Y12 Impacts of technology Flashcards

(44 cards)

1
Q

U3 What is intellectual property

A

the creation of the mind, such as inventions, literary and artistic works, designs, symbols, names etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

U3 list and explain the types of protection under the IP law

A

Registered design: the visual appearance of a product is protected, but not the way it works
Trade mark: not just the brand name/logo, its an identity
Patent: protects how an invention works or functions
Copyright: owners original expression of ideas are protected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

U3 explain the relationship between IP and copyright

A
  • certain material is automatically protected under the Australian law
  • gives the owner legal rights to take action if someone else uses the material without permission
  • some material includes books, music, films, sound recordings, newspapers etc.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

U3 what is fair dealing

A
  • allows people to use the material without permission as long as it is used for the following purposes
    -> research or study;
    -> criticism or review;
    -> reporting news;
    -> parody or satire;
    -> giving professional advice
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

U3 what is online defamation

A
  • when a person intentionally states or spreads information about another person
  • whether a situation is considered defamatory, it depends on the circumstances, but a rough guide is
    -> marks someone as the ‘butt’ of the joke
    -> damages their reputations
    -> causes others to avoid them
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

U3 what are the forms of defamation

A
  • video content, social media, emails, sms etc
  • can take many forms, including novels, cartoons, paintings etc.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

U3 what are the legal ramifications of online defamation

A
  • it is illegal and if found guilty, civil action may be taken to court to pay damages to the victim
  • the compensation will change depending on circumstances
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

U3 what is the objective of defamation laws

A
  • objective is to balance protection of individual reputations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

U3 what is the difference between civil and criminal defamation

A

civil: arises from publications likely to harm a person’s reputation
criminal: publications that affect the community

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

U3 how do you prove you have experienced online defamation

A

to claim compensation:
- it was online
- it isn’t true
- there was malicious intent
the following must be present for a claim to be valid:
- the defamatory material was publish
- you or your business are identified in it
- it caused or continuing to harm your repution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

U3 what are the elements of a defamation case

A
  1. a statement that is made must be false
  2. it must be published to someone other than the object
  3. it must be made with the intent to hurt them
  4. there must be actual damage, like loss of job/emotional harm
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

U3 what is freedom of information

A
  • individuals have the right to request access to documents from the Australian Government Ministers and most agencies under the FOI Act 1982
  • the act covers:
    -> Australian government ministers
    -> most Australian government agencies
    -> the Administration of Norfolk island
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

U3 what is the importance of FOI

A
  • ensures government transparency
  • encourages active individual participation with government
  • some examples include medial records, non-confidential government documents, personal documents etc
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

U3 what can’t you access under FOI

A
  • personal information, national security, defence or international relations, law enforcements etc.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

U3 what is virtual collaboration

A
  • method of collaboration between virtual team members that is carried out
  • people involved don’t physically interact with each other
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

U3 what are the advantages of virtual collaboration

A
  • allows businesses to hire people from al over the world
  • reduces travel and cost times
  • meetings anytime from anywhere
  • easier to share resources
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

U3 what are the disadvantages of virtual collaboration

A
  • inability to meet outside of set meeting times
  • time differences, language barriers, cultural differences may be difficult to overcome them
  • reliance and cost of technology
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

U3 what are the implications of virtual collaboration

A
  • encourages a global work face
  • has a both positive and negative effect on work-life balance
  • reliance on technology
  • technological limits may be reached
  • lack of motivation
19
Q

U3 what is technological convergence

A
  • refers to the combination of two or more different technologies in a single device
20
Q

U3 what are some advantages of technological convergence

A
  • time and cost savings
  • improves human performance
  • allows communication
  • a single piece of technology does more
21
Q

