Sunteți pe pagina 1din 6

Axel Vasquez

Reliability: Reliability can be defined as the probability that it will produce correct outputs up to some given time. Reliability is enhanced by features that help to avoid, detect and repair hardware faults.

Integrity: Is the assurance that information can only be accessed or modified by those authorized to do so. Measures taken to ensure integrity include controlling the physical environment of networked terminals and servers, restricting access to data, and maintaining rigorous authentication practices.

Refers to maintaining and assuring the accuracy and consistency of data over its entire life-cycle,[1] and is an important feature of a database or RDBMS system. Data integrity means that the data contained in the database is and reliable.

Security: Security is information security as applied to computers and networks. The field covers all the processes and mechanisms by which computerbased equipment, information and services are protected from unintended or unauthorized access, change or destruction. Computer security also includes protection from unplanned events and natural disasters.

Refers to techniques for ensuring that data stored in a computer cannot be read or compromised by any individuals without authorization. Most computer security measures involve data encryption and passwords.

Privacy Involves the right or mandate of personal privacy concerning the storing, repurposing, provision to third-parties, and displaying of information pertaining to oneself via the Internet.

Privacy can entail either Personally Identifying Information (PII) or non-PII information such as a site visitor's behavior on a website. PII refers to any information that can be used to identify an individual. For example, age and physical address alone could identify who an individual is without explicitly disclosing their name, as these two factors are unique enough to typically identify a specific person.

Anonymity: Meaning "without a name" or "namelessness". In colloquial use, anonymity typically refers to the state of an individual's personal identity, or personally identifiable information, being publicly unknown. Anonymity may also be created unintentionally, through the loss of identifying information due to the passage of time or a destructive event.

Intellectual property:

is a legal concept which refers to creations of the mind for which exclusive rights are recognized.[1] Under intellectual property law, owners are granted certain exclusive rights to a variety of intangible assets, such as musical, literary, and artistic works; discoveries and inventions; and words, phrases, symbols, and designs. refers to creations of the mind: inventions, literary and artistic works, and symbols, names, images, and designs used in commerce.

Authenticity: authenticity is the process of ensuring that a message received is the same message that was sent and has not been tampered with or altered.

The definition of authenticity refers to the proven fact that something is legitimate or real.

Digital division: Renowned for our easy-to-update, beautifully designed, cutting-edge Web sites, we work with you in partnership to create the Web site of your dreams. By providing all-inclusive services, or helping on specific problem areas, we remain flexible, always. is an economic inequality between groups, broadly construed, in terms of access to, use of, or knowledge of information and communication technologies

Equality of Access: This term is used to describe the patterns of unequal access to information technology like computers and the internet. The growth of the use of IT systems has led to disparities in the use of, and access to, information technologies. Disparities exist not only internationally between countries, but also within countries between different socio-economic groups as well as within what may appear to be relatively homogenous groups.

Surveillance: Surveillance is the use of IT to monitor the actions of people. For example, monitoring may be used to track, record and assess employees performance. It can be used to support claims for promotion or to ensure that employees follow the organizations internet policy appropriately.

In public places like malls or schools, surveillance might be good, it can be used to prevent crimes. With surveillance, people would think twice about their actions, thus, number of crimes might be able to be controlled. Surveillance such as CCTV can also be used as an evidence in crime investigations. However, surveillance can also bad. It can be categorised as invasion of privacy.

Globalization: Globalization means the diminishing importance of geographic, political, economic and cultural boundaries. IT has played a major role in reducing these boundaries. There is a fear that easier communication can become a source of cultural homogeneity. The new global village

provides a worldwide cultural awareness, but may lead to less diversity.

Cultural diversity: Cultural diversity is the quality of diverse or different cultures, as opposed tomonoculture, as in the global monoculture, or a homogenization of cultures, akin tocultural decay. Cultural diversity, or multiculturalism, is based on the idea that cultural identitiesshould not be discarded or ignored, but rather maintained and valued

Policies:

Policies are enforceable measures intended to promote appropriate and discourage inappropriate use relating to information technologies. They

can be developed by governments, businesses, private groups or individuals. They normally consist of rules governing access to, or use of, information, hardware, software and networks. Policies also affect the exchange of information, for example, by making it subject to copyright laws and raising peoples awareness of plagiarism. In general, policies can promote or restrict access, guide behaviour, require the fulfillment of certain conditions prior to or during use, or need to be developed to address unforeseen issues such as cyber-bullying.

Standars: .A level of quality or attainment. .Something used as a measure, norm, or model in comparative evaluations

Protocols: The official procedure or system of rules governing affairs of state or diplomaticoccasions. A set of rules governing the exchange or transmission of data between devices

People and machines: The use of IT systems brings significant advantages, for instance in ease of use, being available 24/7, or through its use rather than exposing humans to a potentially hazardous environment. However, this can raise concerns about the rate at which technology is

being introduced and issues that may arise from insufficient testing in critical situations such as air traffic control. The ultimate fear of many people is that future systems will be programmed to make decisions that would be better taken by humans, such as the decision to deploy nuclear weapons.

Digital citizenship: Digital citizenship can be defined as appropriate behaviour that represents the responsible, ethical and legal approach that individuals take in any situation with respect to the use of IT. permeates, in one way or another, all of the preceding social and ethical considerations.

S-ar putea să vă placă și