You are on page 1of 4

Social and Ethical Issues

The Impact of Software


Data Structures
Data Structure: A way of organising data in computer storage to ensure it can be
used efficiently (and accurately!).
o Primitive: Characters, integers
o Composite: Arrays, dictionaries, records, classes
Limitations of Computer Data structures:
o Word size: The computers preferred size for moving units of information
around. It defines the width of your processors registers, which holds data
during arithmetic and logical calculations. In the 1980s most computers had a
word size of 16 bits.
o Total memory storage: How many bits / bytes of storage. In 1980s a typical
computer could store.
o Processing speed: How many bits can be processed.
Malware
Malware = Malicious software
Tasks:
o Suggest characteristics of each.
o Write down definitions using the text (p4) or online.
o Find a recent example of one of these. Share on Google Classroom.
Virus
Characteristics
o Commonly attached or embedded within apparently legitimate software or
files.
o Able to execute, duplicate itself and perform its malicious processing.
Worms
Characteristics
o A type of virus which aims to slow down the system
o Exploits a security flaw in the OS and then install themselves on the hard
drive (often as hidden files).
o Begins to replicate itself over and over again, consuming the entire hard disk
over time.
o Typical symptoms include RAM being completely consumed by the worm.
Trojan Horse
Characteristics
o A malware that enables an outside user (or program) to take control of your
computer.
o
Spyware
Characteristics
o Aims to obtain your information without your knowledge.
o Able to capture your web browsing habits, read your email contacts or even
read keystrokes as you enter passwords and credit card details.
Ransomware
Characteristics
o A type of malicious software designed to block access to a computer system
until a sum of money is paid
Reliance on Software
For individuals, our reliance on software and being let down when it does not
perform as expected is usually just an inconvenience.
What issues could you envision for large companies that rely on software?
o $$$

Rights and Responsibilities


Response to Problems
When a user identifies a problem within a system, the developers have a responsibility to
respond and address the problem in a reasonable time frame, depending on the severity
and frequency of the issue.
Critical Affecting normal operations Immediate response
with no workaround.
Causing financial loss
Major Affecting normal operations
but there is an inconvenient
workaround available
Normal Affecting normal operations
but there is an accessible
workaround available.
Cosmetic No effect on normal As time allows
operations, but an
opportunity for
enhancement and
improvement
Ergonomics
Ergonomics: The study of the relationship between human workers and their work
environments.
In software, the issue of ergonomics is considered by:
o Considering the users needs from an ergonomic perspective
o Designing a user interface that allows users to work naturally, intuitively and
efficiently. The design should be consistent and follow design standards, use
screen elements (e.g. radio button) correctly, use colour and fonts
appropriately, align and group elements, be forgiving (allow users to reverse
an action)
o Performing usability testing to measure your success in addressing
ergonomics issues in your software design.
Privacy
Flickr
What information is collected
o Email address
o IM names
o Real name
o Current city
o Uploaded photos
o Photo data
How the information is used analytics, communication, sharing with businesses
o Advertisements associated with the photo you are seeing, or the search term
you entered.
Why they store personal information
When the policy applies e.g. to whom
o
Disclosure of potential future changes
o This page describes current Yahoo practices with respect to this particular
service. This information may change as Yahoo revises this service by adding
or removing features or using different service providers.
How the information is managed and kept secured
o
How to change your information / settings
o You can delete individual photos
o Visit your Flickr account information to edit your profile, settings and more.

Software Piracy & Copyright


Classification
Commercial
You are purchasing a license to use the software.
o https://www.adobe.com
o https://www.office.com
o https://www.autodesk.com
o
Open Source
The source code is developed collaboratively and is available to all to modify and
redistribute.
o https://www.blender.org
o http://www.chromium.org
o https://www.mozilla.org/en-US/firefox/
o https://www.mozilla.org/en-US/thunderbird/
o http://www.videolan.org/vlc/
o https://handbrake.fr
o https://sourceforge.net/projects/audacity/
o https://www.virtualbox.org
o https://www.gimp.org
o
Shareware
Covered by copyright. You are required a license to use the product. Purchasers are
allowed to make and distribute copies of the software.
o https://www.rarlab.com
Public Domain
o http://www.prongo.com/tictac/index.html

You might also like