Professional Documents
Culture Documents
UNIT 3-7 - Midterm Reviewer
UNIT 3-7 - Midterm Reviewer
Languages - This type of AI involves computers that Moving heavy objects - E.g., installing large engines,
can understand different human languages as they are moving pallets of items etc.
spoken to them.
4. Quantum Cryptography 7. Virtual Reality Virtual reality is where computers are
used to create an artificial environment that users
Quantum cryptography (encryption) is an emerging
can interact with as if it were real. Virtual reality is not
technology that allows messages and data to be sent
really meant for gaming purposes. It is used for
with complete privacy.
more serious purposes such as:
Unauthorized people attempting to read the data would
Allowing architects to walk around a virtual
see illegible nonsense instead of the real information.
version of their design (this gives a better idea
Older methods of encryption were based of what the finished building will look like)
around mathematics, but quantum cryptography uses
Training soldiers in combat (flight simulation,
physics instead.
battlefield simulation)
This makes the encryption impossible to break.
Training surgeons (virtual patients can be operated on
5. Computer Assisted Translation (CAT)
to provide experience to trainee surgeons).
CAT is where a human translator uses computer
Equipment needed to create the virtual reality
software to help in the translation process.
experience includes the following:
Current CAT tools are not always 100% accurate. They
Eye Goggles - These produce the 3D images that make
need a human to check for errors.
up the artificial world. The goggles project slightly
Spell checkers - These are usually built-into word different views into each eye, and this fools your brain
processing software and can automatically flag-up into thinking that the scene is 3D. Virtual chairs look
spelling errors and suggest translations of miss-spelt solid and so on
words.
Special Gloves - The gloves detect your hand and finger
Translation memory software - Translation memory movements which are input into a
software are databases which store translated text as computer and processed. As users touch or use items in
the human translator works through it to be reused in the virtual world, the computer can carry out these
the future. commands and make them happen. This allows the user
to interact with the virtual world and perform tasks
Language search-engine software - These are Internet such as moving objects or switching on lights etc.
based systems which allow translators to enter any
text that they want translating and to select which Headphones - These control what users hear in the
language they want the text translating into. virtual world.
6. 3D and Holographic Imaging (aka holograms) Powerful Computer - A very powerful computer is
needed to create the virtual environment and to
This is a technique where images are made to appear process/output data sent into the system by the user's
three-dimensional and to have depth. Holograms work actions.
by taking two regular two-dimensional images of
the same object and laying one on top of the other. THE CURRENT TRENDS IN THE SOCIETY
The two-dimensional images need to have been shot at 1. The Technology of the Year Will Be 5G
different angles. Two different types of laser beams are
While artificial intelligence and the internet of things
used to record the two-dimensional images onto
(IoT) get all the attention, 5G could be the technology of
a single photographic plate.
the year in 2019. 5G, which could improve processing
This creates one single image that incorporates the speeds by more than 10 times and could enable
angles of the original two-dimensional images. This remote surgeries and Uber’s announced food delivery
produces a 3D effect. When viewing the image, human drones. In fact, 5G is so important that China, South
eyes see it from slightly different angles. The brain Korea, and the U.S. are embroiled in an arms race to be
combines them into a three-dimensional image. first to market. 5G enabled smartphones are on track to
take over the mobile industry in 2019. Samsung,
OnePlus, Xiaomi, Motorola, and Huawei are among the devices are expected to be lightweight, unbreakable,
leading mobile phone developers that are vying to and compact.
launch 5G enabled mobile sets this year.
Several companies—Apple, Motorola, LG, Huawei, and
2. Bots Will Revolutionize Customer Service Samsung—are in a race to launch first generation
foldable phones with flexible screens in 2019. In the
Research from Gartner, Inc., shows that the use of
meantime, LG has stolen a march over its competitors
chatbots in customer service will have increased 10
by unveiling its rollup, ultra-high-definition TV earlier
times between 2017 and 2020, and bots can reduce
this week at the Consumer Electronics Show in Las
customer inquiries by up to 70%.
Vegas. Royole debuted its Flexi Pal bendable tablet at
3. E-Commerce Grows at A Torrid Pace the same venue.
E-commerce is expected to grow 20%, on pace with its 7. Personalized and predictive medicine
2017-2018 growth rate. More and more, even
Technology is currently transforming healthcare at an
traditional brands are considering direct-to-consumer
unprecedented rate. Our ability to capture data from
to be a channel they can’t ignore.
wearable devices such as smartwatches will give us the
4. Insurance (finally) Enters the Digital Age ability to increasingly predict and treat health issues in
people even before they experience any symptoms.
This will be a standout year for insurance. Insurers will
actively embrace new markets (smart cities, When it comes to treatment, we will see much more
autonomous vehicles, connected living, and the elderly), personalized approaches. This is also referred to as
products (insurance for shared workspaces, working precision medicine which allows doctors to prescribe
from home, automotive pay-per-mile, and cyber- medicines and apply treatments, thanks to a data-
protection), technologies (block chain, virtual reality driven understanding of how effective they are likely to
(VR)/augmented reality (AR), and AI), business models be for a specific patient more precisely.
(Prevention-as-a-Service, usage based car insurance,
and on-demand insurance), and operations (increased
automation, shifts in core systems, and even personnel UNDERSTAND THE IMPACT OF EMERGING
and culture shifts). TECHNOLOGY
Get ready for marketplaces everywhere. The fourth Artificial intelligence (AI) is the ability of a computer
generation of marketplace business models will be program or a machine to think and learn. It is also a
focused on the service sector. Three converging trends field of study which tries to make computers "smart".
will drive their rapid expansion. Firstly, the over five They work on their own without being encoded with
billion connected devices and nearly 230 billion app commands. John McCarthy came up with the name
downloads expected in 2019 will lead to an increase in "artificial intelligence" in 1955. In general use, the term
mobile based marketplace models for services. "artificial intelligence" means a programmed which
mimics human cognition. At least some of the things we
China and India will lead the way here, primarily
associate with other minds, such as learning and
because of their growing app economy. Secondly,
problem solving can be done by computers, though not
technologies like block chain will transform online
in the same way as we do. Andreas Kaplan and Michael
payment systems. Thirdly, a surging on-demand
Haenlein define AI as a system’s ability to correctly
economy will fuel the expansion and diversification of
interpret external data, to learn from such data, and to
digital service marketplaces.
use those learnings to achieve specific goals and tasks
6. Bendable Devices Make Their Debut through flexible adaptation.
Hone up on your origami because 2019 will see the HISTORY OF ARTIFICIAL INTELLEGENCE
launch of foldable phones with flexible screens,
History of AI The first patent for the invention of the
replacing convertible or detachable devices. These
telephone happened in 1876 and AI was introduced at a
much later stage. In true terms, the field of AI research with cognitive intelligence, emotional intelligence, and
was founded at a workshop held on the campus of social intelligence. An AI system with artificial general
Dartmouth College during the summer of 1956. At that intelligence is either self-conscious, self-aware, or both.
time, it was predicted that a machine as intelligent as a This system will demonstrate seamless capabilities of
human being would exist in no more than a generation machine-to-human and machine-to-machine
and they were given millions of dollars to make this interactions that replicate normal human-to-human
vision come true. interactions.
Investment and interest in AI rose in the first decades of TYPES OF ARTIFICIAL INTELLEGENCE
the 21st century. From that time, Machine Learning was
1. Reactive machines
successfully applied to many problems in academia and
industry due to the presence of a powerful computer. The most basic types of AI systems are purely reactive
and have the ability neither to form memories nor to
1950 – The time when it all started, so now this
use past experiences to inform current decisions. Deep
concept has been around for decades but, until 1950,
Blue, IBM’s chess-playing supercomputer, which beat
people were unaware of the term. John McCarthy who
international grandmaster Garry Kasparov in the late
is known as the founder of Artificial Intelligence
1990s, is the perfect example of this type of machine.
introduced the term ‘Artificial Intelligence’ in the year
Deep Blue can identify the pieces on a chess board and
1955. McCarthy along with Alan Turing, Allen Newell,
know how each move. It can make predictions about
Herbert A. Simon, and Marvin Minsky is known as the
what moves might be next for it and its opponent.
founding fathers of AI. Alan suggested that if humans
use available information, as well as reason, to solve 2. Limited memory
problems to make decisions – then why can’t it be done
with the help of machines? This Type II class contains machines can investigate the
past. Self-driving cars do some of this already. For
1974 – Computers flourished! Gradually with time, the example, they observe other cars’ speed and direction.
wave of computers started. With time, they became That can’t be done in a just one moment, but rather
faster, more affordable, and able to store more requires identifying specific objects and monitoring
information. The best part was that they could think them over time. These observations are added to the
abstractly, able to self-recognize and achieved Natural self-driving cars’ preprogrammed representations of the
Language Processing. world, which also include lane markings, traffic lights
and other important elements, like curves in the road.
