In this topic, we will discuss the Negative Effects of ICT on Society.
1. Invasion of Privacy:
Invasion of privacy is a legal term. It is used to describe a circumstance where an individual or organization knowingly intrudes upon a person. The intrusion occurs when the person has a reasonable expectation of privacy, such as in a bathroom or locker room.
One type of invasion of privacy, in some states, is called deception. Deception occurs when an employer collects information he claims is for one reason but uses it for another reason, which could result in the employee’s termination.
A second type of invasion of privacy is violating an employee’s confidentiality. This occurs when information given in confidence is then given to a third party.
A third type of invasion of privacy is intrusion. This occurs in business when an employer intrudes in an employee’s private life. An example of an intrusion is if an employer listens to personal conversations an employee has in his home. The employer then uses the information he has learned to harm the employee in some way, such as disclosing it to others or terminating the employee.
Another type of invasion of privacy is misappropriation. Misappropriation occurs when someone uses the name or likeness of another without his permission. An individual’s image is considered to be his personal property and others are not permitted to use it for their personal gain.
2. Computer Fraud:
Computer fraud is defined as any act using computers, the Internet, Internet devices, and Internet services to defraud people, companies, or government agencies of money, revenue, or Internet access.
3. Intellectual Property Theft:
Intellectual property theft involves robbing people or companies of their ideas, inventions, and creative expressions—known as “intellectual property”—which can include everything from trade secrets and proprietary products and parts to movies, music, and software.
4. Pornography:
This is the portrayal of sexual subject matterThe topic dealt with or the subject represented in a debate, exposition, or work of art. More for the purpose of sexual arousal. Pornography may be presented in a variety of media, including books, magazines, postcards, photographs, sculpture, drawing, painting, animation, sound recording, writing, film, video, and video games.
5. Cybercrime:
Cybercrimes are offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim directly or indirectly, using modern telecommunication networks such as the Internet.
6. Software Piracy:
Software piracy is the illegal copying, distribution, or use of software. It is the unauthorized copying of software. It is a term used to describe the act of illegally using, copying or distributing software without ownership or legal rights. Copying and sharing it with your friends without multiple licenses is considered software piracy, which is illegal.
7. Plagiarism:
Plagiarism is the practice of taking someone else’s work or ideas and passing them off as one’s own.
All of the following are considered plagiarism:
- turning in someone else’s work as your own.
- copying words or ideas from someone else without giving credit.
- failing to put a quotation in quotation marks.
- giving incorrect information about the source of a quotation.
- changing words but copying the sentence structure of a source without giving credit.
- Copying so many words or ideas from a source that it makes up the majority of your work, whether you give credit or not.
8. Computer Viruses:
A computer virus is a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
A computer virus is a type of malicious software program (“malware”) that, when executed, replicates by reproducing itself (copying its own source code) or infecting other computer programs by modifying them.
9. Social Engineering:
Social engineering is the use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes. Social engineering is the art of manipulating people so they give up confidential information. Such as passwords and bank account information.
10. Hacking:
In computing, a hacker is a highly skilled computer expert capable of breaking into computer systems and networks using bugs and exploitsTo use someone or something unfairly for your own advantage. More. As someone who can subvert computer security; if doing so for malicious purposes, the person can also be called a cracker. Crackers are hackers with malicious intentions who steal, exploit, and sell data. They are usually motivated by personal gain.
Crackers find exploits to systems securities and vulnerabilities but often use them to their advantage by either selling the fix to the company themselves or keeping the exploit and selling it to other black hat hackers to steal information or gain royalties.
11. Identity Theft:
Identity theft is the deliberate use of someone else’s identity, usually as a method to gain a financial advantage or obtain credit and other benefits in the other person’s name, and perhaps to the other person’s disadvantage or loss. The person whose identity has been assumed may suffer adverse consequences if they are held responsible for the perpetrator’s actions.
12. Spoofing Attack:
Spoofing attack is a type of scam where an intruder attempts to gain unauthorized access to a user’s system or information by pretending to be the user. The main purpose is to trick the user into releasing sensitive information in order to gain access to one’s bank account, or computer system for fraudulent reasons.
13. Phishing:
Phishing is a fraudulent practice in which an attacker masquerades as a reputable entity or person in an email or other form of communication.