GCSE Pc Science/Impacts of Digital Expertise on Society

Wikibooks, open books for an open world

From Wikibooks, open books for an open world

Soar to navigation
Soar to look

Moral Points[edit]

Digital Expertise[edit]

  • Much less actual interplay
  • Wearable expertise – much less telephones when driving, health trackers enhance well being, good glasses are an invasion of privateness attributable to cameras
  • Implants – well being monitoring, handy, costly, privateness points
  • Digital divide – poor/wealthy, rural/city, previous/younger – deprived attributable to lack of entry
  • World divide – entry in HICs has offered alternatives for improvement – elevated inequality

The Web[edit]

  • Anonymity permits cyber bullying (intimidation and insults à misery and suicide) and trolling (feedback to trigger arguments and frustration)
  • Use of web for banking and buying means organisations retailer our private knowledge – duty of cyber safety to stop identification theft
  • Companies offering Wi-Fi have duty to limit websites to guard youngsters

Accessing Providers[edit]

  • Streaming – Low-cost and handy for customers however may be unlawful if the service doesn’t personal content material and entry misplaced at finish of subscription or if websites closed
  • Apps equivalent to ‘Uber’ have been profitable on good telephones
  • These are low cost and handy however conventional providers are dropping enterprise. Danger attributable to much less strict laws on new kinds of providers.
  • Partial entry to cloud storage at no cost helps to scale back digital divide
  • Cellular video games might exploit impulsive spending, youngsters might by chance spend cash

How Companies Function[edit]

  • They anticipate workers to use for jobs on-line and have pc abilities – some deprived
  • Work telephones can invade free-time as firms can at all times contact staff
  • Implants in staff can improve safety and comfort however may be unethical
  • Adverts swamp social media – if blocked free providers can’t be funded
  • Codes of conduct to indicate dedication to moral use of expertise


  • Private info is not personal – held by web sites and social media encourages folks to submit these particulars
  • Customers don’t learn or are pressured to just accept privateness agreements
  • Corporations can promote particulars and habits to promoting firms and so forth.
  • Privateness may be elevated in settings
  • We should belief firms to maintain knowledge safe nonetheless knowledge is commonly leaked

Surveillance and Censorship[edit]

  • Surveillance – monitoring use of web
  • Safety providers do that to behave in opposition to terrorism
  • Web service suppliers retailer our historical past
  • Censorship – management over what folks can entry (e.g. by governments)
  • China – No websites may be important of presidency, no overseas websites; Cuba – authorities entry factors to internet solely
  • Restricted entry to pornography and playing websites to guard youngsters
  • Controversial – some are for, many are in opposition to this as an invasion of liberty and privateness

Authorized Points[edit]

Private Knowledge[edit]

  • Knowledge have to be used pretty for specified goal. It shouldn’t be extreme nevertheless it have to be correct. It should stay on this nation until closely protected. It ought to be secured and solely stored for the required time. Rights have to be noticed.
  • Organisations should register what knowledge they may acquire with the federal government
  • They will need to have good cyber safety – exhausting for small companies – costly
  • Cloud storage have to be dependable – should perceive the place knowledge is saved

Pc Misuse Act[edit]

  • Unauthorised entry is unlawful
  • Intention of utilizing entry for crime is unlawful
  • Deleting and altering information; making, supplying and acquiring malware are all unlawful

Cyber Crime[edit]

  • Criminal activity on computer systems – Hacking is exploiting safety weaknesses to achieve unauthorised entry to entry knowledge or unfold malware
  • Passive – monitoring knowledge on a community; lively – malware to assault a system; brute-force – automated software program to crack passwords by trial and error; denial-of-service – floods a community with visitors to stop use
  • Criminals have good computing data so can simply keep away from seize

Copyright and Patents[edit]

  • Copyright act protects mental property (created) from being copied or stolen
  • Patents cowl concepts, innovations and ideas (e.g. {hardware})
  • Copyright doesn’t have to be utilized for together with code however not algorithms until they’re particular sufficient for a patent
  • Tough to show copying – coincidence if identical downside, if supply code is secret, it can’t be in contrast
  • Web file sharing has made this tougher – activation keys and on-line affirmation used (DRM)
  • Software program with DRM is cracked to take away these undesirable options (illegally modified)
  • This software program is distributed on-line
  • Cracking also can trigger lack of earnings to a creator

Copying and Sharing Legally[edit]

  • Open supply (e.g. Firefox, VLC and GIMP) – free to obtain and modify
  • CC licences – permits sharing of software program however not for revenue or modified code
  • On-line group enhance and repair software program

Environmental Points[edit]

Pure Assets[edit]

  • Computer systems comprise uncooked supplies
  • Plastics come from crude oil
  • Restricted valuable metals are additionally used up
  • This makes use of vitality, creates air pollution and depletes finite sources


  • Non-renewable fuels used, air pollution and greenhouse gases launched
  • Massive servers require plenty of air conditioning and energy; this air conditioning additionally requires vitality
  • Wasted vitality – little or no utilized by processor, they’re left on usually additionally
  • Digital servers can scale back variety of servers and vitality used, switching off saves energy, wired connections require much less energy as it’s used trying to find connection


  • 20-50 million tonnes yearly attributable to brief life-times
  • Attributable to brief warranties and advertising and marketing of upgrades
  • WEEE has guidelines for disposal, encourages reuse and recycling
  • E-waste is dumped in Africa and Asia attributable to much less regulation – hazard as poisonous chemical substances pollute groundwater and hurt wildlife

Related posts

Leave a Comment