Monday, June 3, 2019

Negative Aspects of IT on Social Communication

Negative Aspects of IT on Social CommunicationM2 Abuse of ITNow create additional blog pages that discuss the negative aspects of IT on brotherly communication give examples and explanations victimisation the headings underlined below please use your OWN words.Abuse of ITThreatsThis can range from hacking into some(prenominal) peerlesss computer to sending scamming emails designed to gather up ad hominem study. In many cases corporations and sell own(prenominal) information for as little as 1p per person.This blog will explain different types of IT abuse and show examples of different reliable life situations.Cyber BullyingThis is the act of bullyrag or abusing a person using electronic devices such as a mobile phone, computers and tablets.Examples of cyberbullying include soused text messages or emails, rumors sent by email or posted on social networking sites, and embarrassing pictures, videos, websites, or fake profiles.One of the main problems with cyber bullying is the fact that it is consistent. Texts, emails and social network posts can be sent and uploaded at any time meaning the person be bullied cannot get away. With verbal and ain bullying the person can get away from it, buy staying in their home but cyber bullying is a consistent form of torture.One of the cyberbullying contenders is social networking sites like Facebook and Twitter. Once something is posted, it can be nearly impossible to remove as other concourse can screenshot it and then they will have it on their hard drive and can no longer be deleted.Cyberbullying has many effects on the person being bullied, these includeDrinking alcohol and using drugsSkipping school to avoid contact with the people bullying themHave lower self-esteem and get poor grades because of itCould lead to mental health problemsIn some cases, cyberbullying can lead to suicide.Cyberbullying has claimed many lives, such as the life of Hannah Smith 1999-2013. She was a 14-year old girl from lutterwort h, Leicestershire, England, hanged herself in her bedroom on August 3rd, 2013. This is one of many cases in that people have ended their lives because of other people. The story tells us that this is a serious subject any should be reported instantly. Because people do not talk roughly it often ends badly but if you talk to someone it can, will be sorted, and can lead the bully in jail.https//www.stopbullying.gov/cyberbullying/what-is-it/SpamSpam is a form of advertising that you will receive unwillingly. This happen because at some point you gave your email address away on online forums, new groups etc. A spam email contains fake information and links that ask for Credit or Debit card information and personal information. Spam emails also come as a phishing email that disguise themselves as banks. They do this to get access to card inside information to take bullion out of your bank account.Spam is typically used to promote inexpensive pharmaceutical drugs, weight loss programs, job opportunities and online gambling. These can lead to lose of personal information that companies can sell on so more people get access to your personal information and then you will receive more spam and humbugulent emails. Botnets is an example of a spamming technique used to command-and-control servers which collect email addresses and distribute spam emails.There are many warnings and watchword reports about fraud emails. There is a case of fake speeding ticket from Manchester. The police warned the public about the scam aimed at stealing bank details from businesses across the country. The email would invite people to click on a link that shows photographic evidence of the offence.http//searchsecurity.techtarget.com/definition/spamhttp//www.stokesentinel.co.uk/warning-about-bogus-8216-speeding-ticket-8217-email-claiming-to-be-from-greater-manchester-police-scam/story-29978636-detail/story.htmlPhishingPhishing is a form of fraud in which the attacker tries to learn informa tion such as login credentials or account information. Phishing emails can disguise themselves as official emails from banks to try to gather bankcard details to use. They send you to a fake copy of the official website.There is a large variety of new reports about phishing emails. There is a give-and-take report on the Mirror website about fraudsters send out fake court summons that when opened give the computer the virus called The Trojan Horse. This virus give the sender complete control over the computer from anywhere in the world and gives then access to a large amount of personal information.In another case, a man was jailed for a phishing fraud that was sent out to UK students to try to steal 1.5m. Olajide Onikoyi, 29, of Hexagon Close, Blackley, Manchester, sent out emails asking them to update details on their students loans. He stole 393,000 from 283 victims in total before he was caught.Phishing emails are as effective as they arehttp//searchsecurity.techtarget.com/defi nition/phishinghttp//www.mirror.co.uk/news/ applied science-science/technology/beware-cyber-fraudsters-sending-out-3114925Denial of Service AttacksThis is a method of preventing a web server from providing a service by overwhelming it with so many requests that it is ineffective to cope.An example of this is that a criminal might try to blackmail a company by threatening to attack their website unless the company gives them money. In some cases, policy-making websites are attacked as the attacker does not agree with the political view.Identity TheftThis is the fraudulent use of using other peoples addresss and personal information to gain access to loans, credit card numbers and other relevant information. This allows the thief to possibly take out loans and buy multiple items in your name which will cause problems for you as you could end up in debt.Gerald Barnbaum lost his pharmacist license after committing Medicaid fraud. He stole the identity of Dr. Gerald Barnes and practic ed medicine under his name. A type 1 diabetic died under his care. Dr. Barnes even worked as a staff physician for a center that gave exams to FBI agents. Hes currently parcel hard time.In this case the consequences were rather extreme however there are more extreme cases out there. The reported cases show us that this is a serious problem as unqualified people are pretending to be Doctors and other trained staff.http//www.huffingtonpost.com/robert-siciliano/10-unbelievable-identity_b_5239159.htmlBibliographyhttps//www.stopbullying.gov/cyberbullying/what-is-it/http//searchsecurity.techtarget.com/definition/spamhttp//www.stokesentinel.co.uk/warning-about-bogus-8216-speeding-ticket-8217-email-claiming-to-be-from-greater-manchester-police-scam/story-29978636-detail/story.htmlhttp//searchsecurity.techtarget.com/definition/phishinghttp//www.mirror.co.uk/news/technology-science/technology/beware-cyber-fraudsters-sending-out-3114925http//www.huffingtonpost.com/robert-siciliano/10-unbelie vable-identity_b_5239159.html

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.