Modern computer systems & Ethics

Zachary Kublalsingh

Unit2

Jul 20, 2024

Estimated reading time:


Modern computer systems & Ethics




Issues confronting modern computer systems, societies and users

  1. Security and Privacy

Cyberattacks: Threaten data integrity, financial systems and critical infrastructure

Data breaches: Increasingly vulnerable leading to identity theft and financial losses.

  1. Digital Divide

Unequal access to technology: Exacerbates existing inequalities in education, employment and healthcare

Lack of digital literacy: Hinder ability to participate in the digital economy

  1. Artificial Intelligence

Automation: The ability to displace workers raises concerns

Bias and discrimination: Algorithms can perpetuate existing social inequalities

Ethical concerns: Areas like autonomous weapons and biometric recognition

  1. Social Media and Misinformation

Misinformation

Negative impacts on mental Health

Moderating content and preventing harmful use

  1. Environmental impact of technology

Production, use and disposal leads to pollution

Increased energy consumption

  1. Accessibility

Disparities due to people with disabilities

Need more technology designed for all



Intellectual Property

Protects the creations of the mind, encouraging innovation and rewarding creators

 

Piracy

Unauthorized use or reproduction of protected property

 

Privacy

Right to control your private information

 

Data Protection

Laws aiming to protect privacy and regulate collection, use and storage of personal information

 

Computer Misuse

Unlawful use of computers and networks such as hacking and data theft

 

Threats

Viruses:

Malicious code that attaches itself to existing files and harms your system.

Worms:

Self-replicating programs that exploit network vulnerabilities.

DDoS (Denial of Service Attack):

Overwhelms a system with traffic, making it unavailable.

Malware:

Software designed to harm your system or steal data.

Ransomware:

Encrypts your data and demands payment for decryption.

Hacking:

Gaining unauthorized access to a computer system or network.

 

Countermeasures

Installing anti-virus software

Use strong passwords

Be cautious when opening attachments and clicking on links

2 factor authentication



 

Software licenses

Shareware

Software distributed for free trial with limited functionality. Can be used before buying a full license

Freeware

Software distributed for free without restricted access

FEATURE SHAREWARE FREEWARE OPEN SOURCE
Cost Free trial, then paid license Completely free Completely free
Functionality Limited features in trial version Full functionality Full functionality
Restriction Cannot use beyond trial period without purchase No limitations May have restrictions based on license
Distribution Can be distributed with permission Can be freely distributed Can be freely distributed
Source code Usually not publicly available May be open-source or closed-source Publicly available for anyone to see, modify and distribute
⚠️ Did you spot an error? Contact Us!
Please include the title of the note, the respective Notebook and the error to speed up the process.

Read Next

Dont't forget to check out our Instagram Page!
edukatte_tt