SlideShare a Scribd company logo
SOCIAL IMPACTS
CENSORSHIP AND FREEDOM OF SPEECH
• Internet censorship are measure that are in place that
includes filtering internet sites based on their content.
• If the content is illegal in that current to publicise or
have possession of.
• Firewalls are used to block certain sites.
• Governments are taking steps to introduce a broad
system that will block certain websites from all users
in that country.
CENSORSHIP AND FREEDOM OF SPEECH
• Some people believe that censorship is a violation of
people’s rights to freedom of speech.
• In the UK laws against libel (written smearing of
someone’s character) equally applies to internet
content as it does with other media methods such as
newspapers.
• There has been a mass increase of internet
surveillance by government officials to fight against
terrorism and crime as well as protecting children.
• The law does provide freedom of speech.
PRIVACY AND ENCRYPTION
• Advancements in technology more often we are seeing
ways in which our privacy is threatened.
• Companies often monitor websites that people have
visited which can be used to create advertisement for that
company.
• Personal information is often freely available on social
networking sites.
• Bank details are often freely given to purchased good
online. This can often be held by the company on their
own online databases.
• Browsing history, search queries and social networking
profiles can be processed to gather confidential details
about an individual. Data such as their politic and religious
views, race, addresses, telephone numbers etc
COOKIES
• A cookie is a small program that stores data on a user’s computer about
activities performed on websites.
• For example they are used to store username and passwords that prevent
you from having to enter them every time.
• Amazon uses cookies to track what you browse and by so they can show
you items that might interest you.
• There is also negative impacts. For example thieves can acquire personal
information through cookies.
• Browsing habits saved on cookies can often be sold on. This can often lead
to spam and phishing emails.
ENCRYPTION
• Encryption is used to make data such as online
payments securely by scrambling the details for it to
be sent.
• This is then decoded at the other side.
• It uses various mathematical transformations that
cannot be decoded without the key.
GLOBAL CITIZENSHIP
• Up until a few hundred years ago majority of people
had never travelled from their owns or even met
people from other countries and cultures.
• The invention of cars and planes opened the world up
to many people.
• The internet has also aided this and now many people
communicate freely in online communities and are in
theory becoming Global Citizens.
• Global communication has led to an increased
awareness and sharing of other cultures and attitudes.
ONLINE COMMUNITIES
• An online community is a virtual community that
exists online.
• Members will sign up to share resources and discuss
issues about a common interest.
• This communities can take form of forums, bulletin
boards, social networking sites, chatrooms and now
even YouTube.

More Related Content

What's hot

How has technology changed the way we conduct business?
How has technology changed the way we conduct business?How has technology changed the way we conduct business?
How has technology changed the way we conduct business?
s1170178
 
advantages and disadvantages of internet
advantages and disadvantages of internetadvantages and disadvantages of internet
advantages and disadvantages of internet
Ali Şahin
 
Presentation of itc
Presentation of itcPresentation of itc
Presentation of itc
noor ul ain
 
ais 150
ais 150ais 150
ais 150
PUTERI nadia
 
How technology changed the way we do business
How technology changed the way we do businessHow technology changed the way we do business
How technology changed the way we do business
DOU End Muh Sunum
 
How mc.donalds run their business in china identify some of their strategies...
How mc.donalds run their business in china  identify some of their strategies...How mc.donalds run their business in china  identify some of their strategies...
How mc.donalds run their business in china identify some of their strategies...
19s1190083
 
The Nine Elements
The Nine ElementsThe Nine Elements
The Nine Elements
BrodyJWU
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
Khanyiso Nemuhuyuni
 
Social interaction within 10 years - Marco Francisetti
Social interaction within 10 years - Marco FrancisettiSocial interaction within 10 years - Marco Francisetti
Social interaction within 10 years - Marco Francisetti
Marco Francisetti
 
Internet a boon or curse
Internet  a boon or curseInternet  a boon or curse
Internet a boon or curse
Arif Farhan
 
