Issues and Impact in Computer Science (EdExcel)

Environmental Issues

Key Concerns:

  • Energy Consumption

    • Digital devices increase global energy demand.

    • Data centers use 1-3% of global energy, often from fossil fuels.

    • Environmental Impact of Energy Consumption:

      • Greenhouse gas emissions

      • Air and water pollution

      • Land degradation

      • Impact on wildlife

  • Manufacturing

    • Requires vast amounts of scarce natural resources.

    • Mining for rare earth metals causes:

      • Water pollution

      • Habitat destruction

  • Replacement Cycle & Disposal

    • Replacement Cycle Issues:

      • Short cycles increase e-waste.

      • Higher energy consumption.

      • Faster depletion of natural resources.

    • Disposal Issues:

      • Landfills cause toxic chemical leakage.

      • Methane emissions contribute to climate change.

      • Exporting e-waste to countries with poor disposal standards leads to hazardous exposure.

Legal Issues in Computing

  • Copyright

    • Unauthorized use of content leads to intellectual property theft.

    • Protection against illegal copying, distribution, and reproduction.

    • Examples:

      • Software piracy

      • Unauthorized streaming of movies and music

  • Cybersecurity

    • Protecting against hacking and cybercrimes, including identity theft.

    • Implementation of strong security measures such as encryption and firewalls.

  • Data Protection

    • Ensuring responsible collection, processing, and storage of personal data.

    • Companies must comply with data protection laws to safeguard user privacy.

Ethical Issues in Computing

  • Moral questions about right and wrong in technology use.

  • Challenges of Ethical Issues in Computing:

    • Laws struggle to keep up with technological advancements.

    • Individuals and organizations must consider the moral implications of emerging technologies.

    • Ethical dilemmas in AI, cybersecurity, and digital surveillance.

Privacy Issues

  • Unauthorized collection or use of personal data.

  • Common Concerns in Privacy Issues:

    • Face recognition (mass surveillance concerns).

    • GPS tracking (data ownership issues).

    • Internet monitoring (security vs. free speech debate).

  • The Privacy Debate:

    • Citizens' View

      • "Governments and corporations have too much access."

    • Government's View

      • "Data access is necessary for security and crime prevention."

Data Protection Act (2018)

  • Principles of the Data Protection Act (2018):

  1. Fair & lawful processing of personal data.

  2. Specified & lawful purposes for data collection.

  3. Adequate, relevant & not excessive data usage.

  4. Accurate & up-to-date records.

  5. Data retention only as long as necessary.

  6. Processed in line with people’s rights and freedoms.

  • Exemptions within the Data Protection Act (2018):

    • Domestic use

    • Law enforcement

    • Intelligence services

Computer Misuse Act (1990)

  • Primary Offenses in the Computer Misuse Act (1990):

    1. Unauthorized access to materials (e.g., guessing passwords).

    2. Unauthorized access with intent to commit further crimes (e.g., altering files).

    3. Unauthorized modification of data (e.g., hacking servers).

Cookies and Electronic Privacy Regulations (2003)

  • Cookies

    • Small files storing browsing data to enhance user experience.

  • Regulations:

    • Inform users about cookies and their usage.

    • Explain their purpose transparently.

    • Obtain explicit user consent before storing cookies.

Artificial Intelligence (AI)

  • AI

    • Machines mimic human intelligence to automate tasks.

  • Machine Learning

    • AI systems improve by analyzing large datasets and identifying patterns.

  • Robotics Categories:

    • Dumb robots

      • Pre-programmed to perform specific tasks (e.g., assembly lines, ATMs).

    • Smart robots

      • AI-driven and capable of learning and decision-making (e.g., autonomous cars, robotic surgery).

Ethical & Legal Issues in AI

  1. Accountability & Safety: Who is responsible for AI errors or accidents?

  2. Algorithmic Bias: AI systems can reinforce and perpetuate societal biases.

  3. Legal Liability: Who is legally accountable if AI causes harm?

Intellectual Property (IP)

  • Protection Methods for Intellectual Property:

    • Copyright (protects original works of authorship).

    • Patents (exclusive rights to inventions and processes).

    • Trademarks (distinguishing logos, names, and symbols).

    • Licensing (legal agreements on software and content use).

  • Copyright Act (1988)

    • Protects works from unauthorized copying, distribution, and adaptation.

  • Licensing

    • Open Source

      • Free and customizable software with publicly available code.

    • Proprietary

      • Paid software with restricted modifications.

Cybersecurity & IT Security

  • Malware Types:

    • Virus

      • Self-replicating program corrupting files.

    • Worms

      • Spread through networks.

    • Trojan

      • Disguises as legitimate software.

    • Keyloggers

      • Record keystrokes.

    • Ransomware

      • Encrypts files and demanding ransom.

Hacker Exploits

  • Unpatched Software

    • Security vulnerabilities.

  • Out-of-date Anti-Malware

    • Ineffective against new threats.

Social Engineering

  • Manipulating people to divulge information.

Types of Social Engineering:

  • Blagging

    • Creating fake scenarios to extract data.

  • Phishing

    • Sending fraudulent emails/messages to deceive users.

  • Baiting

    • Offering deceptive incentives to lure victims.

  • Quid pro quo

    • Offering "assistance" in exchange for sensitive data.

Protection Against Social Engineering

  • Awareness training

  • Recognizing fraud indicators

  • Avoiding "shoulder surfing"

Security Measures

  • Anti-Malware Software:

    • Anti-virus (detects viruses)

    • Anti-spam (filters suspicious emails)

    • Anti-spyware (blocks unauthorized data collection)

  • Encryption

    • Protects data from unauthorized access.

    • Types:

      • Asymmetric (Public & Private Key Encryption).

      • Symmetric (faster but requires a shared key).

Acceptable Use Policies (AUP)

  • Rules for responsible network/system use.

  • Typical Policies:

    • File download restrictions.

    • Limits on personal use.

    • Data security practices.

Backup & Recovery

  • Backup Strategies:

    • RAID

      • Redundant storage for safety.

    • Off-site storage

      • Cloud backups.

    • Standby equipment

      • Spare hardware for quick recovery.