Economic, Moral, Legal, Ethical & Cultural Issues

AS Level — Unit 1: Fundamentals of Computer Science

Economic Benefits of Computer Use

ICT systems (hardware, software, data processing, communications, and the people who operate them) deliver a range of economic benefits to businesses and individuals:

Benefit Description
Saving paper Working electronically reduces paper usage by an estimated 10–30%. Emails replace letters; e-books replace printed materials. This saves both money and time.
Saving manpower Computer-controlled devices and robotics can perform repetitive tasks, reducing the need for human labour and lowering costs.
Communication speed and cost Telephone and postage costs are reduced by using email, VoIP, and online meetings. Information is sent and received faster than by traditional post.
Efficiency Files stored electronically are easier to retrieve than physical paperwork. Businesses can access old documents instantly rather than searching through filing systems.
Accuracy Computers process data more accurately than humans for repetitive tasks. However, the quality of output depends on the quality of input data — if incorrect data is entered, results will be incorrect (GIGO: Garbage In, Garbage Out).

When discussing economic benefits, be specific: state what the benefit is (e.g. reduced costs), how technology achieves it (e.g. email replaces post), and why it matters (e.g. saves money, speeds up communication). A vague answer (“computers are faster”) will not earn marks.


Ethical and Moral Issues in Computing

Ethics refers to principles of right and wrong that guide behaviour. Moral issues are closely related and concern personal or societal judgements about what is acceptable. Computing raises many ethical questions that do not have simple legal answers.

Privacy and Surveillance

  • Companies collect vast amounts of personal data through websites, apps, social media, loyalty cards, and IoT devices.
  • Targeted advertising uses personal data to show users ads based on their browsing history, location, and preferences.
  • Facial recognition technology raises concerns about mass surveillance in public spaces.
  • The question: Where should the line be drawn between convenience and privacy?

Artificial Intelligence and Automation

Issue Description
Bias in AI AI systems can inherit biases from their training data, leading to unfair outcomes (e.g. biased recruitment algorithms that discriminate by gender or race)
Accountability If an autonomous vehicle causes an accident, who is responsible — the manufacturer, the programmer, or the owner?
Decision-making Should AI be used to make decisions that significantly affect people’s lives (e.g. criminal sentencing, medical diagnosis, loan approvals)?
Job displacement Automation and AI may replace many jobs, particularly in manufacturing, transport, and customer service
Deepfakes AI-generated images, audio, and video can be used to spread misinformation or commit fraud

Ownership of Data and Software

  • Who owns the data generated by users on social media platforms — the user or the platform?
  • Open source vs proprietary: Is it ethical to charge high prices for software when open-source alternatives exist?
  • Digital Rights Management (DRM): Is it ethical to restrict how people use content they have legally purchased?

Online Behaviour

When people go online, their behaviour can change — anonymity (real or perceived) may lead them to act in ways they would not in person. This raises significant moral and ethical concerns.

Trolling is the act of deliberately posting inflammatory, offensive, or provocative content online with the intention of upsetting others or causing conflict.

Flaming is the act of posting hostile, aggressive, or abusive messages — often including offensive language or profanity — directed at another person online, typically on social media or in forums.

  • Both trolling and flaming cause real harm to victims and contribute to a hostile online environment.
  • Many organisations and platforms have codes of conduct and community standards to address this behaviour.
  • Freedom of speech does not mean freedom from consequences — online posts can result in criminal prosecution (e.g. under the Communications Act 2003).

Ethical Hacking

Ethical hacking (also called penetration testing or white-hat hacking) is the authorised practice of attempting to access a computer system or network in order to identify security vulnerabilities, so they can be fixed before malicious attackers exploit them.

  • Ethical hackers have explicit permission from the system owner — this distinguishes it from criminal hacking.
  • Their findings are reported to the organisation, which then patches the vulnerabilities.
  • Ethical hacking is a legitimate and growing profession in cybersecurity.

Misuse of Data

In some cases, data gathered for one purpose may be used for another without the individual’s knowledge or consent:

  • Personal data may be sold to third parties, resulting in unsolicited marketing contact.
  • Data may be used to build detailed profiles of individuals for targeted advertising or political influence.
  • This misuse is addressed by GDPR, which requires data to be collected only for specified, explicit, and legitimate purposes.

Ethics in computing refers to the moral principles that govern the design, development, and use of technology. Unlike laws, ethical standards are not legally enforceable, but they guide responsible behaviour in areas where legislation may be absent or insufficient.