1980 – The year of AI In 1980, AI research fired back up
They’re included when the car decides when to change
with an expansion of funds and algorithmic tools. With
lanes, to avoid cutting off another driver or being hit by
deep learning techniques, the computer learned with
a nearby car.
the user experience.
3. Theory of Mind
2000’s – Landed to the Landmark After all the failed
attempts, the technology was successfully established Machines in the next, more advanced, class not only
but, until it was in the 2000s that the landmark goals form representations about the world, but also about
were achieved. At that time, AI thrived despite a lack of other agents or entities in the world. In psychology, this
government funds and public attention. is called “theory of mind” – the understanding that
people, creatures, and objects in the world can have
Artificial General Intelligence
thoughts and emotions that affect their own behavior.
The utmost and long-term goal of artificial intelligence This is crucial to how we humans formed societies
as a field is artificial general intelligence or AGI. AGI because they allowed us to have social interactions.
demonstrates the capability of an AI system to perform
4. Self-Awareness
any intellectual task that a human can perform. In
consideration of the three types of AI systems This is, in a sense, an extension of the “theory of mind”
introduced by Andreas Kaplan and Michael Heinlein, possessed by Type III artificial intelligences.
AGI demonstrates a humanized AI system equipped Consciousness is also called “self-awareness” for a
reason. (“I want that item” is a very different statement information gathered. Autonomous vehicles are with
from “I know I want that item.”) Conscious beings are advanced tool to gather information, including long
aware of themselves, know about their internal states, range radar, cameras, and LIDAR. Each of the
and can predict feelings of others. We assume someone technologies are used in different capacities and each
honking behind us in traffic is angry or impatient, collects different information. This information is
because that’s how we feel when we honk at others. useless, unless it is processed, and some form of
information is taken based on the gathered information.
APPLICATION OF AI ARTIFICIAL INTELLIGENCE
This is where artificial intelligence comes into play and
1. Artificial Intelligence in Healthcare can be compared to human brain. AI has several
applications for these vehicles and among them the
Companies are applying machine learning to make more immediate ones are as follows: Directing the car
better and faster diagnoses than humans. One of the to gas station or recharge station when it is running low
best-known technologies is IBM’s Watson. It on fuel. Adjust the trips directions based on known
understands natural language and can respond to traffic conditions to find the quickest route. Incorporate
questions asked of it. The system mines patient data speech recognition for advanced communication with
and other available data sources to form a hypothesis, passengers. Natural language interfaces and virtual
which it then presents with a confidence scoring assistance technologies.
schema. AI is a study realized to emulate human
intelligence into computer technology that could assist 5. AI for Robotics
both, the doctor and the patients in the following ways:
Will allow us to address the challenges in taking care of
By providing a laboratory for the examination,
an aging population and allow much longer
representation and cataloguing medical information by
independence. It will drastically reduce, may be even
devising novel tool to support decision making and
bring down traffic accidents and deaths, as well as
research By integrating activities in medical, software
enable disaster response for dangerous situations for
and cognitive sciences By offering a content rich
example the nuclear meltdown at the fukushima power
discipline for the future scientific medical communities.
plant.
2. Artificial Intelligence in business
ADVANTAGE OF AI (ARTIFICIAL INTELLIGENCE)
Robotic process automation is being applied to highly
1. Reduction in Human Error
repetitive tasks normally performed by humans.
Machine learning algorithms are being integrated into The phrase “human error” was born because humans
analytics and CRM (Customer relationship make mistakes from time to time. Computers, however,
management) platforms to uncover information on how do not make these mistakes if they are programmed
to better serve customers. Chatbots have already been properly. With Artificial intelligence, the decisions are
incorporated into websites and e companies to provide taken from the previously gathered information
immediate service to customers. Automation of job applying a certain set of algorithms. So, errors are
positions has also become a talking point among reduced and the chance of reaching accuracy with a
academics and IT consultancies. greater degree of precision is a possibility.
It automates grading, giving educators more time. It can This is one of the biggest advantages of Artificial
also assess students and adapt to their needs, helping intelligence. We can overcome many risky limitations of
them work at their own pace. humans by developing an AI Robot which in turn can do
the risky things for us. Let it be going to mars, defuse a
4. AI ARTIFICIAL INTELLIGENCE in Autonomous
bomb, explore the deepest parts of oceans, mining for
Vehicles
coal and oil, it can be used effectively in any kind of
Just like humans, self-driving cars need to have sensors natural or man-made disasters.
to understand the world around them and a brain to
3. Available 24x7
collect, processes and choose specific actions based on
An Average human will work for 4–6 hours a day 1. High Costs of Creation - As AI is updating every day
excluding the breaks. Humans are built in such a way to the hardware and software need to get updated
get some time out for refreshing themselves and get with time to meet the latest requirements.
ready for a new day of work and they even have weekly Machines need repairing and maintenance which
offed to stay intact with their work-life and personal need plenty of costs. Its creation requires huge
life. But using AI we can make machines work 24x7 costs as they are very complex machines.
without any breaks and they don’t even get bored,
2. Making Humans Lazy - AI is making humans lazy with
unlike humans.
its applications automating much of the work. Humans
4. Helping in Repetitive Jobs tend to get addicted to these inventions which can
cause a problem to future generations.
In our day-to-day work, we will be performing many
repetitive works like sending a thanking mail, verifying 3. Unemployment - As AI is replacing most of the
certain documents for errors and many more things. repetitive tasks and other works with robots, human
Using artificial intelligence, we can productively interference is becoming less which will cause a major
automate these mundane tasks and can even remove problem in the employment standards. Every
“boring” tasks for humans and free them up to be organization is looking to replace the minimum qualified
increasingly creative. individuals with AI robots which can do similar work
with more efficiency.
5. Digital Assistance
4. No Emotions - There is no doubt that machines are
Some of the highly advanced organizations use digital
much better when it comes to working efficiently but
assistants to interact with users which save the need
they cannot replace the human connection that makes
for human resources. The digital assistants also used in
the team. Machines cannot develop a bond with
many websites to provide things that users want. We
humans which is an essential attribute when comes to
can chat with them about what we are looking for.
Team Management.
Some chatbots are designed in such a way that it’s
become hard to determine that we’re chatting with a 5. Lacking Out of Box Thinking - Machines can perform
chatbot or a human being only those tasks which they are designed or
programmed to do, anything out of that they tend to
6. Faster Decisions
crash or give irrelevant outputs which could be a major
Using AI alongside other technologies we can make backdrop.
machines take decisions faster than a human and carry
MAJOR GOALS AND FIELDS OF ARTIFICIAL
out actions quicker. While taking a decision human will
INTELLIGENCE
analyze many factors both emotionally and practically
but AI-powered machine works on what it is 1. Knowledge Representation and Reasoning
programmed and delivers the results in a faster way.
