Issues and Impact Flashcards
(38 cards)
What are the environmental issues in the manufacture of digital devices?
- Large quantities of raw materials used to make digital devices
- Mining for raw materials scars the landscape with waste and damages wildlife habitats
- Energy used in the manufacturing process comes from non-renewable fossil fuels contributing to global warming
What are the environmental issues with energy consumption of digital devices?
Lots of energy used in:
1. Production of computer equipment
2. Functioning of equipment
3. Online data storage
4. Recycling of equipment
What are the environmental issues with disposal of digital devices
- Many discarded devices end up in e-waste which may be illegally dumped on landfill sites
- Substances such as lead can get into the land and water
- Severe health issues are caused by people living near, or trying to salvage saleable items from e-waste dumps
What can responsible recycling of e-waste address?
- Reduce the potential for chemical leakage
- Enable the recovery of valuable metals
- Reduce the need for mining
What are the environmental issues of short replacement cycles?
- Adds to the problem of e-waste
- More devices must be manufactured
What does responsible ownership involve?
- Keeping devices for longer
- Buying pre-owned rather than new
- Using energy-effcient measures to reduce power consumption
What is a digital footprint?
A trail of personal data left behind each time someone uses the internet
What are the benefits of collecting personal data?
1, Personalisation - offers can be tailored to an individual’s preferences and location
2. Convenience - personal details only need to be entered once
What are the drawbacks of collecting personal data?
- Privacy - it is not always obvious who is collecting and analysing personal data and who they are passing it onto
- Security - data breaches occur frequently. If it falls into the wrong hands it might be misused
What is the Data Protection Act (2018)?
An act that defines a set of principles that organisations must adhere to
What is the Computer Misuse Act (1990)?
An act used to prosecute cybercriminals on three offenses:
1. Unauthorised access to computer material
2. Unauthorised access with intent to commit further offenses
3. Unauthorised access with intent to impair the running of a computer or to damage or destroy data
What is artificial intelligence?
The general term for computer systems that are capable of performing tasks that typically require human intelligence, such as pattern recognition, decision making and problem solving
What is machine learning?
Machine-learning algorithms learn by looking for rules and patterns in real-time data and get progressively better at carrying out tasks
What is narrow AI?
When the AI fails outside the ‘problem space’ they were designed to work in such as email spam filters and self-driving cars
What is algorithmic bias?
When the Ai algorithm makes prejudiced decisions that discriminate against certain individuals
What are some causes of algorithmic bias?
- Dataset used to train the AI system is biased
- The developers unintentionally incorporate their own prejudices into them
Why might some AI systems go wrong?
- The creator includes an error in the algorithm
- The supplier of the data - the data used to train the algorithm has an error
- The user of the algorithm
What is copyright?
It covers the way an idea is expressed, such as novels and music recordings. Copyright is automatic and lasts for 70 years after the death of the holder
What are patents?
Patents protect new inventions and has to be applied for. A patent holder has the exclusive right to make, use and sell the invention for 20 years
What are trademarks?
Unique company logos and colours can be registered as trademarks which protects the brand and can distinguish their gods and services from those of their competitors. Registration of a trademark lasts for 10 years
What is licensing?
Where the copyright holder of a work can grant a license that permits a third party to use it
What are the reasons hackers use malware?
- To infect a computer with a virus or a worm causing it to run slowly or crash or delete/damage data
- To gain backdoor access into a computer or network and then launch a ransomware attack or harvest sensitive data
- To spy on what a user is doing
- To carry out a distributed denial of service (DDS)
How do hackers use viruses and worms?
- A virus inserts itself into another program and lies hidden until its host runs. It then makes copies of itself once activated and attaches to other programs.
- A worm infects systems by moving from one device to another. They can infect an entire network quickly but don’t embed itself within other programs
How do hackers use Trojans?
A Trojan acts as a legitimate software which users are tricked into downloading and gives the hacker access to the files and a backdoor into devices on the same network