3. Computer and Society
Everyone knows that this is the age of computer and majority of people are
using computer.
Development of science and technology has direct effect on our daily life as
well as in our social life.
Computer technology has made communication possible from one part of
the world to the other in seconds.
They can see the transactions in one part of the world while staying in the
other part.
Computer development is one of the greatest scientific achievements of the
20 th century.
Computers are used in various fields as well as in teaching and learning.
3
4. Major computer application fields
An aid to management: The computer can also be
used as a management tool to assist in solving business
problems.
Banking: Branches are equipped with terminals giving
them an online accounting facility and enabling them to
information as such things as current balances,
deposits, overdrafts and interest charges.
Industrial Application: In industry, production may be
planned, coordinated and controlled with the aid of a
computer.
Engineering Design: Computer help in calculating that
all the parts of a proposed design are satisfactory and
also assist in the designing.
and for payroll and also for check-up and treatment of
diseases.
4
5. Cont.…
Meteorology: Data is recorded at different levels of
atmosphere at different places, using remote sensors
carried on a satellite.
Air Travel: Small computers are installed as a part of
the plane's equipment.
Road Traffic Control: Computers assist with the
control of traffic lights.
Telephones: Computerized telephone exchanges
handle an ever increasing volume of calls very
efficiently.
Medicine: Computers are widely used in hospitals for
such task as maintaining drugs, surgical equipment
In addition computers are also used for recording and
film studios, research, military, etc.
5
6. Computers have both positive and negative impact
in our daily life as well as in our social life.
But the gross development of the nation is faster
with the application of computers in industries and
education.
6
7. Positive Impact of Computer
The work can be done in very less time.
More information can be stored in small space.
Multitasking and multiprocessing capabilities of
data.
Easy to access data.
Impartiality (equal treatment of all rivals or
disputants; fairness).
Documents can be kept secret.
Error free result.
It can be used for various purposes. i.e. It can be
used in any type of work.
7
8. Negative Impact of Computer
Highly expensive.
Data piracy ( illegal copying, distribution, or use
of software/data).
Increased Unemployment.
Huge data and information can be lost
sometimes.
Fast changing computer technology.
Service distribution(media content such as audio,
video, software ,shared resources…..)
Illiteracy( lack of basic computer knowledge) of
computing and computers.
8
9. Computers have both positive and negative
impact in our society. But the use of computer is
increasing
day-by-day.
9
10. Computer Ethics
Computer technology advances from time to time and most probably
will keep advancing in the future. With that, computer ethics will also
keep growing and changing to meet the need of the technology.
Ethics means a set of moral principles that govern the behaviour
of a group or individual.
Therefore, computer ethics is set of moral principles that
regulate the use of computers. Some common issues of computer
ethics include intellectual property rights (such as copyrighted
electronic content), privacy concerns, and how computers affect
society.
Hence, generally, computer ethics is needed to avoid the improper
usage of computer technology and bring justice.
10
11. Cont.…
For example,
while it is easy to duplicate copyrighted electronic
(or digital) content, computer ethics would suggest
that it is wrong to do so without the author's
approval.
And while it may be possible to access someone's
personal information on a computer system,
computer ethics would advise that such an action is
unethical.
11
12. Objectives of computer ethics
To ensure the privacy and safety of the computer users.
To helps people use the computer in the right ways.
To guarantee that the works that done by someone did not
declare by other people.
12
13. Importance of computer ethics
To protect personal & commercial information such as login & password
info, credit card and account information and government and
commercial databases. It also controls unwanted internet mail and ads
(Spam).
To control plagiarism, student identity fraud, and the use of copyrighted
material, etc.
To make ICT (information and communication technologies)available
and accessible to all peoples, including the disabled and the
deprived. Accessibility needs to be kept in mind during curriculum
design (in educational contexts), in order to maximize the capabilities of
the technology.
To suppress dishonest business practices and to protect and
encourage fair competition.
To promote moral and social values in society.
13
14. Problems…
There are several types of activities that against the computer ethics:
1. Stealing funds via computers.
- The one who did this must be very intelligent to manipulate the
computer system and to access into the system.
2. Unauthorized computer entry.
- The perpetrator will steal a company's trade secrets and data and then sell it
to the competitors. This activity involves both property and privacy.
3. Hacking.
- Any computer-related activity which is not sanctioned or approved by owner of
a system or networks.
4. Plagiarism.
- Duplicating copyrighted content without the author's approval and take any
source without credit to the original author.
5. Phishing scam
- Phishing scams are attempts by scammers to trick people into giving out
personal information such as bank account number, passwords and credit card
numbers.
14
15. .
How to avoid Phishing Scams
Keep Informed About Phishing Techniques – New phishing scams
are being developed all the time. Without staying on top of these new
phishing techniques, you could inadvertently fall prey to one. Keep
your eyes peeled for news about new phishing scams.
Think Before You Click! – It’s fine to click on links when you’re on
trusted sites. Clicking on links that appear in random emails and
instant messages, may lead you where they are supposed to lead?
E.g. A phishing email.
Install an Anti-Phishing Toolbar – Most popular Internet browsers
can be customized with anti-phishing toolbars. Such toolbars run
quick checks on the sites that you are visiting and compare them to
lists of known phishing sites. If you stumble upon a malicious site, the
toolbar will alert you about it.
15
16. Verify a Site’s Security – It’s natural to be a little worry about supplying
sensitive financial information online. As long as you are on a secure
website, however, you shouldn’t run into any trouble. Before submitting any
information, make sure the site’s URL begins with “https” and there should
be a closed lock icon near the address bar. Check for the site’s security
certificate as well. If you get a message stating a certain website may
contain malicious files, do not open the website
Check Your Online Accounts Regularly – If you don’t visit an online account
for a while, someone could be having a field day with it. Even if you don’t
technically need to, check in with each of your online accounts on a regular basis.
Get into the habit of changing your passwords regularly too.. Get monthly
statements for your financial accounts and check each and every entry carefully to
ensure no fraudulent transactions have been made without your knowledge.
Keep Your Browser Up to Date – Security patches are released for
popular browsers all the time. They are released in response to the security
loopholes that phishers and other hackers inevitably discover and exploit. If
you typically ignore messages about updating your browsers, stop. The
minute an update is available, download and install it.
16
17. Use Firewalls – High-quality firewalls act as buffers between you, your
computer and outside intruders. You should use two different kinds: a desktop
firewall and a network firewall. The first option is a type of software, and the
second option is a type of hardware. When used together, they drastically
reduce the odds of hackers and phishers infiltrating your computer or your
network.
Be Wary of Pop-Ups –they are phishing attempts. Many popular browsers
allow you to block pop-ups; you can allow them on a case-by-case basis. If
one manages to slip through the cracks, don’t click on the “cancel” button;
such buttons often lead to phishing sites. Instead, click the small “x” in the
upper corner of the window.
Use Antivirus Software –Antivirus software scans every file which comes
through the Internet to your computer. It helps to prevent damage to your
system. You don’t have to live in fear of phishing scams.
By keeping the preceding tips in mind, you should be able to enjoy a worry-free
online experience.
Remember there is no single fool-proof way to avoid phishing attacks,
17