negitive effects disposal of digital devises have on eviroment
all the toxins are infesting soil and water, thus contaminating wildlife, livestock, and crops. These toxins are then being passed around the food chain.
2
New cards
Upgrade Culture
refers to cycle replacing our phones every few years with latest products
3
New cards
negative effects with upgrade culture
we are disposing of so many phones a year it having a huge effect on envorment in manufacturing to.
4
New cards
rare materials
some componenets of phones cannot be created without all 70 of the rare materials so we are having to mine huge holes to find these items
5
New cards
Impact of mining
wildlife habitat's are completely destroyed and some mining supports child labour. mining i very hazardous
6
New cards
energy waste
energy waste translates into greenhouse gass' which contributes to pollution and climate change
7
New cards
disposal of products
they cannot be burnt because harmful gas' are released and theres only small ways to reuse them in new phones.
8
New cards
ethical reasons associated with collection and use of personal data
Avoid or minimize anything that will cause physical or emotional harm to participants. Make participants aware of any potential harms prior to their participation. Try to remain neutral and unbiased. Don't let your personal preconceptions or opinions interfere with the data collection process.
9
New cards
legal reasons associated with collection and use of personal data
Article 6 of the General Data Protection Regulation (GDPR) sets out what these potential legal bases are, namely: consent; contract; legal obligation; vital interests; public task; or legitimate interests.
10
New cards
data privacy
Protecting the privacy of the data located in a database.
11
New cards
Data Ownership
The process of identifying the person responsible for the confidentiality, integrity, availability, and privacy of information assets.
12
New cards
Data consent
Organisations must ask for the permission of people to collect and process their personal data.
13
New cards
Data misuse
Using data for purposes other than for which it was collected.
14
New cards
data protection
Method of ensuring that personal data is correct and is not misused either by those holding it or others who have no right to access it.
15
New cards
legal reasons associated with artificial inteligence
The first law is that a robot shall not harm a human, or by inaction allow a human to come to harm. The second law is that a robot shall obey any instruction given to it by a human, and the third law is that a robot shall avoid actions or situations that could cause it to come to harm itself.
16
New cards
ethical reasons associated with artificial inteligence
Biases. We need data to train our artificial intelligence algorithms, and we need to do everything we can to eliminate bias in that data.
17
New cards
Control and the Morality of AI.
18
New cards
Privacy.
19
New cards
Power Balance.
20
New cards
Ownership.
21
New cards
Environmental Impact.
22
New cards
Humanity
23
New cards
Legal Liability in AI
operators of "high risk" AI (AI having significant potential to cause damage), would be strictly liable for the AI's damage
24
New cards
algorithmic bias
occurs when a computing innovation systematically discriminates against certain individuals or groups and creates unfair outcomes for some and favorable outcomes for others.
25
New cards
Copyright
the exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same.
26
New cards
Patents
exclusive rights to make or sell inventions
27
New cards
trademarks
Designs and names, often officially registered, by which merchants or manufacturers designate and differentiate their products
28
New cards
Licensing
the legal process whereby a licensor allows another firm to use its manufacturing process, trademarks, patents, trade secrets, or other proprietary knowledge
29
New cards
Cybersecurity
the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
30
New cards
Virus
A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
31
New cards
Worms
Independent computer programs that copy themselves from one computer to other computers over a network
32
New cards
Trojans
Programs that look useful, but actually cause damage to your computer
33
New cards
Ransomware
Software that encrypts programs and data until a ransom is paid to remove it.
34
New cards
key logger
Software or hardware which records all key strokes on a computer system.
35
New cards
Unpatched software
Software that hasn't had the latest security updates applied to it, making it vulnerable to attack
36
New cards
cyberattack
an attempt to damage or disrupt computer systems or electronic networks operated by computers
37
New cards
Anti-malware software
Software designed to stop malware from damaging a computer or network
38
New cards
Encryption
Process of converting readable data into unreadable characters to prevent unauthorized access.
39
New cards
recovery procedures
Used to restore a file or database to its state at the time of its last backup