Environmental Impact | Technology |
Society | Pollution |
E-Waste | Carbon Footprint |
Deforestation | Resource Depletion |
The applications of scientific knowledge for practical purposes, often involving the creation or modification of machinery or processes. | The effect of technology on the natural world, including ecosystems, resources, and climate. |
The release of harmful substances or energy into the environment, resulting in negative impacts on living organisms and ecosystems. | A group of individuals living together as a community, often sharing common values, cultural practices, and social norms. |
The total amount of greenhouse gases, particularly carbon dioxide, emitted directly or indirectly by an individual, organization, event, or product. | Discarded electronic devices that are hazardous to the environment if not properly managed. |
The exhaustion or reduction of natural resources, such as minerals, water, or fossil fuels, due to human activities. | The clearing, destruction, or removal of forests to make land available for other uses, such as agriculture or urban development. |
Digital Divide | Greenwashing |
Renewable Energy | Energy Efficiency |
Green Buildings | Eco-Friendly Transportation |
Smart Grid | Waste Reduction |
The act of misleading consumers or the public about the environmental practices or benefits of a company, product, or service. | The socio-economic gap between individuals or communities with access to modern communication technologies and those without. |
The use of technology to reduce the amount of energy required to perform a certain task, resulting in less waste and lower environmental impact. | Energy sources that are virtually inexhaustible and have little to no negative impact on the environment. |
Modes of transportation that have a lower carbon footprint and produce fewer emissions. | Structures that are designed and constructed to minimize their impact on the environment, using resources efficiently and reducing waste, pollution, and health hazards. |
The use of technology to minimize waste generation and promote recycling, composting, and responsible disposal practices. | An advanced electrical grid that uses modern technology to efficiently manage energy distribution, reduce energy losses, and integrate renewable energy sources. |
Precision Agriculture | Environmental Monitoring |
Telecommuting | Habitat Loss |
Species Extinction | Ecosystem |
Fragmentation | Data |
The use of technology to collect and analyze data on the environment, such as water quality, and biodiversity, to facilitate decision-making and conservation. | The application of technology to optimize crop production, reduce the use of water, fertilizers, and pesticides, and minimize soil erosion and pollution. |
The destruction, fragmentation, or degradation of a natural habitat. | The use of technology to work remotely and reduce the need for commuting, resulting in decreased air pollution, traffic congestion, and energy consumption. |
A community of living organisms and their environment, interacting as a system. | The complete disappearance of a species from the entire planet. |
Information, facts, or statistics that are gatherable, dissectible, and actionable for a multitude of reasons. | The process of breaking habitats into smaller, isolated pieces. |
Online Privacy | Encryption |
Cookies | Cybersecurity |
Anonymity | Data Breach |
Phishing | Digital Footprint |
The process of encoding information in a manner that permits access and comprehension solely by authorized parties. | An individual's entitlement to govern and safeguard their personal information as well as monitor their activities carried out on the internet. |
Protecting computer systems, networks, and data from unauthorized access, attacks, and breaches is the practice of safeguarding digital assets. | Small text files are stored on a user's device, which are utilized for monitoring and storing information regarding their browsing activities. |
Unauthorized individuals gain access to and exploit sensitive or confidential data when they gain entry to information intended to be kept private or classified. | The condition of being anonymous is characterized by the absence or concealment of a person's identity or personal information. |
The collection of data and information created from an individual's online activities and engagements that are left as evidence. | A deceitful online method that dupes individuals into divulging their personal or sensitive information is known as a fraudulent activity. |
Privacy Policy | Data Privacy |
Security Breach | Identity Theft |
Data Breaches | Tracking |
Consent | Accuracy |
The protection of personal information and sensitive data from unauthorized access, use, or disclosure. | A statement or document that illustrates the methods by which an organization gathers, utilizes, and safeguards the personal information of its users or customers. |
The fraudulent acquisition and use of an individual's personal information, usually for financial gain, without their consent. | An incident where unauthorized individuals gain access to confidential or sensitive data, potentially leading to privacy violations. |
