0% found this document useful (0 votes)
4 views6 pages

1 - Summary - Social Implications

The document outlines various social implications of technology, focusing on cybercrime, including hacking and identity theft, as well as the theft of hardware and software. It also discusses the impact of social media, highlighting both positive effects like fostering relationships and negative effects such as misinformation and cyberbullying. Additionally, it covers the implications of technology on the global community, including telecommuting and environmental concerns, and emphasizes user-centered design in technology applications.

Uploaded by

khumorams07
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views6 pages

1 - Summary - Social Implications

The document outlines various social implications of technology, focusing on cybercrime, including hacking and identity theft, as well as the theft of hardware and software. It also discusses the impact of social media, highlighting both positive effects like fostering relationships and negative effects such as misinformation and cyberbullying. Additionally, it covers the implications of technology on the global community, including telecommuting and environmental concerns, and emphasizes user-centered design in technology applications.

Uploaded by

khumorams07
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Summary of Social Implications

Computer-related crimes
Cybercrime is defined as a crime in which a computer is the object of the crime (hacking,
phishing, spamming) or is used as a tool to commit an offense (child pornography, hate
crimes). Cybercriminals may use computer technology to access personal information,
business trade secrets or use the internet for exploitative or malicious purposes.
Cybercrime encompasses a wide range of activities, but these can
generally be broken into two categories:

Crimes that target computer networks or devices. These types


of crimes include viruses and denial-of-service (DoS) attacks.
Crimes that use computer networks to advance other criminal
activities. These types of crimes include cyberstalking, phishing
and fraud or identity theft.
Scan for article
Source: https://www.techopedia.com/definition/2387/cybercrime

THEFT OF COMPUTER HARDWARE


Computer hardware is very expensive and it is important that you protect yourself against
hardware theft. Here are some general guidelines on how to protect yourself:

SOFTWARE THEFT
Software theft is the unauthorized copying of software. Most retail
programs are licensed for use at just one computer site or for use by
only one user at any time. By buying the software, you become a
licensed user rather than an owner (see EULA). You are allowed to
make copies of the program for backup purposes, but it is against the
law to give copies to friends and colleagues.
Source: https://www.webopedia.com/TERM/S/software_piracy.html
For additional
information
To avoid software theft, do the following:

tware so that an illegal copy can be made.

BANDWIDTH THEFT
Bandwidth theft refers to the use of bandwidth without paying for it.
Bandwidth theft can also occur when one is connected to an unprotected
network.
Precautions include:

COMPUTER APPLICATIONS TECHNOLOGY | Summary of Social Implications | 128


Having good password policies.
Being careful when installing free software from the internet, as it might be malware.

For additional info checkout this site: https://altlab.com/hotlinking.html

IDENTITY THEFT
Identity theft occurs when someone uses your personal information to pretend to be you to
commit fraud or to gain financial benefits.

Your personal information could be your full name, email address, online login and
passwords, driver's license number, passport number or bank account number. Criminals
can gain access to these types of information and sell it on the dark web to commit identity
theft.

Here are some common ways criminals commit identity theft.


Phishing, Skimming, Unsecure web connections, Phone scams, Data breaches, Email
spoofing.

THEFT OF TIME AND SERVICES


Theft of time refers to a person receiving payment from his or her employer for work that the
employee did NOT do.
Theft of services refers to the person using company equipment, such as a computer or the
internet, for personal matters.

CROWDFUNDING
Crowdfunding is a method of raising capital through the collective effort of
friends, family, customers, and individual investors. This approach taps into the
collective efforts of a large pool of individuals-primarily online via social media
and crowdfunding platforms-and leverages their networks for greater reach and
exposure.

Source: https://www.fundable.com/learn/resources/guides/crowdfunding/what-is- Scan for more


crowdfunding

These are possible crowd funding options:


Donation Crowd Funding
Reward Crowd Funding
Loan Based Crowd Funding
Investment Crowd Funding

COMPUTER APPLICATIONS TECHNOLOGY | Summary of Social Implications | 129


INTERNET ATTACKS

Internet attacks also known as cyberattacks, is a malicious and


deliberate attempt by an individual or organization to breach the
information system of another individual or organization. Usually, the
attacker seeks some type of benefit from disrupting the victim's
network.

Source: https://www.cisco.com/c/en/us/products/security/common-
Scan for more cyberattacks.html

MALWARE
Malware is a term used to describe malicious software, including spyware, ransomware,
viruses, and worms. Malware breaches a network through a vulnerability, typically when a
user clicks a dangerous link or email attachment that then installs risky software. Once
inside the system, malware can do the following:

Blocks access to key components of the network (ransomware)


Installs malware or additional harmful software
Covertly obtains information by transmitting data from the hard drive (spyware)
Disrupts certain components and renders the system inoperable

Image source : https://www.avast.com/c-malware

COMPUTER APPLICATIONS TECHNOLOGY | Summary of Social Implications | 130


BOTS

An Internet bot, in its most generic sense, is software that performs


an automated task over the Internet. More specifically, a bot is an
automated application used to perform simple and repetitive tasks
that would be time-consuming, mundane or impossible for a human
to perform.

Scan to watch clip Bots can be used for productive tasks, but they are also frequently
used for malicious purposes.

