8 Ethical, legal and environmental impacts of digital technology on wider society

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/14

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

15 Terms

1
New cards

Ethical issues

What would be considered right and wrong by society

2
New cards

Legal issues

What’s actually right and wrong by law

3
New cards

Environmental issues

What the impacts would be on the natural worls

4
New cards

Legislation

  • Data Protection Act 2018

  • Computer Misuse Act 1990

  • Copyright, Designs and Patents Act 1988

5
New cards

Data Protection Act 2018

Data must be…

  • Fairly and lawfully processed

  • Used for specific purposes only

  • Adequate, relevant and not excessive

  • Accurate and up-to-date

  • Not to be kept longer than necessary

  • Kept secure

6
New cards

Computer Misuse Act 1990

States that these are illegal:

  • Unauthorised access to computer material

  • Unauthorised access with intent to commit or facilitate a crime

  • Unauthorised modification of computer material

  • Make, supply or obtain anything which can be used in computer misuse offences (e.g. production and distribution of malware)

7
New cards

Copyright, Designs and Patents Act 1988

Designed to protect the works of companies and individuals from being illegally used, copied or distributed.

(“Works“ include books, music, images, video and software)

8
New cards

Privacy

Citizens value their privacy and may not like it when governments/security services have too much access.

However can governments/security services keep their citizens safe from terrorism and other attacks if they don’t have access to private data?

9
New cards

Cyber security and hacking

  • Encryption is used to secure data but cyber criminals also use it to protect their data from governments and law enforcement agencies. So should security services have access to everyone’s encrypted data in order to protect the majority from the few? - Privacy vs crime prevention.

  • Increased communication technologies means more sensitive information is sent electronically - people need to be careful.

10
New cards

Mobile technologies

E.g. smartphones and laptops

  • They switch through one network to another as they roam through various regions - an unprotected network connection can allow a hacker to intercept data like passwords or bank details.

  • Phishing scams happen a lot through SMS messaging as well as standard email.

  • Police have access to mobile cell data and can thus track its movement - no privacy however it is commonly used in crime intervention and as evidence in legal cases.

11
New cards

Wireless networking

  • Could be eavesdroppers in an unsecured network, looking to capitalise on any sensitive data that may be sent.

12
New cards

Cloud storage

Cloud storage = remote storage accessible via the internet.

  • Increased security risks as more data is shared over a connection.

  • High bandwidth required to access data and is not universally available

  • Fewer cars polluting the road as people can work from home rather than having to travel

  • Can be accessed from anywhere in the world with an internet connection

  • Easier to share data with others

  • Backup is arranged by the cloud storage provider

13
New cards

Wearable technologies

E.g. heart rate monitors, health trackers, smart watches and smart glasses/visors

  • Costs of health insurance or health bills may decrease if health is monitored - widens the divide between those who can afford and cannot afford digital technology

  • Has to be accurate in recording health etc - could lead to blame?

  • When monitoring, screen time on mobiles increases, reducing time spent with family

14
New cards

Computer based implants

E.g. microchips inserted under the skin, cochlear implants and pacemakers.

  • Chips could bring health advantages - e.g. monitor and alert a wearer to a current risk of a heart attack or a farm could track livestock movements.

  • But, can data ships be hacked/manipulated?

  • Who owns the data on the chip and who has access to the data?

  • Do chips communicate with outside networks?

  • What laws are in place to define what is legal in implanting and using chips?

  • Will it always be voluntary to be “chipped“ - is it ethical?

  • Are chip implants forbidden by some religions?

  • Will ethical and moral procedures be breached by hackers?

15
New cards

Autonomous vehicles

  • What if a pedestrian suddenly appears on the road? If the brakes are applied hard the risk turns onto the passengers - is this ethical?

  • Who takes the blame if an accident occurs? The programmer, the manufacturer, the driver or someone else? What if the driver had a setting for a driver preference which increases risk for some while reducing it for others. This is a legal issue.

  • Issues in battery production and the generation of additional electrical power required to run a nation of electrical vehicles also needs considered - environmental issues

  • Privacy - location tracking for navigation and security?