social and ethical issues LU8 Flashcards
economic reasons for using computers
quicker and more accurate
reliable,efficient
makes globalised business possible-communication through internet
saves paper
productivity increased-cost effective,efficient,more reliable,replaces manual labour
why is there digital divide
lack of infrastructure
poverty and no access to basic necessities
lack of education,basic literacy and schooling facilities
politics- civil wars and violence-no time for divide. internet taken away in wars
how do we bridge the digital divide
improving infrastructure
reduced poverty
improved education
introduce cellphones,easier than computers
what is ergonomics
Hardware that is designed with the user in mind
sore thumb syndrome
texting and making many repeated movements limiting blood circulation
what is RSI and how does it occur
repetitive strain injuries
occurs from repeated physical movements that cause damage
symptoms of RSI
damage to tendons,nerves,muscles +other soft body tissues
tightness,discomfort,tingling,coldness,numbness,stiffness,soreness,burning,pain IN hands,wrists,fingers,forearms,elbows,upperback,shoulders+neck
what makes you more likely to develop injuries with texting
using incorrect typing techniques or body positions
what is CTS
carpal tunnel syndrome
a painful condition involving the median nerve, flexor tendon + transverse carpal ligament.
how does CTS occur
as you move your hand + fingers - the flexor tendons rub against the sides of the tunnel created by the carpals and transverse carpal ligament.
The rubbing causes irritation of the tendons causing them to swell, which applies pressure to the median nerve.
how to treat CTS
splints and braces
anti inflammatory medication
cortisone injections
surgery
what are the effects of CTS
tingling
numbness
debilitating pain
how do you prevent eye strain
take frequent breaks from viewing the computer
test eyes regularly
how is eyestrain caused
continual refreshal of CRT screens and detectable flickering
amount of time spent on computers
how much of the world’s electricity is used by computer systems
between 5 and 10 percent
physical problems caused by computers
sore thumb syndrome
repetitive strain injuries
carpal tunnel syndrome
eye strain
how to recycle computer components
take to reliable IT waste disposal centre
what to do with printer cartridges
if cannot be refilled, dispose at printer cartridge store or IT waste disposal centre
how to practice green computing
upgrade components of new device before buying to extend life of device
recycle computer components
reduce amount you print
check manufacturing company’s green manufacturing policy and commitment to minimise waste during manufacturing of devices
green computing
- designing , engineering, manufacturing or disposing computer components in a way that reduces their environmental impact
effect of technology on workplace
-video conferences instead of face to face meetings
-mass storage devices instead of file rooms
access to information is simplified (efficiency and productivity increased)
acceptable user policy
set of rules drawn out by management of a company to protect company, its network and data from misuse - outline how network + internet should be used in a company
employees have to sign AUP
eg. usb ports on all networked computers, strict policies w size pf attachments in emails
mobile office
caravans/shipping containers customised to include comfortable working space + equipment to connect to internet
for need to work at remote locations, can be done w ability to synchronise necessary ICT devices
virtual office
range of services (video conferencing, customer contact) offered by service providers that give business appearance that it physically exits
using laptop, mobile devices and internet access
decentralisation of labour
as employees don’t have to physical work in an office environment, labour becomes decentralised
transport and office costs reduced
loss in cohesion and common business
robotics
study of complex machines that perform dangerous, repetitive or distasteful jobs that are boring or risky for human workers
reduce employee injuries
AI
artificial intelligence
branch of science which deals with helping machines find solutions to complex problems in a more human-like manner
involves borrowing characteristics from human intelligence and applying them as algorithms in computer friendly way
UAV
unmanned aerial vehicles
type of aircraft that operates w/o human pilot on board eg drone
used for pest and weed control, military, farming
cuts down labour costs
social engineering
act of manipulating people into divulging confidential info w view to commit fraud or gain unauthorised computer access
shoulder surfing, dumpster diving, phishing, role playing, use of social media
shoulder surfing
attacker uses observational techniques to get info while user is inputting sensitive data
combat- privacy screens
dumpster diving
large orgs dump items w company info into public dumpsters - attacker can use these items to get info abt company, employees, network structure
phishing
convincing email sent to user requesting user to click on link that will take user to spoofed website which requests user to enter sensitive info
persuades user to disclose confidential personal data
role playing
attacker convinces target that he has a problem or will have a problem, and that attacker is only one who can solve it
use of social media
hackers create a profile using someone’s details and will send friend requests to cloned persons friends w message that old account is wrong
then gets access to friend and clones friend account and send request to og account that was hacked- nos has access to them without person “accepting random ppl”
hackers types
white hat hackers: non-malicious (company employees that test security system)
black hat hackers/crackers: malicious, hack w intent to steal/vandalise
grey hat hackers: sometimes act illegally
theft
hardware theft- if hardware stolen/software goes w it , costly
software theft-illegal copying,sharing or usage of copyright-protected software programs
information theft: illegal copying or storage of confidential,personal or financial information (passwords, algorithms, databases). data can be moved to thumb drive (thumb sucking), transmitted through emails, printed
identity theft: person pretends to be someone else by assuming their identity to access resources or obtain benefits in persons name, fraud
bandwidth theft- connecting to internet through wireless internet router that you do not have permission to use
theft of time: employee accepts payment for work not done
theft of services: intentionally use service without paying
safeguard against cyber crimes
install firewall/anti malware
surf and download safely
update software regularly
never click agree on pop-up window without knowing what you agreeing to
use updated web browser
be wary of email attachments+ links
store sensitive data securely w secure passwords
never log into financial accounts from public computers
fake news
news,stories or hoaxes created to deliberately misinform or deceive readers
clickbait- deliberately fabricated to gain more visitors and increase advertising revenue
propaganda: deliberately mislead to promote biased view
satire/parody- fake news for entertainment
sloppy journalism- unreliable info
evaluating website
affiliation (who supports it, bias?)
