Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 37

UNIT 3: CURRENT TRENDS AND EMERGING Robotics - Robotic artificial intelligence is where

TECHNOLOGY machines are programmed to imitate a human.

Emerging Technology is a term generally used to 2. Biometrics


describe a new technology, but it may also refer to the Biometrics is where parts of a person's body are
continuing development of an existing technology; it used for identification purposes. Examples are
can have slightly different meaning when used in shown in the table below:
different areas, such as media, business, science, or
Fingerprints - These are impressions embedded at the
education. The term commonly refers to technologies
end of human fingers and thumbs. Fingerprints kept in a
that are currently developing, or that are expected to
database can be matched to those left at crime-scenes
be available within the next five to ten years, and is
to help identify the culprit.
usually reserved for technologies that are creating, or
are expected to create, significant social or economic Eye recognition - Eye scans analyze the iris which is the
effects. colored ring that surrounds the pupil.
Emerging digital technologies have generated new Face recognition -This is where the shapes of
opportunities while creating new legal challenges, individual's faces are analyzed.
particularly related to copyrights, trademarks, patents,
royalties, and licensing. Voice recognition -Pitch, tone and frequency of voices
are unique and can be analyzed to identify people.
Emerging technologies include a variety of technologies
such as educational technology, information 3. Robotics
technology, nanotechnology, biotechnology, cognitive Robots are used to perform a wide range of physical
science, psych technology, robotics, and artificial tasks. They are either automated (controlled by a
intelligence. computer chip) or manually controlled by a human.
INSTRUCTIONAL MATERIALS There are 4 different types of robots:
New Technologies Manufacturing robots (used to perform repetitive
New technologies are those that are currently being tasks such as welding)
developed or will be developed in the next 5 to 10 Carrier robots (used by the military to carry heavy
years, and which will alter the business and social loads over dangerous terrain)
environment."
Domestic robots (used in homes to perform cleaning
1. Artificial Intelligence (AI) - This is a computer tasks such as vacuuming)
science that is focused on creating computer
systems that simulate human intelligence. The Exploration robots (used to visit and send images from
term was first used in 1956 by a computer scientist places such as Mars)
at the Massachusetts Institute of Technology (MIT) Some more typical tasks that robots can be used for
who was focused on trying to make computers are described below:
behave like humans. AI is being developed in the
following areas: Dangerous jobs -E.g., disposing of bombs, spray
painting or cleaning up nuclear waste.
Game Playing - Computers developed to play games
against human players. Exploring extreme environments-E.g., inside
volcanoes, planets, or the depths of the ocean.
Expert Systems - These are computers that have
been programmed to make decisions based on Repetitive manufacturing jobs -E.g., production lines,
information they are given. packing and welding etc.

Languages - This type of AI involves computers that Moving heavy objects - E.g., installing large engines,
can understand different human languages as they are moving pallets of items etc.
spoken to them.
4. Quantum Cryptography 7. Virtual Reality Virtual reality is where computers are
used to create an artificial environment that users
Quantum cryptography (encryption) is an emerging
can interact with as if it were real. Virtual reality is not
technology that allows messages and data to be sent
really meant for gaming purposes. It is used for
with complete privacy.
more serious purposes such as:
Unauthorized people attempting to read the data would
 Allowing architects to walk around a virtual
see illegible nonsense instead of the real information.
version of their design (this gives a better idea
Older methods of encryption were based of what the finished building will look like)
around mathematics, but quantum cryptography uses
 Training soldiers in combat (flight simulation,
physics instead.
battlefield simulation)
This makes the encryption impossible to break.
Training surgeons (virtual patients can be operated on
5. Computer Assisted Translation (CAT)
to provide experience to trainee surgeons).
CAT is where a human translator uses computer
Equipment needed to create the virtual reality
software to help in the translation process.
experience includes the following:
Current CAT tools are not always 100% accurate. They
Eye Goggles - These produce the 3D images that make
need a human to check for errors.
up the artificial world. The goggles project slightly
Spell checkers - These are usually built-into word different views into each eye, and this fools your brain
processing software and can automatically flag-up into thinking that the scene is 3D. Virtual chairs look
spelling errors and suggest translations of miss-spelt solid and so on
words.
Special Gloves - The gloves detect your hand and finger
Translation memory software - Translation memory movements which are input into a
software are databases which store translated text as computer and processed. As users touch or use items in
the human translator works through it to be reused in the virtual world, the computer can carry out these
the future. commands and make them happen. This allows the user
to interact with the virtual world and perform tasks
Language search-engine software - These are Internet such as moving objects or switching on lights etc.
based systems which allow translators to enter any
text that they want translating and to select which Headphones - These control what users hear in the
language they want the text translating into. virtual world.

6. 3D and Holographic Imaging (aka holograms) Powerful Computer - A very powerful computer is
needed to create the virtual environment and to
This is a technique where images are made to appear process/output data sent into the system by the user's
three-dimensional and to have depth. Holograms work actions.
by taking two regular two-dimensional images of
the same object and laying one on top of the other. THE CURRENT TRENDS IN THE SOCIETY

The two-dimensional images need to have been shot at 1. The Technology of the Year Will Be 5G
different angles. Two different types of laser beams are
While artificial intelligence and the internet of things
used to record the two-dimensional images onto
(IoT) get all the attention, 5G could be the technology of
a single photographic plate.
the year in 2019. 5G, which could improve processing
This creates one single image that incorporates the speeds by more than 10 times and could enable
angles of the original two-dimensional images. This remote surgeries and Uber’s announced food delivery
produces a 3D effect. When viewing the image, human drones. In fact, 5G is so important that China, South
eyes see it from slightly different angles. The brain Korea, and the U.S. are embroiled in an arms race to be
combines them into a three-dimensional image. first to market. 5G enabled smartphones are on track to
take over the mobile industry in 2019. Samsung,
OnePlus, Xiaomi, Motorola, and Huawei are among the devices are expected to be lightweight, unbreakable,
leading mobile phone developers that are vying to and compact.
launch 5G enabled mobile sets this year.
Several companies—Apple, Motorola, LG, Huawei, and
2. Bots Will Revolutionize Customer Service Samsung—are in a race to launch first generation
foldable phones with flexible screens in 2019. In the
Research from Gartner, Inc., shows that the use of
meantime, LG has stolen a march over its competitors
chatbots in customer service will have increased 10
by unveiling its rollup, ultra-high-definition TV earlier
times between 2017 and 2020, and bots can reduce
this week at the Consumer Electronics Show in Las
customer inquiries by up to 70%.
Vegas. Royole debuted its Flexi Pal bendable tablet at
3. E-Commerce Grows at A Torrid Pace the same venue.

E-commerce is expected to grow 20%, on pace with its 7. Personalized and predictive medicine
2017-2018 growth rate. More and more, even
Technology is currently transforming healthcare at an
traditional brands are considering direct-to-consumer
unprecedented rate. Our ability to capture data from
to be a channel they can’t ignore.
wearable devices such as smartwatches will give us the
4. Insurance (finally) Enters the Digital Age ability to increasingly predict and treat health issues in
people even before they experience any symptoms.
This will be a standout year for insurance. Insurers will
actively embrace new markets (smart cities, When it comes to treatment, we will see much more
autonomous vehicles, connected living, and the elderly), personalized approaches. This is also referred to as
products (insurance for shared workspaces, working precision medicine which allows doctors to prescribe
from home, automotive pay-per-mile, and cyber- medicines and apply treatments, thanks to a data-
protection), technologies (block chain, virtual reality driven understanding of how effective they are likely to
(VR)/augmented reality (AR), and AI), business models be for a specific patient more precisely.
(Prevention-as-a-Service, usage based car insurance,
and on-demand insurance), and operations (increased
automation, shifts in core systems, and even personnel UNDERSTAND THE IMPACT OF EMERGING
and culture shifts). TECHNOLOGY

5. Marketplaces Everywhere WHAT IS ARTIFICIAL INTELLEGENCE?

Get ready for marketplaces everywhere. The fourth Artificial intelligence (AI) is the ability of a computer
generation of marketplace business models will be program or a machine to think and learn. It is also a
focused on the service sector. Three converging trends field of study which tries to make computers "smart".
will drive their rapid expansion. Firstly, the over five They work on their own without being encoded with
billion connected devices and nearly 230 billion app commands. John McCarthy came up with the name
downloads expected in 2019 will lead to an increase in "artificial intelligence" in 1955. In general use, the term
mobile based marketplace models for services. "artificial intelligence" means a programmed which
mimics human cognition. At least some of the things we
China and India will lead the way here, primarily
associate with other minds, such as learning and
because of their growing app economy. Secondly,
problem solving can be done by computers, though not
technologies like block chain will transform online
in the same way as we do. Andreas Kaplan and Michael
payment systems. Thirdly, a surging on-demand
Haenlein define AI as a system’s ability to correctly
economy will fuel the expansion and diversification of
interpret external data, to learn from such data, and to
digital service marketplaces.
use those learnings to achieve specific goals and tasks
6. Bendable Devices Make Their Debut through flexible adaptation.

Hone up on your origami because 2019 will see the HISTORY OF ARTIFICIAL INTELLEGENCE
launch of foldable phones with flexible screens,
History of AI The first patent for the invention of the
replacing convertible or detachable devices. These
telephone happened in 1876 and AI was introduced at a
much later stage. In true terms, the field of AI research with cognitive intelligence, emotional intelligence, and
was founded at a workshop held on the campus of social intelligence. An AI system with artificial general
Dartmouth College during the summer of 1956. At that intelligence is either self-conscious, self-aware, or both.
time, it was predicted that a machine as intelligent as a This system will demonstrate seamless capabilities of
human being would exist in no more than a generation machine-to-human and machine-to-machine
and they were given millions of dollars to make this interactions that replicate normal human-to-human
vision come true. interactions.

Investment and interest in AI rose in the first decades of TYPES OF ARTIFICIAL INTELLEGENCE
the 21st century. From that time, Machine Learning was
1. Reactive machines
successfully applied to many problems in academia and
industry due to the presence of a powerful computer. The most basic types of AI systems are purely reactive
and have the ability neither to form memories nor to
1950 – The time when it all started, so now this
use past experiences to inform current decisions. Deep
concept has been around for decades but, until 1950,
Blue, IBM’s chess-playing supercomputer, which beat
people were unaware of the term. John McCarthy who
international grandmaster Garry Kasparov in the late
is known as the founder of Artificial Intelligence
1990s, is the perfect example of this type of machine.
introduced the term ‘Artificial Intelligence’ in the year
Deep Blue can identify the pieces on a chess board and
1955. McCarthy along with Alan Turing, Allen Newell,
know how each move. It can make predictions about
Herbert A. Simon, and Marvin Minsky is known as the
what moves might be next for it and its opponent.
founding fathers of AI. Alan suggested that if humans
use available information, as well as reason, to solve 2. Limited memory
problems to make decisions – then why can’t it be done
with the help of machines? This Type II class contains machines can investigate the
past. Self-driving cars do some of this already. For
1974 – Computers flourished! Gradually with time, the example, they observe other cars’ speed and direction.
wave of computers started. With time, they became That can’t be done in a just one moment, but rather
faster, more affordable, and able to store more requires identifying specific objects and monitoring
information. The best part was that they could think them over time. These observations are added to the
abstractly, able to self-recognize and achieved Natural self-driving cars’ preprogrammed representations of the
Language Processing. world, which also include lane markings, traffic lights
and other important elements, like curves in the road.
1980 – The year of AI In 1980, AI research fired back up
They’re included when the car decides when to change
with an expansion of funds and algorithmic tools. With
lanes, to avoid cutting off another driver or being hit by
deep learning techniques, the computer learned with
a nearby car.
the user experience.
3. Theory of Mind
2000’s – Landed to the Landmark After all the failed
attempts, the technology was successfully established Machines in the next, more advanced, class not only
but, until it was in the 2000s that the landmark goals form representations about the world, but also about
were achieved. At that time, AI thrived despite a lack of other agents or entities in the world. In psychology, this
government funds and public attention. is called “theory of mind” – the understanding that
people, creatures, and objects in the world can have
Artificial General Intelligence
thoughts and emotions that affect their own behavior.
The utmost and long-term goal of artificial intelligence This is crucial to how we humans formed societies
as a field is artificial general intelligence or AGI. AGI because they allowed us to have social interactions.
demonstrates the capability of an AI system to perform
4. Self-Awareness
any intellectual task that a human can perform. In
consideration of the three types of AI systems This is, in a sense, an extension of the “theory of mind”
introduced by Andreas Kaplan and Michael Heinlein, possessed by Type III artificial intelligences.
AGI demonstrates a humanized AI system equipped Consciousness is also called “self-awareness” for a
reason. (“I want that item” is a very different statement information gathered. Autonomous vehicles are with
from “I know I want that item.”) Conscious beings are advanced tool to gather information, including long
aware of themselves, know about their internal states, range radar, cameras, and LIDAR. Each of the
and can predict feelings of others. We assume someone technologies are used in different capacities and each
honking behind us in traffic is angry or impatient, collects different information. This information is
because that’s how we feel when we honk at others. useless, unless it is processed, and some form of
information is taken based on the gathered information.
APPLICATION OF AI ARTIFICIAL INTELLIGENCE
This is where artificial intelligence comes into play and
1. Artificial Intelligence in Healthcare can be compared to human brain. AI has several
applications for these vehicles and among them the
Companies are applying machine learning to make more immediate ones are as follows: Directing the car
better and faster diagnoses than humans. One of the to gas station or recharge station when it is running low
best-known technologies is IBM’s Watson. It on fuel. Adjust the trips directions based on known
understands natural language and can respond to traffic conditions to find the quickest route. Incorporate
questions asked of it. The system mines patient data speech recognition for advanced communication with
and other available data sources to form a hypothesis, passengers. Natural language interfaces and virtual
which it then presents with a confidence scoring assistance technologies.
schema. AI is a study realized to emulate human
intelligence into computer technology that could assist 5. AI for Robotics
both, the doctor and the patients in the following ways:
Will allow us to address the challenges in taking care of
By providing a laboratory for the examination,
an aging population and allow much longer
representation and cataloguing medical information by
independence. It will drastically reduce, may be even
devising novel tool to support decision making and
bring down traffic accidents and deaths, as well as
research By integrating activities in medical, software
enable disaster response for dangerous situations for
and cognitive sciences By offering a content rich
example the nuclear meltdown at the fukushima power
discipline for the future scientific medical communities.
plant.
2. Artificial Intelligence in business
ADVANTAGE OF AI (ARTIFICIAL INTELLIGENCE)
Robotic process automation is being applied to highly
1. Reduction in Human Error
repetitive tasks normally performed by humans.
Machine learning algorithms are being integrated into The phrase “human error” was born because humans
analytics and CRM (Customer relationship make mistakes from time to time. Computers, however,
management) platforms to uncover information on how do not make these mistakes if they are programmed
to better serve customers. Chatbots have already been properly. With Artificial intelligence, the decisions are
incorporated into websites and e companies to provide taken from the previously gathered information
immediate service to customers. Automation of job applying a certain set of algorithms. So, errors are
positions has also become a talking point among reduced and the chance of reaching accuracy with a
academics and IT consultancies. greater degree of precision is a possibility.

