Please enable JavaScript.
Coggle requires JavaScript to display documents.
STRAND1: SOCIAL AND ETHICAL SIGNIFICANCE (People & Machines (How…
STRAND1: SOCIAL AND ETHICAL SIGNIFICANCE
Security
protecting IT systems from unauthorised users
Example
passwords
firewalls
locks used to restrict access to machines/networks
Related to issues: privacy and integrity
Privacy & Anonymity
Controling how data about people are used.
Who gets the data, Who gets the data shared, How long the data is stored, How the data is used
IT can reveal a great deal about people's lives by large databases of information, although names are not directly recorded
anonymous: Total privacy, hiding identity
positive (witness protection)
negative (cyber bullying)
Intellectual Property
creations of the mind(photographs, films, essays, and art works)
To protect intellectual property from unauthorised reproduction, there is the Copyright law
It’s easy to break copyright laws by quickly and easily distributing copies of work, since there’s little fear of being caught.
Authenticity
User proving their identity for accessing to a computer system.
Eg. usernames and passwords
Biometric authentication (fingerprints or retinal scans)
Digital signatures can be used transactions across the Internet
The Digital Divide&Equality of Access
IT has not developed at the same rate for everyone.
In countries, some groups or individuals lack access to technology or services, such as the Internet.
Digital divide between the 'IT-rich' and the ‘IT-poor' can be created by
lack of language
lack of training
lack of basic resources
Globalisation & Cultural Diversity
IT reduced global boundaries, speeded up the global spread of news and culture.
This spread has benefits and problems (erosion, complete loss of traditional cultures, values and languages)
Surveillance
Monitoring people either with or without their knowledge or permission using IT
Performed by governments, law enforcement, or private groups (employers).
world governments search for ways to fight global terrorism and crime.
Policies
Rules for controling how people use IT.
Either designed by individuals (schools/businesses) or organisations (take form of laws from governments)
Standards & Protocols
Technical rules for hardware and software designers
Needs to ensure different systems are compatible with each other.
Eg. JPEG image standard can be opened by any PEG-compatible graphics program.
It is needed for compatibility and interoperability
People & Machines
How humans interact with IT
eg. physical interaction by user interfaces and psychological response to IT.
Many people trust computers intrinsically, it might have consequences when it fails.
People might be relying on IT as to become addicted.
Decisions might be left to technology although human can be better
Digital Citizenship
Being a good citizen in a digital world.
Using information technology ethically, not harming other users, their hardware or software
Using IT in a way that respects the law (copyright)
Using in a way that does not expose yourself to danger (kids posting personal information on the Internet).