Digital Divide - differing access to computing devices and the Internet, based on socioeconomic, geographic, or demographic characteristics
Citizen science - scientific research conducted in whole or part by distributed individuals, many of whom may not be scientists, who contribute relevant data to research using their own computing devices
Crowdsourcing - the practice of obtaining input of information from a large number of people via the Internet
Intellectual property - material created on a computer is the intellectual property of the creator or an organization
Creative Commons - a public copyright license that enables the free distribution of an otherwise copyrighted work. This is used when the content creator wants to give others the right to share, use, and build upon the work they have created. Check it out here
Open source - programs that are made freely available and may be redistributed and modified
Open access - online research output free of any and all restrictions on access and free of many restrictions on use, such as copyright or license restrictions
Personally identifiable information (PII) - information about an individual that identifies, links, relates, or describes them. Examples: social security number, age, race, phone number(s), medical information, financial information, biometric data
Authentication measures - protect devices and information from unauthorized access. Examples: strong passwords and multifactor authentication
Multifactor authentication - a method of computer access control in which a user is only granted access after successfully presenting several separate pieces of evidence to an authentication mechanism, typically in at least two of the following categories: knowledge (something they know), possession (something they have), and inherence (something they are)
Encryption - the process of encoding data to prevent unauthorized access
Decryption - the process of decoding encrypted data
Symmetric key encryption - uses one key for both encryption and decryption
Public key (asymmetric) encryption - pairs a public key for encryption and a private key for decryption. The sender does not need the receiver's private key to encrypt a message, but the receiver's private key is required to decrypt the message
Certificate authorities - issue digital certificates that validate the ownership of encryption keys used in secure communications and are based on a trust model
Computer virus - a malicious program that can copy itself and gain access to a computer in an unauthorized way. Computer viruses often attach themselves to legitimate programs and start running independently on a computer
Malware (malicious software) - software intended to damage a computing system or to take partial control over its operation
Phishing - a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails
Keylogging - the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to password and other confidential information
Rogue access point - a wireless access point that gives unauthorized access to secure networks