3. AI ARTIFICIAL INTELLIGENCE in education 2. Takes risks instead of Humans

It automates grading, giving educators more time. It can This is one of the biggest advantages of Artificial
also assess students and adapt to their needs, helping intelligence. We can overcome many risky limitations of
them work at their own pace. humans by developing an AI Robot which in turn can do
the risky things for us. Let it be going to mars, defuse a
4. AI ARTIFICIAL INTELLIGENCE in Autonomous
bomb, explore the deepest parts of oceans, mining for
Vehicles
coal and oil, it can be used effectively in any kind of
Just like humans, self-driving cars need to have sensors natural or man-made disasters.
to understand the world around them and a brain to
3. Available 24x7
collect, processes and choose specific actions based on
An Average human will work for 4–6 hours a day 1. High Costs of Creation - As AI is updating every day
excluding the breaks. Humans are built in such a way to the hardware and software need to get updated
get some time out for refreshing themselves and get with time to meet the latest requirements.
ready for a new day of work and they even have weekly Machines need repairing and maintenance which
offed to stay intact with their work-life and personal need plenty of costs. Its creation requires huge
life. But using AI we can make machines work 24x7 costs as they are very complex machines.
without any breaks and they don’t even get bored,
2. Making Humans Lazy - AI is making humans lazy with
unlike humans.
its applications automating much of the work. Humans
4. Helping in Repetitive Jobs tend to get addicted to these inventions which can
cause a problem to future generations.
In our day-to-day work, we will be performing many
repetitive works like sending a thanking mail, verifying 3. Unemployment - As AI is replacing most of the
certain documents for errors and many more things. repetitive tasks and other works with robots, human
Using artificial intelligence, we can productively interference is becoming less which will cause a major
automate these mundane tasks and can even remove problem in the employment standards. Every
“boring” tasks for humans and free them up to be organization is looking to replace the minimum qualified
increasingly creative. individuals with AI robots which can do similar work
with more efficiency.
5. Digital Assistance
4. No Emotions - There is no doubt that machines are
Some of the highly advanced organizations use digital
much better when it comes to working efficiently but
assistants to interact with users which save the need
they cannot replace the human connection that makes
for human resources. The digital assistants also used in
the team. Machines cannot develop a bond with
many websites to provide things that users want. We
humans which is an essential attribute when comes to
can chat with them about what we are looking for.
Team Management.
Some chatbots are designed in such a way that it’s
become hard to determine that we’re chatting with a 5. Lacking Out of Box Thinking - Machines can perform
chatbot or a human being only those tasks which they are designed or
programmed to do, anything out of that they tend to
6. Faster Decisions
crash or give irrelevant outputs which could be a major
Using AI alongside other technologies we can make backdrop.
machines take decisions faster than a human and carry
MAJOR GOALS AND FIELDS OF ARTIFICIAL
out actions quicker. While taking a decision human will
INTELLIGENCE
analyze many factors both emotionally and practically
but AI-powered machine works on what it is 1. Knowledge Representation and Reasoning
programmed and delivers the results in a faster way.
Knowledge representation and reasoning, also known
7. Daily Applications as KR&R or KR, is a specific field within artificial
intelligence focusing on designing and implementing
Daily applications such as Apple’s Siri, Window’s
computer representations that can process information
Cortana, Google’s OK Google are frequently used in our
about the world to solve complex problems. As one of
daily routine whether it is for searching a location,
the major goals of AI, KR&R specifically aims to
taking a selfie, making a phone call, replying to a mail
automate different kinds of reasoning. It involves the
and many more.
codification of factors or relationships between ideas,
8. New Inventions or rules or transitions between sets of facts in a manner
that can be interpreted by a computer system. Some of
AI is powering many inventions in almost every domain the applications of knowledge representation and
which will help humans solve most complex problems. reasoning include computer-aided diagnosis for
DISADVANTAGE OF ARTIFICIAL INTELLIGENCE assisting physicians interpret medical images, as well as
natural-language user interface that involves using
human language as input for interacting with computers also one of the traditional problems of AI, NLP aims to
or software. develop and implement computer systems, particularly
computer programs that can process large amounts of
2. Automated Planning and Scheduling
natural language data. Achieving this aim means
Sometimes called as AI planning, automated planning overcoming challenges such as speech recognition,
and scheduling is another subset and field of artificial natural language processing, and natural language
intelligence concerned with the automated generation generation. Intelligent assistant services such as Google
of action sequences that correspond to strategies that Now and the Siri application from Apple Inc. use natural
can be executed by an AI system such as unmanned language processing, along with other subsets of
vehicles or autonomous robots. As one of the artificial intelligence such as machine learning and
traditional problems of AI research, AI planning aims to knowledge representation and reasoning.
mechanize and automate the generation of a plan
5. Computer Vision
based on predetermined goals and objectives, and a set
of possible actions. Note that it is also one of the Computer vision involves acquiring and understanding
fundamental abilities needed to increase the autonomy visual data from still or moving digital images or live
and flexibility of AI systems. images from the real world to process them in a manner
that AI systems can utilize to make decisions. The aim of
Examples of AI planning include self-correcting
computer vision, as one of the major problems in AI
computer programs or software applications, robots
research, centers on the computerization and
that serve as autonomous agents, automated
automation of tasks that can be performed naturally by
information gathering, and computer-aided
human vision, as well as the development of systems
suggestions.
that can process, interpret, and utilize visual data. Facial
3. Machine Learning recognition is one of the notable applications of
computer vision. Other applications include video
Machine learning is both a specific field of artificial tracking, automated image manipulation, object
intelligence and an actual application of AI. As a field of recognition, and integration with virtual reality and
discipline, it involves the study of algorithms and augmented reality.
statistical models that computer systems use to
perform a specific task without using explicit 6. The Rise of Robotics
instructions effectively. Central to the concept of
While technological advances in the previous century
machine learning is a different approach to computer
mainly displaced uneducated laborers, the 21st century
programming. To be more specific, it involves the
is seeing technology increasingly threatening skilled
development and use of computer algorithms that can
workers' jobs as well.
process and analyze Big Data and learn from the
outcome without being explicitly programmed. The Ford believes that unlike previous centuries, the current
benefits of machine learning include supplementing emerging technologies will fail to generate new forms
data mining, continuous improvements, and of employment; he predicts that new industries will
automation of tasks. Real-world applications include "rarely, if ever, be highly labor-intensive". Companies
search engine ranking, content delivery, online like YouTube and Instagram are based on "tiny
advertising, autonomous driving, and intelligent workforces and huge valuations and revenues". Ford
assistant, among others. downplays the benefits of expanding education ("The
problem is that the skills ladder is not really a ladder at
4. Natural Language Processing
all: it is a pyramid, and there is only so much room at
Another major goal and subset of artificial intelligence is the top") and argues for a "dramatic policy response"
natural language processing or NLP. It deals with the such as a guaranteed basic income.
analysis and generation of languages that humans use
Many economists disagree with Ford's thesis that the IT
naturally to interface with computers. In other words,
revolution is fundamentally different from previous
NLP is about human-computer interaction using natural
technological revolutions. Libertarian economist Robin
language instead of computer language. Because it is
Hanson argues that the recent ominous labor trends
may have causes other than automation, such as -Fingerprint access to buildings have been replacing the
"demographics, regulation, worker values, organization older methods of locks and keys.
practices, and other technologies.
-This method ensures that only authorized people can
 Artificial Intelligence (AI) enter restricted buildings or rooms.

Accurate prediction of weather Reduced car theft

-AI software will soon be used to sift through weather -Cars already exist that use fingerprints to only unlock
data more accurately that humans can and will be used their doors or start the engine for the fingerprint that is
to predict approaching storms and automatically issue registered.
warnings.
-This means that the doors will not unlock for a print
Increased leisure time that is not recognized and makes the car harder to
steal.
-Robotic vacuum cleaners are becoming more and more
popular. These can detect walls and other objects to More secure mobile phones
vacuum around them.
-Mobile phones contain our lives. We used our phones
-People can leave them running whilst they enjoy extra for everything from social media to shopping online.
spare time. They need to be as secure as possible to protect the
valuable data that they contain.
Safer transport -Cars that can self-park already exist,
and it is predicted that cars that drive themselves will -Apple recently released an iPhone model that uses a
be available soon. These could drastically reduce road fingerprint reader to identify the true owner of the
accidents. phone. It will not unlock for a fingerprint that it does
not recognize.
-Driverless trains already exist in some countries!
3. Robotics
Increased Personal safety
Increased personal time
-Modern home alarm systems use artificial intelligence
software that can tell the difference between the -If robots can carry out domestic chores, this frees up
homeowners and intruders. more time for us to spend as we wish.

-The software automatically alerts the police when -This could mean more time spent at work or for more
intruders are detected. enjoyable activities such as socializing.

Improved medical care More efficient manufacturing

-Robotic surgery assistants are being used to pass the -Robots can manufacturer products such as cars much
correct surgical tools quickly and accurately to doctors. faster and cheaper than humans can.

-The few seconds saved in getting the correct tool to -This means that companies can make more products
the doctor can save patient's lives. at less cost, and this means greater business profits.

2. Biometrics Loss of jobs

Better airport security -Due to higher and cheaper productivity, robots are
taking over the manufacturing jobs that used to be
-Iris recognition is already in use in some airports.
carried out by humans.
-Travelers have their eyes and iris scanned into a
-This means that humans are missing out on
system and this data is later matched up when the
employment on assembly lines and factory work.
person is performing airport checks.
Safer working environments
Increased building security
-Robots can safely carry out tasks that are too -Anyone with an Internet connection can access tools
dangerous for humans. such as Google Translate and the vast collection of
language databases that the tools can search through.
-For example: spraying cars with toxic paint, defusing
bombs on battlefields and search and rescue operations -This makes accessing other languages much easier than
in buildings destroyed by earthquakes. in the past and makes it easier for people to learn these
new languages.
4. Quantum Cryptography
Quicker and more efficient translations
Completely secure voting
-Foreign visitors to countries can be communicated with
-Citizens of countries have the right to vote-in new
much easier through these CAT tools. -They are
governments but history is littered with examples of
especially useful in places like embassies where a wide-
where these votes have been tampered with to
range of foreign visitors may need to communicate with
influence election outcomes.
local officials about problems or ask for advice etc.
-Securing votes with quantum encryption methods
6. 3D and Holographic Imaging (aka holograms)
ensures that they cannot be tampered with or changed
Improved security
Completely secure communication
-Credit cards, ID cards, software and some bank notes
-Messages sent by the military often include the
include holograms as a way of trying to prevent forged
locations of squadrons or special op's teams. If enemy
duplicates being created.
forces intercepted these messages, it could have severe
consequences. Better movie experiences

-Using quantum cryptography to secure the messages -Hollywood have been using 3D imaging within the
would eliminate the risk of them being read or heard by production of movies for many years.
unauthorized ears.
-These provide the viewer with a much more immersive
Completely secure bank transfers experience.

-Any electronic transfer of money, such as at ATM's or Greater data storage


buying goods online, will be completely secure.
-It is thought that the technology behind holograms will
-Some banks are already using quantum cryptography eventually be used to provide the means to store large
for the purposes of securing money transfers amounts of data.
*Completely secure personal information
-Companies have already produced discs that use
-Health records, bank details and other types of holographic layers that each have the potential to hold
personal information will be secure from hackers and a massive 3.9 terabytes.
other people wishing to commit identity theft crimes.
7. Virtual Reality
5. Computer Assisted Translation (CAT)
Improved medical surgeons
More accurate documents
-Surgeons can be trained using virtual patients. This
-Spell checkers can quickly scan your word-processed allows them to practice over and over until they have
documents and automatically find spelling errors. perfected a particular surgery without risk to a real
patient.
-Miss-spelt words can be quickly corrected to produce
an error-free document. Larger and stronger buildings

A more multilingual society -Virtual buildings allow architects to walk around to


experience what the building would look like when
completed and check for potential errors before the
actual building is constructed.
-Virtual buildings will also be able to be tested against applications so that they don't have to wait for IT, to
factors such as earthquakes to see what effects they grow in 2019
would have on the current design.
Drones and drone ops centers - The companies most
-This allows architects to modify designs quickly and likely to use drones will include those with logistic
cheaply and will, potentially, allow for the development challenges such as areas of terrain that are risky or
of much larger and safer buildings than we currently difficult to traverse or agencies and/or insurance
have. companies that need to oversee disaster and accident
sites.
More effective treatment of phobias
Virtual workers - Virtual workers are essentially a type
-VR is being used to help patients overcome phobias
of freelance worker who works on a remote basis for
and anxieties.
your company. You do not hire the virtual employee as
-People can experience a tame, controlled version of you would with a regular full-time employee. Instead,
what they are afraid of. Slowly the person becomes the individual works on tasks that you assign for a
used to the situation and can relax. specific fee, as an independent contractor. For years, IT
has used consultants and contract programmers to
Training in dangerous situations make up for staff talent shortfalls. With talent shortfalls
-VR can be used for training in dangerous situations so acute in areas like data science, analytics, security,
where it is impossible to practice the real thing. *More etc., there will be a continued move toward virtual
realistic education workers who aren't employed by the company.

