Back to Course

JSS2: COMPUTER STUDIES - 2ND TERM

0% Complete
0/0 Steps
  1. Introduction To Basic Language I | Week 1
    7 Topics
    |
    1 Quiz
  2. Introduction To Basic Language II | Week 2
    2 Topics
    |
    1 Quiz
  3. Computer Ethics I | Week 3
    6 Topics
    |
    1 Quiz
  4. Computer Ethics II | Week 4
    2 Topics
    |
    1 Quiz
  5. Safety Measures In Computer Environment | Week 5
    3 Topics
    |
    1 Quiz
  6. Computer Graphics Packages I | Week 6
    3 Topics
    |
    1 Quiz
  7. Computer Graphic Packages II | Week 7
    6 Topics
    |
    1 Quiz



Lesson Progress
0% Complete

Topic Content:

  • Negative Effects of ICT On The Society

In this topic, we will discuss the Negative Effects of ICT on Society.

1. Invasion of Privacy:

Invasion of privacy is a legal term. It is used to describe a circumstance where an individual or organization knowingly intrudes upon a person. The intrusion occurs when the person has a reasonable expectation of privacy, such as in a bathroom or locker room.

One type of invasion of privacy, in some states, is called deception. Deception occurs when an employer collects information he claims is for one reason but uses it for another reason, which could result in the employee’s termination.

A second type of invasion of privacy is violating an employee’s confidentiality. This occurs when information given in confidence is then given to a third party.

A third type of invasion of privacy is intrusion. This occurs in business when an employer intrudes in an employee’s private life. An example of an intrusion is if an employer listens to personal conversations an employee has in his home. The employer then uses the information he has learned to harm the employee in some way, such as disclosing it to others or terminating the employee.

Another type of invasion of privacy is misappropriation. Misappropriation occurs when someone uses the name or likeness of another without his permission. An individual’s image is considered to be his personal property and others are not permitted to use it for their personal gain.

2. Computer Fraud:

Computer fraud is defined as any act using computers, the Internet, Internet devices, and Internet services to defraud people, companies, or government agencies of money, revenue, or Internet access.

3. Intellectual Property Theft:

 

You are viewing an excerpt of this Topic. Subscribe Now to get Full Access to ALL this Subject's Topics and Quizzes for this Term!

Click on the button "Subscribe Now" below for Full Access!

Subscribe Now

Note: If you have Already Subscribed and you are seeing this message, it means you are logged out. Please Log In using the Login Button Below to Carry on Studying!

Responses

Your email address will not be published. Required fields are marked *

error: Alert: Content selection is disabled!!