social implications Flashcards
what is acceptable user policy or AUP
set of rules drawn up by management of company to protect company, network, devices and data from misuse
what are mobile offices
work at remore locations away from main offices by synchronising ICT devices
what is the aim of mobile offices
as few devices as possible so less must be transported
what are the disadvantages of mobiles offices
limitations of battery life and lack of power outlets
what is a virtual office
range of services offered by service prviders that gives appearance of that it physically exists onlince services are administered by service provider to interact with customers
why are virtual offices so useful
money can be saved
use of paper kept to minimum
documents shared using online storage resources
what is decentralistion of labour
employees have little need to perform jobs effectively in formal office environment
what is the advantageof decentralistion of labour
transport and office space costs are reduced
what are the disadvantages of decentralisation of labour
loss in cohesion and common business purpose when emplouees don’t have regular contact with each other
what can robotics do
complex machines perform dangerous, repetitive and distasteful jobs which are boring and risky for human workers
what are the advantages of robotics
reduces emplyee injuries caused by programming errors, mechanical failures and lack of worker vigilance
perform low-level tasks effectively
used in many indsutries
what is Artificial intelligence
helping machines find solutions to complex problems in human-like manner uses algorithms to have abstract thought pattern recognition and reasoning
what are unmanned aerial vehicles (UAV)
type of aircraft that oeprates without human pilot on board
what are the advantages of UAV’s
reduces labours cost
what is social engineering
manipulating people into divulging confidential informatnion with intent to commit computer fraud
what is shoulder surfing
attacker uses observational techninques to get informatnio whilst user inputs sensitive data close range or long range
what is dupster diving
use dumped items to get informatnion about company empolyee and network structure
what is reverse social engineering
attacker convines target might have problem in future and ready to help solve it
what is sabotage
corrupt system to appear to be corrupted after gaining access so that user looks for help to solve problem
what is marketing
attacker advertises himself as only person that can solve problem
what is support
attacker gains trust of target and obtains access to senisitive information
how is social media used for social engineering
hackers search for particular peron and create similar user with same details they must get the person to click on lint to install irus on target’s machine
what is a hacker
experts who create and alternate computer code and enter systems undetected
what are white hat hackers
non-malicious hackers test security of computer system by trying to break into it
what are black hat hackers
malicious hackers hack into system with intent to steal or vandalise
what are grey hat hackers
illegally break through system without authorisationto put vulnerabilitis on show and charge owner fee to repair it
what happens when hardware is stolen
software goes with it concern to security of computer/network
what is software theft
illegal copying,sharing or usage of copright protected programs
what is informatnion thefy
illefal copying or storage of confidential ,personal or financial informatnion
what is the thumb-sucking technique
informatnio nmoved to memory/USB drive, smartphone it is easy because flash drives are small and have large storage space
what is shraing data remotely
use remot access to transfer data to another location where it can be distributed
what are malware attack
capable of extracting sensitive informatnion
what is identity thefy
pretending to be someone else by essuming their identity to access resources
what is bandwidth theft
connect to internet via wireless router which don’t have permission to use
what is theft of time
employee accepts payment for work not done/time they should’ve spent doing work related tasks
what is theft of services
intentionally use service without paying for that service
what are safeguards against computer crimes
anti-malware and firewall surf and download safely never click ok or agree to close pop window update software reqularly store sensitve data securely secure passwords stay alert to scams be cautious about personal informatnion
what is fake news
news,stories and hoaxes deliveratly created to misinform or deceive readers
what is clickbait
stories fabricated to gaiin more wevsite visitors and increase advertising income
what does propagande do
deliberaltely mislead readers, promote biased point of view,political cause or agency
what is satire
used to create face news for entertainment value
what is sloppy journalism
publish stories with unreliable informatnio without checking facts
what is affiliation
who supports websift and if company is affiliated to provessional organisation
what is an audience
who it’s intened for and if content is appropriate for intended audince
what is authortiy
who is the author
what is content
content organised logically are links working and informatnion cited correctly
what is currency
is information up to data when was it update how up to date is it
what is design
easy to navigate visually plieasing view information properly webpage load easliy register and provide personal informatnio n
what is objectivity
does it reflect preconceptions mask for advertising how detailed is information does author use emotive language cite limited examples to support argument