IT has changed and continues to change how we do things, from shopping to working to listening to music and surfing the internet . let's look at a few examples:
social impacts
How do we spend our free time
during the 1980's and 1990's children and young people spent a lot of their free time watching television remains a popular pastime, many young people spend more time on the internet, using social networking sites and playing computer games.
Effect on local communities
With so much information and goods and services available online, some tradiotonal facilitie, such as village shops, have experinced a reducation in customers to the extent that their continued presence in the community is no longer necessary or economically viable. This can have a negative effect on local communities, in that there is less diverse range of shops for local people to enjoy.
Economic impacts
Employment structure ahnd working practices
IT has changes the nature of owrk inmany proffesioions. Examples of jobs which have been revolutionised by IT includes administrators who used to keep paper- based record and typists who typed letterson a typewriter.
IT has also created many new jobsa na IT skills are now requried by almost every jobs in the industry. With the internet, access are widely open for people to use it wherever they are, whether working at home or working away the office, commucating to your employee, there are many popular options for many different reasons.
Sustainability
Cmputers use electricity and, with so many in use in homes and businesses, they make a significant contribution to energy consumption and related issues, such as climate change.
Furthermore, with computer hardware developing rapidy, there is a problemwith how to deal with the older computer equipment and what the should do with it when it is nolonger required. The disposal of unwanted electrical equipment(not just computer) is covered by rhe Waste Electrical and Electronic Equipment Directive (WEEE Directive, 2007)
Legal imapcts
Ownership, copright and plagiris
Copyright law protects people who produce their own orginal work (e.g. books, songs, films e.t.c). with music and films available to be downloaded over the internet, it has become very easy to steal substanical in copyright. Many file sharing web serivces has beem set up which allows users to share copyrighted substanical, patricularly films, making it freely available.
The internet makes it very easy to copy and paste substanical from a web page into a document. Plagiarism is a common problem is assignment work submitted by learnes in schools, colleges and universities.
Ethical impacts
privacy of information
Wth so much person information kept on computers, personal privcay has become an issue. Almost every aspect of your life is recorded on a computer, including your medical records, what the buy anywere, who the call on their mobile and what the search on the seach engines, such as Google. personal information relating to living individuals held on computers is covered by the Protection Act (1998).
Unequal access
Thy many benefits of internet access are clear. but what happens to people who can't get high-speed access to the internet?
Local and national implication
In the UK many people who live in rural areas cannot get broadband Internet access because they live too far from a telephone exchange and it's too expensive for the amateur cables for small number for contributes. There is also an age issue, with some older people finding it diffculit tocome to terms with the new technology. as services, such as banking and utilities (for example, water, gas and electricty supplies).
Abuse of IT
As with so many things in life, good things have downside. This is unquestionably the case with the IT uprising and with the internet in precise. There is a whole range of threats and provocations that IT user needs to be aware of it and be protected againist.
Threats
cyber bullying
cyber bullying can be a worrying problem for young people, the think the going to the right places and talking to the safe people but before you know it the are getting threats from an unknown person who know everything about that person and that person has no awareness of them using social networking sites like Facebook, email and chatrooms. Cyber bullies often encourgae their friends to join in the bullying.
Spam
Spam is an univited email advertising. Anyone with an email account will tend to get unsolicited emails, most of which are annoying rather than dangerous. But email user can fake their names and age and request to be your friend and before ou know it the are sending you an improper mails and attachment , as these may cotain viruses.
Phishing
Phishing is a method used by criminals trying to trick people into providing their online banking password and security detail most of this prey are people with no knowledge about the internet.
The give them a through detail and direct them to tghe web linked page and them the think the are logging into there their account there are actually telling the criminals there bank account.
Denial of service attacks
This is a method of avoiding a web server from providing a service by overwhelming it with so many appeals that it is impotent to manage. There are numerous motives why these types of spasms might be made. For instances, a criminal might effort to blackmail a retail company by threating to outbreak the sites except given a large sum of money. Occasionally political sites are attacks in this way by people who don't approve with political views communicated on the locations
No comments:
Post a Comment