Environmental Impact of Technology

Negative Impacts

Impact Description
E-waste Discarded electronic devices contain toxic materials (lead, mercury, cadmium) that pollute landfill and water supplies. The short upgrade cycle of devices worsens this problem.
Energy consumption Data centres that power cloud services and the internet consume enormous amounts of electricity, much of it from fossil fuels.
Carbon footprint Manufacturing, transporting, and running electronic devices all contribute to greenhouse gas emissions.
Resource extraction Mining rare earth minerals for components (lithium, cobalt) causes environmental damage and raises human rights concerns.
Planned obsolescence Some manufacturers deliberately design products with a limited lifespan to encourage frequent upgrades.

Positive Impacts

Impact Description
Reduced travel Video conferencing and remote working reduce the need for commuting and business travel.
Paperless operations Digital documents, emails, and e-books reduce paper consumption and deforestation.
Smart energy systems IoT sensors and AI can optimise energy use in buildings, transport networks, and power grids.
Environmental monitoring Satellites and sensor networks enable real-time monitoring of climate, pollution, and ecosystems.
Efficiency gains Automation and digital processes can reduce waste and improve efficiency in manufacturing and logistics.

When discussing the environmental impact of technology, always consider both sides. Technology creates environmental problems (e-waste, energy use) but also provides solutions (remote working, smart grids, environmental monitoring). A balanced answer will earn more marks.


The Digital Divide

The digital divide is the gap between those who have access to modern information and communication technology (computers, the internet, digital skills) and those who do not. It exists between countries (global divide), within countries (social divide), and between generations (generational divide).

Causes of the Digital Divide

  • Economic factors — technology and internet access are expensive; poorer individuals and countries may not be able to afford them.
  • Geographic factors — rural areas may lack broadband infrastructure.
  • Age — older generations may lack digital skills or confidence.
  • Education — lack of digital literacy training limits people’s ability to use technology effectively.
  • Disability — not all technology is designed to be accessible to people with disabilities.

Consequences of the Digital Divide

  • People without digital access are excluded from online services (banking, healthcare, government services, education).
  • Those on the wrong side of the divide have fewer employment opportunities as more jobs require digital skills.
  • The divide can reinforce existing inequalities — those who are already disadvantaged are further disadvantaged.

Bridging the Digital Divide

  • Government investment in broadband infrastructure for rural and underserved areas.
  • Free or subsidised devices and internet access for low-income households.
  • Digital skills training in schools, libraries, and community centres.
  • Designing technology to be accessible to people with disabilities (e.g. screen readers, voice control).

Impact of Technology on Employment

Jobs at Risk from Automation

  • Manufacturing — robots can assemble products faster and more accurately than humans.
  • Transport — autonomous vehicles may replace drivers.
  • Retail — self-service checkouts and online shopping reduce the need for shop workers.
  • Customer service — chatbots and AI assistants can handle routine enquiries.
  • Data entry — automated systems can process data more efficiently.

New Jobs Created by Technology

  • Software development — the need for programmers, web developers, and app developers continues to grow.
  • Cybersecurity — protecting systems and data from attack is a growing field.
  • Data science and AI — analysing large datasets and developing AI systems.
  • IT support — maintaining and troubleshooting technology systems.
  • Digital marketing — managing online presence and social media.

The Gig Economy

  • Technology platforms (e.g. Uber, Deliveroo, Fiverr) enable flexible, short-term work rather than traditional employment.
  • Benefits: flexibility, autonomy, ability to work from anywhere.
  • Concerns: lack of job security, no guaranteed income, no employee benefits (sick pay, pension, holiday pay).

For exam questions on the impact of technology on employment, discuss both the jobs that are lost and the new jobs that are created. Consider also the need for retraining — workers whose jobs are automated need new skills to move into the digital economy. A balanced, well-reasoned answer is always better than a one-sided argument.


Intellectual Property and Software Piracy

Intellectual Property (IP)

Intellectual property refers to creations of the mind — inventions, designs, artistic works, names, and images used in commerce. In computing, IP includes:

  • Source code of software
  • Algorithms and proprietary methods
  • Databases and their structure
  • Website designs and content
  • Brand names and logos (trademarks)

Software Piracy

Software piracy is the unauthorised copying, distribution, or use of software. It is illegal under the Copyright, Designs and Patents Act 1988.

