Show Menu

WJEC A2 Computer Unit 3.9 Cheat Sheet by

alevel     computing     wjec

Moral and Ethical Issues

Moral issue
It concerns our own individual behaviour and our own personal concept of right and wrong. We learn our moral values from other people such as our parents, teachers and peers, and we learn them for ourselves from experience
Ethical Issues
Factors that define the set of moral values by which society functions.

Moral and Social Issues

Unauth­orised access
Hackers gain access to systems for different reasons. Hacking for the purposes of committing fraud is considered to be wrong by many people. However, there are groups of people called ethical hackers who claim that they hack in order to expose weaknesses in system security. They claim that their actions therefore are for the good of society.
Unauth­orised use of software
Some people believe that software companies and progra­mmers spend hours developing programs and should therefore be rewarded for their work. Some people believe that software is too expensive, requires too many updates and that software companies are exploi­tative. Therefore, downlo­ading or copying software is morally defend­able.
Inappr­opriate behaviour
There is evidence that people's behaviour changes when they are online. In the worst cases this can lead to online bullying, trolling and other forms of abuse that may then spread into the real world.
Inappr­opriate content
A lot of content on the Internet is what most people would consider to be inappr­opr­iate. This includes pornog­raphy, violence or sites promoting religious or ethnic hatred. These sites may not be illegal but there is concern about what effect they have on the society, partic­ularly younger people.
Freedom of speech
Some people believe that you should be able to say whatever you like, even if that offends other people. The Internet gives almost everyone the ability to do that. It therefore raises the issue of whether there should be some code that all Internet users should adhere to when expressing their views.
Unempl­oyment
A broader social issue relates to the impact that new technology has on people's working lives. For example, many businesses such as retail and banking may no longer need to employ as many people in their stores and branches. On the other hand, they may create more jobs in IT for employees working in their on line busine­sses.
Access to the Internet
It is difficult to know how many people have access to the Internet. Some estimates are that there are 2.5 billion Internet users. There are 7 billion people in the world, so that means only around 35% of the world's population have access to it. An estimated 15% of the UK population do not have Internet access. Are they disadv­antaged by this?

Legal Issues

Legal issues relate to those issues where a law has been passed by the govern­ment. There are very few Acts of Parliament that are specific to the world of computing. The two main ones are the Data Protection Act and the Computer Misuse Act.

Legal Issues Con

Geogra­phical limita­tions
Most UK laws only apply in the UK With the global nature of the Internet it can be difficult to prove where a particular offence took place. Also, if the perpet­rator breaks a UK law but they are based in another country, it can be difficult to prosecute them. Different countries have different laws and therefore there is no universal way of regulating the computer industry or the Internet.
Constant change
Many acts are introduced in response to current events. As technology develops so rapidly, laws often become out of date quite quickly. The Computer Misuse Act is a good example of this as it was introduced before the widespread adoption of the Internet.

Cultural Issues

Over-use of data
There are fears that we are becoming completely dependent on data. Data are being collected about us by every single organi­sation we deal with including government agencies and busine­sses. Many decisions about the way in which the country is run are based on data analysis.
Invasive techno­logies
A lot of data are collected without our consent. Satellite images and Google StreetView enable anyone to look at your house. Zoopla and other websites tell everyone how much you paid for it.
Over-r­eliance on computers
What happens when computer systems fail? At a simple level you might lose some data on your computer. At a more serious level people may be in physical danger or even die as a result of computer failure.
Over-r­eliance on technology companies
According to some sources, two-thirds of all Internet searches are done through Google. That is around 115 billion searches a month. Wikipedia often appears on the front page of search results. This gives these two organi­sations a massive influence over the inform­ation we access.
'Big brother' culture
The original meaning of 'big brother' is that the government is watching everything we do and that we have to modify our behaviour to meet expected behavi­ours. With the increasing use of CCTV, the desire for national identity cards and the monitoring of emails and mobile phone calls, some people believe that we heading in that direction.
Global­isation
As we become more connected to other cultures, we are more likely to be influenced by them. For example, many indivi­duals and organi­sations use technology to try and influence the debate on religion and politics.

Code of Conduct

always operate in the public interest
have a duty to the organi­sation that they work for, or the college they attend
have a duty to the profession
maintain profes­sional competence and integrity.
 