Lecture 14
Lecture 14Lecture 14
Lecture 14
Tanveer Malik
 
Digital Access
Digital AccessDigital Access
Digital Access
odmont01
 
Technology Powerpoint
Technology PowerpointTechnology Powerpoint
Technology Powerpoint
newri
 
use and protection of Intellectual Property In online Business
use and protection of Intellectual Property In online Businessuse and protection of Intellectual Property In online Business
use and protection of Intellectual Property In online Business
Humma Rashid
 
Team think week 25
Team think week 25Team think week 25
Team think week 25
junkshez
 
Digital citizenship
Digital citizenship Digital citizenship
Digital citizenship
FrancescaMae2
 
2. digital age
2. digital age2. digital age
2. digital age
pajarejp01229108
 
advantages and disadvantages of Internet
advantages and disadvantages of Internetadvantages and disadvantages of Internet
advantages and disadvantages of Internet
Ali Şahin
 
Unit 9 lesson 1 the computer and technology revolutions
Unit 9 lesson 1  the computer and technology revolutionsUnit 9 lesson 1  the computer and technology revolutions
Unit 9 lesson 1 the computer and technology revolutions
MrsSmithGHS
 
U9L1: The computer and technology revolutions
U9L1: The computer and technology revolutionsU9L1: The computer and technology revolutions
U9L1: The computer and technology revolutions
JesSmith817
 

What's hot (20)

How has technology changed the way we conduct business?
How has technology changed the way we conduct business?How has technology changed the way we conduct business?
How has technology changed the way we conduct business?
 
advantages and disadvantages of internet
advantages and disadvantages of internetadvantages and disadvantages of internet
advantages and disadvantages of internet
 
Presentation of itc
Presentation of itcPresentation of itc
Presentation of itc
 
ais 150
ais 150ais 150
ais 150
 
How technology changed the way we do business
How technology changed the way we do businessHow technology changed the way we do business
How technology changed the way we do business
 
How mc.donalds run their business in china identify some of their strategies...
How mc.donalds run their business in china  identify some of their strategies...How mc.donalds run their business in china  identify some of their strategies...
How mc.donalds run their business in china identify some of their strategies...
 
The Nine Elements
The Nine ElementsThe Nine Elements
The Nine Elements
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Social interaction within 10 years - Marco Francisetti
Social interaction within 10 years - Marco FrancisettiSocial interaction within 10 years - Marco Francisetti
Social interaction within 10 years - Marco Francisetti
 
Internet a boon or curse
Internet  a boon or curseInternet  a boon or curse
Internet a boon or curse
 
Lecture 14
Lecture 14Lecture 14
Lecture 14
 
Digital Access
Digital AccessDigital Access
Digital Access
 
Technology Powerpoint
Technology PowerpointTechnology Powerpoint
Technology Powerpoint
 
use and protection of Intellectual Property In online Business
use and protection of Intellectual Property In online Businessuse and protection of Intellectual Property In online Business
use and protection of Intellectual Property In online Business
 
Team think week 25
Team think week 25Team think week 25
Team think week 25
 
Digital citizenship
Digital citizenship Digital citizenship
Digital citizenship
 
2. digital age
2. digital age2. digital age
2. digital age
 
advantages and disadvantages of Internet
advantages and disadvantages of Internetadvantages and disadvantages of Internet
advantages and disadvantages of Internet
 
Unit 9 lesson 1 the computer and technology revolutions
Unit 9 lesson 1  the computer and technology revolutionsUnit 9 lesson 1  the computer and technology revolutions
Unit 9 lesson 1 the computer and technology revolutions
 
U9L1: The computer and technology revolutions
U9L1: The computer and technology revolutionsU9L1: The computer and technology revolutions
U9L1: The computer and technology revolutions
 

Viewers also liked

Database Relationships
Database RelationshipsDatabase Relationships
Database Relationships
Forrester High School
 
ISDD Hacking and Viruses
ISDD Hacking and VirusesISDD Hacking and Viruses
ISDD Hacking and Viruses
Forrester High School
 
ISDD Standard File Formats
ISDD Standard File FormatsISDD Standard File Formats
ISDD Standard File Formats
Forrester High School
 
Database - reports, forms, calculations
Database - reports, forms, calculationsDatabase - reports, forms, calculations
Database - reports, forms, calculations
Forrester High School
 
