INF1505 - Module 4 - Study notes
INF1505 - Module 4 - Study notes
Learning Objectives
After studying this module, you should be able to:
1. Discuss information privacy and methods for improving the privacy of information.
2. Explain the General Data Protection Regulation (GDPR).
3. Explain the privacy issues of e-mail and data collection in a business setting.
4. Examine ethical issues and censorship in information technology.
5. Discuss the principles of intellectual property and issues related to the infringement of
intellectual property.
6. Discuss information system issues that affect organizations, including the digital divide,
electronic publishing, and the connection between the workplace and employees' health.
7. Describe green computing and the ways it can improve the quality of the environment.
Key Terms
• Acceptable Use Policies: Rules specifying the legal and ethical use of systems.
• Accountability: Responsibility and liability of users and organizations.
• Cheap Fakes: Manipulated audiovisual content created with inexpensive software.
• Cookies: Small files stored on users' devices to track browsing activities.
• Cybersquatting: Registering domain names to profit from others' trademarks.
• Deepfakes: Fake videos or audio recordings that appear authentic.
• Digital Citizenship: Safe, ethical, and responsible use of information technology.
• Digital Divide: Gap between information-rich and information-poor populations.
• Disinformation: False information knowingly distributed.
• Fake News: Intentionally misleading stories.
• Green Computing: Environmentally friendly computing practices.
• Intellectual Property: Legal protections for creations of the mind.
• Log Files: Records of user actions on websites.
• Misinformation: False information distributed regardless of intent.
• Nonrepudiation: Binding parties to contracts or agreements.
• Social Media Networking Ethics: Principles for respectful online interactions.
• Spam: Unsolicited bulk emails.
• Virtual Organizations: Networks of companies sharing resources.
Review Questions
1. What are three recommendations for improving the privacy of your information?
• Use encryption, limit access to personal data, and ensure websites have strong privacy
policies.
2. What are four key components of GDPR?
• User consent, anonymization, breach notification, and secure data transfer.
3. What are three recommendations for improving e-mail privacy?
• Encrypt sensitive emails, avoid unsecured accounts, and train employees on privacy
best practices.
4. What are the 10 commandments of computer ethics?
• Avoid harm, respect privacy, avoid theft, respect intellectual property, etc.
5. What are three examples of intellectual property?
• Copyrights, trademarks, patents.
6. What are four health-related issues of information technology?
• RSI, text neck, internet addiction, distracted walking.
7. What are three strategies for implementing a green computing program?
• Green design, green manufacturing, green disposal.
8. Define digital divide. Offer three recommendations for bridging the gap.
• Digital divide refers to disparities in access to technology. Recommendations include
increasing broadband availability, providing affordable devices, and offering digital
literacy programs.
Central Node:
Module 4: Personal, Legal, Ethical, and Organizational Issues