Implications of Computer Use
Effects of Computers (1.6.a, 1.6.b)
- Businesses no longer lose work because of employees taking sick leave, or due to poor weather conditions, as they can work from home.
- Businesses can trade internationally with ease thanks to e-commerce and the internet.
- Work can be outsources easily - it doesn't make a difference if a worker is connecting to the office from the same town or the other side of the world.
- Workers can be more easily distracted by other websites (such as facebook)
- Computers and the internet create a two-tier society - those who can afford them (the "information rich"), and those who can't (the "information poor").
- There is potentially a risk that critical infrastructure could be attacked by hackers. "FBI says hackers hit key services in three US cities" (BBC News, December 2011).
- Text speak, and a general over-reliance on spell checkers could have an impact on literacy.
- Increased stress levels caused by a faster pace of life (reading emails from home on a blackberry, etc).
- New laws have to be created to keep pace with evolving technology. Inevitably, the law is always a few paces behind criminals.
- Identities can be stolen by stealing usernames and passwords - in the "real world", it's almost impossible to steal somebody's identity.
- Many crimes that were very rare are now relatively common, because the tools are easily accessible, for example piracy.
- Technology such as the internet makes illegal downloading and plagiarism possible.
- The internet allows access to information on illegal drugs e.t.c.
- Computers can be used to help with education, and to spread understanding.
- Working from home saves carbon emissions caused by heating and lighting offices, and reduces the need to travel.
- Teleconferencing services such as Skype mean that international air travel for meetings is no longer necessary.
- Most technology is made from rare earth metals, which are a non-renewable resource. Also, processing them often releases toxic, and sometimes radioactive chemicals. For more information, read "Digging for rare earths: The mines where iPhones are born" (CNET, September 2012).
- Batteries used in portable technology are often toxic. Read "What Makes Batteries Toxic?" (About.com) for more information.
There are various ways to maintain privacy while using a computer. The most reliable way is simply to not give anyone else access to the computer (and therefore disconnecting it from the internet and other networks). This is a bit extreme, but the concept is used all the time. For example, rooms with computers in are normally kept locked, and screens are often angled so people can't easily snoop.
When sending information over the internet, it is protected by SSL (along with packet switching) which means that passwords and other confidential information cannot be read by a third party, even if they were able to collect all the packets and arrange them in the correct order. Similarly, removable media containing sensitive information (e.g. medical records) should be encrypted so that it cannot be read if it is lost (or stolen).
Computing Legislation (1.6.d)
These questions will generally focus of processing of personal data in accordance with the 8 principles of the Data Protection Act 1998, although there may be questions about the Computer Misuse Act 1990.