3. Impact of ICT on society

  • Internet
    • A wide area network consisting of an international network of computer networks
  • Online service
    • A service provided via the Internet that allows users to access the service by using their PC and a router or modem
      e.g. online shopping and banking
  • Card payment gateway systems
    • An online service used by auction, booking and shopping websites to allow customers to pay over the Internet. It involves computer networks and several operators to handle a large volume of calls
  • Worldwide web
    • A system of connected HTML documents accessed via the Internet using a web browser
  • Price comparison services
    • A website that gives a comparison of prices from different retailers together with a link to the retailer's website
  • Browse
    • To read and navigate through a series of web pages received from the Internet
  • Username
    • The identifier a user types into an ICT system in order to gain access to the system. Every user has a unique username so that authentication can be carried out.
  • Password
    • An authentication technique user to access a computer system. The user types in their username followed by their password which only they know. This method of security relies on the user never revealing their password to other users.
  • Hacker
    • An unauthorized user of computer systems
  • Identity fraud
    • The copying of the details of a person for illegal user by another. Copying details of a credit card onto another card is a common method.
  • Encrypted data
    • Data that has been changed into a meaningless collection of characters so that it can be transmitted securely.
  • Encryption key
    • The code that is used to change normal data into encrypted data.
  • Website
    • A collection of interrelated web pages that relate to one topic or organization and are usually accessible via the Internet
  • Domain name
  • Web server
    • The name given to both the hardware and software required for the hosting of websites. Large organizations often have their own web servers but small organizations tend to use a hosted web server.
  • Shopping cart software
    • Software used to create the representation of a shopping cart for customers to buy goods online
  • User interface
    • The method by which a computer interacts with a user. It normally consists of a specially designed screen that allows the user to input information as well as providing output to the user.
  • Phishing
    • A method of fraud where the user or customer is sent an e-mail purporting to be from the bank asking for their account details and passwords. On receipt of this information the fraudster is able to access the customer's account online and defraud that person.
  • Robots
    • A device often used in industrial applications to act independently, having been programmed to carry out a specific task.
  • Program
    • To create a set of instructions that will produce a required output from an ICT system
  • Systems Analyst
    • An individual who is responsible for the phases of the systems life cycle being carried out.
  • Design
    • A stage in the systems life cycle occurring after an existing system has been analyzed and before a new system is created
  • Implementation
    • The installing of a new ICT system to replace an existing system
  • Computer programmer
    • A person who writes software routines for use in various applications. They usually work in conjunction with a systems analyst who directs the requirements of a program
  • Help desk
    • Usually a telephone service, where the operators help people with their problems. It is used frequently to help with technical problems related to computers
  • Teleworking
    • A method of working that involves employees spending all or some of their working week at home, using their home as an office and making use of ICT to do so
  • Encryption
    • The process of creating encrypted data
  • Decrypt
    • To remove encryption from received data, thus enabling the user to understand what would otherwise be unintelligible.
  • Public-key
    • A type of encryption-key that is given out by a computer to enable other computers to encrypt data to send to it.
  • Transaction numbers (TANs)
    • A password that is used once only as a security method in online banking
  • Chip and PIN
    • A technology that is used in debit and credit cards for payment in stores or use with ATMs. The chip is read by a card reader machine and is compared with the number typed in by the customer. It helps to ensure security of transactions.
  • PIN
    • Personal Identification Number. Usually typed into a PIN reader when using a chip and PIN card.
  • SSL
    • Secure sockets layer. A network of protocol that is used for remotely accessing a computer or server using encryption security.
  • TLS
    • Transport layer security
  • Protocols
    • Sets of rules that governs how communication between two devices will occur.
  • Duty of confidence
    • The responsibility of an employee to the company they work for and the customers whose personal details they are dealing with to maintain the confidentiality of the data
  • Duty of fidelity
    • The responsibility of an employee to remain loyal to the company they work for as long as they are employed there. They should not pass on company secrets to other organizations.
  • Anonymised information
    • Personal details of an individual where the name or other identifying information is left out.
  • Aggregated information
    • Personal details of individuals combined to provide information without naming those individuals.
  • Skimming
    • A type of identity fraud where a card that is swiped legitimately in a retail outlet is swiped again on another machine that reads all the details from the card. This data is then transferred to a blank card for further use.
  • Pharming
    • A process whereby the user, typically a bank customer using online banking, of what appears to be a genuine website is redirected to a bogus website. The customer thinks they are dealing with their bank but actually sending their details to a fraudster's website.
  • Carpel tunnel syndrome
    • A medical condition causing pain in the forearm and wrist that can be caused by repetitive use of the keyboard
  • Cubital tunnel syndrome
    • A medical condition similar to carpel tunnel syndrome, but which occurs in the elbow and is most commonly caused by regularly making lengthy mobile phone calls