Home | TPT Notes and Actions | Data Structures Plan | Create Task | Quiz Corrections | Proctored MCQ Weeks | Part 1 Study Plan | Others |
5.5 Actions
- Creative Commons - Good for a project where you do not mind anyone using it any way they want.
- Open Source MIT - Good for a project where you can use code freely and distribute closed versions. It also happens to be simpler and easier to digest than many common licenses
-
Open Source GPL - Good for project where people can use your code but they cannot distribute closed versions.
- Our group chose an MIT license because we thought it would be the easiest to do. Also, there is not much reason for anybody to distribute the poway CTE website and its code. Additionally, the only conditions to it are that we must disclose the license and copyright information when we distribute the website.
5.6 Actions
- I have seen PII in previous computer science projects, such as my own project. For example, my about me page has a picture of myself with a description of who I am. Also, the GitHub ReadMe has information abou owners.
- I feel like PII is a good thing and a bad thing. It is good since it can have your information out there, allowing people to reach out to you, such as friends, colleges, or teams. This could help you. However, some might use PII as a bad thing and can find out a lot about you, and that could hurt your privacy.
- Good passwords are those that are long and have a lot of different characters. This can make it harder to hack or guess. Bad passwords are those that are short and are very common, such as “password.” Something used to help in authentication is multifactor authentication, like a list of questions that only you know the answers to.
- Symmetric encryption uses one key that all of the specified users have that can be used to decrypt a message. Asymmetric encryption involves encryption using a public key and decryption using a unique private key, which are connected mathematically.
- In deployment, we used HTTPS to encrypt our website. This uses a TLS protocol to send HTTP data/files to the user that is encrypted data.
- One phishing scheme I learned the hard way was when I saw an ad for getting more robux for a game called Roblox. I got so happy, that I quickly put in all my information, and waited for my account to have a bunch of robux in it. However, I never got my robux. It was at that moment that I realized it wasn’t real and that I wouldn’t be getting any robux.
5.5 Legal and Ethical Concerns
Intellectual Property: (IP)
- A work or invention that is the result of creativity to which one has rights.
- Because of digital devices, the sharing and ownership of IP’s has raised concerns about whether someone can access someone else’s creations.
- Copyright protects an IP; when you create anything, you automatically own an all rights reserved copyright to whatever was created.
- Copyright protects IP and keeps anyone from using it unless given expressed permission.
- When someone takes material created by someone else and presents it as their own, it’s considered plagiarism and might have legal consequences.
- Creative Commons provides free licenses to tell people how to use one’s creations.
5.6 Safe Computing
- Personally Identifiable Information (PII): Information specific to an individual.
- Examples include:
- Social Security Number, Age , Race, Phone Number, Date of Birth, Email Addres, Mailing Address, Medical Information, Credit Card information.
- Personally Identifiable Information (PII): Can be used by people to steal identity.
- Although PII can be used to enhance a user’s online experience, it can also be exploited without protections and privacy.
- Information placed online is hard to delete.