Type of Piracy Description
Counterfeiting Producing and selling fake copies of software packaged to look genuine
Softlifting Purchasing one licence and installing it on multiple computers
Hard disk loading Computer sellers installing unlicensed software on machines before sale
Online piracy Downloading or sharing copyrighted software via the internet without a licence
Client-server overuse More users accessing a network-licensed application than the licence permits

Consequences of Software Piracy

  • For developers: lost revenue, reduced ability to invest in future development, reduced incentive to innovate.
  • For users: no official support or updates, risk of malware bundled with pirated software, legal penalties.
  • For the economy: loss of tax revenue, reduced employment in the software industry.

Software piracy is the illegal copying, distribution, or use of copyrighted software. It is a breach of the Copyright, Designs and Patents Act 1988 and can result in criminal prosecution and significant fines.

FAST (Federation Against Software Theft)

The Federation Against Software Theft (FAST) was established in 1984 as the world’s first organisation dedicated to combating software piracy.

  • FAST works to prevent the use of software in the UK that breaches copyright law.
  • It has a policy of prosecuting individuals and organisations found using software illegally.
  • It also campaigns and educates the public about software licensing rules and the consequences of piracy.
  • FAST operates by investigating reports of software misuse, collecting evidence, and working with law enforcement.

Codes of Conduct

A code of conduct is a set of rules that defines how computer users and IT professionals must behave to ensure their actions are acceptable, ethical, and responsible.

Many organisations produce their own codes of conduct. The British Computer Society (BCS) — the Chartered Institute for IT — is a professional body that promotes good practice in computing. The BCS suggests that a code of conduct should follow four key principles:

  1. Make IT for everyone — technology should be inclusive and accessible to all.
  2. Show what you know, learn what you don’t — be honest about your skills and actively develop your expertise.
  3. Respect the organisation or individual you work for — act with integrity and maintain confidentiality.
  4. Keep IT real, keep IT professional, pass IT on — behave professionally, maintain standards, and share knowledge with others.

All schools and colleges have their own acceptable use policies (AUPs) that students must agree to before using school computer systems. These typically cover:

  • Only using systems for authorised purposes.
  • Not accessing inappropriate or illegal material.
  • Not sharing login credentials.
  • Respecting the privacy and copyright of others.

A code of conduct is a formal set of rules governing the ethical and responsible use of technology. The BCS (British Computer Society) is the professional body for IT in the UK and sets standards for ethical behaviour in the computing industry.


Cultural Impact of Technology

Technology has profoundly shaped culture — changing how people communicate, access information, work, and socialise. The pace of change over the past 35 years has been dramatic:

Year Development
1989 Tim Berners-Lee invents the World Wide Web (WWW)
1993 Widespread adoption of email for communication
1997 Broadband internet becomes available to households
1998 Google is founded, transforming how information is searched
1999 Wi-Fi becomes a recognised standard for wireless network connection
2004 Rise of social media — Facebook is established
2006 Twitter is founded, introducing microblogging and instant public communication
2010 Apple introduces the iPad, popularising tablet computing

Positive Cultural Impacts

  • Access to information — the internet gives everyone access to a vast library of knowledge.
  • Global communication — social media and messaging apps connect people across the world instantly.
  • New creative forms — digital art, music production, and video content creation are open to everyone.
  • Remote working and learning — technology enables people to work and study from anywhere.

Negative Cultural Impacts

  • Loss of privacy — social media encourages oversharing of personal information.
  • Misinformation — false information spreads rapidly online, affecting public opinion and behaviour.
  • Social isolation — excessive screen time and online interaction can reduce face-to-face socialisation.
  • Cyberbullying — online platforms can be used to harass and intimidate others.

For questions on cultural impact, use specific examples to support your points — name a particular platform, event, or development rather than speaking in vague generalities. Be prepared to discuss both positive and negative cultural changes brought about by technology.


Key Legislation

Several laws have been passed in the UK to govern the use of computers and data. You must know the purpose of each act, its key provisions, and be able to apply them to scenarios.


The Data Protection Act 2018 (incorporating GDPR)

This act regulates how personal data is collected, stored, processed, and used by organisations. It incorporates the EU’s General Data Protection Regulation (GDPR) into UK law.

