1 14 17
2/15
18
3
4
5 16
6
7
8
9
10
11
12
13

Crossword: Social, Ethical & Legal Considerations

Across

1. the practice of keeping and storing data for a specific period of time, as legally required or for business purposes

2. Protecting computer systems, networks, and data from unauthorized access, attacks, and breaches is the practice of safeguarding digital assets.

3. Energy sources that are virtually inexhaustible and have little to no negative impact on the environment.

4. The process of ensuring that individuals and organizations adhere to laws, regulations, and industry standards applicable to their activities.

5. The gap in access to and availability of information due to limited digital access.

6. The act of monitoring and recording the online activities, behaviors, and preferences of individuals without their explicit consent.

7. The destruction, fragmentation, or degradation of a natural habitat.

8. The unequal distribution of access to digital technologies and resources.

9. The malicious act of redirecting internet traffic from its intended destination to a different IP address, usually for fraudulent purposes.

10. The unjust or prejudicial treatment of individuals based on certain characteristics such as race, gender, or age.

11. The exhaustion or reduction of natural resources, such as minerals, water, or fossil fuels, due to human activities.

12. The ability to navigate, evaluate, and create information using digital technologies.

13. The system of rules, practices, and processes by which a company is directed and controlled, including the relationships among stakeholders and the goals for which the corporation is governed.

Down

14. Enabling individuals, particularly those from underrepresented groups, to gain confidence, skills, and opportunities to actively participate and succeed in computing fields.

15. Laws that deal with offenses committed using computers or the internet, such as hacking, identity theft, and online fraud.

16. The practice of ensuring that all individuals have equal access and opportunities to use digital technologies and participate in digital society.

17. The difference in technology availability, infrastructure, and knowledge.

18. The use of electronic communication to harass, intimidate, or harm individuals through the spread of derogatory messages, rumors, or threats.


🖶

Shortcuts

Left: ⇤ Right: ⇥ Up: ↑ Down: ↓