Environmental Impact Technology
Society Pollution
E-Waste Carbon Footprint
Deforestation Resource Depletion

 

The applications of scientific knowledge for practical purposes, often involving the creation or modification of machinery or processes. The effect of technology on the natural world, including ecosystems, resources, and climate.
The release of harmful substances or energy into the environment, resulting in negative impacts on living organisms and ecosystems. A group of individuals living together as a community, often sharing common values, cultural practices, and social norms.
The total amount of greenhouse gases, particularly carbon dioxide, emitted directly or indirectly by an individual, organization, event, or product. Discarded electronic devices that are hazardous to the environment if not properly managed.
The exhaustion or reduction of natural resources, such as minerals, water, or fossil fuels, due to human activities. The clearing, destruction, or removal of forests to make land available for other uses, such as agriculture or urban development.

 

Digital Divide Greenwashing
Renewable Energy Energy Efficiency
Green Buildings Eco-Friendly Transportation
Smart Grid Waste Reduction

 

The act of misleading consumers or the public about the environmental practices or benefits of a company, product, or service. The socio-economic gap between individuals or communities with access to modern communication technologies and those without.
The use of technology to reduce the amount of energy required to perform a certain task, resulting in less waste and lower environmental impact. Energy sources that are virtually inexhaustible and have little to no negative impact on the environment.
Modes of transportation that have a lower carbon footprint and produce fewer emissions. Structures that are designed and constructed to minimize their impact on the environment, using resources efficiently and reducing waste, pollution, and health hazards.
The use of technology to minimize waste generation and promote recycling, composting, and responsible disposal practices. An advanced electrical grid that uses modern technology to efficiently manage energy distribution, reduce energy losses, and integrate renewable energy sources.

 

Precision Agriculture Environmental Monitoring
Telecommuting Habitat Loss
Species Extinction Ecosystem
Fragmentation Data

 

The use of technology to collect and analyze data on the environment, such as water quality, and biodiversity, to facilitate decision-making and conservation. The application of technology to optimize crop production, reduce the use of water, fertilizers, and pesticides, and minimize soil erosion and pollution.
The destruction, fragmentation, or degradation of a natural habitat. The use of technology to work remotely and reduce the need for commuting, resulting in decreased air pollution, traffic congestion, and energy consumption.
A community of living organisms and their environment, interacting as a system. The complete disappearance of a species from the entire planet.
Information, facts, or statistics that are gatherable, dissectible, and actionable for a multitude of reasons. The process of breaking habitats into smaller, isolated pieces.

 

Online Privacy Encryption
Cookies Cybersecurity
Anonymity Data Breach
Phishing Digital Footprint

 

The process of encoding information in a manner that permits access and comprehension solely by authorized parties. An individual's entitlement to govern and safeguard their personal information as well as monitor their activities carried out on the internet.
Protecting computer systems, networks, and data from unauthorized access, attacks, and breaches is the practice of safeguarding digital assets. Small text files are stored on a user's device, which are utilized for monitoring and storing information regarding their browsing activities.
Unauthorized individuals gain access to and exploit sensitive or confidential data when they gain entry to information intended to be kept private or classified. The condition of being anonymous is characterized by the absence or concealment of a person's identity or personal information.
The collection of data and information created from an individual's online activities and engagements that are left as evidence. A deceitful online method that dupes individuals into divulging their personal or sensitive information is known as a fraudulent activity.

 

Privacy Policy Data Privacy
Security Breach Identity Theft
Data Breaches Tracking
Consent Accuracy

 

The protection of personal information and sensitive data from unauthorized access, use, or disclosure. A statement or document that illustrates the methods by which an organization gathers, utilizes, and safeguards the personal information of its users or customers.
The fraudulent acquisition and use of an individual's personal information, usually for financial gain, without their consent. An incident where unauthorized individuals gain access to confidential or sensitive data, potentially leading to privacy violations.
The act of monitoring and recording the online activities, behaviors, and preferences of individuals without their explicit consent. Incidents where unauthorized individuals gain access to data, often resulting in potential harm or privacy violations.
the degree to which data correctly represents the real-world scenario or situation The voluntary granting of permission by an individual for the collection, use, and sharing of their personal data.

