Social impacts of the use of it By: Mohamed Abdalla.

Slides:



Advertisements
Similar presentations
E - safety How e-safe are you?.
Advertisements

Protecting children online  How can you protect your child online?  Are you aware of the dangers?  Do you know what you can put in place to protect.
Internet Online Safety How to have FUN and Stay in Control.
Internet safety! By: Liam, Brilee, Dinny, Shalisha.
INTERNET SAFETY.
What you don’t know CAN hurt you!
What is Cyber bullying? Cyber bullying is when a person, or a group of people, uses the internet, mobile phones or other digital technologies to threaten,
Some useful tips to help
ICT Curriculum Evening – an introduction to Wizkid.
Never share your passwords. Even with your significant other or your BFF! Yes, with parents. Especially if they ask. If someone in the lab was watching.
Created by Mr. Hemmert.  Have you ever received a mean or instant message? Have you ever sent one? This is called cyberbullying. A cyberbully uses.
The impact of IT in jobs People say the impact of IT is good, some it’s bad, and your at the right place to find out which one it is.
Social Impacts of ict By Jagpal Rajoo. The local community Development of ict in the local community Everyone will have the latest technology because.
You can contact your parents so they know where you are and you can extend your time out. You can take photos and videos and share them with family and.
 Communicating with friends is now easier than ever, for example on Facebook you can connect with all your friends and chat to them very easily and instantly.
Contents  What is Cyber Bullying?   Credit Card  Social Networking Sites  Phones  End Slide.
Social The social impact may include allowing others to access your personal information, potential employers cheacking your face book page to obtain.
Impacts of the use of IT -Social network sites This is a site that lets you post messages, upload pictures and stories on your own personal page. You can.
Social impact of using I.T Fahimul Hoque. Local Community Development in IT have lead to changes in the way local communities work. IT has changed the.
Digital Access Digital access is the equal ability for people all over the globe to access digital internet. The digital divide is a gap that continues.
Social Impacts Of The Use Of IT By Janat. Local Community The local community has been expanded through people buying goods online as opposed to visit.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
By Tohfell Ahmed. IT Development that are effecting the Local Community for example: If there is a online clothing website which has the same products.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Chloe Miles IMPROVING PRODUCTIVITY USING IT. Menu Using Word Advantages Disadvantages Conclusion E-Safety Social Media Dangers of Social Media Sites Staying.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
ANTI-BULLYING AT KNIGHTLOW CYBER BULLYING. Cyber bullying: fact or fiction? 1. There are at least 7 forms of bullying that happen using technology True.
100 Internet Safety Jeopardy Social Network Sites Online Shopping Words & Pictures Cyber- bullying Internet Scams.
INTERNET SAFTEY AND CYBER BULLYING By your internet protection go to guys… Lukas Richters and Raymond Weaver.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Social impacts of IT Mohammed Mustafa. Local community Developments in IT have led to people shopping online and taking away the community spirit. For.
Shima Begum B44034 Task1 P6. Local community IT has an huge impact on local communities as they can keep in touch with friends, family, workers, employees.
Social impact of ICT. The local community The IT development that may effect the local community one person would start shopping online, chatting online,
The social impacts of ICT is that its gives you access to your personal information. Face book is acceptable in some cases because employers can access.
Personal Online Safety Information Security Systems Community Outreach Program McKinley Middle School April 23, 2013.
Internet Safety Mr. Richard Orr Technology Teacher Murphy Jr. High School.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
MY ONLINE CODE In the last 2 years of digital literacy I have learned the proper ways to act and why to act that way online, I have also learned other.
Social impacts of ICT. Local Community IT has been good in the local community for families who need to keep in touch with family they can use Facebook.
The social impacts of IT: Spending more time on the computer, laptop, phone, tab etc. than going outside. Negative effect on health. Negative effect on.
Cyberbullying Activity 4: Advice Quiz. Ask an Internet Expert These people need help from someone who knows how to be safe online... YOU! What advice.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
SOCIAL IMPACTS OF IT. Local community IT has affected the local community a lot because of people won’t meet someone face to face instead they talk online.
This is Facebook and twitter that you can go on when you are at home but school monitor what you go on in school so they put a ban on it other people can.
Social impacts of IT By Lewis dancocks. Social impacts Due to IT people around the world can commutate with each other anywhere at any time, this is due.
What is Cyber bullying? Cyber bullying is when a person, or a group of people, uses the internet, mobile phones or other digital technologies to threaten,
DIGITAL ETIQUETTE Teachers Students Quiz What is Digital Etiquette? What is Digital Etiquette? Social Networking Social Networking Cyber Bullying Cyber.
By: Delaney Syme and Megan Eglin.. When there is a very intense argument going on in a chat room or over texts it is called flaming. The bullies that.
Cyber Bullying Anti-bullying Week Cyber Bullying What does it mean? What does it mean? Cyber bullying is when cruel messages or pictures are sent.
E- SAFETY PRESENTATION By: Mohamed Fathy Tip 1Tip 2Tip 3Tip 4Tip 5 And the What is e safety.
Tambir Ahmed - A42134 SOCIAL IMPACTS IN IT. LOCAL COMMUNITY As the local community use the computers and internet to socially interact with others, Having.
The Impact of IT. It is hard to believe the impact IT has had on society over the last 40 to 50 years. Many of the things we take for granted now rely.
YEAR 6’S GUIDE TO STAYING SAFE ON THE INTERNET. CHATTING When you are chatting to people online, try not to give out any personal information about yourself.
Tips to Avoid Online Scams. About Several threats are there which spreads on every computer system just to infect each system with their harmful ways.
Home Business Shopping Online – Purchasing goods and services using the Internet.
“Doing the Right thing online” Online Safety. Questions How many of you have like to go off by yourself and get on the internet? What do you like to use.
Information Guide to Cyber Bullying. Cyber bullying is a relatively new form of bullying which has started happening a lot on social networking sites,
As modern children, we have a huge number of electronic devices available to us. We might use computers, tablets, mobile phones or games consoles; for.
Learn how to protect yourself against common attacks
Unit 4 IT Security.
How to use the internet safely and How to protect my personal data?
How to use the internet safely and How to protect my personal data?
IGraphic Social impacts of IT
E - safety How e-safe are you?.
What devices use the internet?
Communicating in the IT Industry
Presentation transcript:

