Welcome to the World of Computing Impact!

Hey there! Welcome to one of the most interesting parts of your H2 Computing journey. While the rest of the syllabus focuses on how to build systems, this chapter focuses on why we need to be careful with them.

In this section, we will look at how computing affects people, the economy, and the laws that keep us safe in Singapore. Don't worry if this seems a bit "wordy" compared to coding—think of this as the "User Manual for Society." Let's dive in!

1. The Four Pillars of Impact: SELE

When we talk about the impact of technology, we usually look through four different "lenses." A great way to remember this is the mnemonic SELE: Social, Ethical, Legal, and Economic.

Social Issues

These are issues that affect how we live and interact as a society.
Example: Social media allows us to stay connected with friends (positive), but it can also lead to social isolation or the "Digital Divide," where people who cannot afford computers are left behind in education and jobs.

Ethical Issues

Ethics is about "what is right vs. what is wrong," even if there isn't a specific law about it yet.
Example: If an AI is used to hire employees but it consistently ignores female candidates because of a bias in its training data, that is an ethical problem.

Legal Issues

These are the hard rules set by the government. If you break these, there are specific punishments like fines or jail.
Example: Hacking into a bank's server to steal money is a direct violation of the law.

Economic Issues

This refers to how technology affects money, jobs, and businesses.
Example: Automation in factories might lead to job losses for manual laborers (negative), but it also creates new jobs for robot maintenance engineers (positive).

Quick Review: The SELE Pillars

Social: Interaction and lifestyle.
Ethical: Right vs. Wrong.
Legal: Government laws.
Economic: Money and jobs.


2. Staying on the Right Side of the Law (Singapore Context)

As a student in Singapore, you need to know four specific Acts that govern the digital world. Think of these as the "Police Force" of the internet.

Computer Misuse Act (CMA)

The CMA is all about unauthorized access. If you use a computer to do something you aren't supposed to, you are likely breaking this act.
Analogy: Imagine someone's house. If you pick the lock and walk in without permission, you've committed a crime, even if you didn't steal anything. That is what the CMA covers for computers.
Key Situations: Hacking, spreading viruses, or using someone else's password without permission.

Personal Data Protection Act (PDPA)

The PDPA protects your personal information. It dictates how companies collect, use, and share your data (like your NRIC, phone number, or address).
Key Rule: Companies must get your consent before using your data and must keep it secure.
Key Situations: A gym sells your phone number to a telemarketer without your permission, or a company accidentally leaks your credit card details online.

Protection from Online Falsehoods and Manipulation Act (POFMA)

This is commonly known as the "Fake News" law. It’s designed to stop the spread of false information that could harm the public interest.
Key Situations: Someone creates a fake website claiming the water supply in Singapore is poisoned to cause a panic.

Protection from Harassment Act (POHA)

The POHA protects people from harassment, stalking, and bullying, whether it happens in person or online (cyberbullying).
Key Situations: Someone posts embarrassing photos of a classmate repeatedly to cause them distress, or follows them across different social media platforms to scare them.

Common Mistake to Avoid!

Don't confuse CMA and PDPA.
• If you hack a database, you broke the CMA.
• If the company failed to lock the database properly and your data got stolen, the company might have breached the PDPA.


3. Professional Ethics and Conduct

If you eventually become a software engineer or a data scientist, you aren't just a "coder"—you are a Computing Professional. Just like doctors have the Hippocratic Oath, computing professionals have a code of conduct.

Key Principles of a Computing Professional:

1. Public Interest: Always consider how your software affects the general public. Does it harm people's health or safety?
2. Integrity: Be honest. If your software has a bug that could leak data, don't hide it—report it.
3. Confidentiality: Respect the privacy of your clients and employers. Never "peek" at data you don't need for your job.
4. Professional Competence: Don't claim you can do something if you can't. Keep learning to ensure your work is up to high standards.

Did you know? Many professionals follow the ACM (Association for Computing Machinery) Code of Ethics. It emphasizes that the highest goal should be to "contribute to society and human well-being."


4. Understanding the PDPA in Detail

Since data is the "new oil," the PDPA is very important for the syllabus. There are three main things companies must do with your data:

1. Collection

They can only collect what is necessary.
Example: An app for a calculator doesn't need to collect your GPS location. If it does, it's a "red flag."

2. Use

They can only use the data for the purpose you agreed to.
Example: If you give your email to a shoe store to receive a digital receipt, they shouldn't use that email to sign you up for a life insurance newsletter.

3. Disclosure

They cannot give your data to third parties without telling you.

Key Takeaway for PDPA

Consent is the magic word! If the user didn't say "Yes," the answer is "No."


Summary Checklist

Before you move on, make sure you can:
• Explain the difference between Social, Ethical, Legal, and Economic impacts.
• Identify which Singapore Act (CMA, PDPA, POFMA, POHA) applies to a given story or scenario.
• Describe why a "Code of Conduct" is important for someone working in IT.
• Explain the basic requirements for collecting and using personal data under the PDPA.

Keep going! You're doing great. Understanding these issues makes you not just a better student, but a more responsible digital citizen!