Technology And The Digital Age Flashcards
Big data process
1) collect unstructured data from a variety of sources
2) process it
3) clean in, remove any unwanted or duplicate data
4) analyse it
Why is big data important for businesses
UBER
Allowed them to monitor which features of the service were most popular and so services and funds could be directed there allowing for DYNAMIC PRICING
Netflix
Allowed them to predict demand by looking at consumer searches
What are the pros of social media
1) increase brand presence, posts on a brands Facebook page can reach 10% more people
2) Increase brand loyalty, 66% of users between the ages of 18 and 24 are more loyal to the brands they follow on social media
3) Increase sales, 25% of people buying a new vehicle use twitter to help inform them of the decision. In a survey of more than 600 senior marketers, 39% said they saw medium ROI increase from organic social media posts
What are the pros of the meta verse
Safer, eg Travis Scott Fortnite concert
Fashion, adidas, if consumer buys shows irl then they get them in the meta verse, allows consumers to try on clothes
Education
Work
Cons of the meta verse
Addiction
Distorted reality
Mental health
What are digital ethics
Moral principles that govern a persons behaviour, how should we handle data and new technologies in a responsible manor
Describe ethics of data, algorithms and practice
Data, how we generate, record and share data
Algorithms, how we interpret data via AI, machine learning and robots
Practice, Devising responsible innovation and profession code to guide science
What are the 4 principles of data ethics
Transparency, privacy, intentions and outcomes
What is cryptocurrency
A digital currency that is secured by cryptography and on decentralised networks based on a blockchain
What is the process of producing bitcoin
Computer power solves maths problems that produce bitcoin called mining
How is bitcoin stored
In a digital wallet as keys
What are the pros of bitcoin
-Decentralised system so lower risk
-Easy and fast movement of funds
-Can be used to transfer money across boarders for a lower cost
-The blockchain makes it secure and transparent
What are the cons of bitcoin
-Not completely anonymous, leaves digital traces behind
-Crypto wallets can be hacked
-High price volatility
-Few legal protections
What is Cyber Terrorism
Unauthorised access to a network or system by a third party
What are the three types of cyber terrorism
Simple unstructured-basic attack, using tools created by someone else
Advanced structured-sophisticated attack, against multiple systems, creates own hacking tools
Complex coordinated- coordinated attack causing mass disruption against integrated defences eg cryptography
What is malware
Malware breaches a network through a vulnerability eg a link on an email
What is phishing
An attacker will impersonate a trusted contact and send links containing malware so they can gain access to confidential information
Describe ‘man in the middle’ attacks
Hacker will intercept a call and steal personal information
What is a denial of service attack
Attackers target systems and networks and flood them with traffic to exhaust them of bandwidth so the website is overwhelmed and shuts down
Why does fake news happen on social media sites
Social media is an environment where everyone can publish without editorial oversights and more and ore people are using it as a source of news, furthermore users are polarised and only shown content that they like
What are some impacts of misinformation
-influences political decisions
-health related decisions like vaccines
-confusion and doubts about prior knowledge
What is digital addiction
A harmful dependence on digital media and other high tech devices