• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Social Impacts and Threats of IT

Extracts from this document...


´╗┐Social Impacts and Threats of IT Over the last 40-50 years the impact IT has had on our lives and our society is astonishing! There are many different impacts associated with this topic, a few of which are Social, Economical, Legal and Ethnical. We rely on IT systems to do the simple things we take for granted in our day-to-day lives such as: media, entertainment (gaming and television), advertising (products and services) etc. IT has developed more than ever over the past decade and although we may not notice how IT has changed, it is constantly altering everything we do in our everyday lives. Many people nowadays take the use of IT for granted. Social Impacts How we spend out extra time Currently in the U.K a staggering 97% of people in the U.K have a PC or a computer of some sort in their homes. However, in this day and age most people use a computer as part of everyday life, whether it is for work or socialising. Nowadays most young people in the U.K spend a large quantity of their time on the computer. ...read more.


In the United Kingdom the Copyright, Designs and Patents Act 1988 gives the authors of written work, music and films rights to control the ways that their material may be used. However because music and films are so easy to download over the internet, many people break this law and use the internet to steal material in copyright. Some people even set up file sharing web services that allow users to share and view copyrighted material, mainly films and music. As well as copyright, plagiarism is an increasing problem and is commonly found within schools. Most school children today view plagiarism as ?changing it into their own words? and don?t really recognise or grasp the concept that is it illegal! Plagiarism is commonly carried out in assignment work submitted by learners in schools, colleges, and even universities. You are allowed to quote other peoples work as long as you recognise the source of information, however you are not allowed (and it is illegal) to pass other peoples work off as your own. Ethnical Impacts Privacy of information Currently with so much personal and private information stored on computers, personal privacy has become a problem. ...read more.


A widely used method that almost all phishing criminals use is they send people an e-mail disguised as if it is coming from their bank. The e-mail usually tells them to then click a link within the e-mail which then directs them to a page that looks like the log-on screen to their online bank account. However, the web page is under complete control of the criminals? and therefore allows them to determine the victim?s username, password and various other security details. After this the criminals then use this information to gain access to the victim?s bank account and go on to steal money out of it. Denial of service attacks A denial of service attack (DOS attack) or distributed denial of service attack (DDoS attack) is an attempt to make a computer resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the determined efforts of a person, or multiple people to prevent an Internet site or service from working efficiently or at all, temporarily or indefinitely. Perpetrators of DoS attacks typically targets sites or services hosted on high-profile web servers such as banks and credit card payment gateways. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE ICT Systems and Application section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Here's what a teacher thought of this essay

A very good overview of some of the social, ethical, moral and economic (and environmental) factors that are borne out of IT and its ever growing use.
There is a good range of examples and some use of data to justify statements - although it would be good for more of these to raise the level of the essay.

This work would help other students looking to get a broad understanding of the implication of the use of IT as it is factually accurate but also includes examples that are relevant and students can relate to.

Overall this is a four star piece of work.

Marked by teacher Ad Son 03/01/2013

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE ICT Systems and Application essays

  1. Marked by a teacher

    Evaluation of my ICT Database, Spreadsheet and Newsletter

    3 star(s)

    I have used all the data entry types that I think fit this task. Validation I used a range check on my Number of People, Reference Number, etc. To make sure that only a certain number can be entered. Forms My colour scheme for my database is colourful, but not too bright.

  2. Types of ICT used and their purposes.

    * The OPERATION Department Video clips are made using a video camera and then connected to the computer via firewire port. Videos can be edited and downloaded using a program called Video Factory. Next it is exported into windows media player format still being improved and finally it can be then put on a CD and delivered to the customers.

  1. Difference between computerized and manual systems.

    single page or a few pages whilst in a website you can add dozens of pages.

  2. Different types of technology How I use ICT at home and at school

    It lets this hypothetical friend get his Pokemon and it works like this for me. If I see something my friends have, the human urge to conform kicks in and I want it, I need it. And this is the need Bluetooth provides, it lets me transfer from mobile to mobile.

  1. Social, Moral and Economical Effects of ICT. How different businesses use ICT.

    ICT used in homes In homes ICT is used for things like for people to do their work or CDs and DVDs. It is also used in music players, TVs and all house electrical items. It is also helpful for the children because the can do their school works

  2. Health and Safety with ICT.

    Safety considerations relating to Health & Safety and ICT in Schools... Electrical * * Safety testing - all school equipment should be tested. * Care of cables, plugs - damaged plugs should be replaced ensuring that the correctly rated fuse is placed in the plug.

  1. This project is designed to help non-computerized library to easily keep track of their ...

    This system lends books to only the member of Balin City Library. The books of this library are mainly bought form Oxford University Press, Urdu bazaar press, Paramount books, the head office of this library and liberty books. LIBRARIAN'S PROSPECTIVE: All the functions preformed by the librarian are listed below

  2. ICT and entertainment, TV and games consoles.

    might miss or want to share with family and friends, pause and rewind live TV. This helps people plan their days better allowing them to watch selected programmes when they want other than the selected show time.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work