| Term | Definition |
|---|---|
| beneficial | Producing a positive or advantageous outcome or impact. |
| beneficial effects | Positive outcomes or advantages that result from the use of a computing innovation. |
| computing innovation | A new or improved computer-based product, service, or concept that includes a program as an integral part of its function, which can be physical, nonphysical software, or a nonphysical concept. |
| data mining | The process of analyzing large datasets to discover patterns, trends, and insights that can be used for various purposes. |
| effect | A consequence or result of a computing innovation that impacts people, society, or other fields. |
| harmful | Producing a negative or damaging outcome or impact. |
| harmful impact | Negative consequences or damage that a computing innovation can cause to society, the economy, culture, or individuals. |
| intended purpose | The original goal or function that a computing innovation was designed to accomplish. |
| machine learning | A computing technique that enables systems to learn and improve from data without being explicitly programmed for each task. |
| targeted advertising | A marketing technique that uses computing innovations to deliver specific advertisements to individuals or groups based on their data and behavior. |
| unintended beneficial effects | Positive consequences of a computing innovation that were not originally anticipated by its creators. |
| unintended purpose | A use or application of a computing innovation that was not originally planned or designed by its creators. |
| Term | Definition |
|---|---|
| access | The ability to obtain and use computing devices and Internet services. |
| computing device | A physical artifact that can run a program, such as computers, tablets, servers, routers, and smart sensors. |
| demographic characteristics | Population characteristics such as age, gender, education level, and other factors that affect access to technology. |
| digital divide | The differing access to computing devices and the Internet based on socioeconomic, geographic, or demographic characteristics. |
| equity | Fair and just access to resources and opportunities, particularly regarding technology and Internet access. |
| geographic characteristics | Location-based factors that influence access to computing devices and Internet connectivity. |
| influence | The power to affect decisions, information, and opportunities through access to computing and digital resources. |
| Internet access | The ability to connect to and use the Internet, which varies based on socioeconomic, geographic, and demographic factors. |
| socioeconomic characteristics | Factors related to income level and social class that affect access to technology and the Internet. |
| Term | Definition |
|---|---|
| algorithm | Step-by-step procedures or sets of rules designed to solve a problem or accomplish a task. |
| bias | Prejudice or systematic error in computing innovations that can result from algorithms or data, reflecting existing human prejudices. |
| computing innovation | A new or improved computer-based product, service, or concept that includes a program as an integral part of its function, which can be physical, nonphysical software, or a nonphysical concept. |
| data | Information represented in a form that can be processed by a program, such as numbers, text, or records. |
| software development | The process of creating and improving software applications where biases can be embedded at multiple levels. |
| Term | Definition |
|---|---|
| citizen science | Scientific research conducted wholly or partly by non-professional scientists who contribute data and observations using their own computing devices. |
| collaboration | The process of working together with others to develop computing innovations that benefit from diverse talents and perspectives. |
| crowdsourcing | The practice of obtaining input, information, or solutions from a large number of people via the Internet. |
| dissemination of results | The process of sharing and distributing findings, solutions, or information widely to relevant audiences. |
| distributed individuals | People spread across different locations who contribute to a common goal or research project, typically coordinated through digital networks. |
| problem-solving processes | Methods and approaches used to identify, analyze, and develop solutions to challenges, often involving multiple participants working collaboratively. |
| public data | Information that is openly accessible to the general public and can be used to identify problems and develop solutions. |
| Term | Definition |
|---|---|
| algorithm bias | Prejudice or unfair treatment built into algorithms that can raise legal and ethical concerns in computing innovations. |
| Creative Commons | A public copyright license that enables the free distribution of otherwise copyrighted work, allowing others to share, use, and build upon the creator's work. |
| data monitoring | The continuous collection and analysis of user activities through computing devices, which raises legal and ethical concerns. |
| digital divide | The differing access to computing devices and the Internet based on socioeconomic, geographic, or demographic characteristics. |
| intellectual property | Material created on a computer or by an individual that is legally owned by the creator or an organization. |
| open access | Online research output that is free of access restrictions and many usage restrictions, such as copyright or license limitations. |
| open source | Programs that are made freely available and may be redistributed and modified by users. |
| plagiarism | The use of material created by someone else without permission and presented as one's own, which may have legal consequences. |
| Term | Definition |
|---|---|
| authentication measures | Security methods used to verify the identity of a user and protect devices and information from unauthorized access. |
| biometric data | Personal information based on physical or behavioral characteristics, such as fingerprints or facial recognition, that can be used to identify an individual. |
| browsing history | A record of websites and pages an individual has viewed that can be collected and maintained by websites and networks. |
| certificate authority | An organization that issues digital certificates to validate the ownership of encryption keys based on a trust model. |
| computer virus | A malicious program that can copy itself and gain unauthorized access to a computer, often by attaching itself to legitimate programs. |
| cookies | Data files stored on a user's device that track browsing behavior and can be aggregated with other personal data. |
| data aggregation | The process of combining disparate personal data from multiple sources to create comprehensive knowledge about an individual. |
| decryption | The process of decoding encrypted data to make it readable. |
| digital certificate | A credential issued by a certificate authority that validates the ownership of encryption keys used in secure communications. |
| encryption | The process of encoding data to prevent unauthorized access. |
| freeware | Free software that can potentially contain malware if downloaded from untrustworthy sources. |
| geolocation | Information about a user's physical location that can be collected by devices, websites, and networks. |
| identity theft | The unauthorized use of a person's PII to impersonate them or commit fraud. |
| keylogging | The use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and confidential information. |
| malicious link | A link that can be disguised on a web page or in an email message to compromise computing security. |
| malware | Software intended to damage a computing system or to take partial control over its operation. |
| malware scanning software | Software designed to detect and protect a computing system against infection from viruses and malware. |
| multifactor authentication | A method of computer access control requiring a user to present at least two separate pieces of evidence from the categories of knowledge (something they know), possession (something they have), and inherence (something they are). |
| permissions | Settings that control what information programs are allowed to collect from users and how they can access user data. |
| personally identifiable information | Information about an individual that identifies, links, relates, or describes them, such as Social Security numbers, age, race, phone numbers, medical information, financial information, or biometric data. |
| phishing | A technique that attempts to trick a user into providing personal information that can be used to access sensitive online resources. |
| public key encryption | An encryption approach that uses a public key for encryption and a private key for decryption, allowing secure communication without sharing the private key. |
| rogue access point | A wireless access point that gives unauthorized access to secure networks. |
| search history | A record of searches made by users on search engines that can be collected, maintained, and used for targeted marketing or other purposes. |
| shareware | Software available for free or low cost that can potentially contain malware if downloaded from untrustworthy sources. |
| social media | Online platforms where individuals post information that can be viewed, shared, and used by others in ways not originally intended. |
| software updates | Regular patches and improvements to software that fix errors and design flaws that could compromise a computing system. |
| strong password | A password that is easy for the user to remember but difficult for others to guess based on knowledge of that user. |
| symmetric key encryption | An encryption approach that uses one key for both encrypting and decrypting data. |
| targeted advertising | A marketing technique that uses computing innovations to deliver specific advertisements to individuals or groups based on their data and behavior. |
| unauthorized access | Gaining access to computing resources without permission, often through techniques like phishing, keylogging, or rogue access points. |