SlideShare a Scribd company logo
1 of 16
UNIT 1
COMMUNICATION
TECHNOLOGIES
TECHNOLOGIES, PROGRAMMING AND ROBOTICS
3 ESO
INDEX
• MOBILE PHONES
• RADIO
• SATELLITES AND POSITIONING SYSTEMS
• TELEVISION
• THE INTERNET
• NEGATIVE EFFECTS OF COMMUNICATION TECHNOLOGIES
6. NEGATIVE EFFECTS OF
COMMUNICATION TECHNOLOGIES
· Ionizing radiation is a flow of energy that is able to change an atom’s structure
(by freeing atoms thus creating ions or charged atoms). Key facts:
- Ionizing radiation can take form of waves (X and gamma rays) of particles (Alpha
and Beta subatomic particles).
- It can damage our cells depending on the
intensity of the radiation and the absorbed
dose. It can cause burns, cancer, mutations…
- It has beneficial medical uses (diagnose,
radiotherapy, agriculture…) and also present
in nature (rocks like granite, dead
organisms…). This video
explains it better.
· Non-ionizing radiation is not able to change an atom’s structure, thus it doesn’t
have negative biological effects.
• KINDS OF RADIATION THAT HAVE NEGATIVE BIOLOGICAL EFFECTS
• ALPHA AND BETA PARTICLES, GAMMA RAYS
· Alpha particles are Helium atoms that have lost their electrons and are positively
charged.
· Beta particles are high-speed electrons or positrons emitted in a nuclear fission
process.
· Gamma rays are electromagnetic radiation of short wavelength and high energy
produced in the disintegration of a radioactive atom’s nucleus.
Radiation dose,
measured in
sieverts (Sv)
• MOBILE PHONE ABUSE
· Some undesired consequences of the abuse of mobile phones and other
communication portable devices are:
- Decrease in IQ
- Concentration problems
- Muscular problems (neck and fingers)
- Headaches
- Social isolation
- Accidents
- Sleeping and anxiety problems related with the blue light
- Sight problems (increase of 35% of cases of myopia since the launch of
mobile phones)
- Stress and anxiety when you can’t check your phone inmediately
- Addiction
- Loss of self esteem related to social networks
- Abandoning other hobbies that are more enriching
- More time indoors  Less exposure to sunlight (vitamins, endorphins)
· Cybercrime and online abuse are not the same.
- Cybercrime is an ilegal act that happens in the Internet.
- Online abuse is a humiliating, threatening or intimidating behaviour in the
Internet. Online abuse can turn into a crime when it breaks a law.
• CYBERCRIME AND ONLINE ABUSE
· Cyber-bullying is an individual or
group behaviour that occurs repeatedly
and a harming intention, where the
victim is harassed by rumours, treats,
pejorative labels, sexual remarks, private
photos… normally in social networks or
other Internet environments.
What to do: Save evidences and tell an adult
A study made 2 years ago in US population between 13 and 24 years old…
Link to the video
To retaliate = fighting back, tomar represalias
· Image-based abuse occurs when someone uses private images of a person for
harming, humilliating or threatening them.
· Sexting is sending sexually explicit phots or videos though the Internet. It can
become a problem when that content is shared beyond the recipient. Sharing this
type of content without the creator’s consent can become a crime for possessing
and distributing child pornography.
· Cyber-stalking / Trolling is a constant and obsesive investigation about
someone in chats or social networks with the objective to steal information and use
it for threatening that person or stealing their identity. This affects women, children
and minorities the most ans it’s normally exerted by someone they know.
• SOME ONLINE ABUSES OR RISKS
What to do: Save evidences, be very careful with
what you share and tell an adult
· Grooming is building a relationship with someone (normally a kid or young
person). The victim has an emotional connection with the abuser and trusts them
so later the abuser can manipulate, exploit and abuse them.
• MAIN RISKS OF ONLINE NAVIGATION
What to do: Don’t talk to people you don’t know
in the Internet, save evidences and tell an adult
· Spoofing is a fraudulent act where an
unknown font pretends to be familiar to you
so that you share private data or do
something for them. Spoofing is only a crime
if it’s used for ilegal acts.
Link to the video
· Grooming, spoofing and other techniques can have the final objective that you
give out personal data (like an account number or a password) or click on links that
later will bring problems. This is called phishing.
· Spam are email sent massively to a huge number of recipients normally with
publicitary purposes. Behind many spam emails there are fraudulent bots that try
to get personal data from you, access your contacts to resend spam, make you
click on links that will download malware to your device…
• MAIN RISKS OF ONLINE NAVIGATION
What to do: Check the spelling of websites you
visit and emails you open. Put filters to your inbox.
Unscribe from undesired mailing lists and DELETE
strange emails without opening!
Intro video
· A virus is a malicious program installed in your computer without your knowledge
that may or not harm your computer. Viruses spread to other computers easily and
can:
1- change your booting options
2- delete your hard drive’s information
3- scan your contacts to resend them viruses
4- hijack your browser so you are directed to a specific website
5- cause programs malfunctioning
6- read what you type to steal passwords or data
7- … and many new things day after day!!
• MALICIOUS SOFTWARE
What to do: Install a good antivirus + antimalware and keep them
updated, don’t click on pop-ups, avoid email attachments from unknown
senders, check your URL…
Symantec
Norton
Panda
AVG
McAfee
Avast
Kaspersky
Avira
Malware bytes
Bitdefender
Total AV…
· Adware are legal programs that are installed in your computer and show
advertisements while other applications are being used. Adware can be linked to
spyware, which is dangerous because it can collect personal data, redirect your
online navigation, install undesired software or take control of programs.
· Spam or junk email is a way for all these malware to get in
your systems. It’s an unsolicited email sent to thousands of
recipients normally with comercial purposes but that can be linked to adware,
spyware or viruses.
• MALICIOUS SOFTWARE
What to do: Install a good antiadware and keep them updated, read
before you click!!
Spybot search and destroy
Spysweeper
Ad-aware
What to do: Have filters to your inbox, check the sender’s email spelling,
delete without reading, block
· While connected to public wireless networks, man-in-the-middle attacks can
happen. This is when the user’s communication with a web server is intercepted by a
cracker to steal personal information (it’s a phishing technique).
Link to the video
· A VPN (Virtual Private Network) is a tunnel within a network along which all the
information travels encrypted. There are apps that help you set up a VPN.
· If you are sharing devices, Incognito browsing will delete your cookies, navigation
history, passwords…
• RISKS IN PUBLIC NETWORKS