Knowledge representation and reasoning, also known
7. Daily Applications as KR&R or KR, is a specific field within artificial
intelligence focusing on designing and implementing
Daily applications such as Apple’s Siri, Window’s
computer representations that can process information
Cortana, Google’s OK Google are frequently used in our
about the world to solve complex problems. As one of
daily routine whether it is for searching a location,
the major goals of AI, KR&R specifically aims to
taking a selfie, making a phone call, replying to a mail
automate different kinds of reasoning. It involves the
and many more.
codification of factors or relationships between ideas,
8. New Inventions or rules or transitions between sets of facts in a manner
that can be interpreted by a computer system. Some of
AI is powering many inventions in almost every domain the applications of knowledge representation and
which will help humans solve most complex problems. reasoning include computer-aided diagnosis for
DISADVANTAGE OF ARTIFICIAL INTELLIGENCE assisting physicians interpret medical images, as well as
natural-language user interface that involves using
human language as input for interacting with computers also one of the traditional problems of AI, NLP aims to
or software. develop and implement computer systems, particularly
computer programs that can process large amounts of
2. Automated Planning and Scheduling
natural language data. Achieving this aim means
Sometimes called as AI planning, automated planning overcoming challenges such as speech recognition,
and scheduling is another subset and field of artificial natural language processing, and natural language
intelligence concerned with the automated generation generation. Intelligent assistant services such as Google
of action sequences that correspond to strategies that Now and the Siri application from Apple Inc. use natural
can be executed by an AI system such as unmanned language processing, along with other subsets of
vehicles or autonomous robots. As one of the artificial intelligence such as machine learning and
traditional problems of AI research, AI planning aims to knowledge representation and reasoning.
mechanize and automate the generation of a plan
5. Computer Vision
based on predetermined goals and objectives, and a set
of possible actions. Note that it is also one of the Computer vision involves acquiring and understanding
fundamental abilities needed to increase the autonomy visual data from still or moving digital images or live
and flexibility of AI systems. images from the real world to process them in a manner
that AI systems can utilize to make decisions. The aim of
Examples of AI planning include self-correcting
computer vision, as one of the major problems in AI
computer programs or software applications, robots
research, centers on the computerization and
that serve as autonomous agents, automated
automation of tasks that can be performed naturally by
information gathering, and computer-aided
human vision, as well as the development of systems
suggestions.
that can process, interpret, and utilize visual data. Facial
3. Machine Learning recognition is one of the notable applications of
computer vision. Other applications include video
Machine learning is both a specific field of artificial tracking, automated image manipulation, object
intelligence and an actual application of AI. As a field of recognition, and integration with virtual reality and
discipline, it involves the study of algorithms and augmented reality.
statistical models that computer systems use to
perform a specific task without using explicit 6. The Rise of Robotics
instructions effectively. Central to the concept of
While technological advances in the previous century
machine learning is a different approach to computer
mainly displaced uneducated laborers, the 21st century
programming. To be more specific, it involves the
is seeing technology increasingly threatening skilled
development and use of computer algorithms that can
workers' jobs as well.
process and analyze Big Data and learn from the
outcome without being explicitly programmed. The Ford believes that unlike previous centuries, the current
benefits of machine learning include supplementing emerging technologies will fail to generate new forms
data mining, continuous improvements, and of employment; he predicts that new industries will
automation of tasks. Real-world applications include "rarely, if ever, be highly labor-intensive". Companies
search engine ranking, content delivery, online like YouTube and Instagram are based on "tiny
advertising, autonomous driving, and intelligent workforces and huge valuations and revenues". Ford
assistant, among others. downplays the benefits of expanding education ("The
problem is that the skills ladder is not really a ladder at
4. Natural Language Processing
all: it is a pyramid, and there is only so much room at
Another major goal and subset of artificial intelligence is the top") and argues for a "dramatic policy response"
natural language processing or NLP. It deals with the such as a guaranteed basic income.
analysis and generation of languages that humans use
Many economists disagree with Ford's thesis that the IT
naturally to interface with computers. In other words,
revolution is fundamentally different from previous
NLP is about human-computer interaction using natural
technological revolutions. Libertarian economist Robin
language instead of computer language. Because it is
Hanson argues that the recent ominous labor trends
may have causes other than automation, such as -Fingerprint access to buildings have been replacing the
"demographics, regulation, worker values, organization older methods of locks and keys.
practices, and other technologies.
-This method ensures that only authorized people can
Artificial Intelligence (AI) enter restricted buildings or rooms.
-AI software will soon be used to sift through weather -Cars already exist that use fingerprints to only unlock
data more accurately that humans can and will be used their doors or start the engine for the fingerprint that is
to predict approaching storms and automatically issue registered.
warnings.
-This means that the doors will not unlock for a print
Increased leisure time that is not recognized and makes the car harder to
steal.
-Robotic vacuum cleaners are becoming more and more
popular. These can detect walls and other objects to More secure mobile phones
vacuum around them.
-Mobile phones contain our lives. We used our phones
-People can leave them running whilst they enjoy extra for everything from social media to shopping online.
spare time. They need to be as secure as possible to protect the
valuable data that they contain.
Safer transport -Cars that can self-park already exist,
and it is predicted that cars that drive themselves will -Apple recently released an iPhone model that uses a
be available soon. These could drastically reduce road fingerprint reader to identify the true owner of the
accidents. phone. It will not unlock for a fingerprint that it does
not recognize.
-Driverless trains already exist in some countries!
3. Robotics
Increased Personal safety
Increased personal time
-Modern home alarm systems use artificial intelligence
software that can tell the difference between the -If robots can carry out domestic chores, this frees up
homeowners and intruders. more time for us to spend as we wish.
-The software automatically alerts the police when -This could mean more time spent at work or for more
intruders are detected. enjoyable activities such as socializing.
-Robotic surgery assistants are being used to pass the -Robots can manufacturer products such as cars much
correct surgical tools quickly and accurately to doctors. faster and cheaper than humans can.
-The few seconds saved in getting the correct tool to -This means that companies can make more products
the doctor can save patient's lives. at less cost, and this means greater business profits.
Better airport security -Due to higher and cheaper productivity, robots are
taking over the manufacturing jobs that used to be
-Iris recognition is already in use in some airports.
carried out by humans.
-Travelers have their eyes and iris scanned into a
-This means that humans are missing out on
system and this data is later matched up when the
employment on assembly lines and factory work.
person is performing airport checks.
Safer working environments
Increased building security
-Robots can safely carry out tasks that are too -Anyone with an Internet connection can access tools
dangerous for humans. such as Google Translate and the vast collection of
language databases that the tools can search through.
-For example: spraying cars with toxic paint, defusing
bombs on battlefields and search and rescue operations -This makes accessing other languages much easier than
in buildings destroyed by earthquakes. in the past and makes it easier for people to learn these
new languages.
4. Quantum Cryptography
Quicker and more efficient translations
Completely secure voting
-Foreign visitors to countries can be communicated with
-Citizens of countries have the right to vote-in new
much easier through these CAT tools. -They are
governments but history is littered with examples of
especially useful in places like embassies where a wide-
where these votes have been tampered with to
range of foreign visitors may need to communicate with
influence election outcomes.
local officials about problems or ask for advice etc.
-Securing votes with quantum encryption methods
6. 3D and Holographic Imaging (aka holograms)
ensures that they cannot be tampered with or changed
Improved security
Completely secure communication
-Credit cards, ID cards, software and some bank notes
-Messages sent by the military often include the
include holograms as a way of trying to prevent forged
locations of squadrons or special op's teams. If enemy
duplicates being created.
forces intercepted these messages, it could have severe
consequences. Better movie experiences
-Using quantum cryptography to secure the messages -Hollywood have been using 3D imaging within the
would eliminate the risk of them being read or heard by production of movies for many years.
unauthorized ears.
-These provide the viewer with a much more immersive
Completely secure bank transfers experience.
-VR can give students the opportunity to learn in a Self-powered data centers - we can expect to see the
much more interactive way. results of early data center pilots that take the data
center entirely off the energy grid, with data centers
CONVERGING COMMUNICATION TECHNOLOGIES running its own self-contained power plants.
Convergence in communication technologies means Cloud-independent edge computing - Age-old
that different kinds of communication technologies are distribute computing will make a comeback as
coming closer to each other. During the past few companies realize that the computing, they are moving
decades of rapid technological advancements, the to at the edge is run more efficiently locally and on real
boarders between telecommunications, the Internet hardware—and not on the cloud.
and mass media are receding. The convergence of
communication technologies means one terminal de- IoT integration - More organizations will proceed with
vice, for example a mobile telephone or a digital televi- IoT implementations in 2019. An emerging concern will
sion can be used for various services. be how well different IoT devices from varying vendors
can interoperate. IT wants a single plane of IoT
Emerging software technologies management.
