Knowledge Organiser 8 : Ethical, Legal, Cultural and Environmental Concerns
| |
Fossil Fuels | Fossil fuels are consumed in the manufacturing of computer devices |
Energy | 2% of global energy consumption is used by data centres |
Disposal | Old computing equipment is often shipped to countries with lower standards for disposal. People trawl through waste looking for metals to be recycled and sold, exposing themselves to danger. |
| |
Implications |
|
| |
Implications |
|
Positive Effects |
|
Negative Effects |
|
| |
Customers | Customers can do more from home with less travelling involved. They can do things 24/7. They can access their data on many devices. Computers can make instant decisions without human involvement. Potentially open to hacking. Less personal |
Staff | Job losses as things become more automated. New types of jobs created that didn’t previously exist. Up-skilling required |
Companies | Less overheads (salary, rent, utility bills) if fewer staff and buildings required. More ways to target potential customers. Increased importance of data protection and security |
Local Communities | Local shops may suffer is town centres are more empty. Elderly and vulnerable customers may have nowhere local to go as local services are scaled back |
| |
Data Protection Act (2018) [implementing GDPR] |
|
Computer Misuse Act (1990) | It is illegal to make any unauthorised access to data…�…with the intent to commit further offences�…with the intent to modify data, e.g. viruses |
Copyright Designs and Patents Act (1998) | It is illegal to copy, modify or distribute software, music, videos or other intellectual property without permission from the author |
| |
Open Source | Users can modify and distribute the software. Can be installed on any number of computers. Support provided by the community. May not be fully tested. Users have access to the source code |
Proprietary Source | Users cannot modify the software. Protected by CD&P Act. Usually paid for and licensed per user or per computer. Supported by developers. Users do not have access to the source code. Tested by developers prior to release. Although they may run beta programs. |