 

Retention Data Protection Laws
Personal Data Data Subject
Data Controller Data Minimization
Anonymization Inclusion In Computing

 

A set of regulations and guidelines that govern the handling and safeguarding of personal data to ensure the privacy and security of individuals. the practice of keeping and storing data for a specific period of time, as legally required or for business purposes
An individual who can be identified by their personal data and has certain rights over its processing and protection. Any information that can identify an individual, such as their name, address, phone number, or social security number.
Reducing the amount of personal data collected and processed to only what is necessary for a specific purpose. A person or organization that collects, determines the purposes of, and is responsible for the processing of personal data.
The practice of ensuring equal access to and participation in computing education and careers regardless of gender, race, ethnicity, disability, or socioeconomic status. The process of removing personally identifiable information from data, making it impossible to associate with a specific individual.

 

Diversity Equity
Underrepresented Bias
Accessibility Empowerment
Intersectionality Growth Mindset

 

The principle of fairness and justice in providing resources, opportunities, and support to ensure equal access, representation, and success for all individuals in computing. The presence of individuals from different backgrounds and identities, including but not limited to gender, race, ethnicity, and socioeconomic status, in computing fields.
Prejudice or unfairness in decision-making processes or system designs that disproportionately affect certain individuals or groups based on factors such as gender, race, ethnicity, or socioeconomic status. Referring to individuals or groups who are not adequately represented or present in computing fields, typically based on factors such as gender, race, ethnicity, or socioeconomic status.
Enabling individuals, particularly those from underrepresented groups, to gain confidence, skills, and opportunities to actively participate and succeed in computing fields. The design and provision of computing tools, technologies, and environments that are usable and available to individuals with disabilities or differing abilities.
The belief that abilities and intelligence can be developed through dedication, hard work, and a willingness to learn, fostering inclusivity in computing education and careers. The interconnected nature of social categorizations, such as gender, race, ethnicity, and socioeconomic status, that creates overlapping systems of discrimination or disadvantage.

 

Allyship Digital Inclusion
Assistive Technology Web Accessibility
Screen Reader Captioning
Inclusive Design Accessible Document Format

 

The practice of ensuring that all individuals have equal access and opportunities to use digital technologies and participate in digital society. The practice of individuals from dominant or privileged groups actively supporting and advocating for those from marginalized or underrepresented groups in computing.
The inclusive practice of designing and developing websites and web content that can be accessed and used by individuals with disabilities. Any device, software, or equipment that helps individuals with disabilities perform tasks, improve their functional capabilities, or increase their independence.
Displaying text on a video, image or audio content to provide a textual representation of spoken words and other audio information. Software that converts text displayed on a computer screen into synthesized speech or Braille output.
A file format designed to be easily accessible and readable by individuals with disabilities, such as visual impairments. The process of creating products, services, and environments that are accessible, usable, and beneficial to as many people as possible, regardless of their abilities or disabilities.

 

Alt Text Tagged PDF
Gender Bias Gender Gap
Glass Ceiling Equal Opportunities
Stereotype Work-Life Balance

 

A type of PDF document that includes structural tags, allowing screen readers and other assistive technologies to accurately interpret the content and provide accessible reading experiences. Alternative text that is added to images, providing a textual description of the image content for individuals who cannot see the images in accessible document formats.
The disparity in opportunities, representation, and pay between men and women in the tech industry. The unequal treatment or representation of individuals based on their gender in the tech industry.
Providing the same chances for advancement, growth, and success to both men and women in the tech industry. The invisible barrier that prevents women from advancing to higher positions in the tech industry.
Achieving a balance between professional work and personal life, which is important for women's inclusion in the tech industry. A widely-held but oversimplified and generalized belief or idea about women in the tech industry.