U3 what are some disadvantages of technological convergence

A
  • some devices are less reliable
  • potential data security issues arise
  • waste of investments
22
Q

what is personal information

A
  • information that can be used to identify you
  • some examples are your name, DOB, address, email, phone number
23
Q

what is sensitive information

A
  • information that is protected and shouldn’t be disclosed
  • examples are your racial or ethnic origin, political opinion, religious beliefs etc
24
Q

what are some ways to secure the security of personal and sensitive information

A
  • businesses and organisations have an obligation to protect information collected by customers
  • unauthorised access could lead to identity theft and fraud
  • physical security, electronic audit trails, file permissions, firewalls etc
25
what is a data breach
- anytime an unauthorised person accesses private data - its a real threat to the security of information
26
how does data breach go with the law
- the APPs set out rules for handling personal information - they require organisations to protect personal information
27
what is the NDB scheme
- the notifiable data breach (NDB) scheme is a mandatory data breach notification scheme that requires organisations to notify the affected individuals and OAIC - the Office of Australian Information Commissioner (OAIC) is responsible for regulating and enforcing privacy laws - under the NDB scheme, organisations must comply with the law - generally has 30 days
28
what is information security
- the theory of allowing access to information to people in organisation who are authorised to see it
29
what are the principles of information security
Confidentiality - information isn't available to people who shouldn't see it Integrity - people can trust the information hasn't been tampered with Availability - people who are authorised to view data can do so when they need access Non-repudiation - the idea that your information should only belong to you and those you allow to see or use it
30
what is a code of conduct
- a set of guidelines or standards employees must follow when they enter a business
31
what is the purpose of a code of conduct
- establishes expected behaviour and standards -> covers ethical principles, workplace conduct, conflicts of interest etc - written document -> as it's written, it is tangible and everyone has access to the same information - grounds for disciplinary action/termination -> accountability, fairness, discipline, deterrence - broader purposes -> culture building, reputation management and risk mitigation
32
how does a COC allow for flexibility in the workplace
- types of flexibility include flextime, remote work, hybrid models, compressed hours - ICT enables remote access technology, specific tools like VPNs, cloud-based storage, collaboration platforms, remote desktop software
33
what does the COC say about work hours
- it provides the basis for employer expectations - defined work periods including breaks (lunch) - technology enables location flexibility but requires clear expectations
34
what does the COC say about emails
- employees have to be careful because it gives written evidence - shouldn't send inappropriate emails
35
what does the COC say about internet use
- employees can only use business internet for business purposes - employees mustn't visit websites that could diminish level of productivitiy
36
what are the employers rights when it comes to COC
- employers have right to monitor work emails, internet use ec - they have the right to monitor ICT systems to; -> protect the business from legal threats and malware -> ensure the business has a positive reputation -> ensure workers remain productive
37
what is online censorship
- the control or suppression of online content - governments and other organisations use it to block access to copyrighted information, harmful or sensitive information
38
why is online censorship used for protection
- preventing people accessing copyrighted information - stopping people from viewing harmful and/or sensitive content - control internet-related and internet communicated crimes
39
list and describe forms of online censorship (6)
DNS tampering/filtering - officials can 'deregister' a domain hosting nefarious content - this makes website invisible because it prevents the translation of domain names into site IP addresses IP blocking - governments can blacklist certain IP addresses they don't like - when you request access, it is monitored and if you try to see a forbidden site, it will fail Keyword filtering - only blocks websites that are explicitly blacklisted - it will filter/inspect a website and scan for 'suspect' keywords URL filtering - mechanism scans requested Uniform Resource Locater (URL) - if it contains forbidden terms, connection will be reset Packet filtering - filters incoming and outgoing packets and let them pass or not based on the IP address of source and destination Deep packet filtering - examines packet for banned keywords
40
what are negative impacts of online censorship
- restricts too much information - who's to define what is censored and what isn't? - censors free speech - curb access to harmful activities
41
what are positive impacts of online censorship
- stops fake news - curb access to harmful activities
42
what is shadow banning and how does it work
- shadow banning is a practice by online platforms where the user's content visibility is reduced or blocked without user being notified How it works - user posts content and their post/comment becomes less visible or invisible - platforms use algorithms and/or human review to apply restrictions
43
why is shadow banning used and what are the impacts and concerns of it
Why: - to combat scams, spam, bots or automated behaviour - reduce the spread of content that violates community guidelines Impacts: - significant drop in user engagement and reach - makes it difficult to grow their audience
44
how to get around internet censorship
- use VPN, smart DNS, free proxy, google translate, IP address, tools etc.