Impacts of Computers - 1.6

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/16

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

17 Terms

1
New cards

What are the eight principles of the Data Protection Act 2018?

  1. Data must be accurate and up-to-date

  2. Data must be processed fairly and lawfully

  3. Data must be adequate, relevant and not excessive

  4. Data must not be retained for longer than necessary

  5. Data can only be used for the purpose it was collected

  6. Data must be kept secure

  7. Data must only be stored within the physical boundaries of the UK

  8. Data controllers must be able to prove that their data protection measures are sufficient

2
New cards

Who is the data subject and what are their rights?

The individual about whom personal data is stored. Rights/responsibilities

  • Freedom information request - view data held about you

  • Make a complaint/ raise concern to the information Commissioner

  • Getting copies of your data

  • Be compensated in the case of a data breach

  • Get your data corrected

3
New cards

Who is the data controller and what are their responsibilities?

This is the person in a company or organisation who is responsible to ensure the DPA is adhered to.

They must:

  • Register with the ICO 

  • Pay a fee

  • Specify security procedures for your data

  • Must train your staff on DPA measure e.g. Not saving confidential data on removable drives, using BCC instead of TO, deleting old data

4
New cards

Who is the Information Commissioner and what are their responsibilities?

Appointed by the Government to oversee the implementation of the Act.

Responsibilities:

  • Serving prosecutions on organisations that breach the Act

  • Investigating complaints from data subjects

  • Maintaining the register of all data controllers

5
New cards

An accountant’s practice was found to have thrown old customer records from 2005 in waste bins outside their offices. Which principle(s) of the Act may have been broken?

  • Data should not be kept for longer than necessary

  • Data should be kept secure

6
New cards

What are the three main principles of the Computer Misuse Act 1990?

  • Unauthorised access to a computer material

  • Unauthorised access with intent to commit or facilitate a crime

  • Unauthorised modification of computer material

7
New cards

Give examples of the types of activities which are illegal under the Copyright Designs and Patents Act 1988:

  • Using proprietary software without paying for the appropriate license

  • Copying proprietary software without paying for the appropriate license

  • Distributing proprietary software without paying for the appropriate license (PIRACY)

    • E.g. Copying a game/software CD

    • E.g. Sharing login credentials for proprietary software

8
New cards

Lauren is a Computer Science teacher. She is building a website for her Computing class where they can share ideas, send each other programs and discuss computing concepts. The students will have

individual accounts that they can log into.

Discuss the ethical and legal issues Lauren will have to consider when setting up the website.

Points may include:

Legal:

Data Protection Act

Rules of DPA:

  • Students data should be removed when the students have left

  • Students should give permission for their personal data to be used 

  • Data should not be used for any other purpose other than the website

Methods of restricting access

Rules of the Copyright Designs & Patents Act:

  • They must not send copies of proprietary software

  • They must not share license keys or log on credentials of proprietary software

Ethical:

  • Dealing with issues such as abuse or cyberbullying

Plagiarism

  • Communication of inappropriate materials for students/school/teacher

  • Backing up to preserve/save data

  • Gaining parental consent for communication online

  • E-safety

  • Acceptable use policy


9
New cards

Describe the key features of Open Source Software:

  • Source code is openly available for everyone

  • Software can be modified and redistributed

  • Developed through online collaboration/communities

  • Usually free

  • Can be installed on any number of devices

10
New cards

Describe the key features of Proprietary Software:

  • Source code is not available

  • Software cannot be modified and redistributed

  • Developed by a software provider business

  • You must purchase correct type of license

  • Can be installed on any number of devices dictated by the license

11
New cards

Carry out a comparison of Open Source and Proprietary Software:


Open Source vs Proprietary

Criteria

Open Source

Proprietary

Source Code




Openly available

Not available

Distribution/Modification Of Software




Freely distributed any amount of times

Cannot be distributed or modified

Licenses




No charge for the license

Must purchase the correct type of license

Cost




Usually free

Cost of the license which depends on the type of software

Support




Community based help

More reliable as it comes direct from the organisation

Developers




Multiple developers from the community through collaboration

A company by paid employees

Updates




Less predictable, depends on the community of developers and their pace of work

Commercial organisation must provide regular updates to ensure the software continues to sell well.

12
New cards

Explain the Environmental Considerations of using computers:

Computers and Waste:

  • Incorrect disposal of computing equipment leads to the release of harmful materials into the environment e.g. Mercury, Dioxins

  • Computer devices should be recycled correctly to allow reuse of precious metals e.g. Lead and Nickel in phones

Working from home/pollution:

  • Less pollution from cars and public transport

  • Heating and lighting, electricity usage

  • Online meetings e.g. Zoom, Teams saves on long range travel e.g. air travel 

Fossil Fuels:

  • Electricity production to supply data centres

  • Use of fossil fuels in the computer production process

13
New cards

Explain the Cultural Considerations of using computers:

This refers to the impact of computers on the daily lives, behaviours and values

General Issues:

  • Digital divide - unequal access to technology due to the country, location or wealth

  • Censorship - Some countries or cultures restrict access to online material (e.g. for political reasons)

  • Software tends to be “westernised”, programming languages written in English

  • Pace of technological change affects:

    • How we socialise (social media)

    • Physical exercise

    • Working from home - not helping communication/ interpersonal skills

    • AI - is it making us lazier/ less creative

14
New cards

A shopping centre has a security system that includes CCTV cameras to record activities in the centre. The security system is being upgraded to include the use of facial recognition to identify, track the movements of and record individuals throughout the shopping centre.

Discuss the positive and negative impacts of this upgrade including:

• ethical issues

• privacy issues

• legal issues

Legal

  • In cases of legal issues or crimes inside the building such as theft or assault. CCTV is good to determine what actually happened and by who

  • Data should not be held for longer than necessary and kept secure

  • The CCTV footage must be used for only what it’s intended for

  • Is there bias built into the software regarding different ethnic groups e.g. Highlighting black people as suspicious

  • Data should be held securely to prevent unauthorised access

Ethical

  • Is it right to record people without their permission

  • Users feel safer knowing they are being monitored and action will be taken if needed

  • Users feel unsafe as they are being watched

  • If they haven't done anything there is no reason for them to be tracked and recorded

Privacy

  • Users may not know the system that exists 

  • User may feel it is an invasion of privacy

  • Users are in a public place and could be recorded by anyone anyways

  • Users may feel like they are being watched all the time

  • Users must allow their permission to be tracked

  • Users may not know the system exists

15
New cards

Describe the cultural impacts of the company bringing out new devices twice a year:

  • people may feel their devices are out-of-date

  • increased cost

  • social pressure to keep up-to-date

  • increase digital divide

  • more secondhand become available for people who cannot afford new technology

  • Increase employment where the devices are being built


16
New cards

Discuss the general impacts of digital technology on employment:

Impact on employers

Advantages:

  • Less running costs e.g. People working from home which saves on rent, rates, electricity, travel expenses

  • Access to a wider range of employees you can employ as you have no distance restrictions

  • Replace human jobs with AI which will save money in the long run


Disadvantages:

  • Difficult to maintain good employee relations and team relationships due to possible job losses and people working from home

  • Very difficult to monitor work ethic and productivity

Impact on employees

Advantages:

  • Less commuting - time and environmental benefit

  • Flexibility - work around children etc

  • Apply for a wider range of jobs as location is not important


Disadvantages:

  • Issues with job loss or having to reskill due to AI for example

  • Issues with self discipline working from home

  • Issues with social isolation 

  • Communication

  • Lack of division with work/life boundaries