12 Ethical and Legal implications Flashcards

(54 cards)

1
Q

Computer malware definition

A

Software designed to damage or disable computer systems or steal sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Viruses

A

Malicious code that attaches to other programs and replicates, spreading from computer to computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Worms

A

Similar to viruses but spread independently without attaching to other files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Trojans

A

Disguised as legitimate software, allowing attackers remote access and control upon installation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Spyware

A

Monitors and collects user activity (browsing history, keystrokes, personal information).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Ransomware

A

Encrypts files and demands ransom for decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Adware

A

Displays unwanted advertisements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How can malware spread

A
  • Email attachments
  • Phishing
  • Malicious websites and drive-by downloads
  • Infected USB drives/external hard drives
  • Software downloads from untrustworthy sources
  • Social engineering attacks
  • Exploit kits and vulnerability exploitation
  • Supply chain attacks
  • Cloud storage services
  • Instant messaging and social media platforms
  • IoT Devices
  • Malicious mobile apps
  • Ai-powered attacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are symptoms of malware infections

A
  • Slow computer performance
  • Frequent crashes or freezes
  • Unusual pop-ups or error messages
  • Unauthorised changes to system settings
  • Theft of personal or financial information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How do businesses and individuals protect and prevent malware attacts?

A

Businesses:
- Cybersecurity solutions
- Employee training
- Regular audits and updates
- Cybersecurity Insurance

Individuals:
- Safe browsing habits
- 2FA
- Regular data backups
- Staying informed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Explain about ubiquity and importance of software, including the benefits and concerns

A

Examples: communication, Education, Healthcare, Finance, Entertainment.

Benefits: Increased productivity, improved information access, enhanced communication, new forms of entertainment.

Concerns: Privacy, bias and discrimination, job displacement, liability for software malfunctions, copyright and intellectual property, cybercrime and security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define social networks

A

Digital platforms that enables users to create personal profiles, establish connections with other individuals, share content etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is the significance of social networks in contemporary society

A
  • communication
  • information dissemination
  • marketing and advertising
  • social and political movements
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is the role of developers in creating and maintaining social networks?

A
  • prioritise key aspects
  • privacy and data protection
  • content moderation
  • promoting positive user experiences
  • ongoing education and collaboration
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is IP rights vs content creators

A
  • user rights and access to information
  • fair use and transformative works
  • distinguishing original and copied content
  • detecting copyright violations in user-generated content
  • evaluating legitimacy of claims
  • balancing rights holder and user interests
  • collaboration with rights holders
  • investing in AI and human review
  • educating users
  • providing tools for rights holders
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

how do you identify infringements and manage take-down requests

A
  • volume overload
  • complexity of copyright
  • subjectivity of fair use
  • balancing rights
  • legitimacy assessments
  • due process
  • preventing abuse
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

how do you moderate content challenges and strategies for social networks

A
  • defining and detecting harmful content
  • addressing algorithmic bias
  • ensuring transparency and accountability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

what are some strategies for responsible content moderation

A
  • hybrid approach with AI and human moderation
  • clear and transparent moderation policies
  • user empowerment and education
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

what are some measures to protect vulnerable users

A
  • enhanced privacy settings for children
  • age verification mechanisms
  • Educational resources and support
  • parental controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Growing Role of AI on Social Media Platforms

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

how do you Enhance User Experiences

A
  • personalised content recommendations
  • improved search functionality
  • accessibility features
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

what are some ethical concerns and mitigation strategies?

A
  • algorithmic bias
  • transparency and explainability
  • accountability
23
Q

what is the developers role in cyber security

A

Developers contribute to cyber safety through several areas:
- secure coding practices
- security testing
- staying up-to-date on security threats
- building secure systems
- promoting security awareness

24
Q

describe about cyber-safety with an Australian context

A

Privacy Act 1988 and Australian Privacy Principles (APPs)
Notifiable Data Breaches (NDB) scheme
Online safety act 2021 and eSafety Commissioner
Collaboration with local experts and organisations

