IT Notes Unit 3
IT Notes Unit 3
SECTION 3:
SOCIAL AND ECONOMIC IMPACT OF INFORMATION AND COMMUNICATIONS
TECHNOLOGY (ICT)
Computer security – this is all the activities related to identifying, assessing and managing
vulnerabilities, threats and attacks on a computer system or network.
Computer misuse – this is any activity during which a computer system or computer network is
accessed or its data is accessed, modified or deleted without proper authorisation.
Cyberspace – generally refers to any data or resources that can be accessed via a network or the
space where the internet operates. The internet gives users access to large parts of cyberspace.
Cybercrime – is any crime perpetrated using computers and networks. It also includes other
electronic devices such as smartphones, tablets etc.
Cybersecurity – is all the activities related to identifying, assessing and managing the
vulnerabilities, threats and attacks originating from cyberspace. It is the body of technologies,
processes and practices designed to protect users, networks, computers, programs and data
from attack, damage or unauthorised access.
Firewall – A fire wall monitors a network, blocking dangerous content such as viruses. It can be either a
physical device (hardware) attached to the network or software running on the connected computer or
the server on a network.
1
These notes belong to Anil Jhilmit, BWSS.
2. Assess the potential impact of computer systems misuse based on the main entities impacted;
Cyberbullying
A form of harassment or bullying using computer based communication.
Copyright infringement
As a general matter, copyright infringement occurs when a copyrighted work is reproduced,
distributed, performed, publicly displayed, or made into a derivative work without the
permission of the copyright owner.
Copyright infringement is the use or production of copyright-protected material without the
permission of the copyright holder.
Data theft
Data theft is the act of stealing information stored on computers, servers, or other devices from
an unknowing victim with the intent to compromise privacy or obtain confidential information.
The unauthorised copying or removal of data from the legitimate owner’s computer system.
Identity theft
This is the deliberate use of someone else’s identity, usually to gain a financial advantage.
Identity theft is the crime of obtaining the personal or financial information of another person
for the sole purpose of assuming that person's name or identity to make transactions or
purchases.
2
These notes belong to Anil Jhilmit, BWSS.
Software piracy
Is the unauthorised reproduction, distribution or use of software products.
Financial abuses
The illegal use of ICT to obtain financial gains.
Phishing attacks
Is an attempt to obtain sensitive information such as usernames, passwords and credit card
details by sending emails pretending to be from a legitimate organization.
Phishing emails can be detected because
o They are unsolicited
o They contain spelling or grammar errors
o They urge you to act immediately
o An email program may warn you that the email is potentially a scam or harmful.
Transmission of viruses and malware
Viruses and malware are programs that can attack computers, tablets, phones and other digital
devices.
Malware is malicious software designed to disrupt, damage or gain unauthorised access to a
computer system.
Their transmission constitutes misuse of computers.
3
These notes belong to Anil Jhilmit, BWSS.
Violation of privacy
Privacy is the right of persons to choose freely under what circumstances and to what extent
they will reveal information of themselves. It related to an individual’s ability to control their
personal information.
Any ACT that violates the above constitutes a violation of privacy and also includes
o Storage of inaccurate personal data.
o Sharing of data (either for free or for a fee) without the owner’s consent.
o Using data for purposes other than that for which it was collected.
Propaganda
Is communication of information that is of a biased or misleading nature and that is aimed at
influencing the recipient.
Can also be defined as information, ideas or rumours that are deliberately and widely spread to
help for harm a person, a group, movement, institution, nation or other entity.
4
These notes belong to Anil Jhilmit, BWSS.
Electronic eavesdropping
Is the act of electronically intercepting communications without the knowledge or consent of at
least one of the participants.
The unauthorized real time interception of a private communication such as a phone call,
instant message, video conference or fax transmission.
Industrial espionage
The illegal act of investigating competitors to gain a business advantage.
The term industrial espionage refers to the illegal and unethical theft of business trade
secrets for use by a competitor to achieve a competitive advantage. This activity is a covert
practice often done by an insider or an employee who gains employment for the express
purpose of spying and stealing information for a competitor. Industrial espionage is conducted
by companies for commercial purposes rather than by governments for national security
purposes.
5
These notes belong to Anil Jhilmit, BWSS.
6
These notes belong to Anil Jhilmit, BWSS.
The introduction of computers has led to a change in the way persons work. Being able to use a
computer system has become an indispensable skill. Unskilled and low skilled workers are retraining
and becoming more productive by using IT systems because of the productivity gains of using compuers.
Consider the following;
In offices, typist had to retrain to become skilled word processing clerks.
In education, teachers and lecturers need skills similar to those of modern office personnel to
access student’s records, produce test papers and maintain electronic mark book.
Medical personnel need to access patient records, produce documents, plot charts and graphs
of patient’s progress and operate computerized life support systems.
Musicians now use computers as a creative tool to create, mix and distribute their music.
Mass media personnel use computers in a creative way. Newspaper publishers must be skilled in
desktop publishing to lay out their magazine and papers.
Law enforcement officers require literacy skills including word processing to fill in crime reports,
database skills to access criminal records and specialist skills to operate software such as
fingerprint matching and photo fit picture software.
In the movie industry, staff must be able to exploit the power of computers particularly when
editing the movie and in the production of special effects, animations and computer modelling.
Automation in the job as seen above has many benefits as well as it has some disadvantages which
include
Job loss – the use of computers had significantly reduced the amount of personnel needed in
the work place.
A single employee with a computer can now do the same job of 2 or more employees who are
not using a computer. For example in the field of accounting.
Many employees now have to be retrained to function in a computerized environment.
7
These notes belong to Anil Jhilmit, BWSS.