Fears About Computer TechnologyBy: BushraHasanRubelynneBalingoay
Table of Contents1.1 Fears About Computer Technology2.1 Identifying Types of Fears3.1 Cyberbullying3.2 Social Networks3.3 Prevention Methods4.1 Cybercrime4.2 Legal Consequences5.1 Increasing Unemployment6.1 Tragedy of the Commons7.1 References
Fears About Computer TechnologyComputer is the soul of modern generation.Every great invention has its benefits and its downfalls.Automated systems, communication device, computers.With technology always changing, people must adapt quickly.
Identifying Types of FearsThere are many categories that fall under computer fears such as: bullying hacking privacy concerns unemployment  fraud
CyberbullyingCyberbullying is the use of electronic devices and social networks to harass, threaten and intimidate people.
Causes the feelings of humiliation, frustration, and depression.
Affects the psychological well-being of an individual.[1]
Social Networks[3][4] [5]
Prevention MethodsZero-tolerance enforcement.Educators and authorities must apply their legal right to intervene.Develop a contract or pledge that protects students against violence at school and at home.Be educated on web based crimes.[7]
CybercrimeA criminal offence occurred by using a computer or telephone as a tool or object of a crime.Reasons for cybercrime are:theft of identitymoney forging documents & messages[8]
Legal ConsequencesCybercrime is a criminal offence. Imprisonment for a term up to 10 years, or punishable upon conviction.Cybercrime must be treated like any serious crime such as theft, fraud and libel. “In 2002, Canada’s Criminal Code was amended to include new offences.” (Government Canada)[10]
Increasing UnemploymentAutomation, controlled systems.IBM Watson computers.A shift toward self service organizations .Ford states, “Robotics will use and eventually become more serviceable in certain jobs more than humans.” http://www.youtube.com/watch?v=3TFDxIyaiCE[12]
Tragedy of the CommonsAnalogy of the Terminator.Two common fears:Advancing Technology Societal FearRobotic computers taking over the world.Creating machines that surpasses human abilities.Dependency on technology.
SummaryWith this constant trend of changing technology, it could impact our lives positively. Considering the preventive methods and educating ourselves about proper uses of technology, these fears will diminish.Remember human capacity is beyond computer technology. Without man made inventions and patents, these devices we have today would not exist.
ConclusionThe dependency on technology had shaped these fears we have about computer technology. We can help create a fear free and untroubled society with the help of safe uses of computer technology.
Referenceshttp://www.cyberbullying.us/2010_charts/teen_tech_use_2010.jpgAdams, Caralee. "CYBERBULLYING." Instructor 120.2 (2010): 44-49. Academic Search Premier. EBSCO. Web. 21 Mar. 2011.http://static.technorati.com/11/01/14/25023/facebook-logo.jpghttp://img.ezinemark.com/imagemanager2/files/30004252/2011/03/2011-03-05-11-53-38-8-myspace-started-in-2003-by-an-interner-marketing-f.jpeghttp://blogs.loc.gov/loc/files/2010/04/twitter_logo.jpg
Reference 2 Adams, Caralee. "CYBERBULLYING." Instructor 120.2 (2010): 44-49. Academic Search Premier. EBSCO. Web. 21 Mar. 2011.http://auctiontalkradio.blogspot.com/2007_03_01_archive.htmlSlide crimepic with credit cardhttp://www.victimsmatter.gc.ca/situation/cyber.htmlhttp://thenglishworld-10.blogspot.com/2008/05/internet.html

More Related Content

PDF
Cyber security rule of use internet safely
PPTX
Future of Information Technology
PPTX
TC160_PowerPoint_presentation_gbraga
PDF
Cybercrime: An Analysis from Positive Law Perspective
DOCX
Teknologi vera
PPT
One - Social & Ethical Issues
PPSX
Core elements of Digital Citizenship
PDF
Internet Privacy: Does it Truly Exist?
Cyber security rule of use internet safely
Future of Information Technology
TC160_PowerPoint_presentation_gbraga
Cybercrime: An Analysis from Positive Law Perspective
Teknologi vera
One - Social & Ethical Issues
Core elements of Digital Citizenship
Internet Privacy: Does it Truly Exist?

