• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Social Impacts and Threats of IT

Extracts from this document...

Introduction

´╗┐Social Impacts and Threats of IT Over the last 40-50 years the impact IT has had on our lives and our society is astonishing! There are many different impacts associated with this topic, a few of which are Social, Economical, Legal and Ethnical. We rely on IT systems to do the simple things we take for granted in our day-to-day lives such as: media, entertainment (gaming and television), advertising (products and services) etc. IT has developed more than ever over the past decade and although we may not notice how IT has changed, it is constantly altering everything we do in our everyday lives. Many people nowadays take the use of IT for granted. Social Impacts How we spend out extra time Currently in the U.K a staggering 97% of people in the U.K have a PC or a computer of some sort in their homes. However, in this day and age most people use a computer as part of everyday life, whether it is for work or socialising. Nowadays most young people in the U.K spend a large quantity of their time on the computer. ...read more.

Middle

In the United Kingdom the Copyright, Designs and Patents Act 1988 gives the authors of written work, music and films rights to control the ways that their material may be used. However because music and films are so easy to download over the internet, many people break this law and use the internet to steal material in copyright. Some people even set up file sharing web services that allow users to share and view copyrighted material, mainly films and music. As well as copyright, plagiarism is an increasing problem and is commonly found within schools. Most school children today view plagiarism as ?changing it into their own words? and don?t really recognise or grasp the concept that is it illegal! Plagiarism is commonly carried out in assignment work submitted by learners in schools, colleges, and even universities. You are allowed to quote other peoples work as long as you recognise the source of information, however you are not allowed (and it is illegal) to pass other peoples work off as your own. Ethnical Impacts Privacy of information Currently with so much personal and private information stored on computers, personal privacy has become a problem. ...read more.

Conclusion

A widely used method that almost all phishing criminals use is they send people an e-mail disguised as if it is coming from their bank. The e-mail usually tells them to then click a link within the e-mail which then directs them to a page that looks like the log-on screen to their online bank account. However, the web page is under complete control of the criminals? and therefore allows them to determine the victim?s username, password and various other security details. After this the criminals then use this information to gain access to the victim?s bank account and go on to steal money out of it. Denial of service attacks A denial of service attack (DOS attack) or distributed denial of service attack (DDoS attack) is an attempt to make a computer resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the determined efforts of a person, or multiple people to prevent an Internet site or service from working efficiently or at all, temporarily or indefinitely. Perpetrators of DoS attacks typically targets sites or services hosted on high-profile web servers such as banks and credit card payment gateways. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE ICT Systems and Application section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Here's what a teacher thought of this essay


A very good overview of some of the social, ethical, moral and economic (and environmental) factors that are borne out of IT and its ever growing use.
There is a good range of examples and some use of data to justify statements - although it would be good for more of these to raise the level of the essay.

This work would help other students looking to get a broad understanding of the implication of the use of IT as it is factually accurate but also includes examples that are relevant and students can relate to.

Overall this is a four star piece of work.

Marked by teacher Ad Son 03/01/2013

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE ICT Systems and Application essays

  1. Disadvantages of Ict

    As an employee they would be able to work from home connecting to the work server via the internet. So we could say basically you can say it is now possible to carry out your whole entire life, even without leaving the doorstep.

  2. Types of ICT used and their purposes.

    * The OPERATION Department Video clips are made using a video camera and then connected to the computer via firewire port. Videos can be edited and downloaded using a program called Video Factory. Next it is exported into windows media player format still being improved and finally it can be then put on a CD and delivered to the customers.

  1. Difference between computerized and manual systems.

    single page or a few pages whilst in a website you can add dozens of pages.

  2. ICT Project - Statement of the Problem

    is done manually and the member's information is not kept on a database. So for example the members fill out a form on paper that is then place alphabetically the members file ling cabinet. Additionally the restaurant bookings are also done manually on pieces of paper., which has consistently lead

  1. Different types of technology How I use ICT at home and at school

    Extremely efficient and easy as I don't have to go back to the source to find it or download it as a slow speed. As mentioned before, Blackberry has an e-mail service. This lets you receive and send emails. Better yet, you can even open and send attachments.

  2. The Advantages of Using ICT Over Manual Meethods. Using Paint and Access.

    The customers will like it more now because if they forget any details the company already has it saved on the computer and by this way the company and the customer will have less stress in remembering their details.

  1. ICT applications - crime prevention methods have been improved by many new technological devices ...

    By having individuals monitoring the CCTV forages constantly, they are able to see whether or not police are needed and can use judgment to see potential trouble before it happens. In my opinion CCTV has changed lives of many people for the better, as just having the CCTV cameras fitted is enough to put many people off from committing crimes.

  2. Free essay

    Impact of ICT on the way Students do things at home and at college/school.

    With the use of internet, people are able to access courses via on-line. The internet can be used to check which local colleges do the courses. Participating in a course through the internet has many advantages because many colleges only run a certain number of courses and usually, the colleges

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work