The act of monitoring and recording the online activities, behaviors, and preferences of individuals without their explicit consent. | Incidents where unauthorized individuals gain access to data, often resulting in potential harm or privacy violations. |
the degree to which data correctly represents the real-world scenario or situation | The voluntary granting of permission by an individual for the collection, use, and sharing of their personal data. |
Retention | Data Protection Laws |
Personal Data | Data Subject |
Data Controller | Data Minimization |
Anonymization | Inclusion In Computing |
A set of regulations and guidelines that govern the handling and safeguarding of personal data to ensure the privacy and security of individuals. | the practice of keeping and storing data for a specific period of time, as legally required or for business purposes |
An individual who can be identified by their personal data and has certain rights over its processing and protection. | Any information that can identify an individual, such as their name, address, phone number, or social security number. |
Reducing the amount of personal data collected and processed to only what is necessary for a specific purpose. | A person or organization that collects, determines the purposes of, and is responsible for the processing of personal data. |
The practice of ensuring equal access to and participation in computing education and careers regardless of gender, race, ethnicity, disability, or socioeconomic status. | The process of removing personally identifiable information from data, making it impossible to associate with a specific individual. |
Diversity | Equity |
Underrepresented | Bias |
Accessibility | Empowerment |
Intersectionality | Growth Mindset |
The principle of fairness and justice in providing resources, opportunities, and support to ensure equal access, representation, and success for all individuals in computing. | The presence of individuals from different backgrounds and identities, including but not limited to gender, race, ethnicity, and socioeconomic status, in computing fields. |
Prejudice or unfairness in decision-making processes or system designs that disproportionately affect certain individuals or groups based on factors such as gender, race, ethnicity, or socioeconomic status. | Referring to individuals or groups who are not adequately represented or present in computing fields, typically based on factors such as gender, race, ethnicity, or socioeconomic status. |
Enabling individuals, particularly those from underrepresented groups, to gain confidence, skills, and opportunities to actively participate and succeed in computing fields. | The design and provision of computing tools, technologies, and environments that are usable and available to individuals with disabilities or differing abilities. |
The belief that abilities and intelligence can be developed through dedication, hard work, and a willingness to learn, fostering inclusivity in computing education and careers. | The interconnected nature of social categorizations, such as gender, race, ethnicity, and socioeconomic status, that creates overlapping systems of discrimination or disadvantage. |
Allyship | Digital Inclusion |
Assistive Technology | Web Accessibility |
Screen Reader | Captioning |
Inclusive Design | Accessible Document Format |
The practice of ensuring that all individuals have equal access and opportunities to use digital technologies and participate in digital society. | The practice of individuals from dominant or privileged groups actively supporting and advocating for those from marginalized or underrepresented groups in computing. |
The inclusive practice of designing and developing websites and web content that can be accessed and used by individuals with disabilities. | Any device, software, or equipment that helps individuals with disabilities perform tasks, improve their functional capabilities, or increase their independence. |
Displaying text on a video, image or audio content to provide a textual representation of spoken words and other audio information. | Software that converts text displayed on a computer screen into synthesized speech or Braille output. |
A file format designed to be easily accessible and readable by individuals with disabilities, such as visual impairments. | The process of creating products, services, and environments that are accessible, usable, and beneficial to as many people as possible, regardless of their abilities or disabilities. |
Alt Text | Tagged PDF |
Gender Bias | Gender Gap |
Glass Ceiling | Equal Opportunities |
Stereotype | Work-Life Balance |
A type of PDF document that includes structural tags, allowing screen readers and other assistive technologies to accurately interpret the content and provide accessible reading experiences. | Alternative text that is added to images, providing a textual description of the image content for individuals who cannot see the images in accessible document formats. |
The disparity in opportunities, representation, and pay between men and women in the tech industry. | The unequal treatment or representation of individuals based on their gender in the tech industry. |
