SlideShare a Scribd company logo
SOCIAL IMPACTS
CENSORSHIP AND FREEDOM OF SPEECH
• Internet censorship are measure that are in place that
includes filtering internet sites based on their content.
• If the content is illegal in that current to publicise or
have possession of.
• Firewalls are used to block certain sites.
• Governments are taking steps to introduce a broad
system that will block certain websites from all users
in that country.
CENSORSHIP AND FREEDOM OF SPEECH
• Some people believe that censorship is a violation of
people’s rights to freedom of speech.
• In the UK laws against libel (written smearing of
someone’s character) equally applies to internet
content as it does with other media methods such as
newspapers.
• There has been a mass increase of internet
surveillance by government officials to fight against
terrorism and crime as well as protecting children.
• The law does provide freedom of speech.
PRIVACY AND ENCRYPTION
• Advancements in technology more often we are seeing
ways in which our privacy is threatened.
• Companies often monitor websites that people have
visited which can be used to create advertisement for that
company.
• Personal information is often freely available on social
networking sites.
• Bank details are often freely given to purchased good
online. This can often be held by the company on their
own online databases.
• Browsing history, search queries and social networking
profiles can be processed to gather confidential details
about an individual. Data such as their politic and religious
views, race, addresses, telephone numbers etc
COOKIES
• A cookie is a small program that stores data on a user’s computer about
activities performed on websites.
• For example they are used to store username and passwords that prevent
you from having to enter them every time.
• Amazon uses cookies to track what you browse and by so they can show
you items that might interest you.
• There is also negative impacts. For example thieves can acquire personal
information through cookies.
• Browsing habits saved on cookies can often be sold on. This can often lead
to spam and phishing emails.
ENCRYPTION
• Encryption is used to make data such as online
payments securely by scrambling the details for it to
be sent.
• This is then decoded at the other side.
• It uses various mathematical transformations that
cannot be decoded without the key.
GLOBAL CITIZENSHIP
• Up until a few hundred years ago majority of people
had never travelled from their owns or even met
people from other countries and cultures.
• The invention of cars and planes opened the world up
to many people.
• The internet has also aided this and now many people
communicate freely in online communities and are in
theory becoming Global Citizens.
• Global communication has led to an increased
awareness and sharing of other cultures and attitudes.
ONLINE COMMUNITIES
• An online community is a virtual community that
exists online.
• Members will sign up to share resources and discuss
issues about a common interest.
• This communities can take form of forums, bulletin
boards, social networking sites, chatrooms and now
even YouTube.

More Related Content

PPTX
Economic Impact of Computing Science
PPTX
Group presentation
PPTX
advantages and disadvantages of internet (yousef aljulaud)
PPTX
Internet
PPTX
Digital Marketing
PPTX
Ramification
PDF
How has technology changed the way we conduct business
Economic Impact of Computing Science
Group presentation
advantages and disadvantages of internet (yousef aljulaud)
Internet
Digital Marketing
Ramification
How has technology changed the way we conduct business

What's hot (19)

PDF
How has technology changed the way we conduct business?
PPTX
advantages and disadvantages of internet
PPTX
Presentation of itc
PPT
ais 150
PDF
How mc.donalds run their business in china identify some of their strategies...
PDF
The Nine Elements
PPTX
Digital citizenship
PPTX
Social interaction within 10 years - Marco Francisetti
PPTX
Internet a boon or curse
PDF
Lecture 14
PPTX
Digital Access
PPT
Technology Powerpoint
PPTX
use and protection of Intellectual Property In online Business
PPTX
Team think week 25
PDF
Digital citizenship
PPT
2. digital age
PPTX
advantages and disadvantages of Internet
PPT
Unit 9 lesson 1 the computer and technology revolutions
PPT
U9L1: The computer and technology revolutions
How has technology changed the way we conduct business?
advantages and disadvantages of internet
Presentation of itc
ais 150
How mc.donalds run their business in china identify some of their strategies...
The Nine Elements
Digital citizenship
Social interaction within 10 years - Marco Francisetti
Internet a boon or curse
Lecture 14
Digital Access
Technology Powerpoint
use and protection of Intellectual Property In online Business
Team think week 25
Digital citizenship
2. digital age
advantages and disadvantages of Internet
Unit 9 lesson 1 the computer and technology revolutions
U9L1: The computer and technology revolutions
Ad