-VR can give students the opportunity to learn in a Self-powered data centers - we can expect to see the
much more interactive way. results of early data center pilots that take the data
center entirely off the energy grid, with data centers
CONVERGING COMMUNICATION TECHNOLOGIES running its own self-contained power plants.
Convergence in communication technologies means Cloud-independent edge computing - Age-old
that different kinds of communication technologies are distribute computing will make a comeback as
coming closer to each other. During the past few companies realize that the computing, they are moving
decades of rapid technological advancements, the to at the edge is run more efficiently locally and on real
boarders between telecommunications, the Internet hardware—and not on the cloud.
and mass media are receding. The convergence of
communication technologies means one terminal de- IoT integration - More organizations will proceed with
vice, for example a mobile telephone or a digital televi- IoT implementations in 2019. An emerging concern will
sion can be used for various services. be how well different IoT devices from varying vendors
can interoperate. IT wants a single plane of IoT
Emerging software technologies management.
Emerging technologies are technologies whose More self-service IT for business users - the idea of a
development, practical applications, or both are still self-service kiosk filled with IT tools, apps, and resources
largely unrealized, such that they are figuratively that users could choose from. Already vetted for proper
emerging into prominence from a background of access, clearances, and security, the self-service IT kiosk
nonexistence or obscurity. These technologies are would enable users to log on and choose what they
generally new but also include older technologies that want for the apps that they build
are still controversial and relatively undeveloped in
potential According to Tech republic here are 8 Convergence of AI, machine learning and deep
emerging Technology trends you can expect to see in learning - continued progress toward the integration of
2019. AI, machine learning, and deep learning in business
applications. AI will deliver first line-of-response
Citizen development - Expect citizen development, business insights from data it analyzed with a baseline
where business users’ development their own of algorithms.
Future of Computing its warehouse facilities with the task of organizing items
and making warehouse operations more efficient.
In the last two decades advances in computing
technology, from processing speed to network capacity 2. New-wave nuclear power
and the internet, have revolutionized the way scientists
Advanced fusion and fission reactors are edging closer
work. Modern computers are found everywhere:
to reality. New nuclear designs that have gained
homes, offices, businesses, hospitals, and schools, to
momentum in the past year are promising to make this
name a few. Contemporary society has become so
power source safer and cheaper. Among them are
dependent on computers that many people become
generation IV fission reactors, an evolution of
frustrated and unable to function when computers are
traditional designs; small modular reactors; and fusion
"down." Because of this dependence, computers are
reactors, a technology that has seemed eternally just
regarded as essential tools for everything from
out of reach.
navigation to entertainment.
3. Predicting preemies
Technological Breakthroughs
A simple blood test can predict if a pregnant woman is
1. Robot dexterity
at risk of giving birth prematurely. Our genetic material
Robots are teaching themselves to handle the physical lives mostly insid e our cells. But small amounts of “cell-
world. For all the talk about machines taking jobs, free” DNA and RNA also float in our blood, often
industrial robots are still clumsy and inflexible. A robot released by dying cells. In pregnant women, that cell-
can repeatedly pick up a component on an assembly free material is an alphabet soup of nucleic acids from
line with amazing precision and without ever getting the fetus, the placenta, and the mother.
bored—but move the object half an inch, or replace it
4. Custom cancer vaccines
with something slightly different, and the machine will
fumble ineptly or paw at thin air. The treatment incites the body’s natural defenses to
destroy only cancer cells by identifying mutations
Robotics-as-a-service (RaaS)
unique to each tumor. Scientists are on the c usp of
Robotics-as-a-service is about to eat the world of work. commercializing the first personalized cancer vaccine. If
While much of the attention in the world of automation it works as hoped, the vaccine, which triggers a person’s
technology has been focused on self-driving cars, many immune system to identify a tumor by its unique
other markets traditionally dominated by human-in-the- mutations, could effectively shut down many types of
loop solutions are reaching a point of inflection, cancers.
enabling RaaS solutions to take over.
5. An ECG on your wrist
Robotics
ECG-enabled smart watches, made possible by
Another one of the major goals and thus, one of the new regulations and innovations in hardware and
subsets and fields of artificial intelligence is robotics. software, offer the convenience of a wearable device
Note that robotics is an interdisciplinary branch of with something closer to the precision of a medical one.
engineering and science that include computer science,
6. Sanitation without sewers
electronic engineering, mechanical engineering, and
information engineering. Robotics is about the design, Researchers are working to build a new kind of toilet
construction, and operation of machines or robots that that’s cheap enough for the developing world and
can replicate human actions and replace human tasks cannot only dispose of waste but treat it as well. These
with mechanical tasks. The integration of computer energy-efficient toilets can operate without a sewer
science and AI in robotics corresponds to equipping system and treat waste on the spot.
robots with sensory feedback and information
capabilities to allow them to operate autonomously. 7. Smooth-talking AI assistants
Current research in robotics aims to introduce A virtual assistant, also called AI assistant or digital
commercial, domestic, and military applications. Online assistant, is an application program that understands
retailer Amazon has been using autonomous robots in
natural language voice commands and completes tasks producing their goods through mass production in
for the user. factories.

Why should the world care about the future of Impact of Computers on Work
computing?
One of the ways that computers have made an impact
Today computers are in virtually everything we touch, on society is in how people have organized themselves
all day long. We still have an image of computers as in workplace groups in relationship to computers. The
bein g rectangular objects either on a desk, or these earliest computers were developed to perform specific
days in our pockets; but computers are in our cars, tasks in science, engineering, or warfare that had
they’re in our thermostats, they’re in our refrigerators. previously been done by hand. Soon general-purpose
In fact, increasingly computers are no longer objects at computers could automate almost any information
all, but they suffuse fabric and virtually every other processing task required to manage an organization,
material. Because of that, we really do need to care such as payroll processing and record management.
about what the future of computing holds because it is However, since early generation computers were
going to impact our lives all day long. relatively expensive, all of an organization's information
processing tasks were typically centralized around the
What will computing look like in the Future?
one large computer it could afford. Departments and
We have no idea yet because change is happening so people in such organizations would likewise be
quickly. But I’m sure with the help of science and organized in a centralized fashion to facilitate their
technology and computers we can build more things access to the computer. Companies with centralized
that will change the world. information processing, for example, usually had most
of their administrative offices in the same geographic
Introduction location as their computer resources.
Computing technologies, like most other forms of Objectives
technology, are not socially neutral. They affect and are
themselves affected by society. Computers have As a department of the main concerns is that we form
changed the way people relate to one another and their professionals to become leaders in their respective
living environment, as well as how humans organize fields and performance from your area of interest can
their work, their communities, and their time. Society, contribute importantly to the improvement of their
in turn, has influenced the development of computers organizations, and therefore to society as a whole. It is
through the needs people have for processing also one of our objectives is that our students can help
information. The study of these relationships has come improve the competitiveness of enterprises in our
to be known as "social informatics." country, that through the use and development of
appropriate technologies, these can be inserted in a
Computing technology has evolved as a means of better way within the contemporary market
solving specific problems in human society. The earliest requirements that require.
kinds of computational devices were the mechanical
calculators developed by Blaise Pascal (1623–1662) in Some of the major computer application fields are
1645 and Gottfried Leibniz (1646–1716) in 1694 for listed below.
solving the navigational and scientific problems that
 An aid to management: The computer can also be
began to arise as Europe entered a new and heightened
used as a management tool to assist in solving
period of scientific development and international
business problems.
commerce. In 1801 Joseph-Marie Jacquard (1752–
1834) invented perhaps the first type of programmed  Banking: Branches are equipped with terminals
machine, called Jacquard's Loom, in order to automate giving them an online accounting facility and
the weaving of cloth with patterns. Jacquard was enabling them to information as such things as
motivated by the desire of capitalists in the early current balances, deposits, overdrafts and interest
Industrial Age who wanted to reduce the cost of charges.
 Industrial Application: In industry, production may o Increased Unemployment.
be planned, coordinated and controlled with the aid o Huge data and information can be lost
of a computer. sometimes.
o Fast changing computer technology.
 Engineering Design: Computer help in calculating
o Service distribution.
that all the parts of a proposed design are
o Illiteracy of computing and computers.
satisfactory and also assist in the designing.
Current Breakthrough Technologies and Disruptive
 Meteorology: Data is recorded at different levels of
Innovations
atmosphere at different places, using remote
sensors carried on a satellite. So many new technologies have appeared in the past
half century that it’s impossible to list them all.
 Air Travel: Small computers are installed as a part
of the plane's equipment. 10 High-tech Breakthroughs stand out over the last 50
years
 Road Traffic Control: Computers assist with the
control of traffic lights. 1. Organ transplants.
 Telephones: Computerized telephone exchanges In 1954, Dr. Joseph Murray removed the kidney from
handle an ever increasing volume of calls very one human patient and implanted it in another. The
efficiently. recipient accepted the kidney as its own rather than
rejecting it as a foreign body. It was more than skillful
 Medicine: Computers are widely used in hospitals
surgery: Murray had chosen a pair of identical twins,
for such task as maintaining drugs, surgical
Ronald Herrick and his terminally ill brother Richard, in
equipments and linen, for payroll and also for
hopes their similar genetic makeup would reduce the
checkup and treatment of diseases.
likelihood of Richard’s body rejecting Ronald’s liver.
In addition computers are also used for recording and
Soon afterward, though, other researchers developed
film studios, research, military, etc.
drugs that could squelch a transplant recipient’s
Computers have both positive and negative impact in immune system long enough for the new organ to
our daily life as well as in our social life. But the gross become incorporated into its new body.
development of the nation is faster with the application
2. Robots and artificial intelligence.
of computers in industries and education.
The term “robot” was coined by Czechoslovakian
The both positive and negative impacts of computers
playwright Karel Capek in 1920 “robota” being a Czech
are listed below.
word for tedious labor but the first real industrial robot
Positive Impact of Computer was built in 1954 by George Devol.

o The work can be done in very less time. Five years later, the Massachusetts Institute of
o More information can be stored in small space. Technology founded its Artificial Intelligence Laboratory
o Multitasking and multiprocessing capabilities of in a quest to mechanically mimic human minds as well
data. as hands.
o Easy to access data. Today, robots assemble products better, faster and
o Impartiality. often cheaper than manual laborers, while more than 8
o Documents can be kept secret. million U.S. airline flights a year are scheduled, guided
o Error free result. and flown with the superhuman assistance of advanced
Negative Impact of Computer software.

o Highly expensive. 3. Electronic funds transfer.


o Accidents. The Federal Reserve Bank of San Francisco set up a
o Data piracy. paperless transfer system with the Los Angeles branch
in 1972. By the end of the decade, instantaneous messages with friends across the country, while still
transfers of millions of dollars in value between banks, looking busy.
insurance companies and other financial institutions
8. Digital media.
had become common.
“The camera doesn’t lie” went a saying not heard much
The real appeal of EFT today is its trickle down to the
since the release of Photoshop 1.0 in 1990. Digitized
individual: You get grab cash fromyour bank account
audio, pictures, movies, and text let even an amateur
anywhere in the world and use PayPal to buy and sell
edit reality or conjure it from scratch with a keyboard
stuff on eBay without sending money or checks through
and a mouse. A singer’s bad notes, a model’s blemishes,
the mail.
or an overcast sky in a movie scene can be fixed as
4. Nuclear power. easily as a spelling error.