Providing the same chances for advancement, growth, and success to both men and women in the tech industry. | The invisible barrier that prevents women from advancing to higher positions in the tech industry. |
Achieving a balance between professional work and personal life, which is important for women's inclusion in the tech industry. | A widely-held but oversimplified and generalized belief or idea about women in the tech industry. |
Mentorship | Harassment |
Sexual Harassment | Microaggression |
Technology Gap | Internet Inequality |
Technological Disparity | Access Divide |
Unwanted or intimidating behavior, often repetitive, which creates a hostile or offensive work environment. | The guidance and support provided by experienced professionals to women in the tech industry to help them succeed. |
Small, subtle, and often unintentional acts of discrimination or bias that marginalize or belittle individuals. | Unwelcome sexual advances, requests for sexual favors, or other verbal/physical conduct of a sexual nature. |
Unequal access to the internet and its resources. | The disparity in technology access and use between different groups or regions. |
The unequal distribution of access to digital technologies and resources. | The difference in technology availability, infrastructure, and knowledge. |
Information Divide | Connectivity Gap |
Digital Literacy | Information Literacy |
Computer Literacy | Internet Literacy |
Media Literacy | Professionalism |
The disparity in access to reliable, high-speed internet connectivity. | The gap in access to and availability of information due to limited digital access. |
The ability to locate, evaluate, and use information effectively to solve problems and make decisions. | The ability to navigate, evaluate, and create information using digital technologies. |
The skills to effectively navigate, search, and critically evaluate information on the internet. | The knowledge and ability to use computers and related technology efficiently. |
In the realm of IT, the conduct, mindset, and commitment demonstrated by IT professionals in the execution of their job duties is referred to as the standard expected. | The ability to analyze and evaluate various forms of media, including digital media. |
Ethics | Accountability |
Communication | Integrity |
Confidentiality | Professional Development |
Adaptability | Teamwork |
Taking ownership for one's actions, decisions, and outcomes in the IT industry demonstrates a sense of responsibility. | In the world of IT, the set of moral principles and values that govern the behavior and decision-making of IT professionals. |
In the realm of IT, honesty, trustworthiness, and the commitment to ethical principles are the qualities displayed by IT professionals. | In the world of IT, it involves sharing information, ideas, and thoughts among IT professionals, clients, and team members. |
Continuous improvement of skills, knowledge, and expertise in the world of IT to remain well-informed and progress in the IT industry. | The preservation and withholding of sensitive and confidential information entrusted to IT professionals within the realm of IT. |
In the world of IT, effective collaboration and coordinated efforts among IT professionals are pursued to attain shared objectives and accomplish successful IT projects. | In the realm of IT, the characteristic of being able to tailor, alter, and effectively react to evolving technologies, trends, and business needs. |
Problem-Solving | Objectivity |
Competence | Fairness |
Responsibility | Respect |
Sustainability | Whistleblower |
The quality of being independent and unbiased, making decisions based on facts and evidence rather than personal feelings or opinions. | In the realm of IT, adeptness involves examining intricate problems, pinpointing suitable resolutions, and executing strategies to overcome challenges related to information technology. |
Treating all individuals impartially and without favoritism or discrimination, ensuring equal opportunities and just outcomes. | The ability to perform tasks and duties with skill, knowledge, and proficiency in a specific field. |
To treat others with esteem, consideration, and dignity, valuing their rights, opinions, and diversity. | The obligation to fulfill duties, obligations, and commitments in a reliable and dependable manner. |
An individual who exposes wrongdoing, illegal activities, or unethical behavior within an organization to the public or the authorities. | The practice of meeting current needs without compromising the ability of future generations to meet their own needs. |
Reporting | Discrimination |
Retaliation | Code Of Conduct |
Whistleblower Protection | Moonlighting |
Conflict Of Interest | Continuing Education |
The unjust or prejudicial treatment of individuals based on certain characteristics such as race, gender, or age. | The process of documenting and notifying incidents of harassment or misconduct through official channels. |