audience (look at language- who is it intended for, appropriate?)
authority (qualifications of author, publishing institution reputable?)
content (chronological, working links, cited correctly?)
currency ( up to date? produced date, updated date?)
design (easy to navigate and view, load easily, requires registration ?)
objectivity (preconceptions, mask for advertising-bias, emotive language, limited examples cited?)
approaches to green computing
- manufacturing, designing or disposing computers components in a way that reduces their environmental impact
- use: minimise electricity consumption
- disposal: repurpose/reuse or recycling/disposing correctly
- design: design energy efficient devices
- manufacturing: reduce waste
make computer greener
sleep mode when away from computer
turn off computer at end of the day
upgrade instead of buying new
activate power management features
positives of computers
- less paper
- easier communication (globally- advance business) - reduce need to travel- travel costs, road wear and tear+ pollution decreased
- makes production processes more efficient
- accessibility + mobility- can work anywhere- increased productivity
disadvantages of tech on environment
-overconsumption of energy
hazardous materials in devices- disposed of incorrectly
-ink cartridges pollute soil and water
-highly toxic dumping grounds for technology
-average lifespan of an electronic device is 2 years
benefits of AI
-medical care + research
-self driving cars
-tracking wildlife to prevent extinction
-predict occurrence of natural disasters
-fight spam email
-protect national security
-less room for errors
-improved efficiency
-takes risks instead of humans
-faster decision
AI cons
high development cost
unemployment
makes humans dependent
lack of creative thinking
bridge digital divide
digital literacy classes, make technology more affordable, donate old digital devices, improving infrastructure + education
tech improve education
provide those who cannot enroll in school/uni access to free online courses
tech improve poverty
create jobs, allow entrepreneur to reach wider market and create opportunities
smart cities
create more efficient buildings and streets
urban area where technology and data collection help improve quality of life as well the sustainability and efficiency of city operations
tech improve transport
electric cars- reduce CO2 emissions
sensors in roads- monitor parking + traffic to reduce congestion
self driving cars
tech improve public safety
LBS emergency communications + apps
tech improve healthcare
efficient electronic medical records (EMRs)-access anytime anywhere
blockchain technology resolve counterfeit drug prevention
IoT wearables provide user generated health data
sexual offences act
prohibits prostitution, brothel-keeping and procuring and procuring pf minors over the internet
electronic communications and transactions act
( excluding voice communications)
you can be held responsible for any electronic communication signed by you and used for/against you in a court of law
protection from harassment act
gives victims of harassment an effective solution when they are being subjected to harassment against behaviour
cyber bullying
bullying that takes place over digital devices, causing embarrassment or humiliation
Protection of Personal Information Act
POPIA
- protects obtaining of personal info in a lawful + fair manner
- info can only be used for the specified purpose it was obtained for
deep web advantages
increased depth + thoroughness of content not accessible by search engines
more efficient search engines, retrieve higher quality, more relevant content
deep web disadvantages
search engines are slower
search string needs to be precise
ethical dilemmas- returns personal info from normally restricted databases
risk of encountering illegal, harmful + criminal activity
dark web advantages
difficult to block
helps ppl to maintain privacy + freely express their views
allows undercover police officers to communicate
dark web disadvantages
slow speed due to multiple layers of encryption
easier to commit crime
can be used to violate privacy of others
may expose computer to sites designed to spread malware or hack your computer