1.2.3 Discuss the social and ethical issues associated with a networked world.

HideShow resource information
Security
Very important, computers have to protect data from viruses (example: The Stuxnet Virus) so that the data is not accessible for anyone that does not have the right to access it.
1 of 5
Privacy
Sensitive issue for interconnected computers, has a lot in common with security. Should be able to choose what info is shared and with whom (example: GPS on phones).
2 of 5
Censorship
Issue in interconnected computers, some info may be deemed inappropriate by the network manager (example: The Muhammad movie trailer).
3 of 5
Addiction
Gambling addictions are more likely to stem from internet use & smartphones, sites are more accessible. Brought about issue of fraud; it is impossible for the user to know if the game is operated fairly.
4 of 5
Dependency
Any online-related, compulsive behaviour which interferes with normal living and causes severe stress on the surrounding network of people of the user. (lying or hiding the extent or nature of and inability to control your online behaviour.
5 of 5

Other cards in this set

Card 2

Front

Sensitive issue for interconnected computers, has a lot in common with security. Should be able to choose what info is shared and with whom (example: GPS on phones).

Back

Privacy

Card 3

Front

Issue in interconnected computers, some info may be deemed inappropriate by the network manager (example: The Muhammad movie trailer).

Back

Preview of the back of card 3

Card 4

Front

Gambling addictions are more likely to stem from internet use & smartphones, sites are more accessible. Brought about issue of fraud; it is impossible for the user to know if the game is operated fairly.

Back

Preview of the back of card 4

Card 5

Front

Any online-related, compulsive behaviour which interferes with normal living and causes severe stress on the surrounding network of people of the user. (lying or hiding the extent or nature of and inability to control your online behaviour.

Back

Preview of the back of card 5

Comments

No comments have yet been made

Similar Computing resources:

See all Computing resources »See all 1.2 Components of a Computer System resources »