Issues and Impacts Crossword

1234567891011121314151617181920212223242526272829303132
Across
  1. 4. Unfairness in algorithms or AI systems that can discriminate
  2. 6. All the information about a person that exists online
  3. 8. Copying someone else’s work without credit
  4. 13. Crime where someone uses another person’s personal details illegally
  5. 18. Illegal activities carried out using computers or the internet
  6. 21. Platforms that can spread misinformation or affect mental health
  7. 24. Technology that identifies people by their face
  8. 25. Incident where sensitive information is accessed without permission
  9. 27. Deliberately posting offensive or upsetting content online
  10. 30. False or misleading information spread online
  11. 31. Protecting systems and data from online threats
  12. 32. Monitoring of people’s activities using technology
Down
  1. 1. Gap between people who have access to technology and those who do not
  2. 2. Computer-generated environment that feels real to users
  3. 3. Software designed to damage or disrupt computers
  4. 5. Legal right protecting creators of software, music, or digital content
  5. 7. Money that exists only electronically, like Bitcoin
  6. 9. Discarded electronic devices that harm the environment
  7. 10. Technology that simulates human thinking and decision-making
  8. 11. Small files stored by websites to track user activity
  9. 12. Software that is freely available and can be modified by anyone
  10. 14. Moral principles guiding responsible use of technology
  11. 15. Process of converting data into code to prevent unauthorized access
  12. 16. Creations of the mind protected by law
  13. 17. Technology that overlays digital information onto the real world
  14. 19. Environmental effects of producing and using technology
  15. 20. Excessive use of technology leading to negative impacts on health or lifestyle
  16. 22. Replacement of human jobs with computer-controlled systems
  17. 23. Fraudulent attempt to steal sensitive information via fake emails or websites
  18. 26. Ensuring personal information is kept safe and not misused
  19. 28. Unauthorized access to computer systems
  20. 29. Programs that can copy themselves and damage computers