Strands Flashcards

1
Q

1.1 Reliability & Integrity

A

Reliability - refers to the operation of hardware, the design of the software, the accuracy of data or the correspondence of data with the real world. Data may be unreliable if it has been entered incorrectly or if it becomes outdated. The reliability of machines, software, and data determines our confidence in their value

Integrity - refers to safeguarding the accuracy and completeness of stored data. Data lacks integrity when it has been changed accidentally or tampered with. Examples of data losing integrity are where information is duplicated in a relational database and only one copy is updated or where data entries have been maliciously altered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

1.2 Security

A

Security refers to the protection of hardware, software, machines and networks from unauthorised access. Security measures include restricted access to machines and networks for certain employees or to prevent access by hackers. THe degree of security of information systems largely determines society’s confidence in the information contained in the systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

1.3 Privacy & Anonymity

A

Privacy is the ability of individuals and groups to determine for themselves when, how, and to what extent information about themselves is shared with others.

At its extreme, privacy becomes anonymity when, for instance, a person uses it to conceal his or her true identity in order to cyberbully someone else. Conversely, excessive privacy could also conceal the perpetrators of criminal, terrorist, or computer hacking acts from law enforcement agencies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

1.4 Intellectual Property

A

Intellectual property includes ideas, discoveries, writings, works of art, software, collections and presentation of data, Copyright, trademarks, and patents exist to protect intellectual property. However, the easy and accurate duplication methods made available through IT can undermine such protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

1.5 Authenticity

A

Authenticity means establishing a user’s identity beyond reasonable doubt. Authenticating the user is crucial in many scenarios, particularly in business and legal matters. A simple example of authentication is a user login ot a network. A more advanced example would be the use of encrypted digital signatures in a business transaction or the use of watermarking on digtital photographs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

1.The Digital Divide & Equality of Access

A

The growth of the use of IT systems has led to disparities in the use of, and access to, information technologies. Disparities exist not only internationally between countries, but also within countries between different socioeconomic groups as well as within what may appear to be relatively homogenous groups. This may lead to groups or individuals without access to IT being disadvantaged. For example, while tele-learning may bring previously unavailable opportunities ot everyone’s doorstep, factors such as the cost and availability of hardware software, or access to the internet may create a “digital divide”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

1.7 Surveillance

A

Surveillance is the use of IT to monitor the actions of people. For example, monitoring may be used to track, records, and asses employee’s performance. It can be used to support claims for promotion or to ensure that employees follow the organisation’s internet policy appropriately.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

1.8 Globalisation & Cultural Diversity

A

Globalisation means the diminishing importance of geographical, political, economic, and cultural boundaries. IT has played a major role in reducing these boundaries. For example, any dramatic event anywhere in the world can be broadcast almost instantly by television or on the internet. However, the new “global village” may lead to the extinction of minority languages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

1.9 Policies

A

Policies are enforceable measures intended to promote appropriate and discourage inappropriate use relating to information technologies. They can be developed by government, businesses, private groups or individuals. They normally consist of rules governing access to, or use of information, hardware, software and networks. For example, a school policy on the use of IT would consists of each user signing and acceptable use policy. It would also address unlawful access to the network through, for example, identity theft or using hacking software, and how these transgressions would be treated. Many websites also require users to agree to specific policies before allowing access their services.
Policies also affect the exchange of information, for example, by making it subject to copyright laws and raising people’s awareness of plagiarism. In general, policies can promote or restrict access, guide behaviour, require the fulfillment of certain conditions prior to or during use, or need to be developed to address unforeseen issues such as cyberbullying.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

1.10 Standards & Protocols

A

Standards and protocols are technical rules and coverntios that enable compatiliity and therefore facillitae communicaion or interoperability between different IT systems and their components .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

1.10 Standards & Protocols

A

Standards and protocols are technical rules and conventions that enable compatibility and therefore facilitate communication or interoperability between different IT systems and their components. They might govern the design and use of hardware, software, and information. For example, the communication protocols used on the internet, the ASCII representations for characters, or the design of the printer port on a personal computer are all governed by standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

1.11 People & Machines

A

The use of IT systems brings sifniciant advantages, for instance in ease of use, being available 24/7, or through the use rather than exposing humans to a potentially hazardous environment. However, this can raise concerns about the rate at which technology is being introduced and issues that may arise from insufficient tesing in critical situations such as air traffic control. The ultimate fear of many people is that furutre systems wil be programmed to make decisions that would be better taken by humans, such as the decision to employ nuclear weapons.
There are also social impacts such as internet addiction, where popele feel that they can never get away from IT and are trapped on a “digital treadmil”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

1.11 People & Machines

A

The use of IT systems brings significant advantages, for instance in ease of use, being available 24/7, or through the use rather than exposing humans to a potentially hazardous environment. However, this can raise concerns about the rate at which technology is being introduced and issues that may arise from insufficient testing in critical situations such as air traffic control. The ultimate fear of many people is that future systems will be programmed to make decisions that would be better taken by humans, such as the decision to employ nuclear weapons.
There are also social impacts such as internet addiction, where people feel that they can never get away from IT and are trapped on a “digital treadmill”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

1.12 Digital Citizenship

A

Digital citizenship can be defined as appropriate behaviour that represents a responsible, ethical, and legal approach that individuals take in any situation with respect to the use of IT. Digital citizenship permeates, in one way or another, all of the preceding social and ethical considerations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly