anonymity
anonymous; total privacy, or hiding their identity
authenticity
a user proving their identity to gain access to a computer system.
compatibility
idea that two systems work together and can share hardware, software, or data.
cultural diversity
the existence of a variety of cultural or ethnic groups within a society
cultural impact
historical, geographical, and familiar factors that affect assessment and intervention processes.
digital citizenship
being a good citizen on the internet
economic impact
the effect of the event on the economy in a specified area
environmental impact
Possible effects caused by a development, industrial, or infrastructural project or by the release of a substance in the environment.
equality of access
the concept that all persons should have equal rights of access to anything they desire.
ergonomic impact
the science of refining the design of products to optimize them for human use. (i.g. weight, height, hearing, sight, etc.)
globalization
the process by which businesses or other organizations develop international influence
health impact
a combination of procedures, methods, and tools by which a policy, program, or project may be judged as to its potential effects on the health of a population, and the distribution of those effects within the population
integrity
the quality of being honest and having strong moral principles
intellectual property
creations of the mind, such as stories, films, music, and computer programs.
legal impact
an unnecessary discriminatory effect on a protected class caused by a practice or policy
policies
rules designed to control the way people use IT.
political impact
The effect that government policy and its administrative practices can have on something
privacy
the ability to control how data about us is used.
protocols
technical rules that designers of hardware and software should follow
psychological impact
the effect caused by environmental and biological factors
reliability
how well the computer system works.
security
concerned with protecting IT systems from unauthorized users.
standards
a level of quality
surveillance
used IT to monitor people - with or without their knowledge or permission
the digital divide
the gap between demographics and regions that have access to modern IT.
unauthorized access
a person gaining access on the website, program, server, service, or other system using someone else's account or other methods.