Unit 11: Computing and Ethics
11.1
A
Surveillance system
protect citizens from crime
Beneficial if it is used to ensure safety and to prevent crime.
Harmful if it is used to track innocent people's movements to keep them
under control
Credit card reader
to process payments for cardholders
Beneficial if it is used to allow individuals to use their own money to make
purchases
Harmful if it is used fraudulently to remove other people's money from
their accounts
DNS testing system
to help identify diseases and solve crimes
Beneficial if used to identify diseases which can be treated.
Harmful if used to identify diseases so that people can be excluded from
health insurance policies
Body scanner
to identify weapons or explosives for security purposes
Beneficial if it is used to identify weapons or explosives
Harmful if it is used to look at somebody without their clothes on, without
their consent
B
Unit 11 Computing and Ethics
1
C
🍎
Reasons and results 💙
Building an argument
another point is
and another thing
as a result
consequently
because
as
finally
lastly
firstly
to begin with/ to start with for one thing
for example
for instance
in addition
also
moreover
furthermore
one result of this is
Unit 11 Computing and Ethics
2
one consequence of this is
because of this
secondly
next
then
since
as
so
therefore
thus
hence
A typical argument is constructed like this:
firstly
in addition
secondly
another point is
moreover
finally
D
bene'ficial
good
👍
'censorship
control
🔏
'conflict
dispute
😠
'ethical
Unit 11 Computing and Ethics
3
moral
'faulty
⛔
flawed
'harmful
damaging
🌌
'impact
effect, to affect, have an influence on
impli'cation
effect that an action or decision might have on sth else
'justify
give a good reason (for doing sth)
'negligence
carelessness
👋
🗣
🤕
obli'gation
duty
🤹
repu'tation
record
🎙
res'ponsible
to blame
🤐
sur'veillance
monitoring
🎦
E
increasingly
progressively
balance
reconcile
Unit 11 Computing and Ethics
4
obligations
commitments
practical
sensible
profound
fundamental
consequences
effects
resulted in
caused
widespread
extensive
illustrates
shows
arise
occur
disagreement
dispute
important
crucial
computer professionals
IT contractors
loss of life
death
environmental contamination
Unit 11 Computing and Ethics
5
destruction
negligence
failure in standard
conflict of opinion
disagreement
computer professionals
employee
Unit 11 Computing and Ethics
6
F
Digital Millennium Copyright Act DMCA
Unit 11 Computing and Ethics
7
European Union Copyright Directive EUCD
Computer Misuse Act
Hacker's Manifesto
UK Data Protection Act DPA
World Intellectual Property Organization WIPO
Unit 11 Computing and Ethics
🌐
8
Digital rights management DRM software
🎲
cybercrime
crime carried out involving the used of a computer
email forgery
to create an email which appears to come from somebody else
📧🤫
keylogger
a software application which logs all the keystrokes made by a user (often
used to capture passwords)
⌨
malware
collective description of all kinds of harmful software
💻🤡
hacker
somebody who can gain unauthorized access to other people's
computers; can also means somebody who likes to write
Trojan
malicious software, disguised as or embedded in harmless software which
allows a user's computer to be taken over
🐎📲
computer fraud
to use a computer to deprive somebody of money or other valuables by
deceiving them
😕
identity theft
Unit 11 Computing and Ethics
9
to steal somebody else's identify
🛂
phishing
to use a forged e-mail to entice users to a fake website with the intention
of defrauding them
✉
botnet
short for 'robot network'; a collection of computers on which software has
been installed to control them without their users' knowledge, often used
for illegal purposes
🤖
11.2
G
Unit 11 Computing and Ethics
10
Don't misunderstand me ...
clarification
To some degree, ...
tentative point
It is fair to say that ...
tentative point
In an attempt to
purpose for speaking
That is to say
restatement
To the extent that
clarification
Not only that, but
another point
... gives a good description of ... in ...
summary of a source
Briefly, ... (he) explains how ...
summary of a source
(He) has no doubt that
definite point
With respect to
statement of a topic
... is a case in point
example
11.3
'disciplinary 'action
Unit 11 Computing and Ethics
11
'black 'hat
i'dentity 'theft
de'nial of ser'vice
'software ex'ploit
'social engi'neering
i'llegal ac'tivities
'bulletin 'board
11.4
A,B
'black hat hacker
a hacker who gains access to systems for personal gain or in order to
damage them
known 'software exploit
a known flaw in a piece of software which allows hackers to take control of
it
technical legal 'breach
where the law is broken, but the breach is very minor and the case is
extremely unlikely to be taken to court
'password protection policy
a policy which sets out how strong passwords can be generated and when
they should be changed
'Internet safety guidance
guidance for avoiding malicious websites, phishing and other types of
Internet dangers
secure 'equipment disposal
how to get rid of old equipment in a way which does not compromise
security; particularly important for old data disks and other forms of
storage
Unit 11 Computing and Ethics
12
B
client consent
Consent given by client (in this case, to access a system)
data protection
laws protecting individual privacy when data is processed
legal situation
The legal position in a given set of circumstances
penetration testing
Carried out by ethical hackers who are paid to test a system's security
privacy legislation
laws protecting individual privacy
reverse engineering
where a piece of software is essentially taken to pieces in order to view
the original code used to write it, and in this way to reveal any potential
flaws
root access
a type of login which gives a user control over the whole machine
successful outcome
a satisfactory end result
target system
the system which is the target of the penetration testing
unpatched exploit
a flaw in the software which allows hackers to take over the machine,
which has not had the software company's patch (or solution to the flaw)
applied
Unit 11 Computing and Ethics
13