Moral, legal and ethical Issues

Slides:



Advertisements
Similar presentations
IT: Communication and Impacts
Advertisements

Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
Social Effects of ICT. AT WORK computers have Removed boring repetitive tasks in factories – now done by robots… Removed the need to do lots of calculations.
Dedicated Computer Systems
The laws Organizations are covered by lots of different laws
PRIVACY. In pairs Work out a definition of the word PRIVACY that you think makes sense You’ve got about 7 minutes...
ICT Exam Techniques This is a guide on how to achieve the maximum marks on the ICT Unit 1 Examination Paper.
ISNE101 Dr. Ken Cosh. Review  Dependability  Reliability  How do we improve it?  Security  Threats & Countering the Threats.
Computer Legislation The need for computer laws Go to Contents.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Liberal Studies 5. According to Source 1, what is the regulation of the plastic bag levy scheme? a)Retailers participating in the scheme will charge shoppers.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
Impacts of I.T. Ethical, Social, legal and economic impacts on I.T.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 7 Ethics in IT Societies.
GCSE CHILD DEVELOPMENT. Summary of Assessment Unit 1 Written Paper 1½ hours (40% final mark, one tier only) Unit 2 Controlled Assessment – Child Study.
How these affect the use of computers. There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer.
ICT DEVELOPMENT - PROGRESS …….. ICT is constantly changing and advancing as scientists and engineers create new technologies for us to use and enjoy.
Computer Systems D Stainton. Computer Misuse What is computer misuse? Criminal offences which can be committed using a computer.
SECURITY ISSUES. TYPES BLUE JACKING SENDING MESSAGES TO OPEN BLUETOOTH CONNECTION VIRUSES HARMFUL PROGRAMS THAT SPREAD WITHIN DIGITAL DEVICES COOKIES.
The Place of Cyberlaw in the MSIS Curriculum Ramesh Subramanian Bruce White Quinnipiac University.
Automated Data Capture Technologies O It is often necessary or convenient to capture data automatically, for example the delivery of a package by an Cable.
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
Trends in Computing You are expected to research a computing related technology (such as mobile phones, social networks etc.) You will communicate these.
Moral, Ethical, legal and cultural issues How technical innovation leads to moral, ethical, legal and cultural issues How our own moral and ethical beliefs.
Department of Defense. Business continuity Private network traffic management Logistics automation Fleet management Field force automation See how to.
1.4 wired and wireless networks lesson 1
Independent Centre for Privacy Protection Schleswig-Holstein
Remarks by Dr Mawaki Chango Kara University DigiLexis Consulting
Key words: Secure | Password | Character
Advanced Income Tax Law
Implications of Digital Technology for Business and Customers
Administrative Practices Outcome 1
Understanding EU GDPR from an Office 365 perspective
Ways to protect yourself against hackers
Contingent Workforce: Global Privacy Laws Overview
Data Protection Act and Other Laws
Starter: Unscramble 6. Altulcru 5. Saclio 1. Lgeal 4. Icecomno
WFSA E-Safety Guidance for Parents and Carers
Uses and Limitations of ICT
A Level Computing AQA (7517)
Living with technology
Edexcel GCSE ICT ASSESSMENT INFORMATION
Types of information systems in organizations and its characteristics
What is Tapestry? An Online learning journal system.
What Is Tapestry? An Online learning journal system.
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Regulation of Investigatory Powers Act 2000
Topic 6: Issues Press F5 to view!
ISNE101 Dr. Ken Cosh.
Chapter 1.1 Fundamentals of Computer systems
5 Techniques for a Proper Website Security Testing.
Unit 1.6 Systems security Lesson 3
Cambridge National Certificate in Information Technologies
What Is Tapestry? An Online learning journal system.
Digital $$ Quiz Test your knowledge.
Ethical, Legal, Cultural and Environmental Concerns
Computer Systems D Stainton.
– Communication Technology in a Changing World
Communication Technology in a Changing World
Y12 Transition Project AS Computer Science Free Powerpoint Templates.
The Main Ethical Considerations of Big Data
Digital Champion training for young people
Aims and Objectives.
BTEC level 3 Learning Aim G - Issues.
INFS 452 – Computer Ethics & Society
Handling information 14 Standard.
Discursive Writing Performance Criteria.
Y12 Transition Project AS Computer Science Free Powerpoint Templates.
End User Support By Dominique Stainton.
Presentation transcript:

Moral, legal and ethical Issues GCSE Computer Science Moral, legal and ethical Issues

AO1 Knowledge and Understanding The following is indicative of possible factors/evidence that candidates may refer to but is not prescriptive or exhaustive: - Modern encryption is easy to access. - The strongest encryption is (as far as is known). Unbreakable even by government agencies. - People leave a digital footprint wherever they go (mobile phones can track our location, store cards record our shopping habits). - Our online activities can be tracked by IP address and 3rd party cookies. - CCTV is ubiquitous. Most people carry round phones capable of taking video/photos. - Facial recognition AI techniques mean we may be filmed whilst unaware and subsequently identified. - The Data Protection Act aims to protect people’s data. - Computer Misuse Act Prosecutes those gaining unauthorised access to computer systems which may deter attempts to gain unauthorised access to data. - The Regulation of Investigatory Powers Act regulates how the authorities can monitor our actions.

AO2.1: Application The selected knowledge/examples should be directly related to the specific question. Examples may include but are not limited to: People can secure their data using encryption but the Regulation of Investigatory Powers Act can force them to share their key with the authorities. The government is becoming increasingly worried about encryption and there is the possibility of laws to limit its use in the future. Laws such as the Computer Misuse Act can act as a deterrent but the Internet is global and it is hard to pursue and prosecute offenders from other countries. Trying to be in a location anonymously is very difficult as movements are tracked in many different ways and this is becoming increasingly automated.

AO3.3: Evaluation Having considered the different sides to the argument candidates will need to reach a supported judgment based on the evidence included in their response. There should be no bias in marks as to which viewpoint is chosen but especially in the top mark band there must be a clear link between the points candidates have made and justification

All have reduced the number of tasks to be done... Technological advances in white goods: Automatic washing machines/dishwashers/... …leading to increased free time... …increased leisure time/more family time/... …chance to go to work because of time freed up, leading to... …increased family wealth  Chance to work from home: More time spent in productive work Chance to plan work around home life Because of advances in communication and... …and availability of more accessible technology  More recent advances including: Intelligent larders which know what food is in them and place automatic orders... ...delivered by supermarket and placed in larder from outside reduces the need for shopping  Robotic cleaners... ...reducing the need for cleaning by hand Microwave cookers have simplified the task of cooking together with... ...large amounts of processed food available which does not need preparation  All have reduced the number of tasks to be done...  ...the amount of time spent on those tasks which still need to be done  ...the knowledge needed to complete the tasks  The amount of socialising has been reduced eg when doing the shopping.