The Negative implications of IT on Social Communication
The Negative implications of IT on Social Communication
Social Implications
The Negative Implications of IT Social Implications on IT Is that people might get addicted to using their computers and might not leave the house for days because of either doing their work or gaming people just get stuck to stay on their pc all the time and this has increased since smartphones were introduced with people getting more and more addicted to IT as well gamers just stay in their homes and just play games non-stop. That can cause isolation from friends and the outside world and how they interact with going outside if they play video games, but it can also cause anti-social when communicating with friends or colleagues and can cause deficits when doing so due to the it and people lose real friends over social implications related to IT. But it can also effect people that work in an office or in an IT related job your boss might assign work to be done at home instead of being done in office and that can put a person in a stress to finish their work and normally this can cause to have their own time taken away for working at home or family time people might have to do cooking or chores around their own home like cleaning or taking their bins out for instance and people might have do this things around their house so it looks clean and not be attached to a computer or laptop for doing their work.
Automation (use of robots)
The Negative Implication of IT in Automation is that Self-Checkouts displaced loads of workers who used to work on the tills but self-checkouts do have their own problems like the fact they sometimes not scan properly and how the fact that items of 18+ require a member of staff to unlock using their codes to purchase the items and sometimes if you use the self-scanners staff have to check the items as a security thing to make sure you are not stealing the item and the fact self-scanners have been used a lot of times to steal items and self-checkouts are more tended to breakdown more often and it can lead to either queues at the self-checkout machines or a queue for the till. Job displacement is also a negative implication of IT because so many jobs such as train driving for instance because of the introduction of ATO And CBTC making the operators doing little work on the mostly opening/closing doors on it and checking the train to check if it’s in good condition and driving it out of the depot only and driving it an emergency only, and with the rise of driverless technology displacement of jobs is to become likely with controllers being based in a signal area and monitoring the trains to make sure they are running and not breaking down in service and they might also open and close doors. Another place Job displacement that affects people is manufacturing and factories where robots are replacing more people than ever and how the use of robots makes people being displaced to either other areas or being layer off. Job displacement due to robots and AI can lead to economic downturns, more vacancies and people having to lower job sectors than they used to and people might not be skilled for other industries and might have to return to education to gain the additional skills needs for other industries of the job sector and not everyone has IT Skills to work to check the robots or how Ai works in situations and most have to be trained to work with Ai.
Legal and Ethical
The Negative Implication of IT in Legal and ethical is that people on the internet can take ownership of some many things that are not theirs and can take ownership of them and pretend it is theirs without giving credit or a reference to the owner of owning his item and so many people don’t give credit online or on YouTube of taking stuff from the original owners and putting on it pretending it is theirs and that can result in a DMCA takedown of the item or having the person go to a court case and having to show evidence of them copying the video that they have taken in consideration and normally when people use copyrighted material the original creator or their record label or licensee has the right to request and or order the takedown of the content of the website people are keeping it on or have it takedown by force the user should notify the holder of the content to see if they are allowed to use it before proceeding to use it before any takedowns happen of the content and this can prevent any serious issues in the future. Another negative implication is plagiarism which is the act of presenting someone else’s ideas work as your own work and taking ownership of it and not acknowledging the creator of the work and taking the full ownership of it yourself and in schools it is a serious academic offence and normally people copy large pieces of an item and use it as their own work for example.
Inequality of access
The negative implications of IT in Inequality of access is that people in some areas of the world do not have internet access or are disadvantaged of having internet access during COVID-19 school pupils in the UK had to have MMFI and Laptops given to them by the government to access to avoid them facing difficulties accessing schoolwork during the lockdown period of 2020-21 and so many pupils who didn’t have access to the internet fell behind on their GCSE’s exams or A-Levels it can also lead to isolation of people and they can experience isolation for the rest of the world or country they leave in and can contribute to misinformation from other sources and it can also limit job and education opportunities for people in deprived areas of the world and any news from getting to them about important matters in their country such as rules changing. People can be excluded from the world due to inequality of access to IT and the Internet and make people miss out on big moments from around the world or movements from their country. People from digital previed area can lead to lower levels of digital skill, lower quals and worse jobs due to this and people missing out on important information about what to research for this information and people in this decade need the internet to access loads of things such as the Doctors and bills and they can’t do stuff through cheques anymore and this has the consequences of lower human development in those areas for instance.