 

Mentorship Harassment
Sexual Harassment Microaggression
Technology Gap Internet Inequality
Technological Disparity Access Divide

 

Unwanted or intimidating behavior, often repetitive, which creates a hostile or offensive work environment. The guidance and support provided by experienced professionals to women in the tech industry to help them succeed.
Small, subtle, and often unintentional acts of discrimination or bias that marginalize or belittle individuals. Unwelcome sexual advances, requests for sexual favors, or other verbal/physical conduct of a sexual nature.
Unequal access to the internet and its resources. The disparity in technology access and use between different groups or regions.
The unequal distribution of access to digital technologies and resources. The difference in technology availability, infrastructure, and knowledge.

 

Information Divide Connectivity Gap
Digital Literacy Information Literacy
Computer Literacy Internet Literacy
Media Literacy Professionalism

 

The disparity in access to reliable, high-speed internet connectivity. The gap in access to and availability of information due to limited digital access.
The ability to locate, evaluate, and use information effectively to solve problems and make decisions. The ability to navigate, evaluate, and create information using digital technologies.
The skills to effectively navigate, search, and critically evaluate information on the internet. The knowledge and ability to use computers and related technology efficiently.
In the realm of IT, the conduct, mindset, and commitment demonstrated by IT professionals in the execution of their job duties is referred to as the standard expected. The ability to analyze and evaluate various forms of media, including digital media.

 

Ethics Accountability
Communication Integrity
Confidentiality Professional Development
Adaptability Teamwork

 

Taking ownership for one's actions, decisions, and outcomes in the IT industry demonstrates a sense of responsibility. In the world of IT, the set of moral principles and values that govern the behavior and decision-making of IT professionals.
In the realm of IT, honesty, trustworthiness, and the commitment to ethical principles are the qualities displayed by IT professionals. In the world of IT, it involves sharing information, ideas, and thoughts among IT professionals, clients, and team members.
Continuous improvement of skills, knowledge, and expertise in the world of IT to remain well-informed and progress in the IT industry. The preservation and withholding of sensitive and confidential information entrusted to IT professionals within the realm of IT.
In the world of IT, effective collaboration and coordinated efforts among IT professionals are pursued to attain shared objectives and accomplish successful IT projects. In the realm of IT, the characteristic of being able to tailor, alter, and effectively react to evolving technologies, trends, and business needs.

 

Problem-Solving Objectivity
Competence Fairness
Responsibility Respect
Sustainability Whistleblower

 

The quality of being independent and unbiased, making decisions based on facts and evidence rather than personal feelings or opinions. In the realm of IT, adeptness involves examining intricate problems, pinpointing suitable resolutions, and executing strategies to overcome challenges related to information technology.
Treating all individuals impartially and without favoritism or discrimination, ensuring equal opportunities and just outcomes. The ability to perform tasks and duties with skill, knowledge, and proficiency in a specific field.
To treat others with esteem, consideration, and dignity, valuing their rights, opinions, and diversity. The obligation to fulfill duties, obligations, and commitments in a reliable and dependable manner.
An individual who exposes wrongdoing, illegal activities, or unethical behavior within an organization to the public or the authorities. The practice of meeting current needs without compromising the ability of future generations to meet their own needs.

 

Reporting Discrimination
Retaliation Code Of Conduct
Whistleblower Protection Moonlighting
Conflict Of Interest Continuing Education

 

The unjust or prejudicial treatment of individuals based on certain characteristics such as race, gender, or age. The process of documenting and notifying incidents of harassment or misconduct through official channels.
A set of rules and guidelines that outline acceptable behavior and expectations within an organization. The act of seeking revenge, punishment, or retribution against a person who reported harassment or misconduct.
The practice of working a second job, typically after normal working hours. Laws and policies implemented to safeguard individuals who expose wrongdoing from retaliation or unfair treatment.
The ongoing process of learning and acquiring new knowledge and skills to maintain technical competence in a specific field. A situation in which a person or organization is involved in multiple interests, one of which could possibly corrupt the motivation or decision-making of the individual or organization.

