6.1 Safe and Responsible Use of Computers

The safe and ethical use of computers is essential to protect privacy, data, and general wellbeing from hazards such as material loss, data loss, and cybersecurity risks.

Key Takeaway: Implementing basic security practices can prevent the majority of common cyber threats and data breaches.

6.1.1 Keep Your System Updated

  • Consistently update the operating system, software, and antivirus.
  • Updates fix security flaws and protect the system from malware.
  • Maintain the most recent virus definitions in your security programs.

6.1.2 Use Strong and Unique Passwords

  • Create unique passwords using a mix of capital/lowercase letters, numbers, and special characters.
  • Avoid using easily guessed data like names or birthdays.
  • Turn on two-factor authentication for all online accounts.
  • Keep passwords private and never reveal them to anyone.

Pro Tip: Use a password manager to generate and store complex, unique passwords for all your accounts.

6.1.3 Beware of Phishing Attacks

  • Be cautious of emails, messages, or pop-ups asking for login details or personal info.
  • Scammers often pretend to be official entities to trick you.
  • Do not click on suspicious links; always verify the sender's email address.

6.1.4 Backup Your Data

  • Always save copies of important files in a safe place (e.g., external hard drive or the cloud).
  • Ensures data recovery if the computer is stolen, damaged, or fails.

6.1.5 Use Secure Wi-Fi Connections

  • Access the internet via protected Wi-Fi networks with strong passwords.
  • Avoid using public Wi-Fi for private tasks like online banking.
  • If public Wi-Fi is necessary, encrypt the connection using a Virtual Private Network (VPN).

6.1.6 Be Careful What You Download

  • Download apps and files only from reliable websites.
  • Avoid untrusted sites to prevent viruses and malware.
  • Be especially careful with email attachments from unknown senders.

6.1.7 Privacy and Physical Security

  • Adjust privacy settings on social media and apps to limit shared personal info.
  • Keep the computer physically secure and lock it when you are away.
  • Stay informed about the latest cybersecurity threats.

6.1.8 Safe Online Shopping and Banking

  • Use secure websites with URLs beginning with "https://" and a padlock symbol.
  • Do not divulge unneeded personal details during transactions.

6.2 Responsible Use of Hardware and Software

6.2.1 Responsible Hardware Use

Focuses on security, sustainability, effectiveness, and ethics.

  • Extended Lifespan: Prevent physical harm and keep gadgets free of dust to reduce technological waste.
  • Data Security: Use encryption and regular firmware updates to prevent hardware from being utilized in hacks.
  • Sensible Upgrades: Only upgrade when truly needed to avoid creating unnecessary waste.
  • Safe Use: Follow manufacturer guidelines for handling and maintenance to prevent accidents.
  • Ethics: Use only authorized hardware/software; do not visit restricted websites or share unlawful content.

6.2.2 Responsible Software Use

Technology should benefit individuals and society while minimizing harm.

  1. Observing the Law: Abide by copyright and intellectual property laws; respect software licenses.
  2. Ethical Use: Avoid using software for hacking, malware, or cyberbullying.
  3. Privacy: Be mindful of shared personal info and configure software privacy settings.
  4. Intellectual Property: Respect patents, trademarks, and copyrights; recognize open-source contributors.
  5. Proper Licensing: Understand and obey open-source or commercial license terms.
  6. User Education: Inform yourself and others about digital literacy and cybersecurity best practices.

6.2.3 Irresponsible Use of Software

Examples of unethical software use include:

  • Breaking into someone else's computer.
  • Disseminating malware.
  • Producing child pornography.
  • Cyberbullying.
  • Stealing someone else's ideas (intellectual property theft).

6.3 Safe Use of Digital Platforms

Practicing digital safety protects personal information, privacy, security, and overall well-being across services like social media, online banking, and email.

6.3.1 Safe Use of Data Searches

  • Trusted Platforms: Stick to well-known search engines (e.g., Google, Bing, DuckDuckGo) and official data repositories like government or academic websites.
  • Information Privacy: Avoid sharing sensitive personal details (SSNs, credit card numbers) in search engines.
  • Vigilance: Most searches do not require personal details; only provide information on secure, official sites.

6.3.2 Safe Use of Social Networking

  • Responsible Sharing: Only post information you are comfortable with the public seeing.
  • Sensitive Data: Be extremely cautious about sharing financial info, medical records, or home addresses.

6.4 Laws for Privacy and Intellectual Property

Rules are essential in the digital age to protect individual rights and promote a just society.

6.4.1 Protection of Individual Rights

  • Definition: Safeguarding a person's personal info, freedom, and privacy.
  • Goal: Ensuring no one misuses data without permission and that everyone is treated fairly.

6.4.2 Prevention of Unauthorized Use

  • Intellectual Property: Stopping others from using ideas, inventions, or creative works (books, music, software) without the owner's permission.
  • Privacy: Protecting personal information from being accessed or copied without consent.

6.5 Computing Innovation

Computing innovation involves creating new or improved hardware, software, and processes that change how society functions.

Key Areas of Innovation

  • Hardware Advancements: Developing faster, energy-efficient processors and high-capacity storage.
  • Software Development: Creating innovative solutions like AI, machine learning, and specialized applications.
  • Emerging Technologies: Expanding boundaries with Blockchain, Quantum Computing, Virtual Reality (VR), and the Internet of Things (IoT).
  • Human-Computer Interaction (HCI): Improving interfaces through natural language processing and gesture recognition.

