1.6 Ethics

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/29

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

30 Terms

1
New cards

Data Protection Act

The law that protects personal data, ensuring it is stored safely, used lawfully, and you have the right to see and correct it

2
New cards

Data Protection Act infringements

Storing customer data insecurely

Selling client's personal data to a marketing company without their permission

3
New cards

Computer Misuse Act

Makes unauthorised access (usually called hacking), and creating or spreading viruses illegal

4
New cards

Examples of computer misuse

Accessing an employee's personal email account without permission

An employee installing a key logger on a collegues computer

5
New cards

Copyright Designs and Patents Act

A law to protect content creators, to ensure their intellectual property is not stolen or used without permission, covers software, music and films

6
New cards

Copyright design and patents act infringements

Using a picture for the a company logo without the original creator's permission

Making a copy of a movie and sharing it with a friend over the internet

7
New cards

License

You must have this, to use software created by someone else.

It makes sure the creators get paid/get acknowledged for the work they did

8
New cards

Open Source

The source code is distributed with the software

The customer can modify the source code

The customer can redistribute the source code (with the same licence / restrictions)

Can be free or paid software

9
New cards

Proprietary

Licence restricts the copying / modifying / distribution of the software (without permission of the copyright owner)

Source code not made available/ Only compiled code is published

10
New cards

Propriety software benefits to manufacturer

Stops competing companies copying their software

... and producing similar / better products.

...prevents reverse engineering code

Ensures compatibility as they can ensure that no modifications have been made

Can charge a fee

11
New cards

Source code

The high-level code for the application program, this is made public for open source software but remains a secret in proprietary software

12
New cards

Bespoke

Software that is specially designed and written for a single organisation or group of users

13
New cards

Legal issues when choosing software licence

Must abide by software licence

For open source, they will be able to make modifications / customisations to the system...

...but will probably have to make these modifications also available to other users (because open source)

And credit all previous contributors in the code

If off-the-shelf, will have to purchase off the shelf package legally - could be expensive

Software must be able to ensure all legal data protection requirements are met. (data protection act)

14
New cards

Environmental issues (use of smartphones example)

E-waste (people dispose of their devices in landfill even if they are in good working order)

Some equipment is sent abroad to be disposed of...

...Leads to excessive landfill (in this country and/or abroad, e.g. Africa and Asia)

Toxic waste released into land, ground water, air (in this country and/or abroad, e.g. Africa and Asia)

Waste of resources - precious metals in phones

Water consumption to manufacture

15
New cards

Ethical issues (use of smartphones example)

Contributes to ill health/lack of sleep...

...waste time -> less work

Contributes to the digital divide...

...access to internet compared to poor countries/communities

Contributes to social divide...

...elderly people less likely to use

Problem of confidential/private data stored on the devices...

...can be hacked/stolen

Puts social pressure on parents/society to pay for new devices...

...even when devices still work fine

Can lead to bullying of those who cannot afford the latest technology

Cyberbullying using social media/internet

Phone manufacturers intentionally designing fragile phones so they need to be replaced more often or slowing down phones using software updates

High cost of new devices....

...less money for essential items

Use of child labour/poor working conditions for mining of materials

16
New cards

Stakeholders (use of smartphones example)

Can adversely affect people in this country and abroad...

...health issues

...financially

....socially

....culturally

The phone manufacturers

The phone shops/networks

17
New cards

Technology involved (use of smartphones example)

The type of devices that are disposed of

Modern phones poorly designed for durability

Phones hardware not upgradeable/replaceable

Proprietary technology used by some manufacturers

18
New cards

Digital divide

The gulf between those who have ready access to computers and the Internet, and those who do not.

19
New cards

Legal issues (Designing a website/social media site example)

Adhering to the Data Protection Act

Rules of DPA

Keeping data secure...

...need for firewall

...anti-virus

Methods of restricting access...