Viewers also liked (20)

PPT
Database Relationships
PPT
ISDD Hacking and Viruses
PPT
ISDD Standard File Formats
PPT
Database - reports, forms, calculations
PPT
ISDD Environmental Impact
PPT
PPT
Sound & Video File Sizes
PPT
ISDD Cloud and Internet Services
PPT
Database structure
PPT
ISDD Networking & Connectivity
PPT
Database Validation
PPT
ISDD Sequential & Random Access
PPT
Technical Implementation: Software
PPT
ISDD - Security Risks
PPT
ISDD Back Up Strategies
PPT
ISDD Media Types - File Compression
PPT
Other web page aspects
PPT
Searching and Sorting
PPT
Backing Storage
PPT
Higher Computing Science CSS
Database Relationships
ISDD Hacking and Viruses
ISDD Standard File Formats
Database - reports, forms, calculations
ISDD Environmental Impact
Sound & Video File Sizes
ISDD Cloud and Internet Services
Database structure
ISDD Networking & Connectivity
Database Validation
ISDD Sequential & Random Access
Technical Implementation: Software
ISDD - Security Risks
ISDD Back Up Strategies
ISDD Media Types - File Compression
Other web page aspects
Searching and Sorting
Backing Storage
Higher Computing Science CSS
Ad

Similar to Social Impacts of Computing Science (20)

PPTX
How you can protect your online identity, online privacy and VPNs
PPT
Internet ppt
PPT
mohammed ppt
PPT
The Internet Presentation
PPT
The Internet Presentation
PPT
The Internet Presentation
PPT
The Internet Presentation
PPTX
Advantages and disadvantages of internet 2
PPTX
What-is-Internet, all information about internet
PPTX
INTERNET
PPTX
Data privacy over internet
PPT
Topics in Internet and Education
PDF
Digital citizenship presentation
PPT
The internet-presentation
PPTX
Chapter 2 The Internet, Digital Media, and Media Convergence
PDF
Internet
PPTX
The State Department and Net Freedom: A year of great challenges & opportunities
PDF
Final%20 presentation
PPTX
Presentation (6).pptx
How you can protect your online identity, online privacy and VPNs
Internet ppt
mohammed ppt
The Internet Presentation
The Internet Presentation
The Internet Presentation
The Internet Presentation
Advantages and disadvantages of internet 2
What-is-Internet, all information about internet
INTERNET
Data privacy over internet
Topics in Internet and Education
Digital citizenship presentation
The internet-presentation
Chapter 2 The Internet, Digital Media, and Media Convergence
Internet
The State Department and Net Freedom: A year of great challenges & opportunities
Final%20 presentation
Presentation (6).pptx

More from missstevenson01 (20)

PPTX
S3 environment
PPTX
The Processor.pptx
PPTX
How Computers Work
PPTX
Lesson 3 - Coding with Minecraft - Variables.pptx
PPTX
Lesson 2 - Coding with Minecraft - Events.pptx
PPTX
Lesson 1 - Coding with Minecraft -Introduction.pptx
PPTX
Lesson2 - Coding with Minecraft - Events.pptx
PPTX
Ethical hacking trojans, worms and spyware
PPTX
Ethical hacking anti virus
PPTX
Ethical hacking introduction to ethical hacking
PPTX
S1 internet safety-chattingonline
PPTX
S3 wireframe diagrams
PPTX
Alien database
PPTX
Video Games and Copyright laws
PPTX
Games Design Document
PPTX
Video game proposal
PPTX
Evaluation
PPTX
H evaluation
PPTX
H testing and debugging
S3 environment
The Processor.pptx
How Computers Work
Lesson 3 - Coding with Minecraft - Variables.pptx
Lesson 2 - Coding with Minecraft - Events.pptx
Lesson 1 - Coding with Minecraft -Introduction.pptx
Lesson2 - Coding with Minecraft - Events.pptx
Ethical hacking trojans, worms and spyware
Ethical hacking anti virus
Ethical hacking introduction to ethical hacking
S1 internet safety-chattingonline
S3 wireframe diagrams
Alien database
Video Games and Copyright laws
Games Design Document
Video game proposal
Evaluation
H evaluation
H testing and debugging