What's hot (18)

PPT
102 Chapter 4 Pt 2
KEY
Digital Citizenship & Media Literacy
PPTX
Internet system and its process
PDF
Chp 9 lect - computer crimes surveys (shared)
PPT
Future of Technology - Jan 2008 update
PDF
Mobile writing by the numbers
PPT
Why Study It
 
PPTX
The ‘M Age’ And Beyond
PPTX
Science & Technology
PPT
Super billing computers are your future
PDF
Popular Issues in (Digital) Media Literacy
PPT
Web Policies Presentation
PPTX
Online security – an assessment of the new
PPT
2008 Personnel Trends Post
PPT
Star Kamal 9 B
PPTX
Digital citizenship
PPT
Technology and Web 2.0 Across Institutions - Risk Mitigation
PPTX
Social networking and security
102 Chapter 4 Pt 2
Digital Citizenship & Media Literacy
Internet system and its process
Chp 9 lect - computer crimes surveys (shared)
Future of Technology - Jan 2008 update
Mobile writing by the numbers
Why Study It
 
The ‘M Age’ And Beyond
Science & Technology
Super billing computers are your future
Popular Issues in (Digital) Media Literacy
Web Policies Presentation
Online security – an assessment of the new
2008 Personnel Trends Post
Star Kamal 9 B
Digital citizenship
Technology and Web 2.0 Across Institutions - Risk Mitigation
Social networking and security
Ad

Similar to 38 FEARS ABOUT COMPUTER TECHNOLOGY (15)

PPT
Bowhuis Group Ppt Draft5
PPTX
CLE-Cyber crimes.pptx
PDF
Research Paper On Cybercrime
PPTX
It act and cyber crime
PPTX
Computer Crime
DOCX
document on cyber terrorism
DOCX
Sumaya Yeasmin ENGL 21002 Professor Robert Birdwell .docx
DOCX
E crime thesis Cyber Crime and its several types
DOCX
A report on cyber Crime
PDF
PPTX
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
PPTX
Ethical, Legal and Social issues IoT
PPTX
cybercrime.pptx
PDF
PPTX
Chapter 1
Bowhuis Group Ppt Draft5
CLE-Cyber crimes.pptx
Research Paper On Cybercrime
It act and cyber crime
Computer Crime
document on cyber terrorism
Sumaya Yeasmin ENGL 21002 Professor Robert Birdwell .docx
E crime thesis Cyber Crime and its several types
A report on cyber Crime
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
Ethical, Legal and Social issues IoT
cybercrime.pptx
Chapter 1
Ad

Recently uploaded (20)

PPT
Geologic Time for studying geology for geologist
PDF
Improvisation in detection of pomegranate leaf disease using transfer learni...
PDF
Five Habits of High-Impact Board Members
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PDF
Developing a website for English-speaking practice to English as a foreign la...
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PPTX
TEXTILE technology diploma scope and career opportunities
PPTX
Configure Apache Mutual Authentication
PDF
Consumable AI The What, Why & How for Small Teams.pdf
DOCX
search engine optimization ppt fir known well about this
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PPTX
Modernising the Digital Integration Hub
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PPTX
Chapter 5: Probability Theory and Statistics
PPTX
Microsoft Excel 365/2024 Beginner's training
PDF
Zenith AI: Advanced Artificial Intelligence
Geologic Time for studying geology for geologist
Improvisation in detection of pomegranate leaf disease using transfer learni...
Five Habits of High-Impact Board Members
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Module 1.ppt Iot fundamentals and Architecture
1 - Historical Antecedents, Social Consideration.pdf
Credit Without Borders: AI and Financial Inclusion in Bangladesh
Developing a website for English-speaking practice to English as a foreign la...
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
A proposed approach for plagiarism detection in Myanmar Unicode text
TEXTILE technology diploma scope and career opportunities
Configure Apache Mutual Authentication
Consumable AI The What, Why & How for Small Teams.pdf
search engine optimization ppt fir known well about this
sbt 2.0: go big (Scala Days 2025 edition)
Modernising the Digital Integration Hub
Final SEM Unit 1 for mit wpu at pune .pptx
Chapter 5: Probability Theory and Statistics
Microsoft Excel 365/2024 Beginner's training
Zenith AI: Advanced Artificial Intelligence

