Merry Christmas !
Icon done by Aleem Dabiedeen
Modern computer systems & Ethics
Modern computer systems & Ethics
Edu Level: Unit2
Date: Jul 20, 2024
⏱️Read Time:
Issues confronting modern computer systems, societies and users
- Security and Privacy
Cyberattacks: Threaten data integrity, financial systems and critical infrastructure
Data breaches: Increasingly vulnerable leading to identity theft and financial losses.
- Digital Divide
Unequal access to technology: Exacerbates existing inequalities in education, employment and healthcare
Lack of digital literacy: Hinder ability to participate in the digital economy
- Artificial Intelligence
Automation: The ability to displace workers raises concerns
Bias and discrimination: Algorithms can perpetuate existing social inequalities
Ethical concerns: Areas like autonomous weapons and biometric recognition
- Social Media and Misinformation
Misinformation
Negative impacts on mental Health
Moderating content and preventing harmful use
- Environmental impact of technology
Production, use and disposal leads to pollution
Increased energy consumption
- Accessibility
Disparities due to people with disabilities
Need more technology designed for all
Intellectual Property
Protects the creations of the mind, encouraging innovation and rewarding creators
Piracy
Unauthorized use or reproduction of protected property
Privacy
Right to control your private information
Data Protection
Laws aiming to protect privacy and regulate collection, use and storage of personal information
Computer Misuse
Unlawful use of computers and networks such as hacking and data theft
Threats
Viruses:
Malicious code that attaches itself to existing files and harms your system.
Worms:
Self-replicating programs that exploit network vulnerabilities.
DDoS (Denial of Service Attack):
Overwhelms a system with traffic, making it unavailable.
Malware:
Software designed to harm your system or steal data.
Ransomware:
Encrypts your data and demands payment for decryption.
Hacking:
Gaining unauthorized access to a computer system or network.
Countermeasures
Installing anti-virus software
Use strong passwords
Be cautious when opening attachments and clicking on links
2 factor authentication
Software licenses
Shareware
Software distributed for free trial with limited functionality. Can be used before buying a full license
Freeware
Software distributed for free without restricted access
FEATURE | SHAREWARE | FREEWARE | OPEN SOURCE |
---|---|---|---|
Cost | Free trial, then paid license | Completely free | Completely free |
Functionality | Limited features in trial version | Full functionality | Full functionality |
Restriction | Cannot use beyond trial period without purchase | No limitations | May have restrictions based on license |
Distribution | Can be distributed with permission | Can be freely distributed | Can be freely distributed |
Source code | Usually not publicly available | May be open-source or closed-source | Publicly available for anyone to see, modify and distribute |