25
APP 1
- Open and transparent management of personal information privacy
26
APP 5
- Security of personal information: Strong security measures to protect from unauthorized access/misuse:
27
APP 8
- Cross-border disclosure: Reasonable steps to ensure similar privacy protections in recipient country or user consent.
28
APP 10
- Quality of personal information: Reasonable steps to ensure accuracy, up-to-date, complete information.
29
APP 11
- Access and correction: Users right to access and correct personal information. Platforms must provide easy mechanisms.
30
APP 12
- Deletion of personal information: Individuals can request deletion when information is no longer needed. Platforms must have processes to handle requests.
31
How does APPs affect developers within organisations
- privacy policy - data collection and use - data security - user rights
32
Misinformation and Disinformation
Misinformation (unintentional falsehoods) and disinformation (deliberate deception) has detrimental consequences for individuals, communities and democracies itself. Its important to use credible sources, verify information and provide context.
33
Striking a Balance
balance content moderation with user freedom of expression. Achieved by: collaborating with fact-checking organisations, investing in AI and machine learning and equipping users with digital literacy skills
34
Transparency and Accountability
achieved by prioritising transparency, enabling user reporting and open communication
35
Collaboration
challenges require a collaborative effort, such as partnership, supporting research and industry standards. The goal is to create a reliable digital infrastructure through systematic approaches to information management and verification
36
With safeguarding your information, what are the rights and responsibilities of software developers in Australia
- Navigating IP landscape - Respecting the work of others - Combating plagiarism and copyright infringement - Leveraging open-source software - Protect your own creations
37
How do you safeguard your code and IP protection for Australian developers
- secure formal recognition - register IP with authorities - copyrights, patents and trademarks - leveraging licensing and agreements - open-source licenses and proprietary licenses - document everything - vigilance is key
38
Key Pillars of Quality Software
1. Industry standards and best practices 2. User-centred design 3. Robust testing and quality assurance 4. Continuous improvement and maintenance 5. Legal and ethical compliance 6. Professional development and learning
39
Key Strategies for Effective Response
- active listening and communications - timely and effective resolution - collaboration - continuous improvement - ensure responses comply with relevant Australian laws - document and share solutions
40
explain about the Australian Computer Society (ACS) Code of Professional Conduct
- Public interest first: prioritise well-being of society - Empowering users: improve quality of life, respect diversity, create inclusive designs, ensure accessibility - Honesty as a cornerstone: be truthful and build trust - Lifelong learning: continuously update knowledge - Fostering collaboration: support own and colleagues' growth - Maintaining integrity: uphold profession's reputation, avoid conflicts of interest etc. - Respecting IP: recognise and respect IP rights
41
By following Code of Conduct guidelines, developers can
- maintain public trust - ensure quality and reliability - foster collaboration and respect - protect IP - contribute to growth of profession
42
developers securing a digital landscape and best practices
- regular vulnerability assessments - secure coding techniques - staying informed
43
Collaboration for a Safer Digital Future
- reporting suspicious activity - sharing knowledge
44
what is ergonomics
the study of people's efficiency in their work environment
45
The ACS emphasising user-wellbeing and ergonomic designs by:
- applying ergonomic principles to UI design - optimise workflows and minimise repetitive tasks - providing keyboard shortcuts and customisable input methods - design for breaks and micro-pauses - consider accessibility and inclusive design
46
Why Inclusivity Matters
- equality for all - unlocking potential - enhanced user experience
47
How developers can implement inclusive design
- accessibility standards - user-centred approach - beyond language - assistive technology ready - customisation - involve diverse user testing
48
what is the importance of protecting privacy
- privacy act 1988 - state and territory privacy laws - professional ethics - international standards - comply with privacy laws and regulations - implement privacy by design - provide transparent privacy policies - give users control over their data - conduct privacy impact assessments
49
Copyright
- protects the expression of ideas in software code - difference licenses determine usage rights
50
Patents
- protects novel and non-obvious intentions implemented in software - challenges and debates surrounding software patentabillity
51
Trademarks
- protects brand names, logos, slogans associated with the software - prevents customer confusion
52
Trade Secrets
- protects confidential information that provides a competitive advantage
53
Key concepts in relation to software development in Australia
- copyright protection - software licensing - piracy and infringement - enforcement and remedies - fair dealing and exceptions - End-user license agreement (EULA) - Digital rights management (DRM)
54
Fair Dealing Applies in Theory
- it is clear-cut than other works - focuses on non-fuctional elements - functionality is often protected