Emerging technologies are technologies whose More self-service IT for business users - the idea of a
development, practical applications, or both are still self-service kiosk filled with IT tools, apps, and resources
largely unrealized, such that they are figuratively that users could choose from. Already vetted for proper
emerging into prominence from a background of access, clearances, and security, the self-service IT kiosk
nonexistence or obscurity. These technologies are would enable users to log on and choose what they
generally new but also include older technologies that want for the apps that they build
are still controversial and relatively undeveloped in
potential According to Tech republic here are 8 Convergence of AI, machine learning and deep
emerging Technology trends you can expect to see in learning - continued progress toward the integration of
2019. AI, machine learning, and deep learning in business
applications. AI will deliver first line-of-response
Citizen development - Expect citizen development, business insights from data it analyzed with a baseline
where business users’ development their own of algorithms.
Future of Computing its warehouse facilities with the task of organizing items
and making warehouse operations more efficient.
In the last two decades advances in computing
technology, from processing speed to network capacity 2. New-wave nuclear power
and the internet, have revolutionized the way scientists
Advanced fusion and fission reactors are edging closer
work. Modern computers are found everywhere:
to reality. New nuclear designs that have gained
homes, offices, businesses, hospitals, and schools, to
momentum in the past year are promising to make this
name a few. Contemporary society has become so
power source safer and cheaper. Among them are
dependent on computers that many people become
generation IV fission reactors, an evolution of
frustrated and unable to function when computers are
traditional designs; small modular reactors; and fusion
"down." Because of this dependence, computers are
reactors, a technology that has seemed eternally just
regarded as essential tools for everything from
out of reach.
navigation to entertainment.
3. Predicting preemies
Technological Breakthroughs
A simple blood test can predict if a pregnant woman is
1. Robot dexterity
at risk of giving birth prematurely. Our genetic material
Robots are teaching themselves to handle the physical lives mostly insid e our cells. But small amounts of “cell-
world. For all the talk about machines taking jobs, free” DNA and RNA also float in our blood, often
industrial robots are still clumsy and inflexible. A robot released by dying cells. In pregnant women, that cell-
can repeatedly pick up a component on an assembly free material is an alphabet soup of nucleic acids from
line with amazing precision and without ever getting the fetus, the placenta, and the mother.
bored—but move the object half an inch, or replace it
4. Custom cancer vaccines
with something slightly different, and the machine will
fumble ineptly or paw at thin air. The treatment incites the body’s natural defenses to
destroy only cancer cells by identifying mutations
Robotics-as-a-service (RaaS)
unique to each tumor. Scientists are on the c usp of
Robotics-as-a-service is about to eat the world of work. commercializing the first personalized cancer vaccine. If
While much of the attention in the world of automation it works as hoped, the vaccine, which triggers a person’s
technology has been focused on self-driving cars, many immune system to identify a tumor by its unique
other markets traditionally dominated by human-in-the- mutations, could effectively shut down many types of
loop solutions are reaching a point of inflection, cancers.
enabling RaaS solutions to take over.
5. An ECG on your wrist
Robotics
ECG-enabled smart watches, made possible by
Another one of the major goals and thus, one of the new regulations and innovations in hardware and
subsets and fields of artificial intelligence is robotics. software, offer the convenience of a wearable device
Note that robotics is an interdisciplinary branch of with something closer to the precision of a medical one.
engineering and science that include computer science,
6. Sanitation without sewers
electronic engineering, mechanical engineering, and
information engineering. Robotics is about the design, Researchers are working to build a new kind of toilet
construction, and operation of machines or robots that that’s cheap enough for the developing world and
can replicate human actions and replace human tasks cannot only dispose of waste but treat it as well. These
with mechanical tasks. The integration of computer energy-efficient toilets can operate without a sewer
science and AI in robotics corresponds to equipping system and treat waste on the spot.
robots with sensory feedback and information
capabilities to allow them to operate autonomously. 7. Smooth-talking AI assistants
Current research in robotics aims to introduce A virtual assistant, also called AI assistant or digital
commercial, domestic, and military applications. Online assistant, is an application program that understands
retailer Amazon has been using autonomous robots in
natural language voice commands and completes tasks producing their goods through mass production in
for the user. factories.
Why should the world care about the future of Impact of Computers on Work
computing?
One of the ways that computers have made an impact
Today computers are in virtually everything we touch, on society is in how people have organized themselves
all day long. We still have an image of computers as in workplace groups in relationship to computers. The
bein g rectangular objects either on a desk, or these earliest computers were developed to perform specific
days in our pockets; but computers are in our cars, tasks in science, engineering, or warfare that had
they’re in our thermostats, they’re in our refrigerators. previously been done by hand. Soon general-purpose
In fact, increasingly computers are no longer objects at computers could automate almost any information
all, but they suffuse fabric and virtually every other processing task required to manage an organization,
material. Because of that, we really do need to care such as payroll processing and record management.
about what the future of computing holds because it is However, since early generation computers were
going to impact our lives all day long. relatively expensive, all of an organization's information
processing tasks were typically centralized around the
What will computing look like in the Future?
one large computer it could afford. Departments and
We have no idea yet because change is happening so people in such organizations would likewise be
quickly. But I’m sure with the help of science and organized in a centralized fashion to facilitate their
technology and computers we can build more things access to the computer. Companies with centralized
that will change the world. information processing, for example, usually had most
of their administrative offices in the same geographic
Introduction location as their computer resources.
Computing technologies, like most other forms of Objectives
technology, are not socially neutral. They affect and are
themselves affected by society. Computers have As a department of the main concerns is that we form
changed the way people relate to one another and their professionals to become leaders in their respective
living environment, as well as how humans organize fields and performance from your area of interest can
their work, their communities, and their time. Society, contribute importantly to the improvement of their
in turn, has influenced the development of computers organizations, and therefore to society as a whole. It is
through the needs people have for processing also one of our objectives is that our students can help
information. The study of these relationships has come improve the competitiveness of enterprises in our
to be known as "social informatics." country, that through the use and development of
appropriate technologies, these can be inserted in a
Computing technology has evolved as a means of better way within the contemporary market
solving specific problems in human society. The earliest requirements that require.
kinds of computational devices were the mechanical
calculators developed by Blaise Pascal (1623–1662) in Some of the major computer application fields are
1645 and Gottfried Leibniz (1646–1716) in 1694 for listed below.
solving the navigational and scientific problems that
An aid to management: The computer can also be
began to arise as Europe entered a new and heightened
used as a management tool to assist in solving
period of scientific development and international
business problems.
commerce. In 1801 Joseph-Marie Jacquard (1752–
1834) invented perhaps the first type of programmed Banking: Branches are equipped with terminals
machine, called Jacquard's Loom, in order to automate giving them an online accounting facility and
the weaving of cloth with patterns. Jacquard was enabling them to information as such things as
motivated by the desire of capitalists in the early current balances, deposits, overdrafts and interest
Industrial Age who wanted to reduce the cost of charges.
Industrial Application: In industry, production may o Increased Unemployment.
be planned, coordinated and controlled with the aid o Huge data and information can be lost
of a computer. sometimes.
o Fast changing computer technology.
Engineering Design: Computer help in calculating
o Service distribution.
that all the parts of a proposed design are
o Illiteracy of computing and computers.
satisfactory and also assist in the designing.
Current Breakthrough Technologies and Disruptive
Meteorology: Data is recorded at different levels of
Innovations
atmosphere at different places, using remote
sensors carried on a satellite. So many new technologies have appeared in the past
half century that it’s impossible to list them all.
Air Travel: Small computers are installed as a part
of the plane's equipment. 10 High-tech Breakthroughs stand out over the last 50
years
Road Traffic Control: Computers assist with the
control of traffic lights. 1. Organ transplants.
Telephones: Computerized telephone exchanges In 1954, Dr. Joseph Murray removed the kidney from
handle an ever increasing volume of calls very one human patient and implanted it in another. The
efficiently. recipient accepted the kidney as its own rather than
rejecting it as a foreign body. It was more than skillful
Medicine: Computers are widely used in hospitals
surgery: Murray had chosen a pair of identical twins,
for such task as maintaining drugs, surgical
Ronald Herrick and his terminally ill brother Richard, in
equipments and linen, for payroll and also for
hopes their similar genetic makeup would reduce the
checkup and treatment of diseases.
likelihood of Richard’s body rejecting Ronald’s liver.
In addition computers are also used for recording and
Soon afterward, though, other researchers developed
film studios, research, military, etc.
drugs that could squelch a transplant recipient’s
Computers have both positive and negative impact in immune system long enough for the new organ to
our daily life as well as in our social life. But the gross become incorporated into its new body.
development of the nation is faster with the application
2. Robots and artificial intelligence.
of computers in industries and education.
