concept. With this development, it is true that were said by Nazura Abdul Manap (2003) that crimes increase along the development of computer technologies and internet. It is because most all of our routine activities daily are involving with computers and internet. For examples at works, at home or even when we are cooking we still accessing internet and using computers to download recipes. Computers are not just been access by people who works but also for housewives and teenagers but it is become an
the prevention of threats on our nation. Is our safety worth our privacy? Most
Student is to provide your view on implication of internet towards the capabilities of Decision Support Systems. Decision Support Systems (DSS) is an interactive computer based system designed to help the decision makers to use all the resources available and make use in the decision making. In management
principle. This principle is supposed to help us understand the right from wrong. However, the conflict between personal freedoms and rights, leads to ethical issues. Ethical issues in information technology are examined with respect to four aspects, privacy, property, authenticity, and right to information. Intellectual Property Rights and Their Types Intellectual Property (IP) is a creation of the human mind, for which exclusive legal rights of ownership are assigned. This means that an IP can be
The demographic variables internet usage, employment status, and car access had significant influence on students’ attitude toward online shopping for apparel products. Students who browsed the internet on a more frequent basis had a more favourable attitude toward shopping online for apparel products than those who browsed the internet less frequently. Also, students past online shopping experiences were shown to have significant
Cyberbullies can use cyberstalking to know the victim’s very digital move. This come make the victim extremely vulnerable to the bully due to the fact that now everything the victim places on the internet is being tracked by the bully. Cyberbullies also use trolling as a way to attack the victim with insults and hurtful language in order to get a certain reaction from the victim. Victims of cyberbullying can also experience masquerading, which is
promotes freedom of privacy. Furthermore, it directly violates citizens’ rights and freedom of speech, and is used to retaliate against political enemies of the government using imprisonment or other sanctions. Government surveillance can have adverse effects on anyone’s life as it can be used to harm an individual’s reputation by exposing their personal information. In the digital age, terrorist’s use of the internet has increased to such an extent that all their
Brother: Technology Since it was written in 1948, technology has advanced in line with what George Orwell imagined in his book, 1984. The terms "Orwellian" and "Big Brother is watching" are often used in conjunction with remote control cameras and Internet tracking technology. In the world of 1984, Orwell portrays a surveillance technology that allows an authoritarian government to watch and control the population.The fictitious country of Oceania is a representation of our modern day society. Today
danger while using it. Many social media platforms can lead to risks in a young teen's future. While creating and expressing your true self on these networking sites can be viewed as a good thing, sharing way too much can jeopardize any resorts of privacy online and offline. These applications that are considered "social" can end up taking away your social life. Specifically speaking, the word social is closely related to 'community' but can produce the exact opposite that creates distance between
promotes freedom of privacy. Furthermore, it directly violates citizens’ rights and freedom of speech, and is used to retaliate against political enemies of the government using imprisonment or other sanctions. Government surveillance can have adverse effects on anyone’s life as it can be used to harm an individual’s reputation by exposing their personal information. In the digital age, terrorist’s use of the internet has increased to such an extent that all their