Wednesday, 14 November 2012

Denial of service:






This is when people make a website become unavailable. It all starts when the person trying to destroy the website sends a fake email to a computer user asking for approval by asking questions and then the computer user sends something back it allows the person trying to make the website unavailable access to the server to disable the website. There are several reasons why these types of attack might be made. This includes an example like; a criminal might attempt to blackmail an online retail company by threatening to attack the site unless given a large sum of money. I personally think this is cruel and greedy over money. Sometimes political sites are attacked in this way by people who don’t agree with the political views expressed on the sites.

Threats:

like cyber bullying, spam and phishing often are received by people through their email accounts to access through their id or bank accounts. Phishing for example is a fake ad or webpage created by hackers; it could be a fake Halifax bank saying you need a new username or something to do with personal information others so the hacker can easily obtain the persons information, and with the information the hacker can easily access personal stuffs like bank number, bank pin and take all the money or in other ways harm their businesses. Cyber bullying which often happens to youngsters who spend a lot of time on social networking. People they might not know can easily offend or change their thoughts or opinion and without being aware it could harm them as well. Few ways to be protect from threats are browsing safely, spyware and be aware.

Abuse:


The term abuse describes unauthorized activity that affects the integrity of computer resources and email or other electronic accounts. Not all but often some people are abused or cyber bullied on social networking sites by others who maybe people they don’t know and could affect their feelings or opinions. Recently tom Daley was abused in twitter by an unknown teenager on suspicion of malicious communications about his father. Things like this often happens in such situation but some sites provide a report button where they can report apparent abuse and also provides a few answers to questions about these situations and describes ways you can protect yourself from abuse.

Unequal access:

like I mentioned earlier, a rich or developed country can afford to buy and use internet to quickly share data as some countries can only afford on basic survival. Many people who live in rural areas of UK do not have broadband internet access this could be due to less population around the area; because of this it’s more expensive for the government to give a strong access of internet to the community. Whereas cities where there is more population seems to have stronger network as many people would be using it and the government can make easy money. The one laptop per child project is a global implication as it is a project of non-profit association to create educational opportunities for the world’s poorest children by providing each child with a low-cost laptop. Their goal is to provide children around the world with different opportunities to experiment and express themselves.
One Laptop Per Child

Monday, 12 November 2012

Ethical:

online privacy is probably what most people are concerned about nowadays as computer store our data and because of what it stores it many of consumer worry. They fear that an unidentified hacker will access their online information or intercept their credit card numbers and make unauthorised purchases. Companies doing business or marketing research have a fear that others will use the internet to invade their computer systems for the information or even sabotage. In that case internet security like northern security was programmed in order to stop the hackers and viruses from getting in to the file, but it seems that there is an ingoing competition between the technology of internet security systems and the hackers those seeking to break them.

Friday, 9 November 2012

Legal Impacts:


Business’s organisations also the government started using computers to store their information about the customers, clients and staff in databases some for example: name, addresses, contact information and credit history. The problems with computers are that they can easily be assessed and databases are a part of that and can be looked, searched and edited. Due to this it was way easier for everyone to share information and access it around the world. Copy right for example recently Samsung was fined £1m because they made a similar phone as  apple’s iPhone which was then looked at because things did match like applications and internal system due to this Samsung was charged for having no copyright permission to build a similar phone. Same with ownership because in another word it’s the person who owns something for example just like a song, music, video and other works they would need to know who and when or maybe in some cases asked questions or could end up as illegal right.

Economic Impacts:


The impact that IT has brought to the world for example; online shopping, internet shopping is very quick and allows people to shop from their favourite designer stores without even having to leave the house and due to this there is a reduction of customers in the actual street and because of this there is no economic reason for them to stay open. This could have a negative effect on the local community because there is a less range of shops for local people to enjoy. Therefore internet shopping will eventually put away the need for high street stores. Another impact is most products consist of large number of different components for example: microchips, semiconductors, printed writing boards and batteries. The manufacture of many of these components has important environmental effects .the production of semiconductors for example; causes significant amounts of air pollution, water emissions and wasters. The productions of other components has an equally a matter of environmental concern.