The term “robot” was coined by Czechoslovakian
The both positive and negative impacts of computers
playwright Karel Capek in 1920 “robota” being a Czech
are listed below.
word for tedious labor but the first real industrial robot
Positive Impact of Computer was built in 1954 by George Devol.
o The work can be done in very less time. Five years later, the Massachusetts Institute of
o More information can be stored in small space. Technology founded its Artificial Intelligence Laboratory
o Multitasking and multiprocessing capabilities of in a quest to mechanically mimic human minds as well
data. as hands.
o Easy to access data. Today, robots assemble products better, faster and
o Impartiality. often cheaper than manual laborers, while more than 8
o Documents can be kept secret. million U.S. airline flights a year are scheduled, guided
o Error free result. and flown with the superhuman assistance of advanced
Negative Impact of Computer software.
When the Queen herself threw the switch on the Just as important, digital media can be copied over and
world’s first atomic power plant at Calder Hall outside over nearly for free, stored permanently without fading,
London in 1956, nuclear reactors were seen as a source and sent around the world in seconds.
of cheap, pollution-free energy. But a partial meltdown
9. Genetic engineering.
in 1979 at the Three Mile Island reactor in Pennsylvania
soured Americans on nukes as safe power. Everyone knows Watson and Crick, who unraveled the
secret of DNA in 1953. But have you heard of Boyer and
5. Mobile phones.
Cohen, who constructed the first organism with
The idea for cellular phone service dates back at least to combined DNA from different species in 1973? They
1947, but the first call was made from the sidewalk inserted toad genes into a bacterium that then
outside the Manhattan Hilton in 1973 by Martin Cooper, replicated itself over and over, passing the toad’s
a Motorola researcher who rang up his rival at AT&T genetic code down through generations of bacteria.
Bell Labs to test the new phone.
Thirty years later, an estimated 70 percent of processed
6. Space flight. foods contain genetically modified ingredients, such as
soybeans or corn engineered for higher crop yields. Of
Americans from 50 years ago would be disappointed to
course, the much bigger potential good and bad is in
learn we never went further than the Moon no Mars
engineering humans. It might prevent birth defects, and
colony, no 2001 odyssey to Jupiter, no speed-of-light
diseases later in life. But the side effects could be
spaceships. Even the Shuttle is in trouble.
disastrous and unknown. Is there an ethical way to
But the space race against the Russians that dominated beta-test human beings?
the national psyche (and a good chunk of the budget) in
10. The Internet.
the ‘60s and ‘70s pushed the development of hundreds
of enabling technologies, including synthetic fibers and This one seems like a no-brainer, but the Net’s unique
integrated computer circuits, necessary to fly men to strength is that no two people will agree on why it’s so
the Moon and back. important. The world’s largest and most unruly library,
it’s also a global news channel, social club, research
7. Personal computers.
archive, shopping service, town hall, and multimedia
Before IBM recast the desktop computer from kiosk. Add to that the most affordable mass medium
hobbyist’s gadget to office automation tool in 1983 ever, and a curse to anyone with a secret to keep.
followed by Apple’s people-friendly Macintosh a year
Paul Boutin is a technology writer for wired magazine
later a “minicomputer” was the size of a washing
and Slate. He has worked as a software engineer and
machine and required a special air-conditioned room.
manager at MIT and in Silicon Valley. © 2013 MSNBC
But the trained technicians who operated the old Interactive.
mainframes already knew computers were cool: They
Disruptive Innovation
could use them to play games, keep diaries, and trade
A disruptive technology or disruptive innovation is an New-market disruptions induce incumbents to ignore
innovation that helps create a new market and value the attackers, and low-end disruptions motivate the
network, and eventually goes on to disrupt an existing incumbents to flee the attack.
market and value network.
When you have a chance to ask questions or share 1. Freedom of speech does not mean the freedom to
perspectives, then it creates more learning have “all” speech.
opportunities in society. This right makes it easier for all
The concept behind the freedom of speech is that you
individuals to make a new discovery, suggest ideas, or
should be able to express anything in a way that does
exchange information freely without worrying about
not create legal consequences for you. Even if your
potential political consequences. Even if some of the
opinion is unsavory, rude, or unpopular, this right gives
ideas do not work after you get to try them, the process
you the option to express it. In the United States, there
of testing contributes to the advancement of society as
are four forms of speech which are not protected under
well. Thomas Edison famously made 1,000 unsuccessful
the First Amendment.
attempts at the invention of the light bulb – each idea
was a new step toward success. • You cannot make an authentic threat against another
individual.
7. Freedom of speech allows for peaceful changes in
society. • It is illegal to defame others, including libel and
slander.
Some people use their freedom of speech to incite
hatred or violence. Others use it to create the potential • You cannot plagiarize any copyrighted material.
• It is illegal to share some obscene material, such as 5. Freedom of speech can create a mob (large,
child pornography. disorderly, and often violent group of people)
mentality.
If you say something in the United States which
insights illegal actions or solicit others to commit a In 2012, Oatmeal and FunnyJunk had a dust-up over the
crime, then your speech is not protected by the First use of images that author Matthew Inman did not
Amendment either. authorize for distribution. Charles Carreon made a
public splash as the attorney for FunnyJunk, which
created a back-and-forth which eventually led the
2. Freedom of speech can spread false information. Internet to turn against him. In return for those actions,
Carreon labeled everyone he thought of as an
Thanks to the rise of the Internet, the freedom of “instigator” as a “rapeutationist.” When one person
speech makes it easier for individuals to spread false offers an opinion that others find to be believable, it
information and outright lies, but then still pretend that creates a mob mentality on both sides of the equation.
this data is true. Research does not prove that When this happens, it can destroy a person’s livelihood
vaccinations increase the risk of autism in children, but quickly.
you will find “information” online that says this is true.
Even though it is protected speech when this right is 6. Freedom of speech can cause people to endure
present, it could also lead to people getting or verbal abuse.
transmitting a preventable disease. In 2019, over 60
Voltaire’s biographer summed up the views of the
people in Washington and Oregon contracted the
philosopher like this: “I don’t agree with what you say,
measles, with almost all the cases being unvaccinated
but I will defend to the death your right to say it.” When
children.
freedom of speech is treated this way, then it creates a
3. Freedom of speech can incite (to encourage or situation where people must endure sexist or racist
provoke someone to take a particular action) violence verbal abuse. Is it really beneficial for society to allow
against other people. individuals to use derogatory terms for the purpose of
causing discomfort?
People must be held responsible for the personal
choices that they make. When someone commits an act 7. Freedom of speech will eventually polarize (divide or
of violence against another because they were incited separate a group) society.
by hate speech to do so, then they made the choice to
When people are allowed to express their opinions
break the law. The person who created the outcome
freely, then it creates three primary outcomes. Some
through the encouragement of their language holds
people will agree with the statement, others will
some responsibility here as well. If online radicalization
disagree, and a middle group won’t care one way or
causes people to join ISIS, then shouldn’t political
the other. People tend to hang out in circles where
radicalization that causes individuals to attack
others think and feel in similar ways, which means they
journalists be treated in the same way?
will gather around like-minded individuals to spend
4. Freedom of speech creates a paradox (seems self- most of their time.
contradictory or absurd).
8. Freedom of speech reduces the desire to
When we look at the modern idea that creates the compromise.
foundation for freedom of speech, it really isn’t free.
Pew Research also discovered that when people are
The government is still dictating some of the things that
consistently liberal or conservative with their freedom
we can or cannot say. This freedom, and this writer,
of speech, their idea of what compromise entails begins
cannot exist if people are not allowed to make
to shift. Instead of believing that both sides must have a
assertions that are distasteful to the majority, even if
give-and-take to create an outcome, the definition
the statements are hurtful to other people.
becomes one in which their side gets what they want
while the other side gets as little as possible. This
perspective makes it a challenge for society to function
because those on each extreme are consistently battling
the other extreme because each view themselves as CONCEPTIONS OF PRIVACY AND THE VALUE OF
being the superior contributor to society. PRIVACY
Mail identity theft is one of the oldest ways for a Account takeover fraud occurs when criminals gain or
criminal to steal your personal information. If your mail have access to your bank or credit card accounts—
has been stolen a thief may be able to retrieve your usually because of a data breach, phishing scam, or
financial account information to make purchases or malware attack—and start making charges to those
open new credit cards. They could also change your accounts.
address on your statements or bills.
