Impacts of the use of IT -Social network sites This is a site that lets you post messages, upload pictures and stories on your own personal page. You can.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Developed by Technology Services 1:1 Laptop Initiative
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Top 10 Checklist to Protect Your Personal Privacy Online Teens 1.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Implications and Security Issues of the Internet By Neelesh Patel.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
The Internet.
What is identity theft, and how can you protect yourself from it?
You can socialise with the internet by using websites such as Facebook, twitter and MySpace. The good things about this is that you can talk to your friends.
Why is there Concern about the Effect of the Internet in Society? E-Commerce: Jason Logan eBay: Ben King Hacking: Khyle Westmoreland Censorship: Ben King.
This week is anti-bullying week.
Basics: Getting Started Uploading and Sharing Videos on YouTube. Basics: Getting Started Uploading and Sharing Videos on YouTube. 1.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
G063 - Social Networking. Learning Objectives: By the end of this topic you should be able to: define the term ‘Social Networking’ give examples of the.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
THE GREATEST INVENTION OF THE LAST 50 YEARS: THE INTERNET.
You can contact your parents so they know where you are and you can extend your time out. You can take photos and videos and share them with family and.
© 2012 Microsoft Corporation. All rights reserved. Amazing apps. Windows 8 comes with built-in apps for the things you do most to help get your favorite.
 Communicating with friends is now easier than ever, for example on Facebook you can connect with all your friends and chat to them very easily and instantly.
Threats to I.T Internet security By Cameron Mundy.
E – Mail History of s What is an ? What happens when we sent an ? messages Folders Address Attachments Types of.
Social effect: Facebook is a site available to anyone. Many people use it in order to contact friends and relatives from all around the world, and to meet.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Social impacts of the use of it By: Mohamed Abdalla.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
P.6.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
The Advantages & Disadvantages of The Internet:
Social impact of using I.T Fahimul Hoque. Local Community Development in IT have lead to changes in the way local communities work. IT has changed the.
IT security By Tilly Gerlack.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
 Cable companies are experimenting with tracking and target individual households cable boxes;
Etiquette – a list of rules that we observe Phishing - sending an to a user falsely claiming to be a legitimate company to scam the user into providing.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Social Impacts of IT. IT allows others to access information about you through social networking sites. Potential employers can check through Facebook.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
ICT in the Home. Introduction ICT is used today for entertainment It influences how people spend their time ICT is used for most every day tasks: tv,
INGOTs Computer Security Name: Elliot Haran. Introduction  Staying safe on the internet  Learning to deal with Cyber Bullying, Stalking and grooming.
Social Impact of IT Online Shopping Industry How it effects you
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Internet Safety Mr. Richard Orr Technology Teacher Murphy Jr. High School.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Once posted, other YouTube users can post comments about the video, post their YouTube video responses, or rate the video. Videos that are uploaded to.
Social impacts of ICT. Local Community IT has been good in the local community for families who need to keep in touch with family they can use Facebook.
The social impacts of IT: Spending more time on the computer, laptop, phone, tab etc. than going outside. Negative effect on health. Negative effect on.
Online Services. An online service is a service delivered from the internet.
Introduction With the development of the Internet a phenomenon known as 'electronic commerce' or 'ecommerce' for short, has been growing. Ecommerce has.
By Jessica Parkinson. Mobile phones have allowed our generation to connect with others all over the world. However, the potential threats are numerous,
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
ONLINE SHOPPING. Refers to buying and selling of goods and services using websites accessed through the internet physical goods such as clothes and books.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
This is Facebook and twitter that you can go on when you are at home but school monitor what you go on in school so they put a ban on it other people can.
Social impacts of IT By Lewis dancocks. Social impacts Due to IT people around the world can commutate with each other anywhere at any time, this is due.
Use of this service Checking location departure/arrival Checking time departure/arrival Benefits to the user or company Provides up to date information.
IT has had a big impact social in many different ways. Facebook is a social networking site that allows people to communicate and stay in touch with friends.
Online Services Think of all the different things that everyone does online This topic is simply about organising them into types of services.
Online Shopping. Learning Objectives To learn how society has been affected by online shopping (e-Commerce)
Tips to Avoid Online Scams. About Several threats are there which spreads on every computer system just to infect each system with their harmful ways.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Topic 5: Online Communities Press F5 to view!
24/7/365 Remote Computer Support
Internet Safety – Social Media
LO2 – Understand Computer Software
Presentation transcript:

Impacts of the use of IT -Social network sites This is a site that lets you post messages, upload pictures and stories on your own personal page. You can also include favourite video clips along with your ‘likes’. Further more you can post comments and messages to other people’s page and your own page. If you make any changes to your page it will come up as ‘news’ to your friends. Some of the sites also contain links to your favourite music artist or online games and other apps. Social networking is all about the constant exchange of personal information, gossip and news. Some social networking sites are a little different such as twitter for example you can only type up to 140 character comment post but still its very good to keep up with news with the people of your interest. To join a social network, you have to provide some personal information. This is called your ‘personal profile’. The social impact of social networking sites is that its very popular around the world, here are some advantages: You do not need particular technical skill to create a personal page It is usually free Very easy to stay in contact with people of similar interests Very easy to contact potential new friends The site makes it simpler to get in touch with long-lost friends You can post interesting things about yourself and your achievements online

Economic -Shopping online Most things that are available on the highs street or in shopping centres can also be found online. For example, supermarkets offer home delivery of goods ordered through their website. -Buying goods online 1. The process for buying goods online commonly involves: 2. browsing through the online catalogue 3. adding items to the virtual basket 4. visiting a virtual checkout 5. choosing payment and delivery method 6. order confirmation 7. shipping confirmation (via or sms) -Advantages Convenience - shop from any computer with an Internet connection any time while avoiding the need to travel, pay for parking, queue in-store etc. Greater variety - more shops online than any high street or shopping centre. Cheaper goods - increased competition between retailers (for some on a global scale) brings down prices. Accessibility - those with a disability that limits their mobility can choose to have goods delivered. Comparability - using the Internet it's easy to research products or services very thoroughly, comparing prices and product details in order to get the best deal. -Disadvantages security concerns surrounding payment by credit card over the Internet not being able to physically inspect the goods before purchase goods getting damaged during transport goods not arriving in time or at all concerns over what information retailers are storing about customers, e.g. buying habits

Threats There are many different threats due to the use of IT. Cyber bulling is one which affects many peoples life’s daily. You have people who go on websites to try and harm you and cause trouble. There are also people who like to intimidate and impersonate others. If this happens then you should report them and try and resolve the problem. Most of the social networking websites including Facebook now have report features. Further more, if you are chatting to someone on Windows Live Messenger or other communication software and they are upsetting, offending or bullying you then there is a button to block them. This way is much faster and easier to stop the specific person from communicating to you. But they will know that you blocked them. Other people are out there who try to fraud you out of your money. This is related to phishing scams that are a major threat. These scams are sent to your inbox on your account. These s claim that they are a real business or company however this is false. These s are used to get hold of your bank account details along with other personal information. Its recommended to delete these s to prevent this from happening. Spam is also a threat, this is another problem related to . Spam s are not important and can be unsafe or contain viruses. However most websites including Hotmail have junk folders that filter spam mail and can be easily deleted by a click of a button. here are also many viruses that can affect your computer. All viruses affect your computer in different ways. The most well known viruses are Trojans and Internet Worms. There is also Spyware and password checkers to get hold of peoples passwords on different accounts. Most viruses make loading times slower and can even get hold of your provide information. However if you have a anti- virus installed on your computer and you do a full scan then you should be able to remove these viruses without any problems and your computer will be running at its normal speeds again.