Source: https://www.techopedia.com/definition/24063/internet-bot

ZOMBIES
In computing, a zombie is a computer connected to a network that has been compromised
and taken over by a hacker, a virus or a Trojan. It can be used remotely for malicious tasks.
Source: https://www.pandasecurity.com/en/security-info/zombie/

RIGHT TO ACCESS VS RIGHT TO PRIVACY


Here are a few examples to look at when it comes to the right of access versus the right to
privacy:

If you do your work on a computer owned by someone else, they may have the right to claim
access to your data files.
If you use online services such as Facebook you should be aware that their End User
License Agreement states that whatever you post belongs to them.
If your school has an AUP for the computer lab that you have accepted, you may have
allowed people other than yourself to access your data files.

FIREWALLS
A firewall is a system
Scan for more
designed to prevent
unauthorised access
to or from a private
network. You can
implement a firewall in
either hardware or
software form, or a
combination of both. Firewalls prevent unauthorised internet users
from accessing private networks connected to the internet, especially Scan for more
intranets. All messages entering or leaving the intranet (the local
network to which you are connected) must pass through the firewall,
which examines each message and blocks those that do not meet the
specified security criteria.
Source: https://kb.iu.edu/d/aoru

Image Source: https://computer.howstuffworks.com/firewall.htm

COMPUTER APPLICATIONS TECHNOLOGY | Summary of Social Implications | 131


ANTIVIRUS PROGRAMS
Antivirus software is a program or set of programs that are designed to prevent, search for,
detect, and remove software viruses, and other malicious software like worms, trojans,
adware, and more.
Source: https://www.webroot.com/in/en/resources/tips-articles/what-is-anti-virus-software
Below is a list of antivirus software available:

Bitdefender Antivirus Plus 2019.


Norton AntiVirus Plus.
F-Secure Antivirus SAFE.
Kaspersky Anti-Virus.
Trend Micro Antivirus+ Security.
Webroot SecureAnywhere AntiVirus.
ESET NOD32 Antivirus.
G-Data Antivirus.
SOCIAL IMPLICATIONS OF E-COMMUNICATIONS AND TECHNOLOGY

IMPACT OF SOCIAL NETWORKING SITES


POSITIVE EFFECTS OF SOCIAL MEDIA NEGATIVE EFFECTS OF SOCIAL MEDIA
Social media has made it easy to make Encouraging poor grammar and spelling
friends
Social media helps in fostering empathy Allowing the spread of misinformation that
may be perceived as fact even in light of
evidence to the contrary Fake news
Social media helps in speedy communication Exposing children to online predators
Providing information that increases the risk
of identity theft
Social media makes the world seem small Creating a culture in which a single mistake
such as a racy picture or poorly thought-out
comment can cause irreparable harm to
someone's reputation
Social media helps in building relationships Decreasing productivity as workers
habitually check social networking sites
when they should be working
Social media helps in finding common ground Creating a platform for cyber bullying
Scan for more
Akram, Waseem. (2018). A Study on Positive and Negative Effects of
Social Media on Society. International Journal of Computer Sciences and
Engineering. 5. 10.26438/ijcse/v5i10.351354.
Sources: https://www.technology.org/2019/06/06/social-networking-sites-and-
the-positive-impact-they-have-on-the-society/

https://www.researchgate.net/publication/323903323_A_Study_on_Positive_and_Negative_Effects
_of_Social_Media_on_Society,
https://socialnetworking.lovetoknow.com/Negative_Impact_of_Social_Networking_Sites

COMPUTER APPLICATIONS TECHNOLOGY | Summary of Social Implications | 132


The Impact of Technology on the Global Community

POSITIVE EFFECTS OF NEGATIVE EFFECTS OF


TECHNOLOGY TECHNOLOGY
Telecommuting (e-commuting) Working environment
Improved healthcare Environmental problems
Enhances our ability to fight crime Social effects
Increased productivity Crime and abuse
Making the impossible, possible Lack of upskilling
Artificial Intelligence
Machine learning
Block chain

Source: https://www.siyavula.com/read/cat/grade-12-cat/social- Scan to read more


implications-of-ecommunications-and-technologies/08-social-implications-
of-ecommunications-and-technologies

VIRTUAL AND AUGMENTED REALITY


Augmented reality Virtual reality (VR)
(AR) adds digital implies a complete
elements to a live immersion
view often by using experience that shuts out the physical
the camera on a world. Using VR devices such as HTC
smartphone. Vive, Oculus Rift or Google Cardboard,
Examples of users can be transported into a number of
augmented reality real-world and
experiences include imagined
Snapchat lenses environments such
and the game as the middle of a
Pokemon Go. squawking penguin
colony or even the
back of a dragon.
Scan for more
Source: https://www.fi.edu/difference-between-ar-vr-and-mr

Social Implications: User-centred design

Designed to work in the way that a user wants to work.


Designed to be easy to use and have features in logical places.
Scan me for
Advantages of a UCD approach include: additional
Users are less frustrated with the software. information
Users need less training as the layout is logical and user friendly.
Users make fewer errors.
Users who have never used the application learn how to use it
very quickly.
Users find websites easy to navigate.
Data entry can be easy to use.
Presentations are easier to present or understand.

COMPUTER APPLICATIONS TECHNOLOGY | Summary of Social Implications | 133

You might also like