A set of rules and guidelines that outline acceptable behavior and expectations within an organization. | The act of seeking revenge, punishment, or retribution against a person who reported harassment or misconduct. |
The practice of working a second job, typically after normal working hours. | Laws and policies implemented to safeguard individuals who expose wrongdoing from retaliation or unfair treatment. |
The ongoing process of learning and acquiring new knowledge and skills to maintain technical competence in a specific field. | A situation in which a person or organization is involved in multiple interests, one of which could possibly corrupt the motivation or decision-making of the individual or organization. |
Certifications | Industry Conferences |
Online Courses | Self-Study |
Professional Networking | Legal Considerations |
Contract Law | Intellectual Property |
Events or gatherings where professionals from a particular industry come together to learn about new advancements and trends. | Official documents or credentials that certify an individual's expertise and competence in a specific area or field. |
The process of independent learning and acquiring knowledge through books, online resources, and other learning materials. | Educational courses and programs that are delivered over the internet, allowing individuals to learn at their own pace. |
The factors and laws that must be taken into account when making legal decisions, such as compliance with regulations, contracts, and ethical standards. | The act of establishing and maintaining relationships with other professionals in order to exchange knowledge and resources. |
The legal rights to creations of the mind, such as inventions, literary and artistic works, and symbols, designs, or names used in commerce. | The body of law that governs agreements and enforceable promises between parties. |
Privacy Laws | Employment Law |
Compliance | Tort Law |
Consumer Protection | Corporate Governance |
Software Copyright | Patents |
The area of law that governs the rights and duties between employers and employees, including issues such as hiring, wages, working conditions, and termination. | The set of laws and regulations that protect individuals' right to privacy, including personal information, communications, and data. |
The branch of law that deals with civil wrongdoings and provides remedies for damages caused by someone's negligence, intentional actions, or strict liability. | The process of ensuring that individuals and organizations adhere to laws, regulations, and industry standards applicable to their activities. |
The system of rules, practices, and processes by which a company is directed and controlled, including the relationships among stakeholders and the goals for which the corporation is governed. | The laws and regulations that aim to safeguard consumers from unfair business practices, such as false advertising, defective products, and deceptive trade practices. |
A government-granted monopoly right that gives the inventor exclusive control over their invention for a limited period of time. | The exclusive legal right granted to the creator of an original work of software to use, distribute, and sell their creation. |
Infringement | Trade Secret |
Open Source | Invention |
Fair Use | Freeware |
Shareware | Proprietary |
Confidential or proprietary information that provides a competitive advantage to a company and is kept secret from the public, such as a software algorithm. | An unauthorized use, reproduction, distribution, or display of someone's intellectual property, such as using patented software without permission. |
A novel and useful creation, usually in the form of a product or process, resulting from human creativity and ingenuity. | Software that is freely available, allowing users to access, use, modify, and distribute it without restrictions. |
Software that can be used and distributed for free. | A legal doctrine that allows limited use of copyrighted material without permission from the owner for purposes such as criticism, commentary, or education. |
Software that is owned by a specific organization or individual and cannot be freely modified or distributed. | Software that is initially provided for free, but requires payment after a trial period. |
Commercial | Public Domain |
Trialware | End-User License Agreement (EULA) |
Site License | Software License |
Open Source License | Freeware License |
Software that is not protected by copyright and can be freely used and distributed. | Software that is developed and sold for profit. |
A legal contract between the software copyright holder and the user, specifying the terms and conditions of use. | Software that is provided for free for a limited time or with limited functionality, with the option to purchase a full version. |
A legal agreement that allows individuals or organizations to use software under certain terms and conditions. | A software license that allows the use of the software by all users within a specific location or organization. |
A type of software license that allows users to use the software for free, but may have restrictions on distribution or modification. | A type of software license that allows users to access, modify, and distribute the source code of the software. |
