Ethical Issues Flashcards
(29 cards)
What are the three types of issues created by technology?
- Ethical - what’s wrong/right by society
- Legal - what’s wrong/ right by law
- Environmental - how we impact the natural world
How has digital technology raised ethical issues?
- smartphones = neglect irl interaction = poeple are more rude and less sociable
- wearable technology = smart glasses with built in cameras = invasion of photography as taking photos without consent
- computer based implants = better monitoring of health but more expensive and less privacy
What has unequal access to technology caused?
- digital divide
- e.g. internet to apply for jobs/ keep in touch/ banks
- global divide bw poor and rich countries = more inequality
What are the causes of the digital divide?
- not enough money to buy new devices = expensive
- urban areas are likely to have greater network coverage than rural areas
- some people don’t know how to use tech so are shut out of opportunities (so older people)
What issues does the internet cause?
- internet is used for online banking, shopping
- lots of personal data is shared including names, addresses and bank details = chance of identity theft
- wireless access to Internet = hackers could monitor users
- children may be able to access sites that are not age-appropriate (gambling) = hard to block them all
What is cyberbullying?
- using social media to harm someone deliberately
- intimidate, insult, humiliate or defame someone
- causes distress for the victim = even suicide
What is trolling?
- someone uses public arguments with others online to frustrate others
- do this for attention or their own amusements
Why can cyberbullying and trolling happen?
- anonymity
- can also abuse social media by pretending to be someone else/ fake news
- sexting = more common as video messaging has become more popular = dangerous and no laws to prevent this
How does technology change how we access services?
- wirelessly stream = cheap subscriptions (data lost when ends)
- apps such as Uber becomes more popular
- cheap and convenient services but draw customers away from traditional businesses - risky for customers as not as regularly regulated
- cloud storage and webmail and then ‘premium’ decrease the digital divide
- games = impulsive spending habits
How does technology change how a business operates?
- more skills expected for use of tech
- employees have company phones for contract (can never take break from work)
- computer chip implants (unethical?)
- marketing and advertising = pop ups and targeted ads
- make sure its ethical and legal to keep public trust and business has a code of conduct
Why is it hard to keep information private on the internet?
- websites need personal data and social media encourages to post
- privacy agreement before using a website
- companies can sell personal data or make it seen by others, buying habits for targeted adverts
- make it more private by changing settings
- users trust companies for data= secure
- lots of high-profile cases or stolen/leaked data
What is surveillance?
- controversial topic = some campaign against mass surveillance
- monitors what people are accessing on the internet
- gov security services may use packet sniffers to monitor Internet traffic and keywords alerting to illegal activities (terrorism) = opposed by public
- ISP - Internet service providers keep records of visited websites by customers for a certain amount fo time and may be legally required to share it w security services
What is censorship?
- controversial topic = some campaign against cyber censorship
- someone tries to control what others can access on the internet
- e.g. China - websites blocked which are foreign
- e.g. Cuba - only access internet from gov access points
- many gov use some form of it
- Uk restricts access to pornography, gambling and inappropriate websites to protect children
What do laws control?
- personal data (data protection act)
- organisation has to register w gov to say what data they’re collecting and how they’re using it
- good cyber security
- companies using cloud storage must ensure its trustworthy and reliable and how and where the data is used
What is the computer misuse act?
- for stopping cyber crimes (3 offences)
- unauthorised access to a private network by hacking
- unauthorised access to a network to commit a crime like stealing data
- unauthorised modification of computer material
- illegal to make, supply or obtain malware
What is cyber crime and hacking?
Cybercrime refers to illegal activities that involve computers
- Hackers gain access to a system by exploiting weakness in security to steal or destroy data or infecting the system with malware
- identify vulnerabilities through pen testing
What are the different methods that hackers used attack systems?
- Passive attacks =monitoring data on network
- Activity attacks = using malware to attack a system directly
- Brute force attacks = using automated software and trial and error to crack password
- Denial of service attack = preventing people from using a network with useless traffic
- hackers = good understanding of security measures so hard to catch and prosecute
What does the Copyrights and Patents Act do?
- protects intellectual property from being copied or stolen by other people
What do Patents cover?
- new inventions
- protects ideas and concepts instead of actual content
- apply and pay for patent
- in computing = mostly apply to hardware
What does copyright cover?
- written or recorded content (books, music, films)
- don’t need applying for it to work
- illegal to share copyrighted material w owner’s permission or to plagiarise
What things are copyright protected?
- software = illegal to use or share without a license (some developers make it open source)
- comp. code = copyrighted but hard for smaller code
- algorithms = not copyright protected but some can get patents for more specific ones (web filters in search engines)
Why is it hard to prove that computer code has been copied?
- similarities may be a coincidence esp if they were to perform the same task - hard to measure how ‘original’ the code is
- creators of paid software want to keep source code secret to prevent competitors copying it which makes it hard to compare if it’s been copied
How has the internet had an effect on copyrighted content?
- harder to protect it (file sharing is easier)
- developers have digital rights management (DRM) w software = prevents unauthorised access with activation keys and online authentication
- software DRM is common target of cracking
What is cracking?
- users illegally modify software to remove/bypass unwanted features
- cracked software is distributed online = so does DRM acc work? Or just annoys acc users?
- DRM can even make older software unusable of authentication service is no longer available
- cracked software = illegal and causes loss on income for creator (discourages from fixing bugs)