Please enable JavaScript.
Coggle requires JavaScript to display documents.
Legal, social, economic and environmental impacts. (Legal Implications…
Legal, social, economic and environmental impacts.
Legal Implications
Computer Misuse Act
Involves the dishonest abuse of computer systems such as
Unauthorised access to computer material
this includes hacking.
Unauthorised access with intent to commit or facilitate commission of further offecnces
Further offences commited after hacking will still be charged
Unauthorised acts with intent to impair the operation of computer systems
This includes DDOS attacks, spreading viruses. Creating a virus isn't illegal but distributing it is.
Copyright Designs and Patents Act
Covers the illegal broadcasting, performing, copying, adapting, issuing, renting or lending of someone's work. The work may include literature, artwork, films and music.
Only the original owner of the work may start a court case.
Infringements include: copying CDs, downloading films, installing software with the purchase of a licence.
Communications Act
Deals with the abuse of telecommunications like phone lines, Wi-Fi hubs, phone networks and postal service.
The following things are ILLEGAL under the communications act:
Dishonestly getting electronic communication services
. LIke using a wi-fi connection without the owners permission or cloning a mobile SIM card so the orignal owner gets charged for your calls.
Possesion of software or hardware that can be used to dishonestly obtain communications services
This could include the use of software/hardware to access a protected network, tka econtrol of a radio frequency, block a television signal or produce clones of satellite TV cards.
Innappropriate use of public electronic communications network
This is broken by users of emails, social networks or mobile phones being offensive, obscene or threatening.
Regulation of Investigatory Powers Act
RIPA, a human rights group, has criticised the act saying that it invades peoples right to privacy. But the government insists that the act is only utitlised when serious crime is at hand or national security is at risk
Internet service providers also have to cooperate with the act and allow bodies to monitor suspects with through their internet providers.
The act utilises survelience techniques and undercover agents, it's also able to force owners of encrypted data to reveal it if need be.
Gives the governent, police and security service bodies the ability to intercept communications and things via the internet as well. To be able to investigate criminal activity.
Computer hardware and software now influences every aspect of our lives in many ways, some positive and some negative.
Economic influences
Advantages for companies
manufacture more while spending less
Communicate faster, both within the company and with the clients
target potential customers both within and with clients
Make more informed decisions regarding future products based on market analysis.
Companies also gain a massive competitive advantage if they computerise their business.
The development of the World Wibe Web has created a global market place were any company no matter how large can have an influence in it and recieve orders from anywhere in the world.
Other effects
The computerisation of businesses can create large costs, including fees for training staff and buying equipment and maintaining it.
The ability to adapt as a company technologically is called "scalability"
That's why companies utilise the services of cloud companies so they can upgrade their system capabilities.
Social influences
The growth of social media and gaming has created large online communities with a huge amount of users daily.
This has created a loss of barriers so anyone anywhere can talk to anyone.
The development of mobile devices no longer limits access to the web to a desk top PC.
Some of the developments has sparked new debate about the following topics:
Censorship and freedom of speech, governments have implemented legislation ranging from total control over what a citizen sees online to total freedom for people online.
Privacy
Encryption, do people have the right to hide and encrypt data they deem fit?
Enviromental factors
The use of computers anywhere creates a carbon footprint for the rest of its life
The computer also needs to be disposed of in an enviromentally friendly way
There is however examples of computers being a benefit to the environment, using calculations to save time and energy.
And computer controlled heating systems accurately time things