impacts of tech Flashcards

(27 cards)

1
Q

IP definition?

A

IP refers to creations of the mind, like inventions, literary and artistic works, designs and symbols, that are protected by law. IP can exist in various forms and types of protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

types of IP protections?

name and what it is

examples are on there but dont have to know them

A
  • trademark (protects identity)
  • patent (rights to make, use and sell) (e.g. phones, bank notes)
  • copyright (protects authorship and rights) (e.g. lyrics of Hamilton songs)
  • trade secrets (protect confidential information) (e.g. coca cola recipe)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IP and copyright law?

A
  • IP is the creation, while copyright specifically protects the creation, enabling creators to control how their content is used
  • Protects the form of ideas
  • E.g. book, film, music, magazine, artwork
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

copyright revision

5 points

A
  • intends to legally protect the rights of creators of creative and artistic works under the australian law
  • applies from moment of creation, 70 years after death
  • owners have right to reproduce, adapt, communicate, publish and perform works to public
  • fair dealing
  • moral rights
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

online defamation definition?

A

occurs when a person intentionally states or spreads false information about another person to cause others to think less of that person.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

concept of online defamation

legal ramifications (2), laws (1)

A

legal ramifications
- defamation in any form is illegal
- if you defame someone, and you are found guilty, civil action may be taken

  • laws have been developed to provide recourse for people whose reputation is or likely to be harmed by publication of info about them
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

personal action you can take for online defamation

4

A
  • record all evidence
  • block user
  • report content
  • contact legal advice
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

definition/concept of FOI act?

A

the right of the public to access information held by Australian government ministers and agencies, under the Freedom Of Information Act 1982

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

legal action to counteract online defamation?

5 points

A
  • action can be brought up against publisher and anyone who interacted with the publication
  • formally approach them
  • lawyers compose a legal letter
  • report
  • seek legal advice (sue)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

proof of online defamation?

3 things to proove, present 3 things

A

to claim compensation for online reputational damage, you must prove these things:
- it was not true
- it was online
- there was malicious intent

the following must be present for it to be valid
- the material was made up, not factual
- victim was clearly mentioned
- it is caused/causing harm to victims’ reputation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

concept of FOI act?

3 points, plus 1 point examples

A
  • e.g. policy making documents, administrative decision-making documents, medical records, personal information, statements, contracts
  • most Australian governments are subject to the FOI act, and must release documents in response to an FOI request, unless there is an overriding reason not to do so
  • covers Australian government ministers and most agencies
  • some agencies and private companies are not subject to FOI act
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

importanace and key provisions of FOI act?

2 for each

A

Importance
- ensures government transparency
- encourages active individual participation with government

Key provisions
- allows you to request access to documents
- allows you to request changes to personal info they hold

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

rights and responsibilities of FOI act?

4

A
  • The FOI Act grants the right to access both paper and digital government records.
  • gives public right to access information
  • there are exemptions, not all documents can be accessed (as seen above)
  • government and agencies must process requests, and provide documents
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

virtual and physical collaboration definitions?

A

virtual: is the method of collaboration between virtual team members, that is carried out via technology-mediated communication

physical: working together with others, physically and in person, to achieve a common goal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

virtual collaboration advantages?

7

A
  • Allows businesses to hire staff around the world
  • Reduce travel time/cost
  • Meetings, anytime, anywhere
  • People work on same project at once
  • Less cost for offices and parking
  • Work from home
  • Businesses can run 24/7, with employees in different time zones
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

convergent device definititon?

A

refers to the combination of two or more different technologies, merged in a single device

16
Q

convergence advantages?

7

A
  • improve efficiency
  • time and cost savings
  • new ways to communicate
  • convenience
  • active audience
  • one set of infrastructure cheaper to operate
  • new product acceptance
17
Q

virtual disadvantages?

7

A
  • Inability to meet outside of meeting times
  • Miscommunication
  • Time differences, language barriers
  • Technological limits – lag, signal loss
  • Less motivation to work
  • Cost of tech/setting up
  • Members may need to learn how to use new tech
18
Q

virtual collab implications?

7

A
  • Encourages global workforce
  • both positive and negative effects on work life balance
  • New tech may need to be adopted by employees
  • Reliance on technology
  • Technology limits: conflicts/misunderstandings
  • Changes in management style
  • Improved global relationships and interactions
19
Q

physical collab advantages and disadvantages and implications?

3 for each

A

Advantages
- Less reliant on internet
- Explanations and meetings are more hands on and personal
- Face to face contact allows for trust and relationships
Disadvantages
- Limited by geographical location
- Difficult to set meetings around everyone’s schedules
- Travel can be expensive and time consuming
implications
- Higher cost
- Better relationships between team members
- Reduced use of technology

20
Q

convergence disadvantages?

4

A
  • privacy concerns with interconnected systems collecting vast amounts of data
  • technology addiction
  • dependency on single device
  • changes how we interact, communicate and use technology (both bad and good)
21
Q

convergenct technologdy developments?

5 (the headings)

A
  • development in media
  • telecommunication advances
  • changes in hardware
  • importance of internet
  • then and now
22
Q

definition of personal and sensitive information

defintion and examples for each

A

Personal information
- any information that can be used to identify you
- e.g. address, date of birth, name, email, phone number

sensitive information
- information that is protected and should no be disclosed unless under specific circumstances
- e.g. ethnic origin, political opinions, religious beliefs, sexual preferences, criminal record, memberships

23
Q

information secuirty

A
  • the protection of information from unauthorised access
24
information security principles | 4
- confidentiality: information is not available to people who aren’t authorized to view it - integrity: people can trust that the information in an organization hasn’t been tampered with in any way - availability: people who are authorised to view data can do so when they need access - non-repudiation: ability to secure CIA principles by knowing who used it, how and when they always used it, so people cannot deny accessing it
25
ways to secure personal and sensitive info? | 5
- physical security: locks, cameras, keys - electronic audit trails: see who accessed it at what time - permissions - firewalls: blocks unauthorized data packets - anti-virus software
26
what is data breach? | 4
- anytime an unauthorised person accesses private data, it called a data breach - data breaches are a real threat to the security of information - when a data breach occurs, we expect and organization to try and reduce individuals impacts - the privacy act 1988 sets rules for handling personal info, including how organizations must protect information from data breaches