ISDD Environmental Impact
ISDD Environmental ImpactISDD Environmental Impact
ISDD Environmental Impact
Forrester High School
 
Web Pages
Web PagesWeb Pages
Sound & Video File Sizes
Sound & Video File SizesSound & Video File Sizes
Sound & Video File Sizes
Forrester High School
 
ISDD Cloud and Internet Services
ISDD Cloud and Internet ServicesISDD Cloud and Internet Services
ISDD Cloud and Internet Services
Forrester High School
 
Database structure
Database structureDatabase structure
Database structure
Forrester High School
 
ISDD Networking & Connectivity
ISDD Networking & ConnectivityISDD Networking & Connectivity
ISDD Networking & Connectivity
Forrester High School
 
Database Validation
Database ValidationDatabase Validation
Database Validation
Forrester High School
 
ISDD Sequential & Random Access
ISDD Sequential & Random AccessISDD Sequential & Random Access
ISDD Sequential & Random Access
Forrester High School
 
Technical Implementation: Software
Technical Implementation: SoftwareTechnical Implementation: Software
Technical Implementation: Software
Forrester High School
 
ISDD - Security Risks
ISDD - Security RisksISDD - Security Risks
ISDD - Security Risks
Forrester High School
 
ISDD Back Up Strategies
ISDD Back Up StrategiesISDD Back Up Strategies
ISDD Back Up Strategies
Forrester High School
 
ISDD Media Types - File Compression
ISDD Media Types - File CompressionISDD Media Types - File Compression
ISDD Media Types - File Compression
Forrester High School
 
Other web page aspects
Other web page aspectsOther web page aspects
Other web page aspects
Forrester High School
 
Searching and Sorting
Searching and SortingSearching and Sorting
Searching and Sorting
Forrester High School
 
Backing Storage
Backing StorageBacking Storage
Backing Storage
Forrester High School
 
Higher Computing Science CSS
Higher Computing Science CSSHigher Computing Science CSS
Higher Computing Science CSS
Forrester High School
 

Viewers also liked (20)

Database Relationships
Database RelationshipsDatabase Relationships
Database Relationships
 
ISDD Hacking and Viruses
ISDD Hacking and VirusesISDD Hacking and Viruses
ISDD Hacking and Viruses
 
ISDD Standard File Formats
ISDD Standard File FormatsISDD Standard File Formats
ISDD Standard File Formats
 
Database - reports, forms, calculations
Database - reports, forms, calculationsDatabase - reports, forms, calculations
Database - reports, forms, calculations
 
ISDD Environmental Impact
ISDD Environmental ImpactISDD Environmental Impact
ISDD Environmental Impact
 
Web Pages
Web PagesWeb Pages
Web Pages
 
Sound & Video File Sizes
Sound & Video File SizesSound & Video File Sizes
Sound & Video File Sizes
 
ISDD Cloud and Internet Services
ISDD Cloud and Internet ServicesISDD Cloud and Internet Services
ISDD Cloud and Internet Services
 
Database structure
Database structureDatabase structure
Database structure
 
ISDD Networking & Connectivity
ISDD Networking & ConnectivityISDD Networking & Connectivity
ISDD Networking & Connectivity
 
Database Validation
Database ValidationDatabase Validation
Database Validation
 
ISDD Sequential & Random Access
ISDD Sequential & Random AccessISDD Sequential & Random Access
ISDD Sequential & Random Access
 
Technical Implementation: Software
Technical Implementation: SoftwareTechnical Implementation: Software
Technical Implementation: Software
 
ISDD - Security Risks
ISDD - Security RisksISDD - Security Risks
ISDD - Security Risks
 
ISDD Back Up Strategies
ISDD Back Up StrategiesISDD Back Up Strategies
ISDD Back Up Strategies
 
ISDD Media Types - File Compression
ISDD Media Types - File CompressionISDD Media Types - File Compression
ISDD Media Types - File Compression
 
Other web page aspects
Other web page aspectsOther web page aspects
Other web page aspects
 
Searching and Sorting
Searching and SortingSearching and Sorting
Searching and Sorting
 
Backing Storage
Backing StorageBacking Storage
Backing Storage
 
Higher Computing Science CSS
Higher Computing Science CSSHigher Computing Science CSS
Higher Computing Science CSS
 