Threats and negative impacts
Cyber bullying and harassment
The negative implications of IT in Threats and harassments is that people can bully someone over social media or email by sending the rude messages or taking the advantage of them on it and people might be threatened by this kind of nature and it can also include sharing of personal and private information to cause embarrassment and humiliation of the person as well as stalking the person this is also called doxing Cyber bullying at this time is not a criminal offense in the UK but might be in the future. It can an also include Impersonation of a person such as hacking into someone’s email or social media account and impersonate them or taking the blame that they have done something bad even though they didn’t do anything bad with the person. It can also include exclusion by leaving a person out of group chats and gaming groups and not inviting them into them and letting them be excluded from them as well as not following them on social media. They could also lead them into revealing secrets to others in a group chat or to a friend they didn’t want them to reveal their secrets or forwarding it to others on the group and making that person feel angry about them revealing your secret information. Another implication is harassment which can include a person making a fake account about you and spreading rude misinformation about you online for instance it can also include spreading lies about you to other people or groups making you believe that you done something wrong.
Spam emails
Spam email is unwanted, unsolicited junk email that is sent in bulk to a large group of recipients and is usually advertising or scam links that can give people viruses through phishing links. Usually, spammers collect email addresses from chat rooms websites, customer lists, newsgroups and viruses that harvest users address books and these addresses are also sold to other spammers. Because spam emails are fake and malicious in nature and it is attempting to steal personal information such as social security numbers and usernames and passwords and this is because the emails usually big brand name companies like Apple and Amazon or from your bank for instance and normally people click on them believing it is a real email but it a fake email and can lead to peoples information being stolen.
Phishing
Phishing is when criminals use scam emails, text messages or phone calls to trick their victims their aims to trick people into sharing information and it is often done by making you visit a website, which may download a virus onto your computer to steal bank details and other personal information. Phishing is a tactic hackers use to acquire sensitive data such as passwords or credit card details. This is typically done through fraudulent communication and is done most through email where a hacker pretends to be someone else, often an authorative figure or a well-known company and their goal is to manipulate users into giving up their data or clicking on malicious links or attachments on the email. Because of individuals being tricked into clicking malicious links on their emails and being tricked by the hacker by making them a promise while they hack your computer you’re your personal data and is done by bypassing technical defences and normally individuals think the emails are genuine and come from trusted sources making them difficult to recognize from regular emails and they can also use target campaigns called spear phishing to trick individuals to click on them.
Denial of Service attacks
Denial of service attack is a cyber attack that aims to make a device or network inaccessible to its intended users and they can be launched by a single computer. Or by many-distributed sources, which is known as a distributed denial-of service (DDos), and they typically function by overwhelming or flooding a targeted machine with requests until normal traffic is unable to be processed. They are carried out by either individuals, businesses or nation-states and they are usually launched using a botnet which is a network of infected devices that can be remotely controlled by an attacker. They carry out of Denial-of-service attacks to get a revenge against a business or an organization or expressing political activism which was done for instance during the Ukraine war and childish pranks towards an organization. One of the most famous examples of a DOS Attack was the google attack of 2020 the attack lasted for 6 months and peaked at a breath taking 2.5Tbps. The attackers used several networks to spoof 167 mpps to 180,000 expose would then send large responses to us. This was larger than the Mirai botnet attack in 2019 and it was done by Chinese ISPs.