When the Queen herself threw the switch on the Just as important, digital media can be copied over and
world’s first atomic power plant at Calder Hall outside over nearly for free, stored permanently without fading,
London in 1956, nuclear reactors were seen as a source and sent around the world in seconds.
of cheap, pollution-free energy. But a partial meltdown
9. Genetic engineering.
in 1979 at the Three Mile Island reactor in Pennsylvania
soured Americans on nukes as safe power. Everyone knows Watson and Crick, who unraveled the
secret of DNA in 1953. But have you heard of Boyer and
5. Mobile phones.
Cohen, who constructed the first organism with
The idea for cellular phone service dates back at least to combined DNA from different species in 1973? They
1947, but the first call was made from the sidewalk inserted toad genes into a bacterium that then
outside the Manhattan Hilton in 1973 by Martin Cooper, replicated itself over and over, passing the toad’s
a Motorola researcher who rang up his rival at AT&T genetic code down through generations of bacteria.
Bell Labs to test the new phone.
Thirty years later, an estimated 70 percent of processed
6. Space flight. foods contain genetically modified ingredients, such as
soybeans or corn engineered for higher crop yields. Of
Americans from 50 years ago would be disappointed to
course, the much bigger potential good and bad is in
learn we never went further than the Moon no Mars
engineering humans. It might prevent birth defects, and
colony, no 2001 odyssey to Jupiter, no speed-of-light
diseases later in life. But the side effects could be
spaceships. Even the Shuttle is in trouble.
disastrous and unknown. Is there an ethical way to
But the space race against the Russians that dominated beta-test human beings?
the national psyche (and a good chunk of the budget) in
10. The Internet.
the ‘60s and ‘70s pushed the development of hundreds
of enabling technologies, including synthetic fibers and This one seems like a no-brainer, but the Net’s unique
integrated computer circuits, necessary to fly men to strength is that no two people will agree on why it’s so
the Moon and back. important. The world’s largest and most unruly library,
it’s also a global news channel, social club, research
7. Personal computers.
archive, shopping service, town hall, and multimedia
Before IBM recast the desktop computer from kiosk. Add to that the most affordable mass medium
hobbyist’s gadget to office automation tool in 1983 ever, and a curse to anyone with a secret to keep.
followed by Apple’s people-friendly Macintosh a year
Paul Boutin is a technology writer for wired magazine
later a “minicomputer” was the size of a washing
and Slate. He has worked as a software engineer and
machine and required a special air-conditioned room.
manager at MIT and in Silicon Valley. © 2013 MSNBC
But the trained technicians who operated the old Interactive.
mainframes already knew computers were cool: They
Disruptive Innovation
could use them to play games, keep diaries, and trade
A disruptive technology or disruptive innovation is an New-market disruptions induce incumbents to ignore
innovation that helps create a new market and value the attackers, and low-end disruptions motivate the
network, and eventually goes on to disrupt an existing incumbents to flee the attack.
market and value network.

The term is used in business and technology literature


to describe innovations that improve a product or
service in ways that the market does not expect. UNIT 4: INTERNET CENSORSHIP AND FREEDOM OF
EXPRESSION
Although the term disruptive technology is widely used,
disruptive innovation seems a more appropriate term in Internet censorship is the control or suppression of
many contexts since few technologies are intrinsically what can be accessed, published, or viewed on the
disruptive; rather, it is the business model that the Internet enacted by regulators, or on their own
technology enables that creates the disruptive impact. initiative. Individuals and organizations may engage in
self-censorship for moral, religious, or business reasons,
Two Types of Disruptive Innovations:
to conform to societal norms, due to intimidation, or
Different value networks can emerge at differing out of fear of legal or other consequences.
distances from the original one along the third
The extent of Internet censorship varies on a country-
dimension of the disruption diagram.
to-country basis. While most democratic countries have
1. New-Market Disruptions moderate Internet censorship, other countries go as far
as to limit the access of information such as news and
We say that new-market disruptions compete with
suppress discussion among citizens. Internet censorship
“nonconsummation” because new-market disruptive
also occurs in response to or in anticipation of events
products are so much more affordable to own and
such as elections, protests, and riots. An example is the
simpler to use that they enable a whole new population
increased censorship due to the events of the Arab
of people to begin owning and using the product, and to
Spring. Other types of censorship include the use of
do so in a more convenient setting.
copyrights, defamation, harassment, and obscene
The personal computer and Sony’s first battery- material claims as a way to suppress content.
powered transistor pocket radio were new-market
Support for and opposition to Internet censorship also
disruptions, in that their initial customers were new
varies. In a 2012 Internet Society survey 71% of
consumers-they had not owned or used the prior
respondents agreed that "censorship should exist in
generation of products and services.
some form on the Internet". In the same survey 83%
2. Low-End Disruptions agreed that "access to the Internet should be
considered a basic human right" and 86% agreed that
We call disruptions that take root at the low end of the "freedom of expression should be guaranteed on the
original or mainstream value network low-end Internet". Perception of internet censorship in the US is
disruptions. largely based on the First Amendment and the right for
Disruptions such as steel minim ills, discount retailing, expansive free speech and access to content without
and the Korean automakers’ entry into the North regard to the consequences. According to
American market have been pure low-end disruptions in GlobalWebIndex, over 400 million people use virtual
that they did not create new markets-they were simply private networks to circumvent censorship or for
low-cost business models that grew by picking off the increased user privacy.
least attractive of the established firms’ customers. HOW INTERNET CENSORSHIP AFFECTS YOU (PROS &
Although they are different, new-market and low-end CONS)
disruptions both create the same vexing dilemma for
incumbents. WHAT IS INTERNET CENSORSHIP?

Internet censorship is the control of information that


can be viewed by the public on the Internet and can be
carried out by governments, institutions, and even Internet censorship in China
private organizations. Censored content can include
Internet control and surveillance in China is one of the
copyrighted information, harmful or sensitive content,
strictest in the world. The Chinese government blocks a
and more.
range of websites that contain content related to
People and organizations can self-censor for moral or various historical independences, protests, freedom of
business reasons, to meet societal norms, or in fear of speech, and pornography from its estimated 500
legal consequences. Government involvement in million Internet users. There are also international
Internet censorship varies from country to country. media and news sites that are flagged, including
Some countries have moderate Internet censorship Facebook, Twitter, and YouTube.
while others strictly limit access to certain information,
Pros of Internet censorship
including the news.
It’s important to keep in mind that Internet censorship
What is the purpose of Internet censorship?
has its advantages when used with the best of
 Stop people from accessing copyrighted intentions.
information.
o Create common-sense limits. Let’s be honest,
 Keep people from viewing harmful or sensitive
there’s a ton of content on the Internet that no
content.
one should ever see (re: Momo Challenge), and the
 Control Internet-related crime
concept of Internet censorship can start a
 Monitor the billions of people on the Internet.
constructive conversation about it.
o Stop fake news. If more content was closely
There is a range of reasons for Internet censorship, and
some are more well-intentioned than others. There are monitored, it could cut down on the mass amounts
use cases for protecting children from accessing of fraudulent information including false
sensitive information and then there are authoritative advertising.
attempts to gate a group of people’s access to o Curb access to harmful activities. The dark web is
important information in order to control the narrative. unchartered territory to many Internet users, but
there are sites that are shockingly easy to find that
While we typically think of Internet censorship being are dedicated to illegal acts like sex trafficking,
controlled by governments, it’s commonly used by child pornography, illicit drugs, and more.
other organizations like your Internet service providers o Less identity theft. If there is less content on the
to limit your access to certain sites. Internet that requires identity information, in
theory, there would be less identity theft.
Global Internet censorship
Cons of Internet censorship
Internet censorship is very different around the world,
ranging from little to no oversight to very pervasive There are some big disadvantages to Internet
control and surveillance. Let’s take a look at two censorship that affect the way people access
countries on opposite sides of the spectrum information.
Internet censorship in America o It restricts too much information. It’s entirely
Internet censorship in the U.S is among the least possible that real information is blocked along with
controlled in the world. This is mainly due to the fact fake information, which opens a large debate
that most online activity is protected by First about what you should and shouldn’t
Amendment rights. There is still some surveillance and restrict/access.
control when it comes to publishing certain content o Who’s in charge? How are rules defined? Are there
that may contain libel, child pornography, and checks and balances? Internet censorship could
intellectual property. While the Internet in the U.S. isn’t quickly turn into a matter of opinion on what is
highly censored, it is highly regulated which leads to a acceptable and what isn’t.
lot of self-censorship in America.
o Censors’ free speech. Internet censorship not only opinions without worrying about the government
limits the content you can access but potentially imprisoning them for criticism. It was adopted on
the content you post as well. December 15, 1971, as part of the Bill of Rights.
o Cost. This kind of goes without saying but the
As with all modern democracies, even the United States
workforce required, and associated cost, to control
places limits on this freedom. There are specific limits
and survey Internet users would be astronomical -
placed on this principle that dictate what people can or
most likely coming at the expense of taxpayers.
cannot say legally. The First Amendment does not
specifically say what is or is not protected, but the
Supreme Court has ruled that there are some forms
FREEDOM OF SPEECH which are not allowed.
Freedom of speech is a principle that supports the Here are the freedom of speech pros and cons to
freedom of an individual or a community to articulate consider with this element as part of a democratic
their opinions and ideas without fear of retaliation, society.
censorship, or legal sanction. The term "freedom of
expression" is sometimes used synonymously but List of the Pros of Freedom of Speech
includes any act of seeking, receiving, and imparting
1. Freedom of speech protects each of us from the
information or ideas, regardless of the medium used.
influence of special interests.
Freedom of expression is recognized as a human right
When people have power, then they do whatever they
under article 19 of the Universal Declaration of Human
can to retain it for as long as possible. That may include
Rights (UDHR) and recognized in international human
a change in the government’s constitution, a shift in a
rights law in the International Covenant on Civil and
company’s Board of Directors, or the suppression of a
Political Rights (ICCPR). Article 19 of the UDHR states
minority group that threatens the way of life for the
that "everyone shall have the right to hold opinions
people involved. Having the freedom of speech reduces
without interference" and "everyone shall have the
this power because it allows individuals to express
right to freedom of expression; this right shall include
criticism of those who are in power. There is no fear of
freedom to seek, receive and impart information and
losing personal freedom with this right because your
ideas of all kinds, regardless of frontiers, either orally, in
opinion contributes to the overall conversation.
writing or in print, in the form of art, or through any
other media of his choice". The version of Article 19 in 2. Freedom of speech eliminates compelled (to be
the ICCPR later amends this by stating that the exercise forced or obligated to do something) actions.
of these rights carries "special duties and
When you have the freedom of speech, then the
responsibilities" and may "therefore be subject to
government cannot compel your actions in such a way
certain restrictions" when necessary "[f]or respect of
that you are required to speak a specific message. You
the rights or reputation of others" or "[f]or the
stay in control of what you say and how those words
protection of national security or of public order (order
are expressed to the rest of society. Even if the
public), or of public health or morals".
government attempts to alter your words to their
17 FREEDOM OF SPEECH PROS AND CONS advantage, you will always address the situation and
correct the “mistakes” that others create in your work.
When a person or a corporation has the right of the
freedom of speech, then they are able to express any 3. Freedom of speech promotes the free exchange of
opinion without restraint or censorship. This approach ideas.
to society is a democratic institution which dates back
When a society operates in an area where free speech
to the ancient Greek culture.
is given to all, then there is a more significant exchange
In the United States, the First Amendment guarantees of ideas that occur. It becomes almost impossible for
the right to free speech for all people. Through this those who are in power to suppress truths that they
fundamental right, Americans have the freedom to may not want to let out in the open. This process allows
protest, practice the religion they want, and express for progress to occur because people can learn from the
experiences and perspectives of one another without for peaceful change. Providing facts to individuals while
worrying about the dogma of a “Big Brother” element in sharing your opinion can persuade them to consider
society, either corporate or government based. your perspective, even if they do not agree with it at the
time. When this is your top priority with this right, then
4. Freedom of speech can expose immoral or unlawful
you are less likely as an individual to use violence to
activities.
create change. Although this process requires patience
When Edward Snowden decided to leak numerous state from all of us to be successful, it will usually get us to
secrets to the press, he created an interesting question where we want to be.
about the freedom of speech that we are still
8. Freedom of speech gives us an opportunity to
attempting to resolve in our society. Was such an action
challenge hate. Peter Tatchell is a human-rights activist
inflicting damage against the legitimate actions of the
who suggests that the best way to move forward as a
government? Or was the information he offered a way
society is to challenge the people who have differing
to bring light to actions that the government shouldn’t
views. He told Index in 2016 this: “Free speech does not
have been performing in the first place? It is tricky to
mean giving bigots a free pass. It includes the right and
find the line which exists when you must protect
moral imperative to challenge, oppose, and protest
information or protect others. Having this right in
bigoted views. Bad ideas are most effectively defeated
society allows us to at least have that conversation.
by good ideas, backed by ethics and reason, rather than
5. Freedom of speech prevents the requirement to bans and censorship.
behave specific ways.
9. Freedom of speech creates resiliency. Although
Some people today might say that any speech which exposing people to hate speech is hurtful and creates
someone finds offensive should be banned. Imagine fear in some individuals, it also creates a resiliency in
then that someone became offended by the mention of the debate. Instead of making your voice louder when
same-gender marriage – or the opposite, that they were confronting these ideas, you are improving your
offended by the mention of opposite-gender marriage. argument. When this action occurs, the action of
Freedom of speech allows people to make up their observation and counter-observation make it possible
minds about what to share with others. Some people to create an outcome where progress toward the
might brazen with their approach, but that also means greater good occurs. When we lack tolerance for
they might not have as many friends because of their differing, uncomfortable opinions, then it weakens the
attitude. rights that so many people take for granted when there
is something that they want to say.
6. Freedom of speech advances knowledge for a
society. LIST OF THE CONS OF FREEDOM OF SPEECH

