SlideShare a Scribd company logo
1 of 17
Fears About Computer Technology By: BushraHasan RubelynneBalingoay
Table of Contents 1.1 Fears About Computer Technology 2.1 Identifying Types of Fears 3.1 Cyberbullying 3.2 Social Networks 3.3 Prevention Methods 4.1 Cybercrime 4.2 Legal Consequences 5.1 Increasing Unemployment 6.1 Tragedy of the Commons 7.1 References
Fears About Computer Technology Computer is the soul of modern generation. Every great invention has its benefits and its downfalls. Automated systems, communication device, computers. With technology always changing, people must adapt quickly.
Identifying Types of Fears There are many categories that fall under computer fears such as:  bullying  hacking  privacy concerns  unemployment   fraud
Cyberbullying ,[object Object]
Causes the feelings of humiliation, frustration, and depression.
Affects the psychological well-being of an individual.[1]
Social Networks [3] [4] [5]
Prevention Methods Zero-tolerance enforcement. Educators and authorities must apply their legal right to intervene. Develop a contract or pledge that protects students against violence at school and at home. Be educated on web based crimes. [7]
Cybercrime A criminal offence occurred by using a computer or telephone as a tool or object of a crime. Reasons for cybercrime are: theft of identity money  forging documents & messages [8]
Legal Consequences Cybercrime is a criminal offence.  Imprisonment for a term up to 10 years, or punishable upon conviction. Cybercrime must be treated like any serious crime such as theft, fraud and libel.  “In 2002, Canada’s Criminal Code was amended to include new offences.” (Government Canada) [10]
Increasing Unemployment Automation, controlled systems. IBM Watson computers. A shift toward self service organizations . Ford states, “Robotics will use and eventually become more serviceable in certain jobs more than humans.”  http://www.youtube.com/watch?v=3TFDxIyaiCE [12]
Tragedy of the Commons Analogy of the Terminator. Two common fears: Advancing Technology  Societal Fear Robotic computers taking over the world. Creating machines that surpasses human abilities. Dependency on technology.
Summary With this constant trend of changing technology, it could impact our lives positively.  Considering the preventive methods and educating ourselves about proper uses of technology, these fears will diminish. Remember human capacity is beyond computer technology. Without man made inventions and patents, these devices we have today would not exist.
Conclusion The dependency on technology had shaped these fears we have about computer technology.  We can help create a fear free and untroubled society with the help of safe uses of computer technology.
References http://www.cyberbullying.us/2010_charts/teen_tech_use_2010.jpg Adams, Caralee. "CYBERBULLYING." Instructor 120.2 (2010): 44-49. Academic Search Premier. EBSCO. Web. 21 Mar. 2011. http://static.technorati.com/11/01/14/25023/facebook-logo.jpg http://img.ezinemark.com/imagemanager2/files/30004252/2011/03/2011-03-05-11-53-38-8-myspace-started-in-2003-by-an-interner-marketing-f.jpeg http://blogs.loc.gov/loc/files/2010/04/twitter_logo.jpg
Reference 2  Adams, Caralee. "CYBERBULLYING." Instructor 120.2 (2010): 44-49. Academic Search Premier. EBSCO. Web. 21 Mar. 2011. http://auctiontalkradio.blogspot.com/2007_03_01_archive.htmlSlide crimepic with credit card http://www.victimsmatter.gc.ca/situation/cyber.html http://thenglishworld-10.blogspot.com/2008/05/internet.html

More Related Content

What's hot

102 Chapter 4 Pt 2
102 Chapter 4   Pt 2102 Chapter 4   Pt 2
102 Chapter 4 Pt 2manpreet04
 
Digital Citizenship & Media Literacy
Digital Citizenship & Media LiteracyDigital Citizenship & Media Literacy
Digital Citizenship & Media LiteracyAlec Couros
 
Chp 9 lect - computer crimes surveys (shared)
Chp 9   lect  - computer crimes surveys (shared)Chp 9   lect  - computer crimes surveys (shared)
Chp 9 lect - computer crimes surveys (shared)YUSRA FERNANDO
 
Future of Technology - Jan 2008 update
Future of Technology - Jan 2008 updateFuture of Technology - Jan 2008 update
Future of Technology - Jan 2008 updateMelanie Swan
 
Mobile writing by the numbers
Mobile writing by the numbersMobile writing by the numbers
Mobile writing by the numbersAnn Wylie
 
Why Study It
Why Study ItWhy Study It
Why Study ItRay
 
The ‘M Age’ And Beyond
The ‘M Age’ And BeyondThe ‘M Age’ And Beyond
The ‘M Age’ And Beyondhudsonpd
 
Science & Technology
Science & Technology Science & Technology
Science & Technology Cake Butter
 