Similar to Social Impacts of Computing Science

internet.pptx
internet.pptxinternet.pptx
internet.pptx
Aroshana Dissanayake
 
Internet ppt
Internet pptInternet ppt
Internet ppt
tej_vish
 
The internet-presentation
The internet-presentationThe internet-presentation
The internet-presentation
armilapratiwi
 
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Commonwealth Telecommunications Organisation
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentation
Chande Kasita
 
mohammed ppt
mohammed pptmohammed ppt
mohammed ppt
Vishal Bunty
 
How you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsHow you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNs
Iulia Porneala
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
VaishnaviPalkar
 
Respect%20 yourself/Respect Others
Respect%20 yourself/Respect OthersRespect%20 yourself/Respect Others
Respect%20 yourself/Respect Others
nealbd
 
About internet by krishna tibdewal...!!!!
About internet by krishna tibdewal...!!!!About internet by krishna tibdewal...!!!!
About internet by krishna tibdewal...!!!!
Krishna Tibdewal
 
Power point assignment
Power point assignmentPower point assignment
Power point assignment
Konrad Warford
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
Muhammad Haroon
 
7881096.pptetststdydsttshsthsstshhstetej
7881096.pptetststdydsttshsthsstshhstetej7881096.pptetststdydsttshsthsstshhstetej
7881096.pptetststdydsttshsthsstshhstetej
NishaTariq1
 
7881096.pptsssysgssssttstststststssstttw
7881096.pptsssysgssssttstststststssstttw7881096.pptsssysgssssttstststststssstttw
7881096.pptsssysgssssttstststststssstttw
NishaTariq1
 
Cyber Safety & Cyber Crimes by me.pptx
Cyber Safety & Cyber Crimes by me.pptxCyber Safety & Cyber Crimes by me.pptx
Cyber Safety & Cyber Crimes by me.pptx
TejasSingh70
 
Internet cybercrime,ebanking and security
Internet cybercrime,ebanking and  securityInternet cybercrime,ebanking and  security
Internet cybercrime,ebanking and security
Dheeraj Kumar Tiwari
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
RoshanMaharjan13
 
INTERNET SAFER DAY-2021.pptx
INTERNET SAFER DAY-2021.pptxINTERNET SAFER DAY-2021.pptx
INTERNET SAFER DAY-2021.pptx
Triveni Prabaakar
 
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdfWeek34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
PhngLinhTrn33
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
DeepasreeBiju
 

Similar to Social Impacts of Computing Science (20)

internet.pptx
internet.pptxinternet.pptx
internet.pptx
 
Internet ppt
Internet pptInternet ppt
Internet ppt
 
The internet-presentation
The internet-presentationThe internet-presentation
The internet-presentation
 
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentation
 
mohammed ppt
mohammed pptmohammed ppt
mohammed ppt
 
How you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsHow you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNs
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
 
Respect%20 yourself/Respect Others
Respect%20 yourself/Respect OthersRespect%20 yourself/Respect Others
Respect%20 yourself/Respect Others
 
About internet by krishna tibdewal...!!!!
About internet by krishna tibdewal...!!!!About internet by krishna tibdewal...!!!!
About internet by krishna tibdewal...!!!!
 
Power point assignment
Power point assignmentPower point assignment
Power point assignment
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
 
7881096.pptetststdydsttshsthsstshhstetej
7881096.pptetststdydsttshsthsstshhstetej7881096.pptetststdydsttshsthsstshhstetej
7881096.pptetststdydsttshsthsstshhstetej
 
7881096.pptsssysgssssttstststststssstttw
7881096.pptsssysgssssttstststststssstttw7881096.pptsssysgssssttstststststssstttw
7881096.pptsssysgssssttstststststssstttw
 
Cyber Safety & Cyber Crimes by me.pptx
Cyber Safety & Cyber Crimes by me.pptxCyber Safety & Cyber Crimes by me.pptx
Cyber Safety & Cyber Crimes by me.pptx
 