38 FEARS ABOUT COMPUTER TECHNOLOGY

Editor's Notes

  • #3: 1.1 what are the fear1.2 how does effect society and people?
  • #4: a
  • #6: Feelings of humiliation, frustration, hurt and afraid develops from cyberbullying. Causing changes to the psychological well-being of an individual.http://www.cyberbullying.us/2010_charts/teen_tech_use_2010.jpgInfo: Adams, Caralee. "CYBERBULLYING." Instructor 120.2 (2010): 44-49. Academic Search Premier. EBSCO. Web. 21 Mar. 2011.
  • #7: Facebook: http://static.technorati.com/11/01/14/25023/facebook-logo.jpgMyspace: http://img.ezinemark.com/imagemanager2/files/30004252/2011/03/2011-03-05-11-53-38-8-myspace-started-in-2003-by-an-interner-marketing-f.jpegTwitter: http://blogs.loc.gov/loc/files/2010/04/twitter_logo.jpg
  • #8: Adams, Caralee. "CYBERBULLYING." Instructor 120.2 (2010): 44-49. Academic Search Premier. EBSCO. Web. 21 Mar. 2011.
  • #9: http://www.webopedia.com/TERM/C/cyber_crime.html
  • #10: http://www.victimsmatter.gc.ca/situation/cyber.htmlhttp://www.google.ca/imgres?imgurl=http://www.pbs.org/newshour/images/cyberspace/jan-june00/hackers.gif&imgrefurl=http://thenglishworld-10.blogspot.com/2008/05/internet.html&usg=__iORzZHQImmwVtoK545md8DgdmYg=&h=245&w=275&sz=12&hl=en&start=136&zoom=1&tbnid=UxeQAwLlhZdFZM:&tbnh=148&tbnw=166&ei=VBeJTdiCLoyzhAeP6q2vDg&prev=/images%3Fq%3Dcybercrime%26um%3D1%26hl%3Den%26sa%3DN%26biw%3D1366%26bih%3D624%26tbs%3Disch:10%2C3713&um=1&itbs=1&iact=hc&vpx=149&vpy=278&dur=498&hovh=196&hovw=220&tx=125&ty=127&oei=OheJTcngKoTg0gGDlL2DDg&page=8&ndsp=19&ved=1t:429,r:13,s:136&biw=1366&bih=624
  • #11: http://www.youtube.com/watch?v=3TFDxIyaiCE (international business machines corporation)Picture:http://www.google.ca/imgres?imgurl=http://financialinsights.files.wordpress.com/2011/03/employment-canada-feb-2011.jpg%3Fw%3D392%26h%3D353&imgrefurl=http://financialinsights.wordpress.com/2011/03/11/employment-number-misses-consensus-us-consumers-cutting-back-will-canadians-follow-another-great-cmhc-video/&usg=__50HZZi_t0v6KPZcOWSzjMGEvtQg=&h=353&w=392&sz=19&hl=en&start=0&zoom=1&tbnid=uJv9ar-B0wQodM:&tbnh=123&tbnw=137&ei=AOiITbeyIK-10QHKxNmpDg&prev=/images%3Fq%3Demployment%2B2011%2Bin%2Bcanada%26um%3D1%26hl%3Den%26biw%3D1366%26bih%3D667%26tbs%3Disch:1&um=1&itbs=1&iact=hc&vpx=1088&vpy=171&dur=1846&hovh=213&hovw=237&tx=186&ty=100&oei=AOiITbeyIK-10QHKxNmpDg&page=1&ndsp=21&ved=1t:429,r:6,s:0Info: http://www.technologyreview.com/blog/guest/26391/Info:http://www.ibtimes.com/articles/112339/20110214/ibm-watson-jeopardy-unemployment-artificial-intelligence.htm
  • #12: http://demo.moodle.net/mod/page/view.php?id=133Last modified: Thursday, December 2, 2010, 02:31 PMTechnology: The rise and fall of cultural FearSocietal Fear