Super billing computers are your future
Super billing computers are your futureSuper billing computers are your future
Super billing computers are your futuresuperb11b
 
Popular Issues in (Digital) Media Literacy
Popular Issues in (Digital) Media LiteracyPopular Issues in (Digital) Media Literacy
Popular Issues in (Digital) Media LiteracyAlec Couros
 
Web Policies Presentation
Web Policies PresentationWeb Policies Presentation
Web Policies Presentationspaul6414
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the newsunnyjoshi88
 
2008 Personnel Trends Post
2008 Personnel Trends Post2008 Personnel Trends Post
2008 Personnel Trends PostTBledsoe
 
Star Kamal 9 B
Star Kamal 9 BStar Kamal 9 B
Star Kamal 9 Bjboulanger
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipaehorton0
 
Technology and Web 2.0 Across Institutions - Risk Mitigation
Technology and Web 2.0 Across Institutions - Risk MitigationTechnology and Web 2.0 Across Institutions - Risk Mitigation
Technology and Web 2.0 Across Institutions - Risk MitigationDan Michaluk
 

What's hot (18)

102 Chapter 4 Pt 2
102 Chapter 4   Pt 2102 Chapter 4   Pt 2
102 Chapter 4 Pt 2
 
Digital Citizenship & Media Literacy
Digital Citizenship & Media LiteracyDigital Citizenship & Media Literacy
Digital Citizenship & Media Literacy
 
Chp 9 lect - computer crimes surveys (shared)
Chp 9   lect  - computer crimes surveys (shared)Chp 9   lect  - computer crimes surveys (shared)
Chp 9 lect - computer crimes surveys (shared)
 
Internet system and its process
Internet system and its processInternet system and its process
Internet system and its process
 
Future of Technology - Jan 2008 update
Future of Technology - Jan 2008 updateFuture of Technology - Jan 2008 update
Future of Technology - Jan 2008 update
 
Mobile writing by the numbers
Mobile writing by the numbersMobile writing by the numbers
Mobile writing by the numbers
 
Why Study It
Why Study ItWhy Study It
Why Study It
 
The ‘M Age’ And Beyond
The ‘M Age’ And BeyondThe ‘M Age’ And Beyond
The ‘M Age’ And Beyond
 
Science & Technology
Science & Technology Science & Technology
Science & Technology
 
Super billing computers are your future
Super billing computers are your futureSuper billing computers are your future
Super billing computers are your future
 
Popular Issues in (Digital) Media Literacy
Popular Issues in (Digital) Media LiteracyPopular Issues in (Digital) Media Literacy
Popular Issues in (Digital) Media Literacy
 
Web Policies Presentation
Web Policies PresentationWeb Policies Presentation
Web Policies Presentation
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the new
 
2008 Personnel Trends Post
2008 Personnel Trends Post2008 Personnel Trends Post
2008 Personnel Trends Post
 
Star Kamal 9 B
Star Kamal 9 BStar Kamal 9 B
Star Kamal 9 B
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Technology and Web 2.0 Across Institutions - Risk Mitigation
Technology and Web 2.0 Across Institutions - Risk MitigationTechnology and Web 2.0 Across Institutions - Risk Mitigation
Technology and Web 2.0 Across Institutions - Risk Mitigation
 
Social networking and security
Social networking and securitySocial networking and security
Social networking and security
 

Viewers also liked

Top People In Computer Technology
Top People In Computer TechnologyTop People In Computer Technology
Top People In Computer TechnologyBhandari Gunjan
 
New Technology 2017 L02 Evolution of Technology
New Technology 2017 L02 Evolution of TechnologyNew Technology 2017 L02 Evolution of Technology
New Technology 2017 L02 Evolution of TechnologyÓlafur Andri Ragnarsson
 
Computer technology power point
Computer technology power pointComputer technology power point
Computer technology power pointoacore2
 
The effect of technology on today's society ppt
The effect of technology on today's society pptThe effect of technology on today's society ppt
The effect of technology on today's society pptoacore
 
Impact of Technology on Society
Impact of Technology on SocietyImpact of Technology on Society
Impact of Technology on SocietyDulaj91
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 

Viewers also liked (8)

Top People In Computer Technology
Top People In Computer TechnologyTop People In Computer Technology
Top People In Computer Technology
 
L05 How Innovation Happens
L05 How Innovation HappensL05 How Innovation Happens
L05 How Innovation Happens
 
New Technology 2017 L02 Evolution of Technology
New Technology 2017 L02 Evolution of TechnologyNew Technology 2017 L02 Evolution of Technology
New Technology 2017 L02 Evolution of Technology
 
Computer technology power point
Computer technology power pointComputer technology power point
Computer technology power point
 
The effect of technology on today's society ppt
The effect of technology on today's society pptThe effect of technology on today's society ppt
The effect of technology on today's society ppt
 
