Вы находитесь на странице: 1из 19

Computer and Society

o Impact of Computer in Society

o Computer Ethics
Computer and Society
o Everyone knows that this is the age of computer and
majority of people are using computer.
o Development of science and technology has direct effect
on our daily life as well as in our social life.
o Computer technology has made communication possible
from one part of the world to the other in seconds.
o They can see the transactions in one part of the world while
staying in the other part.
o Computer development is one of the greatest scientific
achievements of the 20th century.
o Computers are used in various fields as well as in teaching
and learning.
Major computer application fields
O An aid to management: The computer can also be used as a
management tool to assist in solving business problems.
O Banking: Branches are equipped with terminals giving them
an online accounting facility and enabling them to
information as such things as current balances, deposits,
overdrafts and interest charges.
O Industrial Application: In industry, production may be
planned, coordinated and controlled with the aid of a
computer.
O Engineering Design: Computer help in calculating that all the
parts of a proposed design are satisfactory and also assist in
the designing.
O and for payroll and also for check-up and treatment of
diseases.
Cont.…

O Meteorology: Data is recorded at different levels of


atmosphere at different places, using remote sensors carried
on a satellite.
O Air Travel: Small computers are installed as a part of the
plane's equipment.
O Road Traffic Control: Computers assist with the control of traffic
lights.
O Telephones: Computerized telephone exchanges handle an
ever increasing volume of calls very efficiently.
O Medicine: Computers are widely used in hospitals for such task
as maintaining drugs, surgical equipment
O In addition computers are also used for recording and film
studios, research, military, etc.
 Computers have both positive and negative
impact in our daily life as well as in our social life.

 Butthe gross development of the nation is faster


with the application of computers in industries and
education.
Positive Impact of Computer
 The work can be done in very less time.
 More information can be stored in small space.
 Multitasking and multiprocessing capabilities of
data.
 Easy to access data.
 Impartiality (equal treatment of all rivals or
disputants; fairness).
 Documents can be kept secret.
 Error free result.
 It can be used for various purposes. i.e. It can be
used in any type of work.
Negative Impact of Computer
 Highly expensive.
 Data piracy ( illegal copying, distribution, or use of
software/data).
 Increased Unemployment.
 Huge data and information can be lost sometimes.
 Fast changing computer technology.
 Service distribution(media content such as audio,
video, software ,shared resources…..)
 Illiteracy( lack of basic computer knowledge) of
computing and computers.
Computers have both positive and negative
impact in our society. But the use of computer is
increasing
day-by-day.
Computer Ethics
 Computer technology advances from time to time and most
probably will keep advancing in the future. With that, computer
ethics will also keep growing and changing to meet the need of
the technology.

 Ethics means a set of moral principles that govern the behavior of


a group or individual.

 Therefore, computer ethics is set of moral principles that regulate


the use of computers. Some common issues of computer ethics
include intellectual property rights (such as copyrighted
electronic content), privacy concerns, and how computers
affect society.

 Hence, generally, computer ethics is needed to avoid the


improper usage of computer technology and bring justice.
Cont.…
 For example,

 while it is easy to duplicate copyrighted electronic (or


digital) content, computer ethics would suggest that it
is wrong to do so without the author's approval.

 And while it may be possible to access someone's


personal information on a computer system, computer
ethics would advise that such an action is unethical.
Objectives of computer ethics

 To ensure the privacy and safety of the computer


users.

 To helps people use the computer in the right ways.

 To guarantee that the works that done by someone


did not declare by other people.
Importance of computer ethics
 To protect personal & commercial information such as login &
password info, credit card and account information and government
and commercial databases. It also controls unwanted internet mail
and ads (Spam).

 To control plagiarism, student identity fraud, and the use of


copyrighted material, etc.

 To make ICT (information and communication technologies)available


and accessible to all peoples, including the disabled and the
deprived. Accessibility needs to be kept in mind during curriculum
design (in educational contexts), in order to maximize the capabilities
of the technology.