 

Certifications Industry Conferences
Online Courses Self-Study
Professional Networking Legal Considerations
Contract Law Intellectual Property

 

Events or gatherings where professionals from a particular industry come together to learn about new advancements and trends. Official documents or credentials that certify an individual's expertise and competence in a specific area or field.
The process of independent learning and acquiring knowledge through books, online resources, and other learning materials. Educational courses and programs that are delivered over the internet, allowing individuals to learn at their own pace.
The factors and laws that must be taken into account when making legal decisions, such as compliance with regulations, contracts, and ethical standards. The act of establishing and maintaining relationships with other professionals in order to exchange knowledge and resources.
The legal rights to creations of the mind, such as inventions, literary and artistic works, and symbols, designs, or names used in commerce. The body of law that governs agreements and enforceable promises between parties.

 

Privacy Laws Employment Law
Compliance Tort Law
Consumer Protection Corporate Governance
Software Copyright Patents

 

The area of law that governs the rights and duties between employers and employees, including issues such as hiring, wages, working conditions, and termination. The set of laws and regulations that protect individuals' right to privacy, including personal information, communications, and data.
The branch of law that deals with civil wrongdoings and provides remedies for damages caused by someone's negligence, intentional actions, or strict liability. The process of ensuring that individuals and organizations adhere to laws, regulations, and industry standards applicable to their activities.
The system of rules, practices, and processes by which a company is directed and controlled, including the relationships among stakeholders and the goals for which the corporation is governed. The laws and regulations that aim to safeguard consumers from unfair business practices, such as false advertising, defective products, and deceptive trade practices.
A government-granted monopoly right that gives the inventor exclusive control over their invention for a limited period of time. The exclusive legal right granted to the creator of an original work of software to use, distribute, and sell their creation.

 

Infringement Trade Secret
Open Source Invention
Fair Use Freeware
Shareware Proprietary

 

Confidential or proprietary information that provides a competitive advantage to a company and is kept secret from the public, such as a software algorithm. An unauthorized use, reproduction, distribution, or display of someone's intellectual property, such as using patented software without permission.
A novel and useful creation, usually in the form of a product or process, resulting from human creativity and ingenuity. Software that is freely available, allowing users to access, use, modify, and distribute it without restrictions.
Software that can be used and distributed for free. A legal doctrine that allows limited use of copyrighted material without permission from the owner for purposes such as criticism, commentary, or education.
Software that is owned by a specific organization or individual and cannot be freely modified or distributed. Software that is initially provided for free, but requires payment after a trial period.

 

Commercial Public Domain
Trialware End-User License Agreement (EULA)
Site License Software License
Open Source License Freeware License

 

Software that is not protected by copyright and can be freely used and distributed. Software that is developed and sold for profit.
A legal contract between the software copyright holder and the user, specifying the terms and conditions of use. Software that is provided for free for a limited time or with limited functionality, with the option to purchase a full version.
A legal agreement that allows individuals or organizations to use software under certain terms and conditions. A software license that allows the use of the software by all users within a specific location or organization.
A type of software license that allows users to use the software for free, but may have restrictions on distribution or modification. A type of software license that allows users to access, modify, and distribute the source code of the software.

 

Shareware License Commercial License
Single User License Multi-User License
Multi User License Cybercrime Laws
Computer Fraud Digital Forensics

 

A type of software license that is sold for profit, usually with additional features or support. A type of software license that allows users to try the software before purchasing a full license.
A type of software license that allows multiple users within an organization to access and use the software. A type of software license that allows only one user to access and use the software.
Laws that deal with offenses committed using computers or the internet, such as hacking, identity theft, and online fraud. A license that allows multiple individuals to access and use a software or a website concurrently.
The practice of collecting, analyzing, and preserving electronic evidence in a way that is legally admissible in court. The use of computer technology to deceive or manipulate others for financial gain or personal advantage.