Network security
Network securityNetwork security
Network security
 
Impact of Technology on Society
Impact of Technology on SocietyImpact of Technology on Society
Impact of Technology on Society
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 

Similar to 38 FEARS ABOUT COMPUTER TECHNOLOGY

Similar to 38 FEARS ABOUT COMPUTER TECHNOLOGY (15)

Bowhuis Group Ppt Draft5
Bowhuis Group Ppt Draft5Bowhuis Group Ppt Draft5
Bowhuis Group Ppt Draft5
 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptx
 
Research Paper On Cybercrime
Research Paper On CybercrimeResearch Paper On Cybercrime
Research Paper On Cybercrime
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorism
 
Sumaya Yeasmin ENGL 21002 Professor Robert Birdwell .docx
Sumaya Yeasmin ENGL 21002 Professor Robert Birdwell .docxSumaya Yeasmin ENGL 21002 Professor Robert Birdwell .docx
Sumaya Yeasmin ENGL 21002 Professor Robert Birdwell .docx
 
E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several types
 
A report on cyber Crime
A report on cyber CrimeA report on cyber Crime
A report on cyber Crime
 
Essay On CyberCrime
Essay On CyberCrimeEssay On CyberCrime
Essay On CyberCrime
 
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxTopic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
 
Ethical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTEthical, Legal and Social issues IoT
Ethical, Legal and Social issues IoT
 
cybercrime.pptx
cybercrime.pptxcybercrime.pptx
cybercrime.pptx
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Essay Cyber Crime
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 

Recently uploaded

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 

Recently uploaded (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 

38 FEARS ABOUT COMPUTER TECHNOLOGY

  • 1. Fears About Computer Technology By: BushraHasan RubelynneBalingoay
  • 2. Table of Contents 1.1 Fears About Computer Technology 2.1 Identifying Types of Fears 3.1 Cyberbullying 3.2 Social Networks 3.3 Prevention Methods 4.1 Cybercrime 4.2 Legal Consequences 5.1 Increasing Unemployment 6.1 Tragedy of the Commons 7.1 References
  • 3. Fears About Computer Technology Computer is the soul of modern generation. Every great invention has its benefits and its downfalls. Automated systems, communication device, computers. With technology always changing, people must adapt quickly.
  • 4. Identifying Types of Fears There are many categories that fall under computer fears such as: bullying hacking privacy concerns unemployment fraud
  • 5.
  • 6. Causes the feelings of humiliation, frustration, and depression.
  • 7. Affects the psychological well-being of an individual.[1]
  • 9. Prevention Methods Zero-tolerance enforcement. Educators and authorities must apply their legal right to intervene. Develop a contract or pledge that protects students against violence at school and at home. Be educated on web based crimes. [7]
  • 10. Cybercrime A criminal offence occurred by using a computer or telephone as a tool or object of a crime. Reasons for cybercrime are: theft of identity money forging documents & messages [8]
  • 11. Legal Consequences Cybercrime is a criminal offence. Imprisonment for a term up to 10 years, or punishable upon conviction. Cybercrime must be treated like any serious crime such as theft, fraud and libel. “In 2002, Canada’s Criminal Code was amended to include new offences.” (Government Canada) [10]
  • 12. Increasing Unemployment Automation, controlled systems. IBM Watson computers. A shift toward self service organizations . Ford states, “Robotics will use and eventually become more serviceable in certain jobs more than humans.” http://www.youtube.com/watch?v=3TFDxIyaiCE [12]
  • 13. Tragedy of the Commons Analogy of the Terminator. Two common fears: Advancing Technology Societal Fear Robotic computers taking over the world. Creating machines that surpasses human abilities. Dependency on technology.
  • 14. Summary With this constant trend of changing technology, it could impact our lives positively. Considering the preventive methods and educating ourselves about proper uses of technology, these fears will diminish. Remember human capacity is beyond computer technology. Without man made inventions and patents, these devices we have today would not exist.
  • 15. Conclusion The dependency on technology had shaped these fears we have about computer technology. We can help create a fear free and untroubled society with the help of safe uses of computer technology.
  • 16. References http://www.cyberbullying.us/2010_charts/teen_tech_use_2010.jpg Adams, Caralee. "CYBERBULLYING." Instructor 120.2 (2010): 44-49. Academic Search Premier. EBSCO. Web. 21 Mar. 2011. http://static.technorati.com/11/01/14/25023/facebook-logo.jpg http://img.ezinemark.com/imagemanager2/files/30004252/2011/03/2011-03-05-11-53-38-8-myspace-started-in-2003-by-an-interner-marketing-f.jpeg http://blogs.loc.gov/loc/files/2010/04/twitter_logo.jpg
  • 17. Reference 2 Adams, Caralee. "CYBERBULLYING." Instructor 120.2 (2010): 44-49. Academic Search Premier. EBSCO. Web. 21 Mar. 2011. http://auctiontalkradio.blogspot.com/2007_03_01_archive.htmlSlide crimepic with credit card http://www.victimsmatter.gc.ca/situation/cyber.html http://thenglishworld-10.blogspot.com/2008/05/internet.html
  • 18. References 3 http://www.youtube.com/watch?v=3TFDxIyaiCE http://financialinsights.wordpress.com/2011/03/11/employment-number-misses-consensus-us-consumers-cutting-back-will-canadians-follow-another-great-cmhc-video/ http://www.technologyreview.com/blog/guest/26391/ http://www.ibtimes.com/articles/112339/20110214/ibm-watson-jeopardy-unemployment-artificial-intelligence.htm http://demo.moodle.net/mod/page/view.php?id=133
  • 19. QUESTIONS??? WE HOPE YOU ENJOYED THE PRESENTATION.