Shareware License | Commercial License |
Single User License | Multi-User License |
Multi User License | Cybercrime Laws |
Computer Fraud | Digital Forensics |
A type of software license that is sold for profit, usually with additional features or support. | A type of software license that allows users to try the software before purchasing a full license. |
A type of software license that allows multiple users within an organization to access and use the software. | A type of software license that allows only one user to access and use the software. |
Laws that deal with offenses committed using computers or the internet, such as hacking, identity theft, and online fraud. | A license that allows multiple individuals to access and use a software or a website concurrently. |
The practice of collecting, analyzing, and preserving electronic evidence in a way that is legally admissible in court. | The use of computer technology to deceive or manipulate others for financial gain or personal advantage. |
Online Harassment | Ransomware |
Intellectual Property Laws | Copyright |
Trademark | Patent |
Creative Commons | Data Protection |
A type of malicious software that encrypts a victim's data and demands a ransom payment in exchange for decrypting and restoring access. | The act of engaging in abusive, threatening, or distressing behavior towards others through online platforms or communication channels. |
A legal framework that grants exclusive rights to creators and authors for their original works, preventing others from reproducing or distributing them without permission. | Laws that protect creations of the mind, such as inventions, literary and artistic works, and symbols, names, and images used in commerce. |
A government-granted exclusive right to an inventor or assignee for a limited period, providing protection for new inventions and preventing others from making, using, or selling them without authorization. | A distinctive sign, symbol, or logo used to identify and distinguish goods or services from those of others, granting legal protection against unauthorized use or imitation. |
Refers to the practice of safeguarding information from corruption, loss, unauthorized access, or destruction. | A licensing system that allows creators to give permission for others to use their work under certain conditions, promoting collaboration, sharing, and building upon existing intellectual creations. |
Breach Notification | Cybersecurity Laws |
Online Defamation | Cyberbullying |
Social Media | Slander |
Trolling | Online Reputation Management |
The set of laws and regulations that govern activities related to protecting computer systems and networks from unauthorized access, hacking, and data breaches. | The requirement to inform individuals and authorities of a security breach that involves their personal data. |
The use of electronic communication to harass, intimidate, or harm individuals through the spread of derogatory messages, rumors, or threats. | The act of making false statements about a person or organization through the internet with the intent to harm their reputation. |
The spoken form of defamation, where false statements are communicated orally to damage someone's reputation. | Online platforms and websites that enable users to create and share content, interact with others, and participate in online communities. |
The practice of monitoring and controlling an individual's or company's online reputation by managing search engine results and addressing negative content. | Posting inflammatory, irrelevant, or offensive comments or messages online with the aim of provoking emotional responses and disrupting discussions. |
Impersonation | Domain Name Disputes |
Cybersquatting | Uniform Domain-Name Dispute-Resolution Policy (UDRP) |
DNS Hijacking | Plagiarism |
Licensing | Exclusive Rights |
Disputes that arise over the ownership, registration, or use of an internet domain name. | Using someone else's identity or pretending to be someone else online to deceive or harm others. |
A policy implemented by ICANN for resolving domain name disputes by arbitration. | The act of registering or using a domain name with the intent to profit from the goodwill of a trademark belonging to someone else. |
The practice of taking someone else's work or ideas and passing them off as one's own. | The malicious act of redirecting internet traffic from its intended destination to a different IP address, usually for fraudulent purposes. |
Rights granted to authors and creators that allow them to control the use of their works. | The act of permitting someone to use intellectual property under specific conditions. |
Proprietary License | Copyleft |
GNU General Public License (GPL) | |
A licensing method that allows software to be freely used, modified, and shared, but requires that all derivative works also be distributed under the same license. | A software license that grants users the right to use the software, without access to the source code. |
A widely used free software license that guarantees end users the freedom to run, study, share, and modify the software. | |