More Related Content

What's hot

Cyber Bullying 101 for Parents
Cyber Bullying 101 for ParentsCyber Bullying 101 for Parents
Cyber Bullying 101 for Parentsdamarissepulveda
 
Cyber Crime & Prevention
Cyber Crime & Prevention Cyber Crime & Prevention
Cyber Crime & Prevention RAUSHAN KUMAR
 
Cyber Addiction
Cyber AddictionCyber Addiction
Cyber AddictionJhon Nhard
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]sheenau
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesMark Jhon Oxillo
 
Junior secondary yr 7:8 aug 18 4.3 preview
Junior secondary yr 7:8 aug 18 4.3 previewJunior secondary yr 7:8 aug 18 4.3 preview
Junior secondary yr 7:8 aug 18 4.3 previewLeonie Smith
 
Cyber bullying ppt11 02-12
Cyber bullying ppt11 02-12Cyber bullying ppt11 02-12
Cyber bullying ppt11 02-12caroline2012cox
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteAngelito Quiambao
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingCoachElrod
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteDOFJLCCDD
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guidemjtheman
 

What's hot (20)

Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Cyber Bullying 101 for Parents
Cyber Bullying 101 for ParentsCyber Bullying 101 for Parents
Cyber Bullying 101 for Parents
 
Cyber Crime & Prevention
Cyber Crime & Prevention Cyber Crime & Prevention
Cyber Crime & Prevention
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Social Networking and Internet Safety
Social Networking and Internet SafetySocial Networking and Internet Safety
Social Networking and Internet Safety
 
Cyber Addiction
Cyber AddictionCyber Addiction
Cyber Addiction
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
 
Cyberbullying Class
Cyberbullying ClassCyberbullying Class
Cyberbullying Class
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
 