Recently uploaded (20)

PDF
01-Introduction-to-Information-Management.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
master seminar digital applications in india
PPTX
Institutional Correction lecture only . . .
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
Presentation on HIE in infants and its manifestations
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PDF
Computing-Curriculum for Schools in Ghana
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
01-Introduction-to-Information-Management.pdf
Final Presentation General Medicine 03-08-2024.pptx
master seminar digital applications in india
Institutional Correction lecture only . . .
102 student loan defaulters named and shamed – Is someone you know on the list?
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Chinmaya Tiranga quiz Grand Finale.pdf
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
human mycosis Human fungal infections are called human mycosis..pptx
STATICS OF THE RIGID BODIES Hibbelers.pdf
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Presentation on HIE in infants and its manifestations
Module 4: Burden of Disease Tutorial Slides S2 2025
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
Computing-Curriculum for Schools in Ghana
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Abdominal Access Techniques with Prof. Dr. R K Mishra
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3

Social Impacts of Computing Science

  • 2. CENSORSHIP AND FREEDOM OF SPEECH • Internet censorship are measure that are in place that includes filtering internet sites based on their content. • If the content is illegal in that current to publicise or have possession of. • Firewalls are used to block certain sites. • Governments are taking steps to introduce a broad system that will block certain websites from all users in that country.
  • 3. CENSORSHIP AND FREEDOM OF SPEECH • Some people believe that censorship is a violation of people’s rights to freedom of speech. • In the UK laws against libel (written smearing of someone’s character) equally applies to internet content as it does with other media methods such as newspapers. • There has been a mass increase of internet surveillance by government officials to fight against terrorism and crime as well as protecting children. • The law does provide freedom of speech.
  • 4. PRIVACY AND ENCRYPTION • Advancements in technology more often we are seeing ways in which our privacy is threatened. • Companies often monitor websites that people have visited which can be used to create advertisement for that company. • Personal information is often freely available on social networking sites. • Bank details are often freely given to purchased good online. This can often be held by the company on their own online databases. • Browsing history, search queries and social networking profiles can be processed to gather confidential details about an individual. Data such as their politic and religious views, race, addresses, telephone numbers etc
  • 5. COOKIES • A cookie is a small program that stores data on a user’s computer about activities performed on websites. • For example they are used to store username and passwords that prevent you from having to enter them every time. • Amazon uses cookies to track what you browse and by so they can show you items that might interest you. • There is also negative impacts. For example thieves can acquire personal information through cookies. • Browsing habits saved on cookies can often be sold on. This can often lead to spam and phishing emails.
  • 6. ENCRYPTION • Encryption is used to make data such as online payments securely by scrambling the details for it to be sent. • This is then decoded at the other side. • It uses various mathematical transformations that cannot be decoded without the key.
  • 7. GLOBAL CITIZENSHIP • Up until a few hundred years ago majority of people had never travelled from their owns or even met people from other countries and cultures. • The invention of cars and planes opened the world up to many people. • The internet has also aided this and now many people communicate freely in online communities and are in theory becoming Global Citizens. • Global communication has led to an increased awareness and sharing of other cultures and attitudes.
  • 8. ONLINE COMMUNITIES • An online community is a virtual community that exists online. • Members will sign up to share resources and discuss issues about a common interest. • This communities can take form of forums, bulletin boards, social networking sites, chatrooms and now even YouTube.