• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Drawbacks of ICT in a global society

Extracts from this document...

Introduction

Drawbacks of Information Technology It is true that today's society is incomplete without IT, and it is almost impossible to imagine a life without computers, internet, and digital gadget like, cell phones, videogames and IPods. However, the advancement in technology has created many ethical and social issues, like, increased unemployment, threat to privacy; crime has increased and so has blackmailing. Threat to personal privacy and hazards of high tech crime: Many people nowadays do not carry cash every time, instead they use debit cards and credit cards; these cards are easy to use as they just needed to be swiped and rest of the transaction is done by the banks. These cards are frequently use because you can use them over internet (e -commerce). We not only see credit cards but also driving license, health cards, loyalty cards and smart cards; these cards store our information and act as an identity. ...read more.

Middle

Software as lime-wire and torrent allows us to download movies, songs and games all for free. In olden days, it was quite expensive to produce CDs and DVDs but now an ordinary person sitting in their home can produce 100s of CDs. However, this way the original author or the producers do not get credit for their creativity, they do not get their part of money (royalty income) of producing such amazing movies and songs. This is called piracy; it is as much of crime as physically stealing money from a bank. PODGORICA (AFP) - Software piracy in Montenegro is amongst the highest in the world with 83 percent of computer programs illegally copied in 2007, a study released on Thursday showed. The economy has lost about seven million dollars (4.93 million Euros) in 2007 due to unpaid taxes on software sales, said a study done by Business Software Alliance, an industry group. ...read more.

Conclusion

In addition, these machines have proven to be less costly as they do not require breaks and wages. However, many older workers and semi-skilled workers have lost their jobs. In many countries, the unemployment rates have gone up rapidly. Gulf times: The GCC has increased unemployment up to 35 per cent, by reducing 300,000 jobs annually. Even though there is a lot of construction activities in process in UAE, Laborers are being sent back to their home countries, as they have been replaced by robots. The abuse of information as a tool of politics and economic power: Carabobo: The boy thought hacking the government sites would win him a job with a private telecommunications firm, according to the Associated Press and other wire services. The 17-year-old hacked into 23 state-sponsored sites, including those of the vice president's office, the National Guard, the state investigative services and the immigration office. A resident of the Carabobo state, the teen has been accused of unlawful access to and sabotage of a protected computer system, according to an AP report. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our International Baccalaureate Misc section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related International Baccalaureate Misc essays

  1. The History & Development of Reflexology

    The first Alzheimer's patient was diagnosed on May 16, 1850, which was the last year that shoes were made completely by hand. The following pictures are of habitually bare feet, and are from a study conducted over 100 years ago, and published in 1905 in the American Journal of Orthopaedic

  2. ITGS portfolio Loss of employment and privacy issues regarding the rise of online grocery ...

    Take a look at these pros and cons of grocery shopping online to see if you think it is for you. Pros of Online Grocery Shopping With online grocery shopping, there's no hassle of finding time to pack up the kids, drive to the store, find a parking space, grab

  1. Online Games and Addiction

    Online games also employ safe spots where players must travel to be able to save their games safely. Details such as these ensure that players stay as long in the game as they can so that they will have to pay more for further usage.

  2. ITGS portfolio Privacy and security issues that arise when using Health Information Technology to ...

    your personal health information is an important part of our changing health care system. You and your doctor can better manage your health care by improving how you communicate with each other and how you maintain your health information. Using computers and other electronic devices makes it easy for you,

  1. Community Health

    For a community to remain stable it has to continue to grow, with a good infrastructure in place, and people will want to not only live there but also to visit and spend money there. If people do not use the infrastructure it can become unstable and collapse.

  2. SALES OF GOOD ACT

    If the goods are not sellable the buyer has a right to cancel the contract. Unpaid seller :- A seller is termed as an unpaid seller when the whole price of the goods is not paid or where a negotiable instrument has been received & the instrument is dishonoured.

  1. Censorship of Video Games

    a big number, you must remember that in America almost 90% of boys and 40% of girls play video games.2 With such a majority of children playing video games, I believe that the statistic on school fights becomes irrelevant; playing video games has become the norm, not the exception.

  2. Information Technology in a Global Society - article commentary "What are the security risks ...

    This is extremely dangerous if the lost data are important. (Inderscience, 2010) In 2009 the first iPhone worm was discovered, and it is believe that such malware would only be increase in the up coming years. (Mobile Phones And Safety, -)

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work