When you have a chance to ask questions or share 1. Freedom of speech does not mean the freedom to
perspectives, then it creates more learning have “all” speech.
opportunities in society. This right makes it easier for all
The concept behind the freedom of speech is that you
individuals to make a new discovery, suggest ideas, or
should be able to express anything in a way that does
exchange information freely without worrying about
not create legal consequences for you. Even if your
potential political consequences. Even if some of the
opinion is unsavory, rude, or unpopular, this right gives
ideas do not work after you get to try them, the process
you the option to express it. In the United States, there
of testing contributes to the advancement of society as
are four forms of speech which are not protected under
well. Thomas Edison famously made 1,000 unsuccessful
the First Amendment.
attempts at the invention of the light bulb – each idea
was a new step toward success. • You cannot make an authentic threat against another
individual.
7. Freedom of speech allows for peaceful changes in
society. • It is illegal to defame others, including libel and
slander.
Some people use their freedom of speech to incite
hatred or violence. Others use it to create the potential • You cannot plagiarize any copyrighted material.
• It is illegal to share some obscene material, such as 5. Freedom of speech can create a mob (large,
child pornography. disorderly, and often violent group of people)
mentality.
If you say something in the United States which
insights illegal actions or solicit others to commit a In 2012, Oatmeal and FunnyJunk had a dust-up over the
crime, then your speech is not protected by the First use of images that author Matthew Inman did not
Amendment either. authorize for distribution. Charles Carreon made a
public splash as the attorney for FunnyJunk, which
created a back-and-forth which eventually led the
2. Freedom of speech can spread false information. Internet to turn against him. In return for those actions,
Carreon labeled everyone he thought of as an
Thanks to the rise of the Internet, the freedom of “instigator” as a “rapeutationist.” When one person
speech makes it easier for individuals to spread false offers an opinion that others find to be believable, it
information and outright lies, but then still pretend that creates a mob mentality on both sides of the equation.
this data is true. Research does not prove that When this happens, it can destroy a person’s livelihood
vaccinations increase the risk of autism in children, but quickly.
you will find “information” online that says this is true.
Even though it is protected speech when this right is 6. Freedom of speech can cause people to endure
present, it could also lead to people getting or verbal abuse.
transmitting a preventable disease. In 2019, over 60
Voltaire’s biographer summed up the views of the
people in Washington and Oregon contracted the
philosopher like this: “I don’t agree with what you say,
measles, with almost all the cases being unvaccinated
but I will defend to the death your right to say it.” When
children.
freedom of speech is treated this way, then it creates a
3. Freedom of speech can incite (to encourage or situation where people must endure sexist or racist
provoke someone to take a particular action) violence verbal abuse. Is it really beneficial for society to allow
against other people. individuals to use derogatory terms for the purpose of
causing discomfort?
People must be held responsible for the personal
choices that they make. When someone commits an act 7. Freedom of speech will eventually polarize (divide or
of violence against another because they were incited separate a group) society.
by hate speech to do so, then they made the choice to
When people are allowed to express their opinions
break the law. The person who created the outcome
freely, then it creates three primary outcomes. Some
through the encouragement of their language holds
people will agree with the statement, others will
some responsibility here as well. If online radicalization
disagree, and a middle group won’t care one way or
causes people to join ISIS, then shouldn’t political
the other. People tend to hang out in circles where
radicalization that causes individuals to attack
others think and feel in similar ways, which means they
journalists be treated in the same way?
will gather around like-minded individuals to spend
4. Freedom of speech creates a paradox (seems self- most of their time.
contradictory or absurd).
8. Freedom of speech reduces the desire to
When we look at the modern idea that creates the compromise.
foundation for freedom of speech, it really isn’t free.
Pew Research also discovered that when people are
The government is still dictating some of the things that
consistently liberal or conservative with their freedom
we can or cannot say. This freedom, and this writer,
of speech, their idea of what compromise entails begins
cannot exist if people are not allowed to make
to shift. Instead of believing that both sides must have a
assertions that are distasteful to the majority, even if
give-and-take to create an outcome, the definition
the statements are hurtful to other people.
becomes one in which their side gets what they want
while the other side gets as little as possible. This
perspective makes it a challenge for society to function
because those on each extreme are consistently battling
the other extreme because each view themselves as CONCEPTIONS OF PRIVACY AND THE VALUE OF
being the superior contributor to society. PRIVACY

Who would want their personal information to be


accessible by anyone, anytime? None right? That is why
all human beings value their privacy, their space for
personal life. But due to technological advances, some
people can access our valued information. They can
search, collect, and store data concerning phone
conversations, internet searches, and electronic
payments.
UNIT 5: TECHNOLOGY AND PRIVACY
Privacy According to Cambridge Dictionary, it is the
Invasion of privacy - is the intrusion into the personal state of being alone, or the right to keep one’s personal
life of another, without just cause, which can give the matters and relationships secret.
person whose privacy has been invaded a right to bring
a lawsuit for damages against the person or entity that Gillian Black, in her 2011 book on Publicity rights, states
intruded. that privacy is the desire of an individual to be free of
intrusion.
Identity theft - is the deliberate use of someone else's
identity, usually as a method to gain a financial Discussions about privacy relate to the use of
advantage or obtain credit and other benefits in the technology. In an article written by Samuel Warren and
other person's name, and perhaps to the other person's Louis Brandeis, they argued that every human being has
disadvantage or loss. The person whose identity has the right to be left alone and this article fueled a debate
been assumed may suffer adverse consequences, about the claims for the right of individuals to
especially if they are held responsible for the determine the extent to which others have access to
perpetrator's actions. them and claims for the right of the society to know
about individuals.
Identity theft - is when someone steals your personal
information and uses it without your permission. This Constitutional Privacy and Informational Privacy
information could consist of your name, address, date Constitutional or Decisional Privacy refers to then
of birth, social security number, etc. When your freedom of a person to make one’s own decision
personal information is stolen and used to commit a without interference by other people regarding matters
crime or some type of fraud, that's considered identity seen to be intimate and personal decisions. While the
theft. Informational Privacy refers with the interest of
individuals in exercising control over access to
Identity Theft Protection Services information about themselves. Personal Data According
The following are some of the primary features to the law, personal data mea e.g., any information
provided in identity theft protection services: relating to an identified or identifiable individual; an
identifiable person is one who can be identified, directly
 Social Security Monitoring or indirectly, in particular by reference to an
 Social Media Monitoring identification number (e.g. social security number) or
 Address Change Verification one or more factors specific to his physical,
 Pay Day Loan Monitoring physiological, mental, economic, cultural or social
 Court Record Monitoring identity (e.g. name and first name, date of birth,
 Sex Offender Registration biometrics data, fingerprints, DNA).
 Bank and Credit Card Activity Alerts
 Credit Score Monitoring Privacy Right – Data Privacy Act 2012
 Credit Score Reporting Chapter 1, Section 2: Declaration of Policy - It is the
 Bank Account Takeovers policy of the State to protect the fundamental human
 Identity Theft Insurance Coverage
right of privacy, of communication while ensuring free throughout their lives. There is a great value in the
flow of information to promote innovation and growth. ability to have a second chance, to be able to move
The State recognizes the vital role of information and beyond a mistake, to be able to reinvent
communications technology in nation-building and its oneself. Privacy nurtures this ability. It allows
inherent obligation to ensure that personal information people to grow and mature without being shackled
in information and communications systems in the with all the foolish things they might have done in
government and in the private sector are secured and the past.
protected.

8. Not Having to Explain or Justify Oneself - An


Why Privacy matters? important reason why privacy matters is not
having to explain or justify oneself. We may do a
1. Limit on Power - The more someone knows about
lot of things which, if judged from afar by others
us, the more power they can have over us.
lacking complete knowledge or understanding,
Personal data is essential to make important
may seem odd or embarrassing or worse.
decisions in our lives. Once that data lands into
someone’s hand, they can use that information to Online identity theft - happens when someone steals
influence our decisions and shape our behavior. It your personal information (name, Social Security
can used as a tool to exercise control over us. number, credit card information, etc.) for financial gain
2. Respect for Individuals - Privacy is about and other highly illegal purposes.
respecting individuals. Every person has a reason
Hacking a computer or mobile device is quickly
why they want to keep something for themselves,
becoming the most likely way your identity could be
and we need to respect that.
stolen.
3. Maintaining Appropriate Social Boundaries -
People set boundaries from others in society. May 20 TYPES OF IDENTITY THEFT AND FRAUD
it be physical or informational boundary. There are
times that we want space or a place to be alone. Identity theft has become big business for criminals:
Or for some people, they don’t want too much 15.4 million Americans were victims of identity theft in
physical contact to other people. 2016, according to Javelin Research. ID theft has been
4. Trust - In relationships, whether personal or among the top consumer complaints with the Federal
professional, we depend upon trusting the other Trade Commission (FTC) for the last 17 years and
party. In professional relationships such as our ranked as the #1 consumer complaint from 2000 to
relationships with doctors and lawyers, this trust is 2015.
the key to maintaining candor in the relationship. Knowing where identity thieves are looking for your
When trust is breached in one relationship, it could personal data can help you protect yourself from
make us more reluctant to trust in other becoming a victim of ID theft. Make sure you
relationships. understand how to check your credit report for ID theft
5. Freedom of Thought and Speech - Privacy is one of and be on guard against the "classic" forms of ID theft,
the keys to freedom of thought. A watchful eye as well as new and different types of fraud that can
over everything we read, or watch can chill us from occur:
exploring ideas outside the mainstream.
6. Freedom of Social and Political Activities - Privacy 1. Driver's License Identity Theft
helps protect our ability to associate with other Driver's license theft is the most common form of ID
people and engage in political activity. A key theft. The person who stole your ID may try to buy
component of freedom of political association is items under your name and get other forms of
the ability to do so with privacy if one chooses. The identification with their picture which can lead to
watchful eye can disrupt and unduly influence criminal identity theft. You may want to consider adding
these activities. an initial security alert to your credit file if your driver's
7. Ability to Change and Have Second Chances - license is stolen.
People are not static; they change and grow
2. Mail Identity Theft 6. Account Takeover Identity Theft

Mail identity theft is one of the oldest ways for a Account takeover fraud occurs when criminals gain or
criminal to steal your personal information. If your mail have access to your bank or credit card accounts—
has been stolen a thief may be able to retrieve your usually because of a data breach, phishing scam, or
financial account information to make purchases or malware attack—and start making charges to those
open new credit cards. They could also change your accounts.
address on your statements or bills.

7. Senior Identity Theft/Senior Scams


According to the US Postal Service's Annual Report, it
Senior identity theft or senior scams are very common
received over 60,000 complaints of mail theft in 2016,
as older Americans may not be checking their accounts
which resulted in over 2,000 convictions. If you think
or financial reports often since they're typically not
your mail has been stolen you can file a mail theft
opening as many new accounts or seeking new credit.
complaint with the U.S. Postal Inspection Service.
The FTC reported that 37% of Americans who are 60
3. Debit Card Fraud or Credit Card Fraud years or older made fraud complaints in 2016; 20% of
those complaints were for ID theft. Seniors can fall
Credit card fraud or debit card fraud is when someone
victim to scammers if they trust the wrong person, who
uses your credit card or credit account to make a
may develop a relationship over time by preying on
purchase you didn't authorize. Fraudsters can also steal
them over the phone or via email.
your credit card account number, PIN and security code
to make unauthorized transactions, without needing 8. Child Identity Theft
your physical credit card.
Child identity theft may not be as common as other
4. Online Shopping Fraud types of ID theft, but it is very attractive to thieves. That
is because there is usually no credit history established
Online shopping fraud or ecommerce fraud occurs
for the children who become victims. Scammers
when a criminal leverage stolen payment information or
sometimes use children's Social Security numbers and
fraudulently acquired bank or credit card accounts to
other information to open new accounts, apply for
attempt retail transactions without the account owner's
government benefits, take out loans, and more. The
knowledge. The items purchased are then shipped to an
child may not know their credit has been used to run up
address other than victims where the stolen items are
debt in their name until it's time to apply for school or
sold or shipped overseas.
car loans.
Online shopping fraud increased after the new chip
9. Tax Identity Theft
credit cards were implemented in the U.S., causing
fraudsters to shift their attention online. Ecommerce Tax identity theft happens when fraudsters have your
fraud increased more than 30% in the first six-months name and Social Security number and file a tax return in
of 2017, according to Experian. your name before you file yours. In some cases, the
fraudsters use fake income and withholding numbers so
5. Social Security Number Identity Theft
they can get a bigger refund check sent to their address.
Social security number (SSN) identity theft can usually
10. Biometric ID Theft Biometric ID theft is when the
happen from data breaches or Tax ID theft. If you start
physical or behavioral characteristics used to verify a
to notice mail that lists the wrong last four digits of your
person's identity through a device are stolen. These
SSN or the wrong name or address this may be a sign of
characteristics are measurable, such as a fingerprint or
fraud or ID theft. Make sure to check your credit report,
voice recognition "Hey, Alexa", that can be copied and
Experian does list all other Social Security numbers
recorded. These attributes are unique to individuals but
reported as belonging to you because they may be a
in the wrong hands can be used to manipulate devices
sign of fraud, or hopefully just the result of a typo from
or people.
someone wrongly entering information on a loan or
credit application.
11. Criminal Identity Theft Criminal identity theft is picture of their rising obligations and declining ability to
when a criminal gives your information to a police pay. Loan stacking can affect consumers if these loans
officer or law enforcement. This can happen when your are taken out in their name.
ID is lost or stolen and in the possession of a criminal.
16. Mortgage Fraud
They provide your name and information if arrested,
which could show up on a background check for you or Mortgage fraud occurs when a borrower, broker or an
result in a warrant issued under your name. If you appraiser lies about information on the application for a
believe you are a victim of criminal identity theft you mortgage loan. They may do this to get approved for a
may consider signing up for an identity theft protection bigger loan or just to get the loan approved. During the
product. mortgage crisis, Experian estimated that first-party
fraud—like loan stacking—may have accounted for
12. Synthetic Identity Theft Synthetic identity theft is
more than 25% of all consumer credit charge-offs in
the fastest-growing type of ID fraud, representing 80-to-
2009. After the housing crisis, more stringent approvals
85% of all current identity fraud, according to the FTC.
were put in place.
Synthetic ID theft merges real and fake personal
consumer data to create a new identity using 17. Auto Lending Fraud Auto lending fraud can be the
information such as Social Security numbers, names, same as mortgage fraud or loan stacking fraud and
addresses, and birthdays that can be bought on the occurs when a consumer, a dealer or auto lender
dark web. submits or accepts a fraudulent consumer application
for credit. Auto dealers can be more concerned about
13. New Account Takeover
getting customers into a vehicle versus doing a
New account takeover or new account identity theft is thorough identity verification process. Those identity
when a criminal creates a new account under your verifications are likely not cross-checked to prevent
name using personal information, they received from synthetic ID fraud that can result in loan application
stealing your data, either directly or via a data breach. It losses. At the same time, the borrower may be falsifying
is a combination of both synthetic identity theft and information on the loan application in order to get
account takeover theft. approved for the car. If approved and the loan goes
unpaid, the lender takes a loss.
14. Medical Identity Theft
18. Employment Identity Theft
Medical identity theft can be harder to discover than
other types of ID theft because it happens when Employment identity theft is when a criminal applies for
someone steals another person's identity to obtain a job using your Social Security number or ID. Employers
medical services. As a result, no one may notice for a report income to the IRS under your name, and the
while or until the victim receives a statement for care government expects you to pay taxes on all income
that they never received. More than 27% of data earned in your name. The best way to spot this is to
breaches in 2017 were medical or healthcare related. By review your credit report to find anything that you don't
reading your claims received in the mail, reviewing in recognize.
detail any statement of benefits, or going online to
19. Bust-Out Fraud
check existing claims you can monitor all medical
activity done in your name. Bust-out fraud is first-party fraud scheme and a
deliberate form of fraud or ID theft that is also known as
15. Loan Stacking Fraud
sleeper fraud. It occurs when a consumer applies for
Loan stacking fraud occurs when multiple loans are credit and uses their own name or a synthetic identity
taken out by borrowers who slide through today's with the intent of maxing out all available credit and
automated approval process. Consumers love the ease eventually disappearing. Lenders are left assuming all
of access to these online loans and so do fraudsters. the risk as a result and bust-out fraud can happen from
Loopholes in online lending marketplaces can result in people using synthetic IDs or loan stacking methods.
multiple lenders making loans to the same (fake)
20. Internet of Things Identity Theft
borrowers, often within a short period, without the full
Internet of Things (IoT) identity theft is when your you lift the freeze. If you place a fraud alert, creditors
smartphones or tablets are paired with consumer are encouraged to contact you and verify your
products such as cars, heart monitors and household information (and that you applied for the loan or credit
appliances that are connected to the Internet, creating card in question) before approving the application.
an opportunity for hackers to steal your data.
2. Keep Your Personal Documents Safe
Sometimes these connected products can have security
flaws, creating a point of weakness around the victim's Online identity theft is more common than it used to
personal data that leads to the IoT fraud. be, but it's still possible for criminals to gain access to
your credit card numbers, bank account information
What Should You Do If You're an Identity Theft Risks
and other sensitive information on paper. Here are
Four Ways to Reduce the Risk of Identity Theft ways to safeguard your documents:

