There are also many computing services that are now offered for free-eg;cloud storage and webmail. Often these services will have limited access however if you want the premium version which will cost more money. This can lead to digital divide
5) This type of business model can also be seen in mobile games- however some say that these games can exploit How have wearable technology raised ethical issues?people with more impulsive spending habits
How is technology changing the way businesses operate?
1) A lot of businesses nowadays expect people to be able to use technology and access services online. For example, employers may expect people to be able to apply for jobs online, and many require employees to have basic computer skills
2) The popularity of mobile devices has lead to some businesses insisting that employees carry a smartphone with them at all time so they can always be contacted. people who do not have a mobile device are at a disadvantage
3) Some companies have gone as far as offering their employees computer chip implants that are used to open security doors and access their computer but this idea is seen as unethical
4) Marketing and advertising have been greatly affected by new technology. Pop-ups appear all over the internet and targeted adverts are shown to people on social media sites. Most of these free services are funded by advertising for money so if everyone uses an Adblocker, then the company will have no money to invest into online advertisements and promotions.
How is it hard to keep information online private?
1) Some websites require personal information in order to set up an account and social media websites actively encourage users to post more personal information.
2) Users usually agree with a privacy agreement before you use online websites and service however not many people actually read this, so they are unaware to what they are agreeing to.
3) Companies can do a lot of things with your information as long as it lies within the bounds of the agreement. They may make your information available to other people, so that you might be targeted by specific advertisements related to your searches.
4) Users can make their information private if they do so in the settings of these sites
5) Users have to trust companies to keep their data safe.
What is computer surveillance?
When someone monitors what other people are accessing on the internet
Why does the government use surveillance?
Government security services may use packet sniffers and other software to monitor Internet traffic, looking out for certain key words or phrases that might alert them to illegal activities, terrorism, etc.
What is internet censorship?
When someone tries to control what other people can access on the internet. Some countries’ governments use censorship to restrict access to certain information
Give an example of one of the strictest countries for censorship?
-China
In China, they restrict access to websites which are critical of the government. They also censor many major foreign websites like Facebook, YouTube and Twitter.
What are peoples’ opinions on censorship and surveillance?
Some people support them in some form, eg; to protect children or to stop terrorism. Others are completely against them, including several non-profit organisations which campaign against what they call cyber censorship and mass surveillance
What are the laws that control the use of your personal data?
1) When an organisation stores someone’s personal data on their system, that person is entitled to certain rights, stated in the data protection laws
2) Before collecting personal data, an organisation must register with the government, saying what data they will collect and how they will use it
3) Organisations have a legal obligation to have good cyber security on their network to keep personal data secure
4) Companies that use cloud storage to store personal data must ensure the service is trustworthy and reliable.
What is the Computer Misuse Act?
The Computer Misuse Act was introduced to stop hacking and cyber crime. It introduced these three new offences:
- Gaining unauthorized access to a private network or device like hacking can get you a fine or prison sentence
- Gaining unauthorized access to a network or device in order to commit a crime, like stealing data or destroying the network
- Unauthorized modification of computer material-eg; deleting or changing files. The act also makes it illegal to make, supply or obtain malware
What is cyber crime?
Cyber crime refers to any illegal activity that involves computers
What is Hacking?
Hacking refers to gaining access to a system by exploiting weaknesses in its security. This is usually done to steal and destroy data, or to infect the system with malware. However, some companies employ ‘good’ hackers to identify vulnerabilities through penetration testing.
What are the different methods hackers use to attack system?
There are 4 different methods:
- Passive attacks- monitoring data on a network
- Active attacks- using malware or other means to attack a system directly
- Brute force attacks- using automated software and trial-and-error to crack passwords
- Denial-of-service attacks- preventing people from using a network by flooding it with useless traffic
What is the Copyright, Designs and Patents Act?
An Act which protects intellectual property (anything someone has created, e.g. a novel, a song, software , a new invention) from being copied or stolen by other people