...Intellectual property / copyright / licences

20
New cards

Ethical issues (Designing a website/social media site example)

Storing and access to personal information

Rules / terms set up before people can join

Consequences for misconduct made clear e.g. Cyberbullying

Plagiarism

Communication of inappropriate materials

Backing up to preserve / save data

Gaining parental consent for communication online for young users

E-Safety issues

Acceptable use policy - training appropriate use/malpractice

21
New cards

Online banking example - Impact on customers

•No need to travel to the bank - better for people with accessibility issues/don't drive

•24/7 access - Except for maintenance down time

•Access via mobile devices - convenience

•Instant decisions (credit cards, loans, etc.) - algorithms to decide - people may not like important decisions being handled by software

•Less personal service - some people prefer problems to be handled in person e.g. stolen cards

•Open to hacking - can use biometrics/2FA/secret answers to help with this

22
New cards

Online banking example - Impact on bank staff

•Job losses due to branch closures

•Creation of new job roles - more technical roles?

•New working practices - more use of digital technology, remote working

•Changes in required skill sets - Need to be digitally literate

23
New cards

Online banking example - Impact on bank

•Less overheads (staff, utility bills, rent, etc.)

•Targeted marketing - Can use customer info to advertise products (ISAs, current accounts etc)

•Data protection responsibilities - Must consider DPA and GDPR - can cost money in training/fines etc

24
New cards

AI in Healthcare example

Identify range of possibilities based on symptoms more quickly using software

Identify patterns in illness (one patient or multiple)

More accurate/automated/AI equipment - robot surgery, cancer scanning etc)

May miss some symptoms, or suggest incorrect results without human interaction

AI/Automated surgery e.g. can control from another country

...access to specialists who are not local

Technology may be subject to hacking

Error in software could have fatal consequences

May have little human interaction - feel uneasy

25
New cards

General environmental issues

Electronic waste: This waste contains harmful chemicals that can contaminate soil and water.

Energy consumption: increased greenhouse gas emissions and contributing to climate change.

Carbon footprint: contribute to the carbon footprint of the industry.

Data centres: consume large amounts of energy to power servers and cooling systems.

Mining for rare earth materials: Many components of electronic devices require rare earth materials, which are often mined in environmentally damaging ways.

Water consumption: The production of computer hardware requires a significant amount of water= water scarcity

26
New cards

General Ethical issues

Intellectual property, plagiarism and piracy (also links to legal)

Censorship

Access to and sharing of inappropriate content

Online bullying/harassment

Effect on mental/physical well being

Digital divide - access to healthcare, education and latest technology

Privacy of information - identity theft, cyberstalking, use of data, consent, safety

27
New cards

General privacy issues

- Data Collection: Platforms collect extensive personal data, often beyond users' awareness.

- Informed Consent: Users may not fully grasp privacy policies, leading to uninformed consent.

- Third-Party Sharing: User data is frequently shared with advertisers or partners.

- Data Breaches: Platforms are vulnerable to cyberattacks, exposing sensitive user information.

- Targeted Advertising: Collected data creates profiles for targeted ads, potentially influencing behavior.

- Permanent Footprints: Deleted data may still be stored or accessible, raising privacy concerns.

- Government Surveillance: Governments may access user data without their knowledge for law enforcement.

- Limited User Control: Users often struggle to control how their data is used, shared, or deleted.

28
New cards

General social and cultural concerns

Social impacts: Affects relationships, communication, and social norms.

Cultural impacts: Alters beliefs, values, and practices.

Privacy: Increased personal data online risks identity theft, cyberstalking.

Bias: AI/algorithms may perpetuate biases, leading to discrimination.

Cybersecurity: Threats to personal data and critical infrastructure.

Digital divide: Unequal access to technology increases inequality.

Intellectual property: Digital content raises concerns about protection.

Online harassment: Easier to bully and harass, especially on social media.

Automation: Job displacement in certain industries due to technology.

Job roles: Need for higher skills, difficulty in retraining.

Social norms: Changes in communication and work practices.

Radicalisation: Concerns over online extremism growth.

29
New cards

General legal concerns

Conforming to DPA...

...keeping data secure - use of firewall,encryption

...not backing up data

...deleting after a certain amount of time

Conforming to Computer Misuse Act...

...don't access data/systems when unauthorised

Conforming to Copyright Designs and Patents Act...

...Software licences, piracy, Intellectual Property.

30
New cards

Ethical Long Answer Questions Categories

- Social

- Cultural

- Ethical

- Legal

- Environmental

- Privacy