Digital divide
gaps between those who have access to the internet and those who do not
Open-sourcing
work is freely shared, distributed, and modified
personally identifiable information (PII)
nformation that can be used to identify you
Encryption
encoding data to prevent others from accessing it
computing bias
computing innovations can reflect existing racial/gender/etc biases. Ex: recruiting algorithms that prefer one race or gender over another
copyright
When someone uses something without someones permission
virus vs worm
Viruses are attached to infected files and must be activated by the user; worms can operate independently.
key
a secret piece of information used to encrypt data
Creative Commons
copyright license for creators to give others the ability to use their work
malware
malicious software that takes control of a system
symmetric key encryption
one key for both encrypting & decrypting
Intellectual property
the work that people consider “theirs”
phishing
tricks people into giving their personal information away by pretending to be a trustworthy group
public key encryption
public key to encrypt & private key to decrypt
Citizen Science
scientific research that the general population helps to conduct.
multi-factor authentication
requiring multiple methods of verification.