 To suppress dishonest business practices and to protect and


encourage fair competition.

 To promote moral and social values in society.


Problems…
There are several types of activities that against the computer ethics:
1. Stealing funds via computers.
- The one who did this must be very intelligent to manipulate the
computer system and to access into the system.

2. Unauthorized computer entry.


- The perpetrator will steal a company's trade secrets and data and
then sell it to the competitors. This activity involves both property and
privacy.

3. Hacking.
- Any computer-related activity which is not sanctioned or
approved by owner of a system or networks.

4. Plagiarism.
- Duplicating copyrighted content without the author's approval
and take any source without credit to the original author.

5. Phishing scam
- Phishing scams are attempts by scammers to trick people into
giving out personal information such as bank account number, passwords
and credit card numbers.
How to avoid Phishing Scams
 Keep Informed About Phishing Techniques – New phishing
scams are being developed all the time. Without staying on
top of these new phishing techniques, you could
inadvertently fall prey to one. Keep your eyes peeled for
news about new phishing scams.

 Think Before You Click! – It’s fine to click on links when


you’re on trusted sites. Clicking on links that appear in
random emails and instant messages, may lead you where
they are supposed to lead? E.g. A phishing email.

 Install an Anti-Phishing Toolbar – Most popular Internet


browsers can be customized with anti-phishing toolbars.
Such toolbars run quick checks on the sites that you are
visiting and compare them to lists of known phishing sites. If
you stumble upon a malicious site, the toolbar will alert you
about it.
 Verify a Site’s Security – It’s natural to be a little worry about supplying
sensitive financial information online. As long as you are on a secure
website, however, you shouldn’t run into any trouble. Before submitting
any information, make sure the site’s URL begins with “https” and there
should be a closed lock icon near the address bar. Check for the site’s
security certificate as well. If you get a message stating a certain website
may contain malicious files, do not open the website

 Check Your Online Accounts Regularly – If you don’t visit an online


account for a while, someone could be having a field day with it. Even if
you don’t technically need to, check in with each of your online
accounts on a regular basis. Get into the habit of changing your
passwords regularly too.. Get monthly statements for your financial
accounts and check each and every entry carefully to ensure no
fraudulent transactions have been made without your knowledge.

 Keep Your Browser Up to Date – Security patches are released for popular
browsers all the time. They are released in response to the security
loopholes that phishers and other hackers inevitably discover and exploit.
If you typically ignore messages about updating your browsers, stop. The
minute an update is available, download and install it.
 Use Firewalls – High-quality firewalls act as buffers between you,
your computer and outside intruders. You should use two different
kinds: a desktop firewall and a network firewall. The first option is a
type of software, and the second option is a type of hardware.
When used together, they drastically reduce the odds of hackers
and phishers infiltrating your computer or your network.

 Be Wary of Pop-Ups –they are phishing attempts. Many popular


browsers allow you to block pop-ups; you can allow them on a
case-by-case basis. If one manages to slip through the cracks,
don’t click on the “cancel” button; such buttons often lead to
phishing sites. Instead, click the small “x” in the upper corner of
the window.

 Use Antivirus Software –Antivirus software scans every file which


comes through the Internet to your computer. It helps to prevent
damage to your system. You don’t have to live in fear of phishing
scams.
 By keeping the preceding tips in mind, you should be able to enjoy a
worry-free online experience.
 Remember there is no single fool-proof way to avoid phishing attacks,
Instructions: Please read all questions carefully and make sure you
understand the facts before you begin answering. Answer legibly
and be as concise as possible.

1. What is Computer?
2. What is Computer Ethics? Why is it important?
3. What are the advantage and disadvantages of using
computers?
4. Are there disadvantages to the growing dependence
of humans on computers?
5. What is good system for creating computer login and
password information that would make my computer
more secure against hackers?
6. Role of computer in business?
7. Role of Computers at daily life?
8. Role of Computers in Banking?
9. What is the recommended time using a computer?
10. What is Phishing Scam?
 THE END

Вам также может понравиться