Junior secondary yr 7:8 aug 18 4.3 preview
Junior secondary yr 7:8 aug 18 4.3 previewJunior secondary yr 7:8 aug 18 4.3 preview
Junior secondary yr 7:8 aug 18 4.3 preview
 
Cyber bullying ppt11 02-12
Cyber bullying ppt11 02-12Cyber bullying ppt11 02-12
Cyber bullying ppt11 02-12
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyberstalking
Cyberstalking Cyberstalking
Cyberstalking
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and Etiquette
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guide
 

Similar to negative effects of communication technologies

Data Processing.pptx
Data Processing.pptxData Processing.pptx
Data Processing.pptxStephenJude3
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptxBobby Dait
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsusxenhalo561
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxDominicCaling
 
Empowerment lesson 2.ppt
Empowerment lesson 2.pptEmpowerment lesson 2.ppt
Empowerment lesson 2.pptAndrew_Braza
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Jesus Rances
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)Can R. PAHALI
 
Eskwela module 3_responsible use of ict
Eskwela module 3_responsible use of ictEskwela module 3_responsible use of ict
Eskwela module 3_responsible use of ictAnwar Jesus Esperida
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationSheryldeVilla2
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingYumna Ali
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
Unmasking the Shadows: Exploring the Depths of Cyberbullying and Criminal Har...
Unmasking the Shadows: Exploring the Depths of Cyberbullying and Criminal Har...Unmasking the Shadows: Exploring the Depths of Cyberbullying and Criminal Har...
Unmasking the Shadows: Exploring the Depths of Cyberbullying and Criminal Har...Brian Markle
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxNoelBuctot1
 
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTEMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTTeacherNicaPrintable
 
Security on the internet volosyanko
Security on the internet volosyankoSecurity on the internet volosyanko
Security on the internet volosyankoSergiy Sydoriv
 

Similar to negative effects of communication technologies (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Data Processing.pptx
Data Processing.pptxData Processing.pptx
Data Processing.pptx
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptx
 
Stop Cyberbullying
Stop CyberbullyingStop Cyberbullying
Stop Cyberbullying
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
 
Empowerment lesson 2.ppt
Empowerment lesson 2.pptEmpowerment lesson 2.ppt
Empowerment lesson 2.ppt
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
 
Eskwela module 3_responsible use of ict
Eskwela module 3_responsible use of ictEskwela module 3_responsible use of ict
Eskwela module 3_responsible use of ict
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
Unmasking the Shadows: Exploring the Depths of Cyberbullying and Criminal Har...
Unmasking the Shadows: Exploring the Depths of Cyberbullying and Criminal Har...Unmasking the Shadows: Exploring the Depths of Cyberbullying and Criminal Har...
Unmasking the Shadows: Exploring the Depths of Cyberbullying and Criminal Har...
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
 
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTEMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
 
Security on the internet volosyanko
Security on the internet volosyankoSecurity on the internet volosyanko
Security on the internet volosyanko
 
Kinds of Cyber Crimes
Kinds of Cyber CrimesKinds of Cyber Crimes
Kinds of Cyber Crimes
 
cybercrime.pptx
cybercrime.pptxcybercrime.pptx
cybercrime.pptx
 

More from gabriela-technoteacher

Unit 1. chapter 5. presentation internet
Unit 1. chapter 5. presentation internetUnit 1. chapter 5. presentation internet
Unit 1. chapter 5. presentation internetgabriela-technoteacher
 
Unit 1. chapter 3. presentation satellites
Unit 1. chapter 3. presentation satellitesUnit 1. chapter 3. presentation satellites
Unit 1. chapter 3. presentation satellitesgabriela-technoteacher
 
Portrait: proportions and expressive resources
Portrait: proportions and expressive resourcesPortrait: proportions and expressive resources
Portrait: proportions and expressive resourcesgabriela-technoteacher
 
Technonews: Cleaning the ocean garbage
Technonews: Cleaning the ocean garbageTechnonews: Cleaning the ocean garbage
Technonews: Cleaning the ocean garbagegabriela-technoteacher
 

More from gabriela-technoteacher (20)

Workshop rules and roles
Workshop rules and rolesWorkshop rules and roles
Workshop rules and roles
 
Structures
StructuresStructures
Structures
 
Comic language
Comic languageComic language
Comic language
 
Camera shots and angles
Camera shots and anglesCamera shots and angles
Camera shots and angles
 
Unit 1. chapter 4.
Unit 1. chapter 4. Unit 1. chapter 4.
Unit 1. chapter 4.
 
