G10 IT Social Implications

Cards (32)

  • EULA: A legal contract between a software application author or publisher and the user. It defines the ways in which the software may be used.
  • Copyright: A legal protection for original works of authorship, giving creators exclusive rights to their work for a limited time, with the intention of enabling fair compensation for the creator's intellectual effort.
  • Piracy: The unauthorized reproduction or use of someone else's work, such as software, music, or movies, without permission from the copyright owner.
  • Copyleft: A general method for making a program (or other work) free and requiring all modified and extended versions of the program to be free as well.
  • Creative Commons: A licensing system that allows creators to specify which rights they reserve and which rights they waive for their work, providing a flexible alternative to traditional copyright.
  • Digital Divide: The gap between demographics and regions that have access to modern information and communication technology and those that don't.
  • Intellectual Property: Creative ideas and expressions of the mind, including inventions, literary and artistic works, designs, symbols, names, and images used in commerce.
  • Repetitive Strain Injury: A condition characterized by discomfort or pain in the muscles, tendons, and nerves caused by repetitive movements and overuse of certain body parts.
  • Carpal Tunnel Syndrome: A specific type of RSI affecting the hand and wrist, caused by pressure on the median nerve, often due to repetitive motions or improper wrist positions.
  • Ergonomics: The study of designing equipment and devices that fit the human body, its movements, and its cognitive abilities, aiming to enhance efficiency and prevent discomfort or injury.
  • Standby Power: The electric power consumed by electronic appliances while they are switched off or in a standby mode, often in a low-power state but still using energy.
  • E-Waste: Discarded electronic devices and equipment, including computers, smartphones, and appliances, that have reached the end of their useful life.
  • Paperless Office: An office environment where the use of paper is significantly reduced or eliminated through digital documentation and communication methods.
  • Energy Star: A label given to devices that are energy-efficient products, encouraging the reduction of greenhouse gas emissions.
  • Green Computing: The practice of designing, manufacturing, using, and disposing of computers, servers, and associated subsystems efficiently and effectively with minimal impact on the environment.
  • Virus: A malicious software program that replicates itself by modifying other computer programs and inserting its own code. They can cause harm to a computer system or network by corrupting or destroying data, stealing sensitive information, or disrupting system operations.
  • Malware: A broad term that encompasses various types of malicious software, including viruses, worms, Trojans, spyware, adware, and ransomware. They are designed to harm or exploit computer systems and networks.
  • Anti-virus Software: Software designed to detect, prevent, and remove malicious software (malware), including viruses, from computer systems.
  • Virus Signature: A unique identifier or pattern used by anti-virus software to recognize specific viruses or malware. They are created based on the characteristics of the malicious code and are used to detect and remove infections.
  • Quarantine: Isolating and containing infected or suspicious files in a secure area within a computer system to prevent the spread of malware. This allows users to review and analyze potentially harmful files without risking the overall system's security.
  • Computer Worm: A self-replicating malware program that spreads without user intervention. They exploit vulnerabilities in networked computers to replicate and spread to other devices, often causing network congestion and system slowdowns.
  • Trojan: A type of malware disguised as legitimate software or files. They often create backdoors for remote access, steal sensitive data, or enable other malicious activities.
  • Spyware: Malicious software designed to secretly monitor and gather user information, including keystrokes, browsing habits, and personal data, without the user's knowledge or consent.
  • Adware: Software that displays unwanted advertisements on a user's computer, often in the form of pop-up ads or banners. They can slow down system performance and disrupt the user experience.
  • Pop-up Blocker: A feature or software application that prevents pop-up windows, commonly used for displaying advertisements, from appearing on a user's web browser.
  • Spam: Unsolicited and often irrelevant or inappropriate messages sent over the internet, typically in bulk. They are commonly found in email messages and can include advertisements, scams, and phishing attempts.
  • Hoax: A false or deceptive message or rumor circulated on the internet, often via email or social media, with the intention of misleading or alarming recipients. They can spread misinformation and create unnecessary panic.
  • Identity Theft: The unauthorized use of someone else's personal information, such as social security numbers, credit card details, or passwords, to commit fraud or other crimes. This can lead to financial loss and reputational damage.
  • Phishing: A fraudulent attempt to obtain sensitive information, such as usernames, passwords, and credit card numbers, by sending an e-mail asking a person to update their personal details and having a link to a fake website.
  • Pharming: A cyber attack that redirects website traffic from legitimate websites to fraudulent websites without the user's knowledge.
  • E-mail Spoofing: A technique used to forge or disguise the sender's email address to appear as if the email originated from a trusted source.
  • Netiquette: Refers to the rules and conventions governing online behavior and communication. It encompasses polite and respectful conduct in emails, social media, forums, and other online platforms.