Data Protection Act

Fairly and lawfully processed
Processed for limited purposes
Adequate, relevant and not excessive
Accurate and up-to-date
Not kept longer than necessary
Processed in accordance with the data subject's rights • held securely
Data may not be transf­erred outside EU unless the country has adequate data-p­rot­ection legisl­ation.
Another feature of the Act is that data subjects have the right to know what data are stored about them by any particular individual or organi­sation. These are known as subject access rights. If this inform­ation is incorrect then the data subject has the right to have it corrected. The organi­sation must be given notice and may charge a small fee to the data subject

Freedom of Inform­ation Act

The Freedom of Inform­ation Act extends the subject access rights of the Data Protection Act and gives general rights of access to inform­ation held by public author­ities such as hospitals, doctors, dentists, the police, schools and colleges. Both Acts are overseen by the Inform­ation Commis­sioner.

The Act gives indivi­duals access to both personal and non-pe­rsonal data held by public author­ities. The idea behind the Act was to provide more openness between the public and government agencies. Therefore, the agencies are obliged to give the public access to inform­ation and to respond to individual requests for inform­ation. Much of this is done through websites and email commun­ica­tions.

Computer Misuse Act

Unauth­orised access to computer programs or data
This includes some forms of hacking including breaking through password protection and firewalls, decrypting files and stealing another user's identity.
Unauth­orised access with further criminal intent:
An extension of the first offence where there is a clear intention to carry out a further criminal act such as an act of fraud or a copyright breach.
Unauth­orised modifi­cation of computer material
This includes falsifying bank details or exam grades, spreading viruses designed to corrupt data and programs and interf­ering with system files.

Regulation of Invest­igatory Powers (RIP) Act

Part 1
which relates to the interc­eption of commun­ica­tions, including electronic data
Part 3
which covers the invest­igation of electronic data protected by encryp­tion. In simple terms
They also have the right to decipher these data if they are encrypted even if this means that the user must tell the police how to decrypt the data.

It also allows employers to monitor the computer activity of their employees, for example, by monitoring their email traffic or tracking which websites they visit during work time. This raises a number of issues relating to civil liberties.

Copyright, Designs and Patents Act

This Act gives rights to the creators of certain kinds of material allowing them control over the way in which the material is used. The law covers the copying, adapting and renting of materials.

The law covers all types of materials but of particular relevance to computing are:

• original works including instru­ction manuals, computer programs and
• some types of databases
• web content
• original musical works
• sound recordings
• films and videos.

Copyright applies to all works regardless of the format. Conseq­uently, work produced on the Internet is also covered by copyright. It is illegal to produce pirate copies of software or run more versions on a network than have been paid for. It is an offence to adapt existing versions of software without permis­sion. It is also an offence to download music or films without the permission of the copyright holder.
In computing, two techniques are used to protect copyright:

• Digital Rights Management (DRM): This uses access control software to limit the way in which users can control, use, copy, print or edit digital content that they have bought.

• Licensing: Normally used for software, this provides users with a paper-­based or digital proof that they have purchased software legally and details what they are allowed to do with the software.

Other Acts Relevant to Computer Science

The Official Secrets Act prevents the disclosure of government data relating to national security.
The Defamation Act prevents people from making untrue statements about others which will lead to their reputation being damaged.
The Obscene Public­ations Act and the Protection of Children Act prevent people from dissem­inating pornog­raphic or violent images.
The Health and Safety (Display Screen Equipment) Regula­tions provides regulation on the correct use screens and is a specific addition to the Health and Safety at Work Act, which contains more general regulation on keeping employees safe.
The Equality Act makes it illegal to discri­minate against anyone of the grounds of sex, sexual orient­ation, ethnicity, religion, disability or age. This includes the dissem­ination of derogatory material.

Download the WJEC A2 Computer Unit 3.9 Cheat Sheet

4 Pages
//media.cheatography.com/storage/thumb/brecon_wjec-a2-computer-unit-3-9.750.jpg

PDF (recommended)

Alternative Downloads

Share This Cheat Sheet!

 

Comments

No comments yet. Add yours below!

Add a Comment

Your Comment

Please enter your name.

    Please enter your email address

      Please enter your Comment.

          Related Cheat Sheets