 

Online Harassment Ransomware
Intellectual Property Laws Copyright
Trademark Patent
Creative Commons Data Protection

 

A type of malicious software that encrypts a victim's data and demands a ransom payment in exchange for decrypting and restoring access. The act of engaging in abusive, threatening, or distressing behavior towards others through online platforms or communication channels.
A legal framework that grants exclusive rights to creators and authors for their original works, preventing others from reproducing or distributing them without permission. Laws that protect creations of the mind, such as inventions, literary and artistic works, and symbols, names, and images used in commerce.
A government-granted exclusive right to an inventor or assignee for a limited period, providing protection for new inventions and preventing others from making, using, or selling them without authorization. A distinctive sign, symbol, or logo used to identify and distinguish goods or services from those of others, granting legal protection against unauthorized use or imitation.
Refers to the practice of safeguarding information from corruption, loss, unauthorized access, or destruction. A licensing system that allows creators to give permission for others to use their work under certain conditions, promoting collaboration, sharing, and building upon existing intellectual creations.

 

Breach Notification Cybersecurity Laws
Online Defamation Cyberbullying
Social Media Slander
Trolling Online Reputation Management

 

The set of laws and regulations that govern activities related to protecting computer systems and networks from unauthorized access, hacking, and data breaches. The requirement to inform individuals and authorities of a security breach that involves their personal data.
The use of electronic communication to harass, intimidate, or harm individuals through the spread of derogatory messages, rumors, or threats. The act of making false statements about a person or organization through the internet with the intent to harm their reputation.
The spoken form of defamation, where false statements are communicated orally to damage someone's reputation. Online platforms and websites that enable users to create and share content, interact with others, and participate in online communities.
The practice of monitoring and controlling an individual's or company's online reputation by managing search engine results and addressing negative content. Posting inflammatory, irrelevant, or offensive comments or messages online with the aim of provoking emotional responses and disrupting discussions.

 

Impersonation Domain Name Disputes
Cybersquatting Uniform Domain-Name Dispute-Resolution Policy (UDRP)
DNS Hijacking Plagiarism
Licensing Exclusive Rights

 

Disputes that arise over the ownership, registration, or use of an internet domain name. Using someone else's identity or pretending to be someone else online to deceive or harm others.
A policy implemented by ICANN for resolving domain name disputes by arbitration. The act of registering or using a domain name with the intent to profit from the goodwill of a trademark belonging to someone else.
The practice of taking someone else's work or ideas and passing them off as one's own. The malicious act of redirecting internet traffic from its intended destination to a different IP address, usually for fraudulent purposes.
Rights granted to authors and creators that allow them to control the use of their works. The act of permitting someone to use intellectual property under specific conditions.

 

Exclusivity Patent Application
Patent Maintenance Patent Enforcement
Market Exclusivity Software Patent
Patentability Proprietary License

 

A formal request submitted to a patent office, containing all necessary details about the invention, including claims and specifications. The state of being limited to one party, granting them sole rights to produce and profit from a certain invention or idea.
The actions taken to monitor for unauthorized use of a patented invention and pursue legal remedies against infringements. The obligation to pay fees at regular intervals to keep a granted patent in force and enforceable.
A legal protection that grants exclusive rights to inventors for their innovative software solutions. Provides a temporary monopoly on an invention, enabling the owner to regulate market entry and enhance financial returns.
A software license that grants users the right to use the software, without access to the source code. The criteria that determine whether an invention can be granted a patent, typically requiring novelty, non-obviousness, and usefulness.

 

Copyleft GNU General Public License (GPL)
Compiled Program Permissive License
MIT License

 

A widely used free software license that guarantees end users the freedom to run, study, share, and modify the software. A licensing method that allows software to be freely used, modified, and shared, but requires that all derivative works also be distributed under the same license.
A type of software license that allows users to freely use, modify, and distribute software without strict restrictions. The version of software that has been transformed from source code into machine code that can be executed by a computer.
A widely used permissive license that allows for software reuse with minimal restrictions on how the software can be used.