Hacking
Hacking is the act of gaining unauthorized access to a computer system network or digital device to steal, modify or destroy data and they can use a variety of methods to gain access including technical weaknesses which is a hacker exploiting software vulnerabilities or weak security practices and social engineering where a hacker or a scammer convinces a person with privileged accesses on their computer to click on malicious links or open infected files. Hacking can be used for malicious purposes such as stealing personal information, compromising systems or spreading malware to a computer. People hack people for financial gain by stealing credit or debit card details or defraud financial services or phishing techniques they might also spy on their competitors and might also steal businesses information or national intelligence, and some might want recognition or achievement by wanting the fame associated with the hacking attack and some hackers might enjoy the thrill and challenge that it brings. An example of hacking is that of the hotel chain Marriot international in 2018 a breached that exposed 500 million guest’s data through email spoofing to spread malware into vulnerable guest reservation system using legacy its infrastructure and the ICO Was fined 18.4 million pounds for GDPR violations, and they discovered that they had been hacked after a security tool flagged an unusual database query.
Privacy
Information is shared to process the exchanging data intelligence or knowledge between individuals, organizations or sectors. It can be done for a variety of reasons such as protecting people that can help protect people or provide better services for example agencies may share information about customers to keep them safe. But can include sharing critical information about cyber-attacks and vulnerabilities can help prevent and isolate future attacks in the social aspect of it can build trust with an employer for instance. But people have access to review their personal information under the data protection act. Data tracking is the process of collecting, organizing and analysing data points to gain insights that can help a business and normally it is used to provide a more personalized user experience, but people can turn it off by not allowing cookies and can be cleared as well. Normally the data is tracked by websites to see what people shopping habits and recommend the item to the user or similar items of their taste for instance that the user might like for instance to help them see what other items of their instance is available. But it also applies to browsing habits what the user browses on social media or on google can be recommended to the user to provide a better experience to the user and give them a better experience when on the internet. but the negative implications of it is that the user might hate being tracked online and want to turn it off which they can by not allowing it on their web browsers or apps for instance.
Information we give out about ourselves
You can tell about people on their Facebook pages what their education, studies, what they like, what friends they have on there, location and more if they were added their information on there or it is publicly available on their account that can be said for other platforms such as Instagram or X (Twitter) where a more limited selection of it is available but you can still add things on those platforms for example and people can also tell about their information on their Bio if they wanted to for instance. But people chose to list information about themselves on LinkedIn about education and studies and where they worked for instance as that’s a more of a career platform and people can tell about their experiences as well on that platform too but snapchat takes to whole new level people can find out peoples location on their if their friend turned for instance and which can increase the chances of stalking a person which doesn’t want to be stalked for instance and people on social media if the person allows can find out a lot about a particular person on there can break privacy rules of the person if something bad happens and things such as stalking or paedophilia arise towards a person.
Lack of privacy in public
The lack of privacy in public is that for instance a celebrity can be photographed when they leave a building or their home for instance if they know where they live and they can be shared to YouTube or other tabloid websites and paparazzi do it all the time to earn money the famous case of Princess Diana in 1997 of paparazzi’s chasing her in Paris ended up having her dead at such young age due to the car accident that happened that day but before her death pictures of her were shared around magazines and newspapers with stories running about her relationship to Dodi Fayed and this is just one of example of many about things about celebrities being shared around the world but other things include seeing them doing things they don’t admit too. But when someone’s right to keep personal information private is not respected it can lead to a number of negative consequences including them feeling monitored and they feel like they are being watched constantly all the time which can be uncomfortable to the person and their information being shared and collected without their consent which is used to discriminate them in different way against them and that can include tracking cookies on sites that track their online activates and RFID technology that monitors data about a person’s location or activites.
very clear explanation and proper use of words.
ReplyDeleteThis explanation is good when you have used the correct punctuations and it is very informative.
ReplyDeletein the Legal and Ethical part of the blog it has good information about the copyright laws and how the original creator can ask to get the video or stolen property back very useful
ReplyDeleteThis explanation is very clear as it explains in deep details the negative implications of privacy and how it can affect people
ReplyDeletevery detailed blog and very organized especially covering the point about privacy very interesting, giving clear examples.
ReplyDeletevery detailed and very organized especially covering about privacy very interesting, giving clear examples, i like the part where you talk about lack of privacy in public giving real life examples
ReplyDeletevery detailed and very organized especially covering about privacy very interesting, giving clear examples, i like the part where you talk about lack of privacy in public giving real life examples such as the the famous case of Princess Diana in 1997, really good example.
ReplyDelete