Social impacts of the use of it By: Mohamed Abdalla

Local community TASK 1

Development in IT  The development of the social IT affected the community, some affects are positive and some are negative. Some social networking sites like Facebook and twitter has affected the community, people chat online instead of meeting in a coffee shop, that affects the people that works in a coffee shop and their business drops off. Also it affects people that chat on Facebook, if they didn’t get to meet for like 7 years and only chatting on Facebook then when they meet, they will not know how to speak or act face to face and that will cause problems. TASK 1

Advantages  Local stores like Tesco have an advantage in the use of IT because it is a big business, they have a websites which people can shop online, check for offers as well. This gives them more customers so they get more profit. People will not have to go to shops anymore, they can just stay at home and pick the staff that they need and then they get it by delivery. TASK 1

Disadvantages Small shops in a local area are affected by the development of the IT, for example people don’t have to go out from their home and buy staff from the shop, they can buy anything online instead of going shops. The people that works in these shops are loosing money because there are less customers. Some people might loose their jobs. TASK 1

Availability of jobs TASK 1

Availability of jobs  Some jobs that used to be performed by humans are now performed by robots, this affects the people that used to do these jobs, also it affects the people that build the robot and maintain it.  Fewer jobs  Fewer jobs for the people that robots do their job, because machines can do the work instead of them. If all the people used robots and machines in their, then people will not find jobs and they will not be able to pay for the service provided by the government, also they will have no money to go around with.  More jobs  more jobs for the people that works in maintaining robots and building it. because everyone will be using robots so they will have more work to do. TASK 1

Inequality in broadband access TASK 1

Inequality in broadband access  There are some people that cant get an internet access which it is unfair to them. If there were no local shops and shopping is only online then these people that cant get internet access will be affected. These people cant go on internet for many reasons, some of them cant get internet because they cant afford it, other because there are no internet access in some areas in the country and other people cant use internet because they don’t know how to use it because of their age or because of disability, so if there is no shops and only online shopping then these people that don’t have internet access because of the area that they living in, they can’t even buy a computer or a laptop because they have to buy it online and they don’t have an internet access. TASK 1

Potential IT threats  Phishing  The phishing attack sent users to a fake site where they were asked to input personal details like addresses, s and credit card details. It is extremely dangerous. If gave these details to them then that can harm you and your family, these people that have your details can get into your house and harm you and your family. If you gave your credit card details then that person can take the money from your card. Here is an example of phishing, Microsoft received letters that people that go on x box live are affected by phishing, Microsoft said that only small amount of users are affected. We take the security of the Xbox Live service seriously and work to improve it against evolving threats a man from Microsoft said that, also he said, "We can confirm that only a small percentage of Xbox Live customers have been affected here in the UK. The Microsoft company said that there is some security advices on it’s website and they said that users should not give their or password to anybody., so to protect your self from phishing, you shouldn’t give your detail to anyone on internet, that includes your address, and your credit card details.  Spam  Spam is a concern for Internet users and policy makers not only blocking networks and distributing viruses and fake messages, but also undermining trust in the Internet and the digital economy. also it is when a lot of people send the same message to everyone which it is annoying. People do that on mobile phones, laptops and pcs, but most of it on mobile phones, specially BlackBerrys, there is a messenger on the blackberry smartphones which it is called blackberry messenger, on this messenger people do spam most of the time, for example someone sends a message saying for example everyone add that person…. And then everyone sends the same message. The solution for spam is to delete the people that does spam and only add the people that don’t spam. TASK 2

 Cyber bullying  The cyber bullying is one of the most dangerous threats on internet which cause a lot of people a lot of problems. Cyber bullying is when a group of people sending letters to someone trying to scare him, that person can do that using many different ways which is the common way is by sending a threat letters, these letters cause people killing themselves and hurting themselves. If you someone sends you threats letter and you want you protect your self and get rid of this, then you have to make a new account on Facebook or on your messenger. If the same person got your new then report it to the police.  Service denial  Service denial is lot of requests being sent to the server and it ends up the server crashing, this is a really big threat because if the server crashed then the company will have serious problems, then the company will have to pay a lot of money fixing the server also the people that uses the server wouldn’t be able to access websites. TASK 2