BY: JACQUIRE ELLIS
THE DANGER OF THE FUTURE
OF TECHNOLOGY
• Technology like smart devices, video game systems,
computers, and social media haven taken away some
key traits that help to define the human experience.
• These key traits include face to face interaction and
spending time with family.
Dangers of Tech Is it good or bad? 2
IS INNOVATION ALWAYS A GOOD THING?
WHEN GOOD GOES BAD
• Instant Messaging- It’s possible for Malware to enter a
corporate network through external IM clients.
• E-Mail-Malicious emails can easily be sent to
unsuspecting prey.
• Smart Phones- People carry these around everywhere
they go. They have a ton of personal information and
can easily be stolen if one isn’t paying attention.
• Skype- Require updates to get the most secure
version but some people don’t remember to update
apps.
Dangers of Tech Is it good or bad? 3
POTENTIALLY HAZARDOUS FORMS OF
TECHNOLOGYWARNING!!!
• Limit the use of gadgets
• Maintain a healthy lifestyle
• Avoid rushing for information
• Invest in cybersecurity
Your Date Here Your Footer Here 4
METHODS OF PREVENTATIVE ACTION
STOP THE DANGER!
• A positive and upbeat environment
• Lack of fraud/security breach’s
• More human connection
BENEFITS
HOW PREVENTING NEGATIVE EFFECTS AFFECTS THE WORLD
• Before leaving, think about how technology is
negatively affecting you and what you can do to
change it…
• @Jacquireellis Twitter, Jacquire Ellis on LinkedIn,
@Jacquire1 on Instagram.
THE END
AVOID DANGER

More Related Content

PDF
Mobile Device Management & Data Protection
PPTX
Mobile device security
PDF
CTO Cybersecurity Forum 2013 David Turahi
PPT
Smart phone and mobile device security
 
PPT
Internet google
PPTX
Mobile security by Tajwar khan
PPTX
Mobile security
PPT
Cyber Security Awareness Training by Win-Pro
Mobile Device Management & Data Protection
Mobile device security
CTO Cybersecurity Forum 2013 David Turahi
Smart phone and mobile device security
 
Internet google
Mobile security by Tajwar khan
Mobile security
Cyber Security Awareness Training by Win-Pro

What's hot (20)

PDF
Avoiding a BYOD Blowup!
PPTX
Information Security Awareness Session -2020
PDF
Can You Steal From Me Now? Mobile and BYOD Security Risks
PPTX
Digital Citizenship: Parent Presentation
PPTX
Salem Lutheran 2017 Tech Speaking
PDF
Employee Security Awareness Program
PDF
Information Security Awareness Training
PPT
Cyber security awareness training by cyber security infotech(csi)
PPTX
Westpark Elementary 2017
PPTX
Mobile protection
PDF
Designing Calm Technology
PPTX
Security awareness
PPTX
Your smartphone can help protect itself – and
PPTX
Human Factor on Information Security -- Origin of Information Leakage
PPTX
Information Security Awareness: at Work, at Home, and For Your Kids
PPTX
Cyber Security 101: Training, awareness, strategies for small to medium sized...
PDF
Features and impact of technology
PPTX
Information Security Awareness, Petronas Marketing Sudan
PPTX
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
PPTX
cyber_security
Avoiding a BYOD Blowup!
Information Security Awareness Session -2020
Can You Steal From Me Now? Mobile and BYOD Security Risks
Digital Citizenship: Parent Presentation
Salem Lutheran 2017 Tech Speaking
Employee Security Awareness Program
Information Security Awareness Training
Cyber security awareness training by cyber security infotech(csi)
Westpark Elementary 2017
Mobile protection
Designing Calm Technology
Security awareness
Your smartphone can help protect itself – and
Human Factor on Information Security -- Origin of Information Leakage
Information Security Awareness: at Work, at Home, and For Your Kids
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Features and impact of technology
Information Security Awareness, Petronas Marketing Sudan
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
cyber_security
Ad

Similar to The Danger of the Future of Technology (20)

