Issues and impact

Cards (40)

  • E-waste Discarded electronic equipment including computer technology mobile devices etc
  • Carbon footprint Carbon dioxide produced as a result of consuming energy
  • The Basel Convention A treaty designed to protect developing countries from e-waste from developed countries (USA Europe etc)
  • Personal data Information that is personal and unique to an individual
  • Identity theft Stealing someones personal details in order to commit fraud or another crime
  • GDPR (2018) Law that controls how organisations can use personal data they have gathered
  • Big data' A term for the huge amounts of personal data that is gathered and analysed from online activities
  • Computer Misuse Act (1990) Law that defines these crimes: 1 - unauthorised access to a computer system 2 - unauthorised access to commit further crimes (identity theft) 3 - intentional destruction of data (eg. installing a virus)
  • Copyright Designs and Patents Act (1988) Law that makes it illegal to copy or modify intellectual property without permission
  • Proprietary software Software that is paid for not open for modification
  • Open-source software Software that is free can be modified by users
  • Algorithmic bias occurs when a computing innovation systematically discriminates against certain individuals or groups and creates unfair outcomes for some and favorable outcomes for others.
  • Artificial intelligence A scientific field that focuses on creating machines capable of performing activities that require intelligence when they are done by people.
  • Machine Learning A type of artificial intelligence that leverages massive amounts of data so that computers can improve the accuracy of actions and predictions on their own without additional programming.
  • Ethics The principles of right and wrong that guide an individual in making decisions
  • Software Licensing Defines the permissions rights and restrictions assigned to the person who purchases a copy of software
  • cybersecurity Measures taken to protect a computer or computer system against unauthorized access or attack
  • Cyber attack An attempt by hackers to damage or destroy a computer network or system
  • Malware Software that is intended to damage or disable computers and computer systems.
  • Cloud computing A system in which all data is stored on a central server owned by a company (e.g. Google) and accessed virtually
  • Social engineering Techniques that trick a person into disclosing confidential information
  • Worm A software program capable of reproducing itself that can spread from one computer to the next over a network
  • Virus A piece of code that is capable of copying itself and typically has a detrimental effect such as corrupting the system or destroying data
  • Trojan a program disguised as a harmless application that actually produces harmful results.
  • Baiting A victim is enticed by the offer of something for free; a music download or a free game for example
  • Ransomware A type of malicious software designed to block access to a computer system until a sum of money is paid.
  • Quid pro quo Something given in exchange or return for something else
  • Replacement cycle The period of time between the purchase of a product and its replacement with an equivalent product.
  • Data breach The unintended release of sensitive data or the access of sensitive data by unauthorized individuals.
  • Data subject The individual about whom information is being processed such as the patient at a medical facility the employee of a company or the customer of a retail store.
  • Intellectual property A product of the intellect such as an expressed idea or concept that has commercial value.
  • Trademark A brand that has exclusive legal protection for both its brand name and its design
  • Spyware Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
  • Encryption Process of converting readable data into unreadable characters to prevent unauthorized access.
  • Phishing An attack that sends an email that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
  • Pretexting A form of social engineering in which one individual lies to obtain confidential data about another individual
  • Software patch A piece of software designed to update a computer program in order to fix a software vulnerability or improve the program
  • Anti-malware A utility that searches for and removes any malware on a computer.
  • Backup and Recovery Plan Backup - An exact copy of a system's information Recovery - The ability to get a system up and running in the event of a system crash or failure
  • Acceptable Use Policy (AUP) Requires a user to agree to follow it to be provided access to corporate email information systems and the Internet