Energy Consumption
Digital devices increase global energy demand.
Data centers use 1-3% of global energy, often from fossil fuels.
Environmental Impact of Energy Consumption:
Greenhouse gas emissions
Air and water pollution
Land degradation
Impact on wildlife
Manufacturing
Requires vast amounts of scarce natural resources.
Mining for rare earth metals causes:
Water pollution
Habitat destruction
Replacement Cycle & Disposal
Replacement Cycle Issues:
Short cycles increase e-waste.
Higher energy consumption.
Faster depletion of natural resources.
Disposal Issues:
Landfills cause toxic chemical leakage.
Methane emissions contribute to climate change.
Exporting e-waste to countries with poor disposal standards leads to hazardous exposure.
Copyright
Unauthorized use of content leads to intellectual property theft.
Protection against illegal copying, distribution, and reproduction.
Examples:
Software piracy
Unauthorized streaming of movies and music
Cybersecurity
Protecting against hacking and cybercrimes, including identity theft.
Implementation of strong security measures such as encryption and firewalls.
Data Protection
Ensuring responsible collection, processing, and storage of personal data.
Companies must comply with data protection laws to safeguard user privacy.
Moral questions about right and wrong in technology use.
Challenges of Ethical Issues in Computing:
Laws struggle to keep up with technological advancements.
Individuals and organizations must consider the moral implications of emerging technologies.
Ethical dilemmas in AI, cybersecurity, and digital surveillance.
Unauthorized collection or use of personal data.
Common Concerns in Privacy Issues:
Face recognition (mass surveillance concerns).
GPS tracking (data ownership issues).
Internet monitoring (security vs. free speech debate).
The Privacy Debate:
Citizens' View
"Governments and corporations have too much access."
Government's View
"Data access is necessary for security and crime prevention."
Principles of the Data Protection Act (2018):
Fair & lawful processing of personal data.
Specified & lawful purposes for data collection.
Adequate, relevant & not excessive data usage.
Accurate & up-to-date records.
Data retention only as long as necessary.
Processed in line with people’s rights and freedoms.
Exemptions within the Data Protection Act (2018):
Domestic use
Law enforcement
Intelligence services
Primary Offenses in the Computer Misuse Act (1990):
Unauthorized access to materials (e.g., guessing passwords).
Unauthorized access with intent to commit further crimes (e.g., altering files).
Unauthorized modification of data (e.g., hacking servers).
Cookies
Small files storing browsing data to enhance user experience.
Regulations:
Inform users about cookies and their usage.
Explain their purpose transparently.
Obtain explicit user consent before storing cookies.
AI
Machines mimic human intelligence to automate tasks.
Machine Learning
AI systems improve by analyzing large datasets and identifying patterns.
Robotics Categories:
Dumb robots
Pre-programmed to perform specific tasks (e.g., assembly lines, ATMs).
Smart robots
AI-driven and capable of learning and decision-making (e.g., autonomous cars, robotic surgery).
Accountability & Safety: Who is responsible for AI errors or accidents?
Algorithmic Bias: AI systems can reinforce and perpetuate societal biases.
Legal Liability: Who is legally accountable if AI causes harm?
Protection Methods for Intellectual Property:
Copyright (protects original works of authorship).
Patents (exclusive rights to inventions and processes).
Trademarks (distinguishing logos, names, and symbols).
Licensing (legal agreements on software and content use).
Copyright Act (1988)
Protects works from unauthorized copying, distribution, and adaptation.
Licensing
Open Source
Free and customizable software with publicly available code.
Proprietary
Paid software with restricted modifications.
Malware Types:
Virus
Self-replicating program corrupting files.
Worms
Spread through networks.
Trojan
Disguises as legitimate software.
Keyloggers
Record keystrokes.
Ransomware
Encrypts files and demanding ransom.
Unpatched Software
Security vulnerabilities.
Out-of-date Anti-Malware
Ineffective against new threats.
Manipulating people to divulge information.
Blagging
Creating fake scenarios to extract data.
Phishing
Sending fraudulent emails/messages to deceive users.
Baiting
Offering deceptive incentives to lure victims.
Quid pro quo
Offering "assistance" in exchange for sensitive data.
Awareness training
Recognizing fraud indicators
Avoiding "shoulder surfing"
Anti-Malware Software:
Anti-virus (detects viruses)
Anti-spam (filters suspicious emails)
Anti-spyware (blocks unauthorized data collection)
Encryption
Protects data from unauthorized access.
Types:
Asymmetric (Public & Private Key Encryption).
Symmetric (faster but requires a shared key).
Rules for responsible network/system use.
Typical Policies:
File download restrictions.
Limits on personal use.
Data security practices.
Backup Strategies:
RAID
Redundant storage for safety.
Off-site storage
Cloud backups.
Standby equipment
Spare hardware for quick recovery.