There's no surefire way to avoid becoming a victim of Request electronic statements: Doing this eliminates
identity theft. Even if you're extra careful with how you the paper trail financial account statements create. Mail
handle your personal information online, it still may be fraud is considered old school, but it's still alive and
susceptible to data breaches and other attacks from well. It's best to have financial statements delivered to
hackers. your secure email inbox rather than your mailbox.
There are, however, some steps you can take to reduce Keep your mail safe: If you do receive paper documents
the risk of identity theft, and even to make your with personal information, see if you can add a lock to
information less valuable to a criminal who gets their your mailbox or use a P.O. box as your mailing address.
hands on it. You may also want to consider having smaller packages
delivered to your work address, so you receive them
1. Monitor Your Credit
during the day versus having them left unattended on
While it's possible for someone to steal your your porch. If you are going to be gone for a while, ask
information by taking your purse or wallet or someone to pick up and hold your mail for you, or
burglarizing your home, many incursions that lead to request a hold with the U.S. Postal Service until you
identity theft occur without the victim knowing. return.
To make sure nobody has opened new accounts under Buy a shredder: If you plan to throw out financial and
your name, make sure to check each of your credit other sensitive documents, shred them first. This can
reports at least yearly. You can get your Experian, take a little extra time but adds a layer of protection
Transunion, and Equifax credit reports for free at against dumpster-divers.
AnnualCreditReport.com.
Lock it up: There are some documents—your Social
If possible, pull one report every four months so that Security number, recent tax returns, birth certificate
you're looking at your reports throughout the year. and more—you can't get rid of. Consider getting a safe
Through Experian, you can get a free copy of your deposit box at a local bank branch or purchasing a
Experian credit report every 30 days as well as free lockbox you can store them in at your house.
credit monitoring, which provides alerts about new
3. Secure Your Online Data
inquiries, accounts, and suspicious activity.
Stopping mail fraud is straightforward, but protecting
If you notice fraudulent activity, dispute it with the
yourself online can be a lot trickier because criminals
lender and the bureau. Also, consider freezing your
employ many tactics to steal your identity. Here's what
credit reports and request a fraud alert be added to
you need to do:
them if you've been victimized.
Be cautious with links: Phishing scams involve a thief
With a credit freeze, no one can view your credit
using email to trick you into giving them personal
reports, including lenders. So, if a thief steals your Social
information. These messages often look like they're
Security number and plans to open credit accounts in
coming from a reputable business and can take an eagle
your name, they'll be denied. Keep in mind, though,
eye to spot. If something seems off about an email
you'll also be denied for legitimate applications unless
that's asking you to click a link to an offer or action, To help minimize the damage, create a unique, strong
don't click. Instead, hover your cursor over the link and password for every online account. The strongest
check the destination URL. If the link would take you to passwords are long, random strings of letters, numbers,
a different website than you were expecting, or seems and symbols, and it would be impossible to memorize
otherwise illegitimate, ignore it. Additionally, these each one. For that reason, you could use a password
emails can include attachments that, if opened, install manager such as LastPass or 1Password to securely
information-gathering malware. store all of them in a place that's easily accessible when
you need them.
Monitor your online accounts: Staying up to date on
changes to your financial accounts can be helpful in If a website or app offers it, set up two-factor
catching fraud as soon as it happens. Set up push authentication. This will require you to provide a second
notifications on your smartphone or other mobile piece of information to verify your identity. It may
devices and pay attention to any alert emails you may require you to use an authenticator app with a unique
get from financial institutions. number that changes every 30 seconds or have a code
sent to your email or phone.
Be careful with public Wi-Fi: Public Wi-Fi can be a
convenient way to get access to the internet. But Using this process takes a little more time every time
whether you're at a coffee shop or the airport, be you log in or change account details, but it provides
careful about what you do while you're online. Hackers valuable protection against people who want to do you
and others can set up their own free Wi-Fi networks and harm.
use them to scrape your data. Even legitimate Wi-Fi
networks can be hacked, allowing the thief to
"eavesdrop" on your connection and steal data. Make UNIT 6: INFORMATION WARFARE & ONLINE CRIMES
sure the network you are connected to be legitimate
and can be trusted, and use a virtual private network, or ONLINE CRIMES
VPN, to add an extra layer of security and prevent 1. WHAT IS HACKING
eavesdropping.
Hacking generally refers to unauthorized
Watch out for unsecure websites: Before you enter intrusion into a computer or a network. The person
payment or other personal information into a website, engaged in hacking activities is known as a hacker. This
check to make sure it's secure and trustworthy. If the hacker may alter system or security features to
URL starts with "HTTP" instead of "HTTPS," it's not accomplish a goal that differs from the original purpose
secure and hackers can eavesdrop and steal information of the system.
you share. Even if the site does have a secure
connection, it can still be a front for a scam. If you don't Hacking can also refer to non-malicious
recognize the name of the company, be diligent to activities, usually involving unusual or improvised
make sure it's legitimate and trustworthy. alterations to equipment or processes.
Root kit: represents a set of programs which Firesheep was created by software developer Eric Butler
work to subvert control of an operating system and released in 2010 to prove the security risks
from legitimate operators associated with a number of popular websites, including
Facebook and Twitter. The software served to highlight
Trojan horse: serves as a back door in a
a major Web browsing security flaw that could expose
computer system to allow an intruder to gain
users to malicious hackers. Of course, its capabilities
access to the system later
were also useful to hackers, leading to some public
Viruses: self-replicating programs that spread concern about the software.
by inserting copies of themselves into other
3. SPAMMING
executable code files or documents
INTRODUCTION
Key loggers: tools designed to record every
keystroke on the affected machine for later Spamming is the use of electronic messaging
retrieval systems like e-mails and other digital delivery systems
and broadcast media to send unwanted bulk messages
Hacking Tool
indiscriminately. The term spamming is also applied to
A hacking tool is a program or utility to assist a other media like in internet forums, instant messaging,
hacker with hacking. It can also be proactively utilized to and mobile text messaging, social networking spam,
protect a network or computer from hackers. junk fax transmissions, television advertising and
sharing network spam.
Hacking is intentional modification of computer
software or hardware that is outside the architectural Spam involves sending nearly identical messages to
perimeters and design. Hacking tools come in a wide thousands (or millions) of recipients. Spammers use
variety of applications and are specifically created to software robots, called spambots (also Web crawlers or
assist in hacking. A hacking too is commonly used to Web spiders) in order to get valid email addresses from
gain unauthorized access to a PC to insert worms, company Web sites, blogs and newsgroups. Common
siffers, viruses and Trojan horses. subjects of spam messages are pornographic or other
sexually related Web sites, various financial services or
2. Hackerazzi get-rich-quick schemes and health products.
Hackerazzi is a slang term used to refer to Spam messages normally have a fake origin address,
cybercriminals who hack into celebrity email accounts which is randomly generated, in order to keep the
to gain access to their personal information. This term is author of the message from being easily discovered.
derived from the term paparazzi, which refers to the
aggressive photojournalists who often intrude on Spam is commonly used for advertising thus given an
celebrities' privacy and make a living by selling candid acronym Sales Promotion and Marketing.
photos of famous people.
BRIEF HISTORY OF SPAM
Banker Trojan
The growth of unsolicited e-mail imposes increasing
A banker Trojan is a piece of malware intended to get costs on networks and causes considerable aggravation
financial information or hack users through a banking or on the part of e-mail recipients. The history of spam is
financial system, commonly through an online banking one that is closely tied to the history and evolution of
or brokerage interface. the Internet itself.
1993 First use of the term spam was for a Work-at-Home Schemes: These are fraudulent schemes
post from USENET by Richard Depew to that promise individuals the opportunity to work from
news.admin.policy, which was the result of a home and make money. Typically, the work involves
bug in a software program that caused 200 some type of assembly or processing of materials, but in
messages to go out to the news group. reality, there is no real work to be done, and individuals
are often required to pay an upfront fee to participate.
