• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Social Impacts and Threats of IT

Extracts from this document...

Introduction

Social Impacts and Threats of IT Over the last 40-50 years the impact IT has had on our lives and our society is astonishing! There are many different impacts associated with this topic, a few of which are Social, Economical, Legal and Ethnical. We rely on IT systems to do the simple things we take for granted in our day-to-day lives such as: media, entertainment (gaming and television), advertising (products and services) etc. IT has developed more than ever over the past decade and although we may not notice how IT has changed, it is constantly altering everything we do in our everyday lives. Many people nowadays take the use of IT for granted. Social Impacts How we spend out extra time Currently in the U.K a staggering 97% of people in the U.K have a PC or a computer of some sort in their homes. However, in this day and age most people use a computer as part of everyday life, whether it is for work or socialising. Nowadays most young people in the U.K spend a large quantity of their time on the computer. ...read more.

Middle

In the United Kingdom the Copyright, Designs and Patents Act 1988 gives the authors of written work, music and films rights to control the ways that their material may be used. However because music and films are so easy to download over the internet, many people break this law and use the internet to steal material in copyright. Some people even set up file sharing web services that allow users to share and view copyrighted material, mainly films and music. As well as copyright, plagiarism is an increasing problem and is commonly found within schools. Most school children today view plagiarism as ?changing it into their own words? and don?t really recognise or grasp the concept that is it illegal! Plagiarism is commonly carried out in assignment work submitted by learners in schools, colleges, and even universities. You are allowed to quote other peoples work as long as you recognise the source of information, however you are not allowed (and it is illegal) to pass other peoples work off as your own. Ethnical Impacts Privacy of information Currently with so much personal and private information stored on computers, personal privacy has become a problem. ...read more.

Conclusion

A widely used method that almost all phishing criminals use is they send people an e-mail disguised as if it is coming from their bank. The e-mail usually tells them to then click a link within the e-mail which then directs them to a page that looks like the log-on screen to their online bank account. However, the web page is under complete control of the criminals? and therefore allows them to determine the victim?s username, password and various other security details. After this the criminals then use this information to gain access to the victim?s bank account and go on to steal money out of it. Denial of service attacks A denial of service attack (DOS attack) or distributed denial of service attack (DDoS attack) is an attempt to make a computer resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the determined efforts of a person, or multiple people to prevent an Internet site or service from working efficiently or at all, temporarily or indefinitely. Perpetrators of DoS attacks typically targets sites or services hosted on high-profile web servers such as banks and credit card payment gateways. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE ICT Systems and Application section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Here's what a teacher thought of this essay


A very good overview of some of the social, ethical, moral and economic (and environmental) factors that are borne out of IT and its ever growing use.
There is a good range of examples and some use of data to justify statements - although it would be good for more of these to raise the level of the essay.

This work would help other students looking to get a broad understanding of the implication of the use of IT as it is factually accurate but also includes examples that are relevant and students can relate to.

Overall this is a four star piece of work.

Marked by teacher Ad Son 03/01/2013

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE ICT Systems and Application essays

  1. ICT Project - Statement of the Problem

    is done manually and the member's information is not kept on a database. So for example the members fill out a form on paper that is then place alphabetically the members file ling cabinet. Additionally the restaurant bookings are also done manually on pieces of paper., which has consistently lead

  2. Types of ICT used and their purposes.

    * The OPERATION Department Video clips are made using a video camera and then connected to the computer via firewire port. Videos can be edited and downloaded using a program called Video Factory. Next it is exported into windows media player format still being improved and finally it can be then put on a CD and delivered to the customers.

  1. ICT Multimedia Coursework Assignment A1

    do this you will have to add action buttons to your master slide this will automatically add Action buttons to all of your slideshows. Slide Transition: - I used slide transition because these are affects, which are placed between one slide to another to make your slideshow more Attractive, there

  2. The Advantages of Using ICT Over Manual Meethods. Using Paint and Access.

    sending them to a college you can make a pay for an expert staff to come in and teach them. The Third way is that if you have 7+ employees then you have a separate training department and do a test at the end and whoever passes the test them make them be your employees.

  1. Social, Moral and Economical Effects of ICT. How different businesses use ICT.

    Have a rest for a while every here and then. Cramps Staying in the same position for too long. Have a rest for a while every here and then. The law The Data protection Act requires all organizations which handle personal information to comply with a number of important principles regarding privacy and disclosure.

  2. Use of ICT in Sainsbury's:

    Advantages * CCTV cameras have a good and clean record, they have never missed anything going on in the store during the working hours or after the shop has been closed, but if you have a security guard he can't keep staring at someone like a hawk and maybe offending

  1. Health and Safety Issues in ICT

    Humidity - Ventilation and humidity should be maintained at levels which prevent discomfort and problems of sore eyes. Temperatures Minimum temperatures - For workplaces generally, the Workplace (Health, Safety and Welfare) Regulations specify 16�C. For classrooms and other workrooms in schools, however, the Education (School Premises)

  2. This project is designed to help non-computerized library to easily keep track of their ...

    : * Enquire borrower by name or number * Issue books and other resources for the member * Accept books and other resources back into the library * Be able to make reservations * Modify any of the members detail * Add more members or delete the old ones or those who have left.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work