Sei sulla pagina 1di 24

1

2
1.4 CURRENT AND FUTURE
DEVELOPMENTS

1.4.1 IMPACT OF ICT ON


SOCIETY

CONTRIBUTION/ NEGATIVE
POSITIVE IMPACT IMPACT

3
ICT contribution:

Education
Health care
Science and Technology
Finance
Publishing
Travel

4
E-Learning
-Changes in the management of the educational
sector.

- Changes in the work process in education.

5
Many people and companies use computers to
help manage their finances.

Some use finance software to balance


checkbooks , pay bills ,track personal income &
expenses, manage investments,& evaluate financial
plans.

6
Hospitals and doctors use computers to maintain
patient records.
Doctors use the web and medical software to
assist with researching and diagnosing health
conditions.

7
All branches of science, from biology to
astronomy to meteorology, use computers to
assist them with collecting, analyzing and
modeling data.

8
This works include books, magazines, newspapers,
music, film and video.
Special software assists graphic designers in
developing pages that include text, graphics and
photographs.

9
Many airlines now provide passengers with
Internet-enabled devices during flights.

You can order airline tickets on the Web.

10
11
There is a lot of negative impact of using the
ICT such as:-

Virus
Hacking
Copyright and Piracy
Phishing
Biometrics

12
Potentially damaging computer negatively.

Not only damage hard disk but also damage


your hardware & software.

13
As well as varying ideas of what a hacker is or
does.

Hacker is any programming specialist who has the


Expertise to enter a computer or network without
proper authorization.

The amount of damage a hacker can do depends on


what the Hacker's skill level

14
Copyright is make a copy of any type of CD using
a CD writer and sell it.

Piracy involves usage, copying, selling &


distributing computer program without the
permission of its producer

15
Phishing is a technique used to gain personal and
financial information for purposes of identity
theft by used e-mail.

Some phishing e-mail messages ask you to reply


with your personal information such as account
numbers and passwords, credit card numbers and
Social Security numbers.

16
The technology of authenticating a person’s
by verifying a personal characteristic.
Include fingerprints, hand geometry, facial
features, voice, signatures, and eye
patterns. (please refer discovery computer
text book)

17
18
The consumers of Pirates run the risk
piracy run the risk that of massive fines
their computers may be and possible jail
infected with viruses sentences if they
are caught.

COPYRIGHT & PIRACY

If there isn't money to There is no


sustain R&D, then the degradation in the
developers won't be able quality.
to hire new employee 19
Technology can cause If their iris scan is stolen,
physical harm to an though, and it allows someone
individual else to access personal
information

BIOMETRIC

The data obtained using Electronic readers that are able to


biometrics can be used in read the chip in the cards and verify
unauthorized ways without the the information present in the card
individual's consent. and on the passport.
20
Hack to the bank system Hacker robe a money in
it’s cause the business the bank by hacking the
close. system of bank

HACKING

Many people don’t want to Hospital system may cause


used card credit because many people die because of
hacker can hack the many people was control by
number of card credit. a machine
21
Businesses lose as their An attacker uses a bank or
clients become victims service's own scripts against the
victim.

PHISHING

The attacker could then access the Create fake accounts in a victim's
victim's account and use it for name, ruin a victim's credit, or
various criminal purposes, such as even prevent victims from
spamming. accessing their own accounts.

22
23
1. THE CONTRIBUTION OF ICT.
2. NEGATIVE IMPACT

24

Potrebbero piacerti anche