My expressionist school
My expressionist schoolMy expressionist school
My expressionist school
 
Structures presentation improved
Structures presentation improvedStructures presentation improved
Structures presentation improved
 
presentation television
presentation televisionpresentation television
presentation television
 
Unit 1. chapter 5. presentation internet
Unit 1. chapter 5. presentation internetUnit 1. chapter 5. presentation internet
Unit 1. chapter 5. presentation internet
 
Unit 1. chapter 3. presentation satellites
Unit 1. chapter 3. presentation satellitesUnit 1. chapter 3. presentation satellites
Unit 1. chapter 3. presentation satellites
 
Unit 1. chapter 2. presentation radio
Unit 1. chapter 2. presentation radioUnit 1. chapter 2. presentation radio
Unit 1. chapter 2. presentation radio
 
mobile phones
mobile phonesmobile phones
mobile phones
 
Ejemplos anuncios
Ejemplos anunciosEjemplos anuncios
Ejemplos anuncios
 
Structures presentation for 3rd ESO
Structures presentation for 3rd ESOStructures presentation for 3rd ESO
Structures presentation for 3rd ESO
 
Classical orders
Classical ordersClassical orders
Classical orders
 
Movie crew presentation
Movie crew presentationMovie crew presentation
Movie crew presentation
 
Byzantine mosaics
Byzantine mosaics Byzantine mosaics
Byzantine mosaics
 
Connecting brains to machines
Connecting brains to machinesConnecting brains to machines
Connecting brains to machines
 
Portrait: proportions and expressive resources
Portrait: proportions and expressive resourcesPortrait: proportions and expressive resources
Portrait: proportions and expressive resources
 
Technonews: Cleaning the ocean garbage
Technonews: Cleaning the ocean garbageTechnonews: Cleaning the ocean garbage
Technonews: Cleaning the ocean garbage
 

Recently uploaded

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 

Recently uploaded (20)