PPSX
csa2014 IBC
PPTX
Internet safety how to stay safe using internet
PPTX
empowerment technologies Powerpoint presentation
PPTX
Cyber security
PPTX
Online Security and How to Make Money Online
PPT
Cyber Security and Cyber Awareness
PPTX
HeusjsjnwbsusususujPresentation (2).pptx
PPTX
Digital Security and Hygiene.pptx
PPTX
ppt on cybersecurity and why its necessary
PPTX
Cyber_Awareness_Presrerereerentation.pptx
PPTX
3Nov Challanges to Inernal Security.pptx
PDF
Module 5: Safety
PPTX
Chapter 1-introduction to ict
PDF
NCERT Ransomeware and malware attacks.pdf
PPTX
LESSON 5 DIGITAL CITIZENSHIP.pptx
PPTX
Cybersecurity_Issues and challenges.pptx
PPTX
Cybercrime
PPTX
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
PPTX
Digital literacy
PPTX
Introduction Of Cyber Security in 2024.pptx
csa2014 IBC
Internet safety how to stay safe using internet
empowerment technologies Powerpoint presentation
Cyber security
Online Security and How to Make Money Online
Cyber Security and Cyber Awareness
HeusjsjnwbsusususujPresentation (2).pptx
Digital Security and Hygiene.pptx
ppt on cybersecurity and why its necessary
Cyber_Awareness_Presrerereerentation.pptx
3Nov Challanges to Inernal Security.pptx
Module 5: Safety
Chapter 1-introduction to ict
NCERT Ransomeware and malware attacks.pdf
LESSON 5 DIGITAL CITIZENSHIP.pptx
Cybersecurity_Issues and challenges.pptx
Cybercrime
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
Digital literacy
Introduction Of Cyber Security in 2024.pptx
Ad

Recently uploaded (20)

PDF
Flame analysis and combustion estimation using large language and vision assi...
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PPTX
Benefits of Physical activity for teenagers.pptx
PDF
Two-dimensional Klein-Gordon and Sine-Gordon numerical solutions based on dee...
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
CloudStack 4.21: First Look Webinar slides
PPTX
The various Industrial Revolutions .pptx
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PPT
Geologic Time for studying geology for geologist
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
DOCX
search engine optimization ppt fir known well about this
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
Hindi spoken digit analysis for native and non-native speakers
PPTX
Configure Apache Mutual Authentication
Flame analysis and combustion estimation using large language and vision assi...
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Benefits of Physical activity for teenagers.pptx
Two-dimensional Klein-Gordon and Sine-Gordon numerical solutions based on dee...
Module 1.ppt Iot fundamentals and Architecture
A comparative study of natural language inference in Swahili using monolingua...
CloudStack 4.21: First Look Webinar slides
The various Industrial Revolutions .pptx
Credit Without Borders: AI and Financial Inclusion in Bangladesh
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
Geologic Time for studying geology for geologist
sustainability-14-14877-v2.pddhzftheheeeee
Final SEM Unit 1 for mit wpu at pune .pptx
A proposed approach for plagiarism detection in Myanmar Unicode text
Developing a website for English-speaking practice to English as a foreign la...
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
search engine optimization ppt fir known well about this
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Hindi spoken digit analysis for native and non-native speakers
Configure Apache Mutual Authentication

The Danger of the Future of Technology

  • 1. BY: JACQUIRE ELLIS THE DANGER OF THE FUTURE OF TECHNOLOGY
  • 2. • Technology like smart devices, video game systems, computers, and social media haven taken away some key traits that help to define the human experience. • These key traits include face to face interaction and spending time with family. Dangers of Tech Is it good or bad? 2 IS INNOVATION ALWAYS A GOOD THING? WHEN GOOD GOES BAD
  • 3. • Instant Messaging- It’s possible for Malware to enter a corporate network through external IM clients. • E-Mail-Malicious emails can easily be sent to unsuspecting prey. • Smart Phones- People carry these around everywhere they go. They have a ton of personal information and can easily be stolen if one isn’t paying attention. • Skype- Require updates to get the most secure version but some people don’t remember to update apps. Dangers of Tech Is it good or bad? 3 POTENTIALLY HAZARDOUS FORMS OF TECHNOLOGYWARNING!!!
  • 4. • Limit the use of gadgets • Maintain a healthy lifestyle • Avoid rushing for information • Invest in cybersecurity Your Date Here Your Footer Here 4 METHODS OF PREVENTATIVE ACTION STOP THE DANGER!
  • 5. • A positive and upbeat environment • Lack of fraud/security breach’s • More human connection BENEFITS HOW PREVENTING NEGATIVE EFFECTS AFFECTS THE WORLD
  • 6. • Before leaving, think about how technology is negatively affecting you and what you can do to change it… • @Jacquireellis Twitter, Jacquire Ellis on LinkedIn, @Jacquire1 on Instagram. THE END AVOID DANGER

Editor's Notes

  • #2: © Copyright PresentationGo.com – The free PowerPoint template library
  • #3: © Copyright PresentationGo.com – The free PowerPoint template library
  • #4: © Copyright PresentationGo.com – The free PowerPoint template library
  • #5: © Copyright PresentationGo.com – The free PowerPoint template library