The term “spam” itself was thought to have come from
the spam skit by Monty Python's Flying Circus. 5. Pornographic Websites: These are unsolicited
messages that advertise pornographic websites or
In the sketch, a restaurant serves all its food with lots of
services.
spam, and the waitress repeats the word several times
in describing how much spam is in the items. When she Stock Offerings for Unknown Start-Up Corporations:
does this, a group of Vikings in the corner start a song: These are unsolicited messages that advertise unknown
"Spam, spam, spam, spam, spam, spam, spam, spam, start-up corporations and their stock offerings. Often,
lovely spam! Wonderful spam!" Until told to shut up. these companies are fraudulent, and the stock offerings
are worthless.
Thus the meaning of the term: something that keeps
repeating and repeating to great annoyance. Quack Health Products and Remedies: These are
unsolicited messages that advertise health products or
2003 May 3rd – 25th anniversary of the first
remedies that are not scientifically proven or regulated.
“spam” and the first time that the amount of
Often, these products are fraudulent, and the claims
spam email exceeded the amount of legitimate
made about them are false.
email
Pirated Software: These are unsolicited messages that
2012 The rise of social media spam
advertise illegally pirated software. Using pirated
CATEGORIES OF GENERAL SPAM software is illegal and can result in fines or legal action.
SMS Spam - any unwanted or unsolicited text Don't click any links in a spam
message sent indiscriminately to your mobile email. Spammers often have multiple, unique
phone, often for commercial purposes pages on their sites. Often, when you click a
URL in a spam message, this tells the spammer
Spamdexing - which is a word derived from that you — and only you — received the
“spam” and “indexing,” refers to the practice of message he or she sent. It's another way for the
search engine spamming? spammer to figure out you actually exist.
It is a form of SEO spamming. SEO is an Don't forward an email from someone you
abbreviation for Search Engine Optimization, don't know to a list of people. You remember
which is the art of having your website those "forward this email to 20 of your friends"
optimized, or attractive, to the major search messages? They are perfect for spammers to
engines for optimal indexing. harvest email addresses, even if the sender of
practice of creating websites that will be the original email did not have this intent.
illegitimately indexed with a high position in the These types of sign-and-forward emails often
search engines appear in the form of a petition — and they
don't work.
THINGS YOU CAN DO TO PREVENT SPAM
Monitor Your Settings, Report Suspicious Behavior
Take Precautions
Use a spam filter. A few free ones
Use a complicated email username. Spammers' are SpamBayes for Windows or POPFile for both
software will look for the easy and obvious Windows and Mac. TechSoup also offers
addresses first, such as those with identifiable donated anti-spam software or services from
names like "john1977@hotmail.com," as partners such as Comodo, Mailshell, and Red
opposed to "sjk839@gmail.com." Earth.
Preview your messages before you open Make sure your privacy settings are set so you
them. Outlook (and many other email clients) don't receive marketing from other sites in
let you use a preview mode to peek at the your AOL and Yahoo profiles. Many listservs
contents of a message before you actually open use Yahoo lists as the list provider; you must
it. To do this in Outlook, go to the View menu unselect these pre-selected choices in your
and select Reading Pane. Instead of double personal privacy settings.
clicking a message, click it once to select it and
you'll see the message displayed in the Reading If your organization has an IT department,
Pane. forward it any spam that gets through. The IT
staff may be able to tweak the filters to block
Think Before You Click (or Reply or Forward) similar emails in the future.
Never, ever reply to a spam message. This TECHNOLOGY-BASED TERRORISM
includes buying a product that is for sale or
clicking the often-misunderstood "unsubscribe" Technology-based Terrorism
link, which actually informs your spammer that
Technology is a foundation of modern society, it Many other groups are active on the web, including
governs its dynamics, and therefore, it is normal that Hamas (the Islamic Resistance Movement), the
also the terrorism will benefit from it. We are living a Lebanese Hezbollah (Party of God), the Egyptian Al-
very difficult period, the terrorism is threatening the Gama’a at Islamiyah, the Popular Democratic Liberation
society and cultures on a global scale, and differently Front Party in Turkey (DHKP / C), the Kurdish Workers’
from the past, it has reached a global dimension. We Party (PKK), the Zapatista National Liberation Army
are facing a global alert. Intelligence and law (ELNZ), the Islamic Movement of Uzbekistan (IMU) the
enforcement agencies worldwide are warning about Mujahedin, and the Chechens.
possible terrorist attacks in the major cities.
What are the advantages in the use of the Internet?
5. Technology-based Terrorism is also called
The Internet offers a simple access to a global stage,
Cyberterrorism
every terrorist could instantly reach large masses or
Cyberterrorism is the use of the Internet to conduct targets specific groups of individuals. Under specific
violent acts that result in, or threaten, loss of life or circumstances, the resources of the Internet could offer
significant bodily harm, in order to achieve political or anonymity to the user, a great advantage for a terrorist
ideological gains through threat or intimidation. It is organization that wants to spread their message while
also sometimes considered an act of Internet terrorism remaining undetected.
where terrorist activities, including acts of deliberate,
The Internet is CHEAP.
large-scale disruption of computer networks, especially
of personal computers attached to the Internet by The Internet, and technology, could be exploited by
means of tools such as computer viruses, computer terrorist organizations for several purposes including:
worms, phishing, and other malicious software and
hardware methods and programming scripts. Propaganda
Psychological warfare
The modern terrorism is instantaneous and Recruitment and mobilization
unpredictable, a global threat that hit its targets, but Fundraising
that at same time hits a wide audience thanks to the Data Mining, information gathering
technology, it is bringing the terror into our homes. Secure communications
Cyber attacks
Social media is an essential element of modern
Software distribution (e.g., mobile app)
terrorism; these powerful platforms allow terrorists to
Buying false documents
communicate, to make propaganda and recruit new
Training
sympathizers.
Every terrorist attack is similar to a dramatic Terrorists use the new social platforms like Facebook,
representation, in which the Internet is the stage. Twitter and media services such as YouTube. Their
language is direct, young, and it can reach a specific
“Terrorist attacks are often carefully choreographed to
audience by using images with a high emotional impact.
attract the attention of the electronic media and the
international press. Terrorism is aimed at the people The online propaganda is multi-lingual. It
watching, not at the actual victims. Terrorism is a reaches not only Arab people and is easily accessible to
theater,” wrote Brian Jenkins, an young people.
International Terrorism expert.ISIS - Islamic State of Iraq
The chain of communication leading massacres and
and Syria also known as Islamic State of Iraq and the
executions directly into our homes is extremely short, a
Levant (ISIL) is the perfect example for technology-
few tools (i.e., a smartphone, a camera, and a laptop)
based terrorism.
and the free Internet network are the pillars of the new
Although members of the Islamic state use new strategy of terror.
technologies with great skill, many other terrorist
CYBER ESPIONAGE
groups use the Internet and its resources every day.
Cyber spying, or cyber espionage, is the act or practice The attacker must be able to intercept all
of obtaining secrets and information without the relevant messages passing between the two
permission and knowledge of the holder of the victims and inject new ones. This is
information from individuals, competitors, rivals, straightforward in many circumstances; Man-in-
groups, governments and enemies for personal, the-middle (MitM) attack for example, an
economic, political or military advantage using methods attacker within reception range of an
on the Internet, networks or individual computers unencrypted wireless access point (Wi-Fi) could
through the use of proxy servers, cracking techniques insert themselves as a man-in-the-middle.
and malicious software including Trojan
Phishing and spear phishing attacks
horses and spyware.
Spear phishing is an email spoofing attack that
targets a specific organization or individual,
TOP 5 MOST COMMON CYBER-ATTACKS. seeking unauthorized access to sensitive
information.
Denial-of-service (DoS) and distributed denial-of-
service (DDoS) attacks Spear phishing attempts are not typically
initiated by random hackers but are more likely
a denial-of-service attack (DoS attack) is a cyber-
to be conducted by perpetrators out for
attack in which the perpetrator seeks to make a
financial gain, trade secrets or military
machine or network resource unavailable to its
information.
intended users by temporarily or indefinitely
disrupting services of a host connected to Drive-by attacks
the Internet.