6.5.1 Benefits of Computing Innovation

  1. Increased Productivity: Automation and robotics handle repetitive or hazardous tasks efficiently.
  2. Improved Communication: Tools like email, video conferencing, and social media allow instant global interaction.
  3. Information Access: The internet provides vast resources for education and research.
  4. Medical Advancements: Improvements in medical imaging, drug discovery, and treatments for mental health (using VR).
  5. Other Impacts: Safer transportation (autonomous vehicles), interactive entertainment, and accessible e-learning.

6.5.2 Harmful Effects of Computing Innovation

  • Privacy Concerns: Massive collection and analysis of personal data often occur without informed consent.
  • Digital Addiction: Excessive screen time and constant connectivity can lead to anxiety, depression, and social isolation.
  • Environmental Impact: Production of devices leads to greenhouse gas emissions and electronic waste (e-waste).

Malicious Software and Cyber Threats


Important: Understanding common cyber threats is the first step in protecting yourself against them.

Malware

  • Definition: Software designed to harm or exploit computers and networks.
  • Examples: Computer viruses, ransomware, and Trojan horses.

Phishing

  • Definition: Tricking individuals into revealing sensitive information through fake emails or websites.
  • Example: A fraudulent bank email asking for login credentials.

Hacking

  • Definition: Gaining unauthorized access to or manipulating computer systems and networks.
  • Example: Stealing information from a company database.

Spyware

  • Definition: Software that secretly collects user information without consent.
  • Example: Tracking online activities to send data to advertisers.

Pharming

  • Definition: Redirecting website traffic to a fake site without the user's knowledge.
  • Example: Redirecting a user from a legitimate banking site to a fraudulent one.

Other Digital Issues

  • Spam: Unsolicited, irrelevant, or inappropriate internet messages (e.g., promotional emails).
  • Cookies: Small text files stored on a device that track interactions to personalize user experience.
  • Scams: Deceptive schemes (like fake lottery wins) designed to trick people for financial gain.

Software Types and Licensing


  • Software Piracy: Unauthorized copying, distribution, or use of software without proper licensing (e.g., using "cracked" versions).
  • Freeware: Software that is free to use without payment (e.g., Mozilla Firefox).
  • Shareware: Software distributed on a trial basis, requiring purchase for full functionality (e.g., WinRAR).
  • Open Source: Software with publicly accessible source code that anyone can view, modify, and distribute (e.g., Linux).

Information Privacy and System Security


Information Privacy

  • Concept: Keeping personal information safe from unauthorized access.
  • Tradeoff: Stricter security often requires more effort, such as using complex passwords or encryption.

System Security

  • Definition: Mechanisms implemented to protect systems and data from unauthorized access, damage, or theft.
  • Primary Goal: To ensure confidentiality, integrity, and availability of resources.
  • Examples: Firewalls, encryption, antivirus software, and access control.

Disinformation vs. Fake News


  • Disinformation: False or misleading information spread deliberately to deceive people.
  • Fake News: False or misleading information created to deceive, though not always with the specific intent to cause harm.
  • Impact: The ease of spreading these online can have serious consequences for public discourse and decision-making.

Social Networking

  • Definition: The practice of using online platforms to connect with people, build relationships, share information, and communicate.
  • Purpose: Designed to facilitate the exchange of ideas, interests, personal updates, and professional networking.
  • Common Platforms: Facebook, Twitter, Instagram, YouTube, and WhatsApp.

Harmful Effects

  • Mental Health: Excessive use can lead to addiction and negatively impact well-being.
  • Cyberbullying: Platforms can be used to harass, threaten, or humiliate individuals, leading to severe psychological consequences.
  • Data Privacy: Networks collect vast amounts of personal data, which can be misused or exposed in security breaches.
  • Misinformation: Rapid spread of false information, conspiracy theories, and "fake news" (misleading info presented as factual) which lacks proper verification mechanisms.

Approaches to Computing Effects

Computing has a deep impact across several key areas of life:

  • Personal Impact: Makes life easier through devices like smartphones. Supports tasks, remote work, health monitoring, and digital payments.
  • Ethical Impact: Raises concerns regarding privacy, hacking, and data breaches. Highlights the need for ethical practices to protect information.
  • Social Impact: Transforms how we learn and connect. Provides instant messaging and global access to information via search engines and online education.
  • Economic Impact: Creates new industries (software development, e-commerce), boosts job opportunities, and improves business efficiency through automation.
  • Cultural Impact: Connects cultures globally, promotes diversity, and helps preserve traditions through online archives and videos.
  • Globalization: Enables instant global communication, facilitates international trade, and creates a more connected world.
  • E-commerce: Transforms shopping by allowing businesses to reach global customers and making transactions faster and more secure.

Intellectual Property (IP) Protection

IP protection safeguards "creations of the mind" to foster innovation and prevent unauthorized use.

Definition: Intellectual property refers to creations of the mind, such as inventions, literary and artistic works, designs, symbols, names, and images used in commerce.

Key Terms

  1. Patents: Legal documents granting exclusive rights to an invention for a specific period (usually 20 years). It prevents others from making or selling the invention without permission.
  2. Trademarks: Recognizable signs, designs, or expressions (like the Apple logo) that distinguish products or services of one source from others.
  3. Copyrights: Legal rights granted to creators of original works (like books). It allows creators to receive compensation and prevents others from reproducing or distributing the work without permission.