The Six Data Protection Principles

Data must be:

Principle Description
1. Lawful, fair and transparent Data must be processed legally and openly — the individual must know what is happening with their data
2. Purpose limitation Data must be collected for a specific, stated purpose and not used for anything else
3. Data minimisation Only the minimum amount of data necessary for the stated purpose should be collected
4. Accuracy Data must be kept accurate and up to date; inaccurate data must be corrected or deleted
5. Storage limitation Data must not be kept for longer than is necessary for the stated purpose
6. Integrity and confidentiality Data must be kept secure using appropriate technical and organisational measures

Individual Rights Under GDPR

Right Description
Right to be informed Individuals must be told how their data is being used
Right of access Individuals can request a copy of the personal data held about them (Subject Access Request)
Right to rectification Individuals can request correction of inaccurate data
Right to erasure Individuals can request deletion of their data (“right to be forgotten”)
Right to restrict processing Individuals can request that their data is stored but not processed
Right to data portability Individuals can request their data in a format that allows transfer to another service
Right to object Individuals can object to processing of their data for certain purposes (e.g. direct marketing)

The Role of the Information Commissioner’s Office (ICO)

  • The ICO is the UK’s independent authority for data protection.
  • Organisations that process personal data must register with the ICO.
  • The ICO can investigate complaints, issue warnings, and impose fines for breaches (up to £17.5 million or 4% of global turnover under GDPR).

GDPR (General Data Protection Regulation) is a comprehensive data protection framework that gives individuals control over their personal data and requires organisations to handle that data lawfully, transparently, and securely. In the UK, it is implemented through the Data Protection Act 2018.


The Computer Misuse Act 1990

This act was introduced to deal with the growing problem of hacking and other forms of unauthorised access to computer systems. It created three criminal offences (a fourth was added later).

Offence Description Example Maximum Penalty
Section 1 Unauthorised access to computer material Guessing or stealing someone’s password to access their account Up to 2 years imprisonment
Section 2 Unauthorised access with intent to commit a further offence Hacking into a bank system with the intention of transferring money Up to 5 years imprisonment
Section 3 Unauthorised modification of computer material Writing and distributing a virus, deleting files, or encrypting data with ransomware Up to 10 years imprisonment
Section 3A Making, supplying or obtaining tools for use in computer misuse Creating and distributing hacking tools or malware kits Up to 2 years imprisonment

In exam scenarios, identify the specific section of the Computer Misuse Act that applies. Section 1 is about access (just getting in). Section 2 is access with intent to commit a further crime. Section 3 is about modifying or damaging data. The sections build in severity.


This act protects the rights of creators of original works, including software, music, films, literature, and art.

Key Provisions

  • It is illegal to copy, modify, or distribute copyrighted material without the permission of the copyright holder.
  • Software is protected as a literary work — the source code is copyrighted.
  • Software piracy (copying or sharing software without a licence) is a criminal offence.
  • Reverse engineering software (decompiling it to understand how it works) is generally prohibited.
  • Copyright applies automatically — the creator does not need to register it.

Types of Software Licence

Licence Type Description
Proprietary The user buys a licence to use the software but does not own the source code. Copying and modification are prohibited.
Open source The source code is freely available. Users can use, modify, and distribute it, often under conditions (e.g. GPL requires derivatives to also be open source).
Freeware Free to use but the source code is not available. The user cannot modify it.
Shareware Free to try for a limited time or with limited features. The user must pay for the full version.

Copyright is the legal right of the creator of an original work to control how it is used, copied, and distributed. Under UK law, it applies automatically to software, music, text, images, and other creative works.


The Freedom of Information Act 2000

  • Gives the public the right to access information held by public authorities (e.g. government departments, local councils, NHS trusts, schools).
  • A request must be responded to within 20 working days.
  • Some information is exempt from disclosure (e.g. national security, personal data, commercial interests).
  • It promotes transparency and accountability in public services.

The Regulation of Investigatory Powers Act 2000 (RIPA)

  • Regulates the power of public bodies to carry out surveillance and investigation.
  • Allows authorised bodies to intercept communications (e.g. phone calls, emails, internet activity) for purposes such as national security, preventing crime, or protecting public health.
  • Internet Service Providers (ISPs) can be required to provide access to a customer’s communications data.
  • Raises significant ethical concerns about the balance between security and individual privacy.

You may be asked to discuss the tension between security and privacy in the context of RIPA. Be prepared to argue both sides — surveillance can prevent crime and terrorism, but it can also infringe on individuals’ rights to privacy and be open to misuse.