Drive-by downloads may happen when visiting
Denial of service is typically accomplished by a website, opening an e-mail attachment or
flooding the targeted machine or resource with clicking a link, or clicking on a deceptive pop-up
superfluous requests to overload systems and window by clicking on the window in the
prevent some or all legitimate requests from being mistaken belief that, for example, an error
fulfilled. report from the computer's operating system
itself is being acknowledged or a seemingly
In a distributed denial-of-service attack (DDoS innocuous advertisement pop-up is being
attack), the incoming traffic flooding the victim dismissed.
originates from many different sources. This
effectively makes it impossible to stop the attack Password attack
simply by blocking a single source.
Is the process which of
Man-in-the-middle (MitM) attack is a Man-in-the- recovering passwords from data that have been
middle (MitM) attack. stored in or transmitted by a computer system.
Attack where the attacker secretly relays and A common approach (brute-force attack) is to
possibly alters the communications between try guesses repeatedly for the password and
two parties who believe they are directly check them against an available cryptographic
communicating with each other. hash of the password.
These threats have been aimed at corporate State-sponsored information and electronically
and government organizations in Vietnam, the delivered actions taken to achieve information
Philippines, Laos, and Cambodia and focus on superiority in support of national military
foreign corporations with interests in Vietnam’s strategy.
manufacturing, consumer products, and
Meant to affect enemy information and
hospitality industries.
information systems while protecting our
China information and information systems.
2. Data Breach – A leak or spill of data which is Frequent instances of Internet fraud include:
released from a secure location to an untrusted 1. Business Fraud - Business fraud consists of
environment. Data breaches can occur at the dishonest and illegal activities perpetrated by
personal and corporate levels and involve individuals or companies in order to provide an
sensitive, protected, or confidential information advantageous financial outcome to those
that is copied, transmitted, viewed, stolen, or persons or establishments. Also known as
used by an individual unauthorized to do so. corporate fraud, these schemes often appear
3. E-Mail Account Compromise (EAC) – Similar to under the guise of legitimate business practices.
BEC, this scam targets the general public and • Charity Fraud
professionals associated with, but not limited • Internet Auction Fraud
to, financial and lending institutions, real estate • Non-delivery of merchandise
companies, and law firms. Perpetrators of EAC • Non-payment of funds
• Overpayment scheme Therefore, computer ethics is set of moral principles
• Re-shipping scheme that regulate the use of computers. Some common
issues of computer ethics include intellectual property
2. Credit Card Fraud - Credit card fraud is the
rights (such as copyrighted electronic content), privacy
unauthorized use of a credit or debit card, or
concerns, and how computers affect society.
similar payment tool (ACH, EFT, recurring
charge, etc.), to fraudulently obtain money or INTRODUCTION TO E-COMMERCE
property. Credit and debit card numbers can be
What is E-commerce? Refers to the buying and selling
stolen from unsecured websites or can be
of goods or services using the internet, and the transfer
obtained in an identity theft scheme
of money and data to execute these transactions.
It is often used to refer to the sale of physical products
online, but it can also describe any kind of commercial
transaction that is facilitated through the internet.
3. Internet Auction Fraud - Internet auction fraud
involves schemes attributable to the The history of E-commerce begins with the first ever
misrepresentation of a product advertised for online sale: on the August 11, 1994 a man sold a CD by
sale through an Internet auction site or the non- the band sting to his friend through his website Net
delivery of products purchased through an Market, An American retail platform.
Internet auction site.
This is the finest example of a consumer purchasing
4. Investment Schemes - Investment fraud product from a business through the World Wide Web –
involves the illegal sale or purported sale of or “E-commerce” as we commonly know it today.
financial instruments. The typical investment
TYPES OF E-COMMERCE
fraud schemes are characterized by offers of
1. Business to Consumer (B2C)
low- or no-risk investments, guaranteed
When a business sells a good or services to an individual
returns, overly-consistent returns, complex
consumer.
strategies, or unregistered securities.
2. Business to Business (B2B)
These schemes often seek to victimize affinity groups—
When a business sells a good or service to another
such as groups with a common religion or ethnicity—to
business
utilize the common interests to build trust to effectively
operate the investment fraud against them. The 3. Consumer to Consumer (C2C)
perpetrators range from professional investment When a customer sells a good or service to another
advisers to persons trusted and interacted with daily, consumer
such as a neighbor or sports coach. The fraudster’s
ability to foster trust makes these schemes so 4. Consumer to Business (C2B)
successful. Investors should use scrutiny and gather as When a consumer sells their own products or services
much information as possible before entering into any to a business or organization.
new investment opportunities. EXAMPLE OF E-COMMERCE
5. Non-delivery of Merchandise - Non-delivery of
merchandise is a scheme most often linked to 1. RETAIL – The sale of product by a business directly to
Internet auction fraud, in which a seller on an a costumer without any intermediary.
Internet auction website accepts payment for 2. WHOLESALE – The sale of product in bulk, often to a
an item yet intentionally fails to ship it. Sellers retailer then sells them directly to consumers.
like these sometimes will relist the item and 3. DROPSHIPPING – The sale of a product, which is
attempt to sell it again through a different manufactured and shipped to the consumer by a third
username. party.
7. DIGITAL PRODUCTS – Downloadable digital goods, - Customers need not to travel to shop a
templates and courses or media that must be product.
purchased for consumption or licensed for use. - Helps reducing the costs of products.
- Enabled rural areas to access services and
8. SERVICES – A skill or set of skills provided in exchange products, which are otherwise not available to
for compensation. them.
- Helps the government to deliver public
SOCIAL ISSUES OF E-COMMERCE
services such as healthcare, education, social
services at a reduce costs and in an improved
1. Security and Privacy – It is the most important issues
manner.
for e-commerce because without security and privacy,
the customer will be scared, get cheated by the seller. ETHICS & PRIVACY
4. Integrity/ Security – requires the information 1. Confidentiality – Only authorized users can access
collected to be stored safely and securely. the data resources and information.
5. Enforcement/ Redress – the above four principles 2. Integrity – Only authorized users should be able to
are enforced. modify the data when needed.
Ways of making personal data more private 3. Availability – Data should be available to users when
1. Install personal firewall. needed.
2. Purchases goods with cash, rather than credit card.
3. Less use of Facebook. 4. Authentication – Are you really communicating with
4. Avoid GPS tags in photo. whom you think you are communicating with?
What is Computer Security? VIRUSES – A malicious program which is loaded into the
user’s computer without user’s knowledge.
Computer Security, also known as cybersecurity or IT
security, is the protection of information systems from COMPUTER WORM – A computer worm is a software
theft or damage to the hardware, the software, and to program that can copy itself from one computer to
the information on them, as well as from disruption or another, without human interaction.
misdirection of the services they provide. PHISHING – Disguising as a trustworthy person or
Often people confuse computer security with other business, phishers attempt to steal sensitive financial or
related terms like information security and personal information through fraudulent email or
cybersecurity. One way to ascertain the similarities and instant messages.
differences among these terms is by asking what is BOTNET – A botnet is a group of computers connected
being secured. to the internet that have been compromised by a
Information Security – Securing information from hacker using a computer virus.
unauthorized access, modification & deletion ROOTKIT – A rootkit is a computer program designed to
Computer Security – Securing a standalone machine by provide continued privileged access to a computer
keeping it updated and patched while actively hiding its presence.
KEYLOGGER – Also known as keystroke logger, Change passwords regularly using a unique
keyloggers can track the real-time acitivity of a user on combination of numbers, letters and case types
his computer.
Use the internet with caution and ignore pop-
What do anti-viruses/ firewalls do to ensure these ups, drive-by downloads while surfing
concerns issues are solved?
Taking the time to research the basic aspects of
FIREWALL - Also known as a ‘packet filter’. Basically, computer security and educate yourself on
software which monitors network traffic and connection evolving cyber-threats
attempts into and out of a network or computer and
Perform daily full system scans and create a
determines whether or not to allow it to pass.
periodic system backup schedule to ensure your
Antivirus - A software which will find data is retrievable should something happen to
programs/files/softwares/etc that might compromise your computer
your computer, either by being executable or by
Social Computing
exploiting a vulnerability in the program normally
supposed to process them - - types of malware. It
An area of computer science that is concerned with the
detects these kinds of harmful programs that are
intersection of social behavior and computational
installed on your computer or about to be installed.
systems. Social computing is the collaborative and
interactive aspect of online behavior.