Unit 9 - Legal, moral, ethical and cultural issues Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

what are the four main acts we need to know

A
  • data protection act 1998
  • computer misuse act 1990
  • copyright design and patents act 1988
  • regulation of investigatory powers act 2000
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is the data protection act

A

anyone who stores personal details must keep them secure. it controls the way data about living people is stored and processed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what are the 8 principles under the data protection act

A
  1. be fair and lawful
  2. relevant and not excessive
  3. accurate and up to date
  4. only kept as long as needed
  5. only used for the stated purpose
  6. be kept securely
  7. handled in line with peoples’ rights
  8. not to be transferred to countries without protection laws
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is the computer misuse act

A

makes it an offence to access or modify computer material without permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what are the three main principles of the computer misuse act

A
  • unauthorised access to computer material
  • unauthorised access with intent to commit or facilitate a crime
  • unauthorised modification of computer material
  • making, supplying or obtaining anything which can be used in computer misuse offences
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is the copyright designs and patents act

A

this protects creators of books, music, video and software from having their work illegally copied. It applies to all forms of copying.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what are not able for protection under the copyright designs and patents act

A

algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what are some ways of protecting
data from being copied

A
  • the user must enter a unique key before the software is installed
  • some software will only run if the CD is present in the drive
  • some applications will only run if special piece of hardware called a ‘dongle’ is plugged into a USB port on the computer
  • tools used to create software may require fees if the software is then sold
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is the regulation of investigatory powers

A

regulates the powers of public bodies to carry out surveillance and investigation, and covers the interception of communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what are the principles of the regulation of investigatory powers act

A
  • enables certain public bodies to demand that an ISP provide access to a customers communications in secret
  • enables mass surveillance of communications in transit
  • enables certain public bodies to demand ISPs fit equipment to facilitate surveillance
  • enables certain public bodies to demand that someone hand over keys to protected information
  • allows certain public bodies to monitor people’s Internet activities
  • prevents the existence of interception warrants and any data collected with them from being revealed in court
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what are issues with using computers in the workforce

A

computers can complete a task by making decisions based on conditions set by a human. therefore, the conditions may not represent all possible situations meaning people may be unfairly disadvantaged or advantaged

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

pros and cons of automatic systems

A

operates without a human providing inputs for each operation
pros: time-saving
cons: ethical issues - price, access to electricity = development inequality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

examples of autonomous machines

A

AI and machine learning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

pros and cons of autonomous machines

A

pros: self sufficient, require no human intervention, learn and adjust to their changing environment
cons: ethical questions, lack of ownership for responsibility (machine or programmer)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is algorithmic bias

A

the measure of error that shows how far away the actual output is from the predicted output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is prediction bias

A

the algorithmic bias is significant when the model has not reflected the real-world relationship between the input data and what the model predicts. therefore it is said to have prediction bias

17
Q

what are environmental effects of technology

A

mainly disposable technology

18
Q

positive opportunities of devices on the environment

A
  • monitoring vegetation, wildlife and pollution
  • energy monitoring
  • transport
19
Q

manufacturing devices impact on the environment

A
  • planned obsolescence (devices are made to become unfashionable or unsusuable)
  • rare materials
  • mining
  • energy use
  • pollution
20
Q

energy consumption effects on the environment

A
  • data centres
  • energy waste
21
Q

disposal of devices effect on the environment

A
  • e-waste
  • leaching
  • run-off from land fills
22
Q

problems with collecting and analysing data

A
  • companies obtain data from literally anything people do online if cookies are not in place
  • however some of this data can help transform society
23
Q

problems with monitoring and surveillance

A
  • ‘nothing to hide’ argument
  • scale
  • encryption
24
Q

problems with hiding to avoid detection

A

the decentralised nature of the internet and the use of encryption and VPNs has enabled more people to hide their activity in order to avoid detection:
- bypassing censorship by governments
- piracy = peer to peer networks
- offensive communications

25
Q

what is a digital footprint unhelpful

A

the way data is represented can reveal more than a person originally intended (metadata)
- exploitations by criminals

26
Q

why is it important for systems to be accessible

A
  • accommodates for all people
    for example: visual impairments, motor difficulties, learning disabilities and deafness
27
Q

why is cultural aspects important in web design

A

different cultures have different expectations it digital content.
for example:
- read left to right in UK
- implication of colours (red dangerous in some cultures but in others means good luck)

28
Q

why is using colour to signify meaning inadvisable

A

can cause difficulties to users with colour difficulies

29
Q

why are character sets important in web design

A

accessibility to all languages so all users can express themselves