There's no surefire way to avoid becoming a victim of Request electronic statements: Doing this eliminates
identity theft. Even if you're extra careful with how you the paper trail financial account statements create. Mail
handle your personal information online, it still may be fraud is considered old school, but it's still alive and
susceptible to data breaches and other attacks from well. It's best to have financial statements delivered to
hackers. your secure email inbox rather than your mailbox.

There are, however, some steps you can take to reduce Keep your mail safe: If you do receive paper documents
the risk of identity theft, and even to make your with personal information, see if you can add a lock to
information less valuable to a criminal who gets their your mailbox or use a P.O. box as your mailing address.
hands on it. You may also want to consider having smaller packages
delivered to your work address, so you receive them
1. Monitor Your Credit
during the day versus having them left unattended on
While it's possible for someone to steal your your porch. If you are going to be gone for a while, ask
information by taking your purse or wallet or someone to pick up and hold your mail for you, or
burglarizing your home, many incursions that lead to request a hold with the U.S. Postal Service until you
identity theft occur without the victim knowing. return.

To make sure nobody has opened new accounts under Buy a shredder: If you plan to throw out financial and
your name, make sure to check each of your credit other sensitive documents, shred them first. This can
reports at least yearly. You can get your Experian, take a little extra time but adds a layer of protection
Transunion, and Equifax credit reports for free at against dumpster-divers.
AnnualCreditReport.com.
Lock it up: There are some documents—your Social
If possible, pull one report every four months so that Security number, recent tax returns, birth certificate
you're looking at your reports throughout the year. and more—you can't get rid of. Consider getting a safe
Through Experian, you can get a free copy of your deposit box at a local bank branch or purchasing a
Experian credit report every 30 days as well as free lockbox you can store them in at your house.
credit monitoring, which provides alerts about new
3. Secure Your Online Data
inquiries, accounts, and suspicious activity.
Stopping mail fraud is straightforward, but protecting
If you notice fraudulent activity, dispute it with the
yourself online can be a lot trickier because criminals
lender and the bureau. Also, consider freezing your
employ many tactics to steal your identity. Here's what
credit reports and request a fraud alert be added to
you need to do:
them if you've been victimized.
Be cautious with links: Phishing scams involve a thief
With a credit freeze, no one can view your credit
using email to trick you into giving them personal
reports, including lenders. So, if a thief steals your Social
information. These messages often look like they're
Security number and plans to open credit accounts in
coming from a reputable business and can take an eagle
your name, they'll be denied. Keep in mind, though,
eye to spot. If something seems off about an email
you'll also be denied for legitimate applications unless
that's asking you to click a link to an offer or action, To help minimize the damage, create a unique, strong
don't click. Instead, hover your cursor over the link and password for every online account. The strongest
check the destination URL. If the link would take you to passwords are long, random strings of letters, numbers,
a different website than you were expecting, or seems and symbols, and it would be impossible to memorize
otherwise illegitimate, ignore it. Additionally, these each one. For that reason, you could use a password
emails can include attachments that, if opened, install manager such as LastPass or 1Password to securely
information-gathering malware. store all of them in a place that's easily accessible when
you need them.
Monitor your online accounts: Staying up to date on
changes to your financial accounts can be helpful in If a website or app offers it, set up two-factor
catching fraud as soon as it happens. Set up push authentication. This will require you to provide a second
notifications on your smartphone or other mobile piece of information to verify your identity. It may
devices and pay attention to any alert emails you may require you to use an authenticator app with a unique
get from financial institutions. number that changes every 30 seconds or have a code
sent to your email or phone.
Be careful with public Wi-Fi: Public Wi-Fi can be a
convenient way to get access to the internet. But Using this process takes a little more time every time
whether you're at a coffee shop or the airport, be you log in or change account details, but it provides
careful about what you do while you're online. Hackers valuable protection against people who want to do you
and others can set up their own free Wi-Fi networks and harm.
use them to scrape your data. Even legitimate Wi-Fi
networks can be hacked, allowing the thief to
"eavesdrop" on your connection and steal data. Make UNIT 6: INFORMATION WARFARE & ONLINE CRIMES
sure the network you are connected to be legitimate
and can be trusted, and use a virtual private network, or ONLINE CRIMES
VPN, to add an extra layer of security and prevent 1. WHAT IS HACKING
eavesdropping.
Hacking generally refers to unauthorized
Watch out for unsecure websites: Before you enter intrusion into a computer or a network. The person
payment or other personal information into a website, engaged in hacking activities is known as a hacker. This
check to make sure it's secure and trustworthy. If the hacker may alter system or security features to
URL starts with "HTTP" instead of "HTTPS," it's not accomplish a goal that differs from the original purpose
secure and hackers can eavesdrop and steal information of the system.
you share. Even if the site does have a secure
connection, it can still be a front for a scam. If you don't Hacking can also refer to non-malicious
recognize the name of the company, be diligent to activities, usually involving unusual or improvised
make sure it's legitimate and trustworthy. alterations to equipment or processes.

4. Create Strong Passwords Hackers employ a variety of techniques for hacking,


including:
Society is so integrated with technology that it's easy to
have scores of online accounts. As a result, it can be  Vulnerability scanner: checks computers on
tempting to create one easy-to-remember password networks for known weaknesses
and use it everywhere.  Password cracking: the process of recovering
Unfortunately, scammers have gotten good at passwords from data stored or transmitted by
guessing passwords using publicly available information computer systems
and social engineering—for example, asking you about  Packet sniffer: applications that capture data
your pets, children, other family members and more. packets in order to view data and passwords in
And once they have your password for one website, transit over networks
they'll have it for all the other sites you use it on.
 Spoofing attack: involves websites which falsify Firesheep is a Mozilla Firefox extension that uses packet
data by mimicking legitimate sites, and they are sniffing to hijack unsecured Wi-Fi network sessions and
therefore treated as trusted sites by users or capture unencrypted website cookies during network
other programs data transmission.

 Root kit: represents a set of programs which Firesheep was created by software developer Eric Butler
work to subvert control of an operating system and released in 2010 to prove the security risks
from legitimate operators associated with a number of popular websites, including
Facebook and Twitter. The software served to highlight
 Trojan horse: serves as a back door in a
a major Web browsing security flaw that could expose
computer system to allow an intruder to gain
users to malicious hackers. Of course, its capabilities
access to the system later
were also useful to hackers, leading to some public
 Viruses: self-replicating programs that spread concern about the software.
by inserting copies of themselves into other
3. SPAMMING
executable code files or documents
INTRODUCTION
 Key loggers: tools designed to record every
keystroke on the affected machine for later Spamming is the use of electronic messaging
retrieval systems like e-mails and other digital delivery systems
and broadcast media to send unwanted bulk messages
Hacking Tool
indiscriminately. The term spamming is also applied to
A hacking tool is a program or utility to assist a other media like in internet forums, instant messaging,
hacker with hacking. It can also be proactively utilized to and mobile text messaging, social networking spam,
protect a network or computer from hackers. junk fax transmissions, television advertising and
sharing network spam.
Hacking is intentional modification of computer
software or hardware that is outside the architectural Spam involves sending nearly identical messages to
perimeters and design. Hacking tools come in a wide thousands (or millions) of recipients. Spammers use
variety of applications and are specifically created to software robots, called spambots (also Web crawlers or
assist in hacking. A hacking too is commonly used to Web spiders) in order to get valid email addresses from
gain unauthorized access to a PC to insert worms, company Web sites, blogs and newsgroups. Common
siffers, viruses and Trojan horses. subjects of spam messages are pornographic or other
sexually related Web sites, various financial services or
2. Hackerazzi get-rich-quick schemes and health products.
Hackerazzi is a slang term used to refer to Spam messages normally have a fake origin address,
cybercriminals who hack into celebrity email accounts which is randomly generated, in order to keep the
to gain access to their personal information. This term is author of the message from being easily discovered.
derived from the term paparazzi, which refers to the
aggressive photojournalists who often intrude on Spam is commonly used for advertising thus given an
celebrities' privacy and make a living by selling candid acronym Sales Promotion and Marketing.
photos of famous people.
BRIEF HISTORY OF SPAM
Banker Trojan
The growth of unsolicited e-mail imposes increasing
A banker Trojan is a piece of malware intended to get costs on networks and causes considerable aggravation
financial information or hack users through a banking or on the part of e-mail recipients. The history of spam is
financial system, commonly through an online banking one that is closely tied to the history and evolution of
or brokerage interface. the Internet itself.

Firesheep  1971 RFC 733: Mail Specifications


 1978 First email spam was sent out to users of new members rather than the sale of actual products
of ARPANET – it was an ad for a presentation by or services.
Digital Equipment Corporation (DEC)
"Get Rich Quick" or "Make Money Fast" Schemes:
 1988 First know email Chain letter sent These are fraudulent schemes that promise quick and
easy wealth with minimal effort. Often, these schemes
 1988 “Spamming” starts as prank by
require an initial investment, and the promised returns
participants in multi-user dungeon games by
are unrealistic.
MUDers (Multi User Dungeon) to fill rivals
accounts with unwanted electronic junk mail.

 1993 First use of the term spam was for a Work-at-Home Schemes: These are fraudulent schemes
post from USENET by Richard Depew to that promise individuals the opportunity to work from
news.admin.policy, which was the result of a home and make money. Typically, the work involves
bug in a software program that caused 200 some type of assembly or processing of materials, but in
messages to go out to the news group. reality, there is no real work to be done, and individuals
are often required to pay an upfront fee to participate.
The term “spam” itself was thought to have come from
the spam skit by Monty Python's Flying Circus. 5. Pornographic Websites: These are unsolicited
messages that advertise pornographic websites or
In the sketch, a restaurant serves all its food with lots of
services.
spam, and the waitress repeats the word several times
in describing how much spam is in the items. When she Stock Offerings for Unknown Start-Up Corporations:
does this, a group of Vikings in the corner start a song: These are unsolicited messages that advertise unknown
"Spam, spam, spam, spam, spam, spam, spam, spam, start-up corporations and their stock offerings. Often,
lovely spam! Wonderful spam!" Until told to shut up. these companies are fraudulent, and the stock offerings
are worthless.
Thus the meaning of the term: something that keeps
repeating and repeating to great annoyance. Quack Health Products and Remedies: These are
unsolicited messages that advertise health products or
 2003 May 3rd – 25th anniversary of the first
remedies that are not scientifically proven or regulated.
“spam” and the first time that the amount of
Often, these products are fraudulent, and the claims
spam email exceeded the amount of legitimate
made about them are false.
email
Pirated Software: These are unsolicited messages that
 2012 The rise of social media spam
advertise illegally pirated software. Using pirated
CATEGORIES OF GENERAL SPAM software is illegal and can result in fines or legal action.

