Computer Related Issues
Computer Related Issues
2. Vertigo )(چکر
Being a little dizzy sounds funny, but vertigo is a serious issue. Imagine feeling like you’re going to fall
over all the time. And sometimes you do. Vertigo is closely related to migraines. So, if excessive screen
time can cause migraines, it can certainly trigger or worsen vertigo.
Every computer screen has a flicker. Generally, you don’t recognize it, but that does not mean you
don’t see it. It still registers on your brain. That constant flickering can also cause or complicate vertigo.
3. Vision problems
Bright light and bad glare or flickering image can strain your eyes. Constantly focusing on the screen
without blinking can cause dry eyes. Computer vision syndrome is another problem that you may suffer
from. Here are some natural remedies for improving eyesight.
6. Obesity )(موٹاپا
Studies have shown that prolonged use of computers, especially in children, is the major contributing
factor of sedentary lifestyle and childhood obesity. Read more about the reason why childhood obesity
is on the rise.
1
7. Stress disorders
Technology has a huge impact on our behavior and emotions. Prolonged computers use along with
other factors like poor health, work pressure and job environment can make you susceptible to stress.
Moreover, the longer you uphold the stress, the more susceptible you become to other health issues
mentioned above. It can also lead to loss of concentration, dizziness and weariness.
Excessive computer use doesn’t cause depression and anxiety, but it can make it worse for many
reasons. We know that exercise, good nutrition, fresh air and sunshine are powerful aides in dealing
with depression and anxiety.
Sitting in a dark room, staring at a screen and eating junk food is the exact opposite of that. And that’s
what a lot of people do every day, whether it’s gaming or just keeping up with what the rest of the
world is doing while you do nothing.
Add to that the headaches, migraines, vertigo and other potential health issues and the depression
and anxiety can only get worse. Plus, the things that you see and hear will affect you. You’re seeing
what people in the world want you to see. You’re seeing the brief moments where they are at their
best. Then you look around you and feel like you’re not measuring up. Comparison is the thief of joy,
as the saying goes.
On the other hand, there are video games designed to help people with depression and anxiety. So,
like any other tool, computers can be used to fix problems or, if misused, really destroy things.
2
B. Computer related legal and ethical Issues
There are many legal and ethical issues with computers that can be exploited by bad people to do bad
things. Some of those issues include illegal music and video file downloading, spyware, identity theft,
phishing, keystroke logging, packet sniffing and cyberbullying.
1. Illegal File Downloading
Illegal music and video file downloading is fairly straightforward.
People can post the file of music or movies on websites for others
to download for free when they would usually have to pay for
them. These are forms of media are protected by copyright law
meaning that they cannot be copied, reproduced or resold
without the permission of the original creators or owners which is what inevitably makes this action
illegal even though many people today do listen or watch music and movies illegally, but not necessarily
by downloading them.
2. Spyware
Spyware is software downloaded onto a user’s electronic device
without their knowledge and is used mostly to steal their personal
information. These can be used for good and bad. Parents can use
them to monitor their children or companies to monitor their
employees, while third party apps can be downloaded to infect
phones and use their camera or microphone to spy on the owner
24/7.
3. Identity Theft
Identity theft, or identity fraud, is when someone steals personal identifiable information on others in
order to impersonate said person. This can be one of the worst legal issues with computers because it
allows the criminal to get credit card info and buy thing in the name of
someone else or even do crimes in other names.
There are two main types of identity theft.
• Account takeover and
• True name.
Account takeover is when the thief uses the info taken to gain control
of the original person's account, allowing them to change some things and buy others before they
realize what is going on.
True name theft is when the thief creates new accounts in other's names. This can be done for many
reasons in many forms however one of the main ones would be to obtain blank cheques.
3
4. Keystroke Logging
Keystroke logging is when a software is downloaded onto a computer and is able to detect and record
every key press made on that device which is then saved into a log file. This can be used to acquire
private messages, usernames, passwords or
even just what you search for on google. Unlike
the others, keystroke loggers are not only used
by thieves, but can be used by business
employers to make sure their employees do
only the work they are meant to do and by
parents to monitor their children so that they
aren't doing any searches for inappropriate
things. Therefore, keyloggers are not only used
for bad but for good as well.
5. Cyberbullying
Cyberbullying is making others feel sad, angry or scared multiple
times over the internet on a wide variety of electronic devices. This
is usually done on different social media websites such as Facebook
or Instagram or just by texting or email. Unlike bullying in schools,
cyberbullying can be done anonymously, making the perpetrator
faceless to the victim. This has become a serious issue in this day
and age when everyone and everything is connected online.
Ethics Laws
These are defined by individuals and may vary These are created by the
depending on personal choice. Government and court.
4
D. What Content is Illegal on the Internet?
The scope of illegal content varies with different countries, but in most cases, it includes child sexual
abuse material. Users can discover illegal digital content online in various spaces, including websites,
social media platforms, or file-sharing services. It is mostly discovered inadvertently, for instance, when
a user clicks on links in spam messages. Illegal content may also be shared through emails or messaging
services.
Illegal content includes:
• Footage of real or simulated violence, accidents, or criminal activity, from movies, video clips,
or games.
• Sexually explicit images, including those of child sexual abuse.
• Content that promotes extreme political views, potentially used for radicalizing vulnerable
people.
• Materials that promote hate towards groups or individuals based on religion, race, or sexual
preference.
• Instructions that promote violence, crime, or unsafe behavior, such as how to make weapons
and bombs, drug use, or terrorism.
• Gaining unauthorized access to streaming services.
• Stealing IP address and committing computer fraud and abuse
Torrenting is a type of file sharing conducted between different users on the internet. Torrenting
usually involves a platform where one individual uploads illegal content, such as a copyrighted film or
song, and others are free to download this material.
2. Pornography
3. Terrorism
4. Murder and Weapons
5. Illegal drugs
5
F. What is cybercrime? How to protect yourself from cybercrime?
Cybercrime is criminal activity that either targets or uses a computer, a computer network or a
networked device. Most cybercrime is committed by cybercriminals or hackers who want to make
money. However, occasionally cybercrime aims to damage computers or networks for reasons other
than profit. These could be political or personal.
Cybercrime can be carried out by individuals or organizations. Some cybercriminals are organized, use
advanced techniques and are highly technically skilled. Others are novice hackers.