User:Social impacts of it 1

dvd

  Social Impacts Of IT 



Social Impacts of ICT affects the local communities as it helps the elderly generation. It helps them get there Grocery shopping done. They can order it online and it is delivered to them. This is an advantage to the elderly as they do not need to travel out of there house in horrible weather conditions and be struggling to bring it home. However, this is also a disadvantage as they do not get to communicate with others living in the community. There is also a disadvantage and this is that people who do not have the internet are not able to do online shopping, as a result they will have to go to the store and buy there things rather than having the advantage others have of ordering it online. However, this is an advantage as they get out of there houses’ and are able to communicate with others living in there local community.

 ECONOMIC: 

 Economics  is the social science that studies the behavior of individuals, groups, and organizations (called economic actors, players, or agents), when they manage or use scarce resources, which have alternative uses, to achieve desired ends. Agents are assumed to act rational, have multiple ends in sights (all desirable), limited resources to obtain them, a set of stable preferences, a definite overall guiding objective, and the capability of making a choice.

Economics traditional concern is to gain an understanding of the processes that govern the production, distribution and consumption of goods and services in an exchange economy.







     

     

     

     

 LEGAL:  

 Is the process of identifying and retrieving information necessary to support legal decision-making In its broadest sense, legal research includes each step of a course of action that begins with an analysis of the facts of a problem and concludes with the application and communication of the results of the investigation.

     

 WORKING PRACTICES: 

 There are a number of factors relating to how jobs are designed or carried out that may increase the risk of violence and crime happens to you or your staff.

     

     

<p class="MsoNormal">     

<p class="MsoNormal">     

<p class="MsoNormal">     

<p class="MsoNormal">     

<p class="MsoNormal">     

<p class="MsoNormal">     

<p class="MsoNormal">     

<p class="MsoNormal">      

<p class="MsoNormal">

<p class="MsoNormal"> Copyright  is a legal concept, enacted by most governments, that grants the creator of an original work exclusive rights to its use and distribution, usually for a limited time, with the intention of enabling the creator of intellectual wealth (e.g. the photographer of a photograph or the author of a book) to receive compensation for their work and be able to financially support themselves.

<p class="MsoNormal">

<p class="MsoNormal">

<p class="MsoNormal"> Ethics , sometimes known as philosophical ethics, ethical theory, moral theory, and moral philosophy, is a branch of philosophy that involves systematizing, defending and recommending concepts of right and wrong conduct  , often addressing disputes of moral diversity. undefined The term comes from the Greek word ἠθικός or  ethos , which means "character", "habit", "and praxis". The superfield within philosophy known as axiology includes both ethics and aesthetics and is unified by each sub-branch's concern with value

<p class="MsoNormal">

<p class="MsoNormal">

<p class="MsoNormal">

<p class="MsoNormal">

<p class="MsoNormal">

<p class="MsoNormal">

<p class="MsoNormal"> PRIVACY OF INFORMAION  is usually how to keep your information in website so people you don’t know they will not see it.

<p class="MsoNormal">

<p class="MsoNormal">

<p class="MsoNormal">

<p class="MsoNormal">

<p class="MsoNormal">

<p class="MsoNormal">

<p class="MsoNormal">

<p class="MsoNormal">

<p class="MsoNormal">

<p class="MsoNormal">

<p class="MsoNormal" style="tab-stops:55.15pt">

<p class="MsoNormal" style="tab-stops:55.15pt">

<p class="MsoNormal" style="tab-stops:55.15pt">

<p class="MsoNormal" style="tab-stops:55.15pt">

<p class="MsoNormal">

<p class="MsoNormal"> Cyber bullying  is the use of Information Technology to harm or harass other people in a deliberate, repeated, and hostile manner. According to U.S. Legal Definitions, Cyber-bullying could be limited to posting rumors or gossips about a person in the internet bringing about hatred in other’s minds; or it may go to the extent of personally identifying victims and publishing materials severely defaming and humiliating them.

<p class="MsoNormal">   

<p class="MsoNormal">

<p class="MsoNormal">

<p class="MsoNormal"> Spamming  remains economically viable because advertisers have no operating costs beyond the management of their mailing lists, and it is difficult to hold senders accountable for their mass mailings. Because the barrier to entry is so low, spammers are numerous, and the volume of unsolicited mail has become very high. In the year 2011, the estimated figure for spam messages is around seven trillion. The costs, such as lost productivity and fraud, are borne by the public and by Internet service providers, which have been forced to add extra capacity to cope with the deluge. Spamming has been the subject of legislation in many jurisdictions.

<p class="MsoNormal">

<p class="MsoNormal">

<p class="MsoNormal"> Phishing  is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, banks, online payment processors or IT administrators are commonly used to lure unsuspecting public.

<p class="MsoNormal">

<p class="MsoNormal">

<p class="MsoNormal">

<p class="MsoNormal">

<p class="MsoNormal">

<p class="MsoNormal">

<p class="MsoNormal">

<p class="MsoNormal">

<p class="MsoNormal"> Denial-of-service (DoS)  or distributed denial-of-service (DDoS) attack is an attempt to make a machine or network resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of efforts to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet. As clarification, DDoS (Distributed Denial of Service) attacks are sent by two or more persons, or bots. (See botnet ) DoS (Denial of Service) attacks are sent by one person or system.