These categories can be further explained as follows: TYPES OF SPAM

4. Chain Letters: These are unsolicited messages  Email Spam


that ask recipients to forward the message to
There are 2 general types of unsolicited emails –
others. Often, these messages contain threats
Unsolicited Bulk Emails (UBE) or Unsolicited
or promises of good luck, and they can be
Commercial Emails (UCE), both a form of SPAM
considered a form of superstition or hoax. Chain
messages, sent to multiple recipients, without their
letters are typically used to spread malware or
consent. Such emails are sent from companies of which
collect personal information.
you are not a customer and most often have a
Pyramid Schemes: These are fraudulent investment marketing purpose. However, a huge part of these
schemes where individuals are promised high returns messages contain malware or links
for recruiting new members into the scheme. The new to phishing websites.
members then recruit even more members, and so on.
 Social Networking Spam (or Social Media
In reality, the profits are derived from the recruitment
Scam)
 Unwanted spam content appearing on social you exist. If you can tell from the subject line
networking services and any website with user- that a message is spam, don't open it — delete
generated content (comments, chat, etc.) it. Spam subject lines typically promise you a
better sex life, a more youthful appearance,
 It can be manifested in many ways, including
prescription drugs without a doctor's approval,
bulk messages, profanity, insults, hate speech,
love, thicker hair, or a better mortgage rate.
malicious links, fraudulent reviews, fake friends,
They also use attention-demanding
and personally identifiable information.
punctuation, such as exclamation marks or all
caps.

 SMS Spam - any unwanted or unsolicited text  Don't click any links in a spam
message sent indiscriminately to your mobile email. Spammers often have multiple, unique
phone, often for commercial purposes pages on their sites. Often, when you click a
URL in a spam message, this tells the spammer
 Spamdexing - which is a word derived from that you — and only you — received the
“spam” and “indexing,” refers to the practice of message he or she sent. It's another way for the
search engine spamming? spammer to figure out you actually exist.
 It is a form of SEO spamming. SEO is an  Don't forward an email from someone you
abbreviation for Search Engine Optimization, don't know to a list of people. You remember
which is the art of having your website those "forward this email to 20 of your friends"
optimized, or attractive, to the major search messages? They are perfect for spammers to
engines for optimal indexing. harvest email addresses, even if the sender of
 practice of creating websites that will be the original email did not have this intent.
illegitimately indexed with a high position in the These types of sign-and-forward emails often
search engines appear in the form of a petition — and they
don't work.
THINGS YOU CAN DO TO PREVENT SPAM
Monitor Your Settings, Report Suspicious Behavior
Take Precautions
 Use a spam filter. A few free ones
 Use a complicated email username. Spammers' are SpamBayes for Windows or POPFile for both
software will look for the easy and obvious Windows and Mac. TechSoup also offers
addresses first, such as those with identifiable donated anti-spam software or services from
names like "john1977@hotmail.com," as partners such as Comodo, Mailshell, and Red
opposed to "sjk839@gmail.com." Earth.
 Preview your messages before you open  Make sure your privacy settings are set so you
them. Outlook (and many other email clients) don't receive marketing from other sites in
let you use a preview mode to peek at the your AOL and Yahoo profiles. Many listservs
contents of a message before you actually open use Yahoo lists as the list provider; you must
it. To do this in Outlook, go to the View menu unselect these pre-selected choices in your
and select Reading Pane. Instead of double personal privacy settings.
clicking a message, click it once to select it and
you'll see the message displayed in the Reading  If your organization has an IT department,
Pane. forward it any spam that gets through. The IT
staff may be able to tweak the filters to block
Think Before You Click (or Reply or Forward) similar emails in the future.
 Never, ever reply to a spam message. This TECHNOLOGY-BASED TERRORISM
includes buying a product that is for sale or
clicking the often-misunderstood "unsubscribe" Technology-based Terrorism
link, which actually informs your spammer that
Technology is a foundation of modern society, it Many other groups are active on the web, including
governs its dynamics, and therefore, it is normal that Hamas (the Islamic Resistance Movement), the
also the terrorism will benefit from it. We are living a Lebanese Hezbollah (Party of God), the Egyptian Al-
very difficult period, the terrorism is threatening the Gama’a at Islamiyah, the Popular Democratic Liberation
society and cultures on a global scale, and differently Front Party in Turkey (DHKP / C), the Kurdish Workers’
from the past, it has reached a global dimension. We Party (PKK), the Zapatista National Liberation Army
are facing a global alert. Intelligence and law (ELNZ), the Islamic Movement of Uzbekistan (IMU) the
enforcement agencies worldwide are warning about Mujahedin, and the Chechens.
possible terrorist attacks in the major cities.
What are the advantages in the use of the Internet?
5. Technology-based Terrorism is also called
The Internet offers a simple access to a global stage,
Cyberterrorism
every terrorist could instantly reach large masses or
Cyberterrorism is the use of the Internet to conduct targets specific groups of individuals. Under specific
violent acts that result in, or threaten, loss of life or circumstances, the resources of the Internet could offer
significant bodily harm, in order to achieve political or anonymity to the user, a great advantage for a terrorist
ideological gains through threat or intimidation. It is organization that wants to spread their message while
also sometimes considered an act of Internet terrorism remaining undetected.
where terrorist activities, including acts of deliberate,
The Internet is CHEAP.
large-scale disruption of computer networks, especially
of personal computers attached to the Internet by The Internet, and technology, could be exploited by
means of tools such as computer viruses, computer terrorist organizations for several purposes including:
worms, phishing, and other malicious software and
hardware methods and programming scripts.  Propaganda
 Psychological warfare
The modern terrorism is instantaneous and  Recruitment and mobilization
unpredictable, a global threat that hit its targets, but  Fundraising
that at same time hits a wide audience thanks to the  Data Mining, information gathering
technology, it is bringing the terror into our homes.  Secure communications
 Cyber attacks
Social media is an essential element of modern
 Software distribution (e.g., mobile app)
terrorism; these powerful platforms allow terrorists to
 Buying false documents
communicate, to make propaganda and recruit new
 Training
sympathizers.

Every terrorist attack is similar to a dramatic Terrorists use the new social platforms like Facebook,
representation, in which the Internet is the stage. Twitter and media services such as YouTube. Their
language is direct, young, and it can reach a specific
“Terrorist attacks are often carefully choreographed to
audience by using images with a high emotional impact.
attract the attention of the electronic media and the
international press. Terrorism is aimed at the people The online propaganda is multi-lingual. It
watching, not at the actual victims. Terrorism is a reaches not only Arab people and is easily accessible to
theater,” wrote Brian Jenkins, an young people.
International Terrorism expert.ISIS - Islamic State of Iraq
The chain of communication leading massacres and
and Syria also known as Islamic State of Iraq and the
executions directly into our homes is extremely short, a
Levant (ISIL) is the perfect example for technology-
few tools (i.e., a smartphone, a camera, and a laptop)
based terrorism.
and the free Internet network are the pillars of the new
Although members of the Islamic state use new strategy of terror.
technologies with great skill, many other terrorist
CYBER ESPIONAGE
groups use the Internet and its resources every day.
Cyber spying, or cyber espionage, is the act or practice  The attacker must be able to intercept all
of obtaining secrets and information without the relevant messages passing between the two
permission and knowledge of the holder of the victims and inject new ones. This is
information from individuals, competitors, rivals, straightforward in many circumstances; Man-in-
groups, governments and enemies for personal, the-middle (MitM) attack for example, an
economic, political or military advantage using methods attacker within reception range of an
on the Internet, networks or individual computers unencrypted wireless access point (Wi-Fi) could
through the use of proxy servers, cracking techniques insert themselves as a man-in-the-middle.
and malicious software including Trojan
Phishing and spear phishing attacks
horses and spyware.
 Spear phishing is an email spoofing attack that
targets a specific organization or individual,
TOP 5 MOST COMMON CYBER-ATTACKS. seeking unauthorized access to sensitive
information.
Denial-of-service (DoS) and distributed denial-of-
service (DDoS) attacks  Spear phishing attempts are not typically
initiated by random hackers but are more likely
 a denial-of-service attack (DoS attack) is a cyber-
to be conducted by perpetrators out for
attack in which the perpetrator seeks to make a
financial gain, trade secrets or military
machine or network resource unavailable to its
information.
intended users by temporarily or indefinitely
disrupting services of a host connected to Drive-by attacks
the Internet.
 Drive-by downloads may happen when visiting
 Denial of service is typically accomplished by a website, opening an e-mail attachment or
flooding the targeted machine or resource with clicking a link, or clicking on a deceptive pop-up
superfluous requests to overload systems and window by clicking on the window in the
prevent some or all legitimate requests from being mistaken belief that, for example, an error
fulfilled. report from the computer's operating system
itself is being acknowledged or a seemingly
 In a distributed denial-of-service attack (DDoS innocuous advertisement pop-up is being
attack), the incoming traffic flooding the victim dismissed.
originates from many different sources. This
effectively makes it impossible to stop the attack Password attack
simply by blocking a single source.
 Is the process which of
Man-in-the-middle (MitM) attack is a Man-in-the- recovering passwords from data that have been
middle (MitM) attack. stored in or transmitted by a computer system.

 Attack where the attacker secretly relays and  A common approach (brute-force attack) is to
possibly alters the communications between try guesses repeatedly for the password and
two parties who believe they are directly check them against an available cryptographic
communicating with each other. hash of the password.

 One example of a MITM attack is  On a file-by-file basis, password cracking is


active eavesdropping, in which the attacker utilized to gain access to digital evidence for
makes independent connections with the which a judge has allowed access but the
victims and relays messages between them to particular file's access is restricted.
make them believe they are talking directly to
 The three different types of password attacks
each other over a private connection, when in
are Brute Force, Dictionary attack and Hybrid
fact the entire conversation is controlled by the
attack
attacker.
The other types of cyber-attacks are to the South China Sea and some of the world’s
busiest trading routes.
 SQL injection attack
 Another group of Chinese threat actors, APT10,
 Cross-site scripting (XSS) attack
is blamed for a campaign that perhaps started
 Eavesdropping attack as early as 2009.

 Birthday attack  As potentially one of the longest sustained


cybersecurity threats in history, APT10 recently
 Malware attack attacked companies through managed service
Most Nefarious in Cyber Espionage providers in multiple industries in several
countries, as well as some Japanese companies,
 Recent attack was APT37 which took aim at causing an unknown amount of damage
South Korea, Japan, Vietnam, and the Middle through the theft of large volumes of data
East.
Intelligence Gathering
 The attack was purportedly led by a well-known
hacking group called Lazarus, which has been Types of Intelligence Gathering
active for the last five years or so.  Competitive Intelligence
 The group has been cited for attacks such as the  Corporate Espionage
Sony Pictures one in 2014, which netted tens of
millions of dollars, and it may be responsible for  Information Warfare
the $81 million cyber heist of a Bangladeshi
 Private Investigation
bank in 2016.
Competitive Intelligence
 They also are blamed for the 2017 widespread
WannaCry attack, which wreaked billions of  Relies solely on legal and ethical means to
dollars of havoc on companies, banks, and gather data, piece it together to form
hospitals around the world. information, and analyze it to create
intelligence for the use of decision-makers
Vietnam
 Helps organizations better understand their
 Onto Vietnam, and there is OceanLotus, a
competitive environment and make sound
cyber-espionage group which could potentially
business decisions
be behind the attacks called APT32 and APT-C-
00. Information Warfare

 These threats have been aimed at corporate  State-sponsored information and electronically
and government organizations in Vietnam, the delivered actions taken to achieve information
Philippines, Laos, and Cambodia and focus on superiority in support of national military
foreign corporations with interests in Vietnam’s strategy.
manufacturing, consumer products, and
 Meant to affect enemy information and
hospitality industries.
information systems while protecting our
China information and information systems.

 One of China’s well-known attack groups is Information Warfare Categories


TEMP.Periscope, or Leviathan.
 Offensive - Deny, corrupt, destroy, or exploit an
 This group has recently been escalating their adversary’s information, and influence the
attacks and targeting U.S. companies in the adversary’s perception.
engineering and maritime fields that are linked
Defensive - Safeguard the nation and allies from similar
actions, also known as IW hardening.
Private Investigation use compromised e-mails to request payments
to fraudulent locations.
 Research to develop knowledge on a human
subject, by obtaining identifiable private 4. Phishing/Spoofing - Both terms deal with
information that can be linked to the individual. forged or faked electronic documents. Spoofing
generally refers to the dissemination of e-mail
Investigation Methods
which is forged to appear as though it was sent
 Begin by writing down everything you know by someone other than the actual source.
about your subject. Phishing, also referred to as vishing, smishing,
 Start the investigation from the person’s or pharming, is often used in conjunction with a
address and work out from there. spoofed e-mail. It is the act of sending an e-mail
 Research property records. falsely claiming to be an established legitimate
 Ask at the Post Office for any change of address business in an attempt to deceive the
on the person. unsuspecting recipient into divulging personal,
 Ask neighbors for information. sensitive information such as passwords, credit
 Research marriage records. card numbers, and bank account information
ONLINE FRAUD after directing the user to visit a specified
website. The website, however, is not genuine
Online Frauds and was set up only as an attempt to steal the
Internet Frauds is the use of Internet services or user's information.
software with Internet access to defraud victims or to 5. Ransomware – form of malware targeting both
otherwise take advantage of them. Internet crime human and technical weaknesses in
schemes steal millions of dollars each year from victims organizations and individual networks in an
and continue to plague the Internet through various effort to deny the availability of critical data
methods. Several high-profile methods include the and/or systems. Ransomware is frequently
following: delivered through spear phishing emails to end
1. Business E-Mail Compromise (BEC) – A users, resulting in the rapid encryption of
sophisticated scam targeting businesses sensitive files on a corporate network. When
working with foreign suppliers and companies the victim organization determines they are no
that regularly perform wire transfer payments. longer able to access their data, the cyber
The scam is carried out by compromising perpetrator demands the payment of a ransom,
legitimate business e-mail accounts through typically in virtual currency such as Bitcoin, at
social engineering or computer intrusion which time the actor will purportedly provide
techniques to conduct unauthorized transfer of an avenue to the victim to regain access to their
funds. data.