Editor's Notes

  1. 1.1 what are the fear1.2 how does effect society and people?
  2. a
  3. Feelings of humiliation, frustration, hurt and afraid develops from cyberbullying. Causing changes to the psychological well-being of an individual.http://www.cyberbullying.us/2010_charts/teen_tech_use_2010.jpgInfo: Adams, Caralee. "CYBERBULLYING." Instructor 120.2 (2010): 44-49. Academic Search Premier. EBSCO. Web. 21 Mar. 2011.
  4. Facebook: http://static.technorati.com/11/01/14/25023/facebook-logo.jpgMyspace: http://img.ezinemark.com/imagemanager2/files/30004252/2011/03/2011-03-05-11-53-38-8-myspace-started-in-2003-by-an-interner-marketing-f.jpegTwitter: http://blogs.loc.gov/loc/files/2010/04/twitter_logo.jpg
  5. Adams, Caralee. "CYBERBULLYING." Instructor 120.2 (2010): 44-49. Academic Search Premier. EBSCO. Web. 21 Mar. 2011.
  6. http://www.webopedia.com/TERM/C/cyber_crime.html
  7. http://www.victimsmatter.gc.ca/situation/cyber.htmlhttp://www.google.ca/imgres?imgurl=http://www.pbs.org/newshour/images/cyberspace/jan-june00/hackers.gif&imgrefurl=http://thenglishworld-10.blogspot.com/2008/05/internet.html&usg=__iORzZHQImmwVtoK545md8DgdmYg=&h=245&w=275&sz=12&hl=en&start=136&zoom=1&tbnid=UxeQAwLlhZdFZM:&tbnh=148&tbnw=166&ei=VBeJTdiCLoyzhAeP6q2vDg&prev=/images%3Fq%3Dcybercrime%26um%3D1%26hl%3Den%26sa%3DN%26biw%3D1366%26bih%3D624%26tbs%3Disch:10%2C3713&um=1&itbs=1&iact=hc&vpx=149&vpy=278&dur=498&hovh=196&hovw=220&tx=125&ty=127&oei=OheJTcngKoTg0gGDlL2DDg&page=8&ndsp=19&ved=1t:429,r:13,s:136&biw=1366&bih=624
  8. http://www.youtube.com/watch?v=3TFDxIyaiCE (international business machines corporation)Picture:http://www.google.ca/imgres?imgurl=http://financialinsights.files.wordpress.com/2011/03/employment-canada-feb-2011.jpg%3Fw%3D392%26h%3D353&imgrefurl=http://financialinsights.wordpress.com/2011/03/11/employment-number-misses-consensus-us-consumers-cutting-back-will-canadians-follow-another-great-cmhc-video/&usg=__50HZZi_t0v6KPZcOWSzjMGEvtQg=&h=353&w=392&sz=19&hl=en&start=0&zoom=1&tbnid=uJv9ar-B0wQodM:&tbnh=123&tbnw=137&ei=AOiITbeyIK-10QHKxNmpDg&prev=/images%3Fq%3Demployment%2B2011%2Bin%2Bcanada%26um%3D1%26hl%3Den%26biw%3D1366%26bih%3D667%26tbs%3Disch:1&um=1&itbs=1&iact=hc&vpx=1088&vpy=171&dur=1846&hovh=213&hovw=237&tx=186&ty=100&oei=AOiITbeyIK-10QHKxNmpDg&page=1&ndsp=21&ved=1t:429,r:6,s:0Info: http://www.technologyreview.com/blog/guest/26391/Info:http://www.ibtimes.com/articles/112339/20110214/ibm-watson-jeopardy-unemployment-artificial-intelligence.htm
  9. http://demo.moodle.net/mod/page/view.php?id=133Last modified: Thursday, December 2, 2010, 02:31 PMTechnology: The rise and fall of cultural FearSocietal Fear