Looks like no one added any tags here yet for you.
strong password
a password that is easy for a user to remember but would be difficult for someone else to guess based on knowledge of that user
encryption
the process of encoding data to prevent unauthorized access
decryption
the process of the process of decoding the data
algorithmic bias
bias embedded into algorithms and any level of software development
Creative Commons
a public copyright license that enables the free distribution of an otherwise copyrighted work
open source
programs that are made freely available and may be redistributed and modified
open access
online research output free of any and all restrictions on access and free of many restrictions on use, such as copyright or license restrictions
citizen science
scientific research conducted in whole or part by distributed individuals, many of whom may not be scientists, who contribute relevant data to research using their own computing devices
crowdsourcing
the practice of obtaining input or information from a large number of people via the Internet
personally identifiable information (PII)
information about an individual that identifies, links, relates, or describes them
digital divide
the differing access to computing devices and the Internet, based on socioeconomic, geographic, or demographic characteristics
Asymmetric Key Encryption
encryption that pairs a public key for encryption and a private key for decryption
multifactor authentication
a method of computer access control in which a user is only granted access after successfully presenting several separate pieces of evidence to an authentication mechanism, typically in at least two of the following categories: knowledge (something they know); possession (something they have), and inherence (something they are)
malware
software intended to damage a computing system or take partial control over its operation
computer virus
a malicious program that can copy itself and gain access to a computer in an unauthorized way
phishing
a technique that attempts to trick a user into providing personal information
keylogging
the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
rogue access point
a wireless access point that gives unauthorized access to secure networks
cookie
A small amount of text that tracks information about a user visiting a website.
certificate authority
issue digital certificates that validate the ownership of encryption keys used in secure communications and are based on a trust model.
freeware
Untrustworthy (often free) downloads from freeware or shareware sites can contain malware.
Symmetric Key Encryption
involves one key for both encryption and decryption.