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 

negative effects of communication technologies

  • 2. INDEX • MOBILE PHONES • RADIO • SATELLITES AND POSITIONING SYSTEMS • TELEVISION • THE INTERNET • NEGATIVE EFFECTS OF COMMUNICATION TECHNOLOGIES
  • 3. 6. NEGATIVE EFFECTS OF COMMUNICATION TECHNOLOGIES
  • 4. · Ionizing radiation is a flow of energy that is able to change an atom’s structure (by freeing atoms thus creating ions or charged atoms). Key facts: - Ionizing radiation can take form of waves (X and gamma rays) of particles (Alpha and Beta subatomic particles). - It can damage our cells depending on the intensity of the radiation and the absorbed dose. It can cause burns, cancer, mutations… - It has beneficial medical uses (diagnose, radiotherapy, agriculture…) and also present in nature (rocks like granite, dead organisms…). This video explains it better. · Non-ionizing radiation is not able to change an atom’s structure, thus it doesn’t have negative biological effects. • KINDS OF RADIATION THAT HAVE NEGATIVE BIOLOGICAL EFFECTS
  • 5. • ALPHA AND BETA PARTICLES, GAMMA RAYS · Alpha particles are Helium atoms that have lost their electrons and are positively charged. · Beta particles are high-speed electrons or positrons emitted in a nuclear fission process. · Gamma rays are electromagnetic radiation of short wavelength and high energy produced in the disintegration of a radioactive atom’s nucleus.
  • 7. • MOBILE PHONE ABUSE · Some undesired consequences of the abuse of mobile phones and other communication portable devices are: - Decrease in IQ - Concentration problems - Muscular problems (neck and fingers) - Headaches - Social isolation - Accidents - Sleeping and anxiety problems related with the blue light - Sight problems (increase of 35% of cases of myopia since the launch of mobile phones) - Stress and anxiety when you can’t check your phone inmediately - Addiction - Loss of self esteem related to social networks - Abandoning other hobbies that are more enriching - More time indoors  Less exposure to sunlight (vitamins, endorphins)
  • 8. · Cybercrime and online abuse are not the same. - Cybercrime is an ilegal act that happens in the Internet. - Online abuse is a humiliating, threatening or intimidating behaviour in the Internet. Online abuse can turn into a crime when it breaks a law. • CYBERCRIME AND ONLINE ABUSE · Cyber-bullying is an individual or group behaviour that occurs repeatedly and a harming intention, where the victim is harassed by rumours, treats, pejorative labels, sexual remarks, private photos… normally in social networks or other Internet environments. What to do: Save evidences and tell an adult
  • 9. A study made 2 years ago in US population between 13 and 24 years old…
  • 10. Link to the video To retaliate = fighting back, tomar represalias
  • 11. · Image-based abuse occurs when someone uses private images of a person for harming, humilliating or threatening them. · Sexting is sending sexually explicit phots or videos though the Internet. It can become a problem when that content is shared beyond the recipient. Sharing this type of content without the creator’s consent can become a crime for possessing and distributing child pornography. · Cyber-stalking / Trolling is a constant and obsesive investigation about someone in chats or social networks with the objective to steal information and use it for threatening that person or stealing their identity. This affects women, children and minorities the most ans it’s normally exerted by someone they know. • SOME ONLINE ABUSES OR RISKS What to do: Save evidences, be very careful with what you share and tell an adult
  • 12. · Grooming is building a relationship with someone (normally a kid or young person). The victim has an emotional connection with the abuser and trusts them so later the abuser can manipulate, exploit and abuse them. • MAIN RISKS OF ONLINE NAVIGATION What to do: Don’t talk to people you don’t know in the Internet, save evidences and tell an adult · Spoofing is a fraudulent act where an unknown font pretends to be familiar to you so that you share private data or do something for them. Spoofing is only a crime if it’s used for ilegal acts. Link to the video
  • 13. · Grooming, spoofing and other techniques can have the final objective that you give out personal data (like an account number or a password) or click on links that later will bring problems. This is called phishing. · Spam are email sent massively to a huge number of recipients normally with publicitary purposes. Behind many spam emails there are fraudulent bots that try to get personal data from you, access your contacts to resend spam, make you click on links that will download malware to your device… • MAIN RISKS OF ONLINE NAVIGATION What to do: Check the spelling of websites you visit and emails you open. Put filters to your inbox. Unscribe from undesired mailing lists and DELETE strange emails without opening!
  • 14. Intro video · A virus is a malicious program installed in your computer without your knowledge that may or not harm your computer. Viruses spread to other computers easily and can: 1- change your booting options 2- delete your hard drive’s information 3- scan your contacts to resend them viruses 4- hijack your browser so you are directed to a specific website 5- cause programs malfunctioning 6- read what you type to steal passwords or data 7- … and many new things day after day!! • MALICIOUS SOFTWARE What to do: Install a good antivirus + antimalware and keep them updated, don’t click on pop-ups, avoid email attachments from unknown senders, check your URL… Symantec Norton Panda AVG McAfee Avast Kaspersky Avira Malware bytes Bitdefender Total AV…
  • 15. · Adware are legal programs that are installed in your computer and show advertisements while other applications are being used. Adware can be linked to spyware, which is dangerous because it can collect personal data, redirect your online navigation, install undesired software or take control of programs. · Spam or junk email is a way for all these malware to get in your systems. It’s an unsolicited email sent to thousands of recipients normally with comercial purposes but that can be linked to adware, spyware or viruses. • MALICIOUS SOFTWARE What to do: Install a good antiadware and keep them updated, read before you click!! Spybot search and destroy Spysweeper Ad-aware What to do: Have filters to your inbox, check the sender’s email spelling, delete without reading, block
  • 16. · While connected to public wireless networks, man-in-the-middle attacks can happen. This is when the user’s communication with a web server is intercepted by a cracker to steal personal information (it’s a phishing technique). Link to the video · A VPN (Virtual Private Network) is a tunnel within a network along which all the information travels encrypted. There are apps that help you set up a VPN. · If you are sharing devices, Incognito browsing will delete your cookies, navigation history, passwords… • RISKS IN PUBLIC NETWORKS