2. Data Breach – A leak or spill of data which is Frequent instances of Internet fraud include:
released from a secure location to an untrusted 1. Business Fraud - Business fraud consists of
environment. Data breaches can occur at the dishonest and illegal activities perpetrated by
personal and corporate levels and involve individuals or companies in order to provide an
sensitive, protected, or confidential information advantageous financial outcome to those
that is copied, transmitted, viewed, stolen, or persons or establishments. Also known as
used by an individual unauthorized to do so. corporate fraud, these schemes often appear
3. E-Mail Account Compromise (EAC) – Similar to under the guise of legitimate business practices.
BEC, this scam targets the general public and • Charity Fraud
professionals associated with, but not limited • Internet Auction Fraud
to, financial and lending institutions, real estate • Non-delivery of merchandise
companies, and law firms. Perpetrators of EAC • Non-payment of funds
• Overpayment scheme Therefore, computer ethics is set of moral principles
• Re-shipping scheme that regulate the use of computers. Some common
issues of computer ethics include intellectual property
2. Credit Card Fraud - Credit card fraud is the
rights (such as copyrighted electronic content), privacy
unauthorized use of a credit or debit card, or
concerns, and how computers affect society.
similar payment tool (ACH, EFT, recurring
charge, etc.), to fraudulently obtain money or INTRODUCTION TO E-COMMERCE
property. Credit and debit card numbers can be
What is E-commerce? Refers to the buying and selling
stolen from unsecured websites or can be
of goods or services using the internet, and the transfer
obtained in an identity theft scheme
of money and data to execute these transactions.
It is often used to refer to the sale of physical products
online, but it can also describe any kind of commercial
transaction that is facilitated through the internet.
3. Internet Auction Fraud - Internet auction fraud
involves schemes attributable to the The history of E-commerce begins with the first ever
misrepresentation of a product advertised for online sale: on the August 11, 1994 a man sold a CD by
sale through an Internet auction site or the non- the band sting to his friend through his website Net
delivery of products purchased through an Market, An American retail platform.
Internet auction site.
This is the finest example of a consumer purchasing
4. Investment Schemes - Investment fraud product from a business through the World Wide Web –
involves the illegal sale or purported sale of or “E-commerce” as we commonly know it today.
financial instruments. The typical investment
TYPES OF E-COMMERCE
fraud schemes are characterized by offers of
1. Business to Consumer (B2C)
low- or no-risk investments, guaranteed
When a business sells a good or services to an individual
returns, overly-consistent returns, complex
consumer.
strategies, or unregistered securities.
2. Business to Business (B2B)
These schemes often seek to victimize affinity groups—
When a business sells a good or service to another
such as groups with a common religion or ethnicity—to
business
utilize the common interests to build trust to effectively
operate the investment fraud against them. The 3. Consumer to Consumer (C2C)
perpetrators range from professional investment When a customer sells a good or service to another
advisers to persons trusted and interacted with daily, consumer
such as a neighbor or sports coach. The fraudster’s
ability to foster trust makes these schemes so 4. Consumer to Business (C2B)
successful. Investors should use scrutiny and gather as When a consumer sells their own products or services
much information as possible before entering into any to a business or organization.
new investment opportunities. EXAMPLE OF E-COMMERCE
5. Non-delivery of Merchandise - Non-delivery of
merchandise is a scheme most often linked to 1. RETAIL – The sale of product by a business directly to
Internet auction fraud, in which a seller on an a costumer without any intermediary.
Internet auction website accepts payment for 2. WHOLESALE – The sale of product in bulk, often to a
an item yet intentionally fails to ship it. Sellers retailer then sells them directly to consumers.
like these sometimes will relist the item and 3. DROPSHIPPING – The sale of a product, which is
attempt to sell it again through a different manufactured and shipped to the consumer by a third
username. party.

4. CROWDFUNDING - The collection of money from


consumers in advance of a product being available in
UNIT 7: TRENDS AND ISSUES IN COMPUTING order to raise the start up capital necessary to bring it
to the market. products.
- Provides user with more option to compare and
5. SUBSCRIPTION – The automatic recurring purchase of select the cheaper and better options.
a product or service on a regular basis until the - The customer can put a review comments about
subscriber chooses to cancel. the product and can see what others are buying.
- Provides a substantial discount to customer.
6. PHYSICAL PRODUCTS – Any tangible good that - Provides options of virtual auctions.
requires inventory to be replenished and orders to be
3. Advantages to Society
physically shipped to consumer as sales are made.

7. DIGITAL PRODUCTS – Downloadable digital goods, - Customers need not to travel to shop a
templates and courses or media that must be product.
purchased for consumption or licensed for use. - Helps reducing the costs of products.
- Enabled rural areas to access services and
8. SERVICES – A skill or set of skills provided in exchange products, which are otherwise not available to
for compensation. them.
- Helps the government to deliver public
SOCIAL ISSUES OF E-COMMERCE
services such as healthcare, education, social
services at a reduce costs and in an improved
1. Security and Privacy – It is the most important issues
manner.
for e-commerce because without security and privacy,
the customer will be scared, get cheated by the seller. ETHICS & PRIVACY

2. Shipping Issues – When the buyer buys a product Computer Ethics


from the seller and the seller is from other state then a set of morals that regulate the use of computers. It is
they should use shipping to send the products to the important for computer users to be aware of the ethical
buyer so that it can arrive to the place of the buyer stay. use of copyrighted material, the ethical use of resources
and information, and the ethical use of school, company
3. Complexity of Process – When the buyer want to
and employee information.
purchase that such products then they need to follow
their step to purchase a product from them such as 10 Commandments of Computer Ethics
register as a member of that website, fill up the
agreement form, key in all your personal details, key in 1.) Thou shalt not use a computer to harm other people
your credit card number and so forth. 2.) Thou shalt not interfere with other people’s
computer work
E-commerce Advantages
3.) Thou shalt not snoop around in other people’s files.
1. Advantage to Organization 4.) Thou shalt not use a computer to steal
- Organization can expand their market to national 5.) Thou shalt not use a computer to bear false witness.
and international market with minimum capital
6.) Thou shalt not copy or use proprietary software for
investment.
which you have not paid (without permission).
- Helps organization to reduce the cost to create
7.) Thou shalt not use other people’s computer
process, distribute, retrieve and manage the paper
resources without authorization or proper
based information.
compensation.
- Improves the brand image of the company.
8.) Thou shalt not appropriate other people’s
- Helps to provide better customer service.
intellectual output.
- Helps to simplify the business processes and,
9.) Thou shalt think about the social consequences of
makes them faster and efficient.
the program you are writing or the system you are
2. Advantages to Customer designing.
- It provides 24/7 support 10.) Thou shalt always use a computer in ways that
- Provides more option and quicker delivery of
ensure consideration and respect for your fellow Cybersecurity – Defined as protecting computer
humans. systems, which communicate over the computer
networks.
Common Issues of Computer Ethics
The components of a computer system that needs to
1. Privacy Concerns be protected are:
2. How Computer Affects Society
1. Hardware – The physical part of the computer, like
3. Intellectual Property Rights
the system memory and disk drive
Five Principles of Privacy
2. Firmware – Permanent software that is etched into a
1. Notice/ Awareness – requires the company to
hardware device’s nonvolatile memory and is mostly
provide consumers with a notice before collecting their
invisible to the user.
personal information.
2. Choice/ Consent – allows consumers to control how 3. Software – The programming that offers services, like
their information is used. operating system, word processor, internet browser to
3. Access/ Participation – allows consumers to view the the user
data collected about them and gives them the
opportunity to correct any incorrect information about What are the concerns of Computer Security?
them. Computer Security is concerned with four main areas:

4. Integrity/ Security – requires the information 1. Confidentiality – Only authorized users can access
collected to be stored safely and securely. the data resources and information.

5. Enforcement/ Redress – the above four principles 2. Integrity – Only authorized users should be able to
are enforced. modify the data when needed.
Ways of making personal data more private 3. Availability – Data should be available to users when
1. Install personal firewall. needed.
2. Purchases goods with cash, rather than credit card.
3. Less use of Facebook. 4. Authentication – Are you really communicating with
4. Avoid GPS tags in photo. whom you think you are communicating with?

COMPUTER SECURITY COMPUTER SECURITY THREATS

What is Computer Security? VIRUSES – A malicious program which is loaded into the
user’s computer without user’s knowledge.
Computer Security, also known as cybersecurity or IT
security, is the protection of information systems from COMPUTER WORM – A computer worm is a software
theft or damage to the hardware, the software, and to program that can copy itself from one computer to
the information on them, as well as from disruption or another, without human interaction.
misdirection of the services they provide. PHISHING – Disguising as a trustworthy person or
Often people confuse computer security with other business, phishers attempt to steal sensitive financial or
related terms like information security and personal information through fraudulent email or
cybersecurity. One way to ascertain the similarities and instant messages.
differences among these terms is by asking what is BOTNET – A botnet is a group of computers connected
being secured. to the internet that have been compromised by a
Information Security – Securing information from hacker using a computer virus.
unauthorized access, modification & deletion ROOTKIT – A rootkit is a computer program designed to
Computer Security – Securing a standalone machine by provide continued privileged access to a computer
keeping it updated and patched while actively hiding its presence.
KEYLOGGER – Also known as keystroke logger,  Change passwords regularly using a unique
keyloggers can track the real-time acitivity of a user on combination of numbers, letters and case types
his computer.
 Use the internet with caution and ignore pop-
What do anti-viruses/ firewalls do to ensure these ups, drive-by downloads while surfing
concerns issues are solved?
 Taking the time to research the basic aspects of
FIREWALL - Also known as a ‘packet filter’. Basically, computer security and educate yourself on
software which monitors network traffic and connection evolving cyber-threats
attempts into and out of a network or computer and
 Perform daily full system scans and create a
determines whether or not to allow it to pass.
periodic system backup schedule to ensure your
Antivirus - A software which will find data is retrievable should something happen to
programs/files/softwares/etc that might compromise your computer
your computer, either by being executable or by
Social Computing
exploiting a vulnerability in the program normally
supposed to process them - - types of malware. It
An area of computer science that is concerned with the
detects these kinds of harmful programs that are
intersection of social behavior and computational
installed on your computer or about to be installed.
systems. Social computing is the collaborative and
interactive aspect of online behavior.

10 Social Issues Computers Have Created

What are the types of firewalls?


1. Communication Breakdown – Socializing within a
PACKET-FILTERING FIREWALL – Examines each packet family unit has always been important, as it strengthens
that crosses the firewall and tests the packet according the bonds between us and ensures cohesion within the
to a set of rules that you set up. group.
2. Defamation of Character – The only means of getting
STATEFUL PACKET INSPECTION (SPI) – A step up in in touch with major corporations or famous people in
intelligence from simple packet filtering. the public eye prior to the advent of digital
DEEP PACKET INSPECTION (DPI) – The actual content of communication was via a stiffly written letter.
the packets is inspected so viruses, spam, and other 3. Identity Theft – Fraud is another spurious activity
harmful content can be blocked. that has been able to evolve in the wake of easily
Computer Security Practices accessible computers and the internet.
4. Cyber Bullying – As with defamation of public figures,
Secure your computer physically by: the internet and computers have also made it easier for
 Installing reliable, reputable security and anti- spiteful people to attack they know personally as well as
virus software perfect strangers via the anonymous platforms that are
available to them.
 Activating your firewall, because a firewall acts
as a security guard between the internet and 5. Gaming Addiction – Whilst computers and the
your local area network. internet have made it easier for gambling addicts to get
their fix, a new type of addiction has also arisen, in the
 Stay-up-to-date on the latest software and form of addiction to video games. This is something that
news surrounding your devices and perform can impact people of all ages and leads inevitably to a
software updates as soon as they become number of problems, from the social to the financial.
available
6. Privacy – Whilst high profile cases of online identity
 Avoid clicking on email attachments unless you theft and fraud should have caused people to become
know the source more careful about how they use their personal
opinion, issues of privacy and a lack of appreciation for last few years. The issue of net neutrality is
the risks are still widespread. essentially a question of access

7. Health & Fitness – We are living increasingly


sedentary lifestyles, because computers are removing
the need for us to physically carry out many tasks, as
well as keeping us rooted to one spot throughout our
working days and during our leisure time.

8. Education – The educational properties of computers


are well known and universally lauded, but having all
the information in existence on tap has its own issues.

9. Terrorism & Crime – Computers have been a positive


force in allowing for the creation of global movements
and righteous activism in a number of forms.

10. Sexuality – This is a less clear cut topic, but there


are fears that unmitigated access to pornography for
adolescents is shaping the sexual proclivities and
expectations of young people in problematic ways.

Legal Aspects of Computing

Related to the overlapping areas of law and computing.

1. Privacy – Most people have their personal data


spread throughout the digital world. Even
things thought to be secure, such as email or
private accounts, can be accessed by
unintended sources.

2. Digital Ownership – Digital mediums have


allowed information to flow more freely than
before. This exchange of ideas comes with a
legal and ethical backlash.

3. Data Gathering – On some level, everyone


knows that their online lives are monitored. The
United States has even passed legislation
allowing the government to actively monitor
private citizens in the name of national
security.

4. Security Liability – In the past, security issues


were resolved by locking a door. Digital security
is much more complicated. Security systems for
digital networks are computerized in order to
protect vital information and important assets.

5. Access Costs – Net neutrality has become a


trendy issue thanks to legislative efforts in the

You might also like