Internet cybercrime,ebanking and security
Internet cybercrime,ebanking and  securityInternet cybercrime,ebanking and  security
Internet cybercrime,ebanking and security
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 
INTERNET SAFER DAY-2021.pptx
INTERNET SAFER DAY-2021.pptxINTERNET SAFER DAY-2021.pptx
INTERNET SAFER DAY-2021.pptx
 
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdfWeek34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 

More from missstevenson01

S3 environment
S3 environmentS3 environment
S3 environment
missstevenson01
 
The Processor.pptx
The Processor.pptxThe Processor.pptx
The Processor.pptx
missstevenson01
 
How Computers Work
How Computers WorkHow Computers Work
How Computers Work
missstevenson01
 
Lesson 3 - Coding with Minecraft - Variables.pptx
Lesson 3 -  Coding with Minecraft -  Variables.pptxLesson 3 -  Coding with Minecraft -  Variables.pptx
Lesson 3 - Coding with Minecraft - Variables.pptx
missstevenson01
 
Lesson 2 - Coding with Minecraft - Events.pptx
Lesson 2 - Coding with Minecraft - Events.pptxLesson 2 - Coding with Minecraft - Events.pptx
Lesson 2 - Coding with Minecraft - Events.pptx
missstevenson01
 
Lesson 1 - Coding with Minecraft -Introduction.pptx
Lesson 1 - Coding with Minecraft -Introduction.pptxLesson 1 - Coding with Minecraft -Introduction.pptx
Lesson 1 - Coding with Minecraft -Introduction.pptx
missstevenson01
 
Lesson2 - Coding with Minecraft - Events.pptx
Lesson2 - Coding with Minecraft - Events.pptxLesson2 - Coding with Minecraft - Events.pptx
Lesson2 - Coding with Minecraft - Events.pptx
missstevenson01
 
Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spyware
missstevenson01
 
Ethical hacking anti virus
Ethical hacking   anti virusEthical hacking   anti virus
Ethical hacking anti virus
missstevenson01
 
Ethical hacking introduction to ethical hacking
Ethical hacking   introduction to ethical hackingEthical hacking   introduction to ethical hacking
Ethical hacking introduction to ethical hacking
missstevenson01
 
S1 internet safety-chattingonline
S1 internet safety-chattingonlineS1 internet safety-chattingonline
S1 internet safety-chattingonline
missstevenson01
 
S3 wireframe diagrams
S3 wireframe diagramsS3 wireframe diagrams
S3 wireframe diagrams
missstevenson01
 
Sql
SqlSql
Alien database
Alien databaseAlien database
Alien database
missstevenson01
 
Video Games and Copyright laws
Video Games and Copyright lawsVideo Games and Copyright laws
Video Games and Copyright laws
missstevenson01
 
Games Design Document
Games Design DocumentGames Design Document
Games Design Document
missstevenson01
 
Video game proposal
Video game proposalVideo game proposal
Video game proposal
missstevenson01
 
Evaluation
EvaluationEvaluation
Evaluation
missstevenson01
 
H evaluation
H evaluationH evaluation
H evaluation
missstevenson01
 
H testing and debugging
H testing and debuggingH testing and debugging
H testing and debugging
missstevenson01
 

More from missstevenson01 (20)

S3 environment
S3 environmentS3 environment
S3 environment
 
The Processor.pptx
The Processor.pptxThe Processor.pptx
The Processor.pptx
 
How Computers Work
How Computers WorkHow Computers Work
How Computers Work
 
Lesson 3 - Coding with Minecraft - Variables.pptx
Lesson 3 -  Coding with Minecraft -  Variables.pptxLesson 3 -  Coding with Minecraft -  Variables.pptx
Lesson 3 - Coding with Minecraft - Variables.pptx
 
Lesson 2 - Coding with Minecraft - Events.pptx
Lesson 2 - Coding with Minecraft - Events.pptxLesson 2 - Coding with Minecraft - Events.pptx
Lesson 2 - Coding with Minecraft - Events.pptx
 
Lesson 1 - Coding with Minecraft -Introduction.pptx
Lesson 1 - Coding with Minecraft -Introduction.pptxLesson 1 - Coding with Minecraft -Introduction.pptx
Lesson 1 - Coding with Minecraft -Introduction.pptx
 
Lesson2 - Coding with Minecraft - Events.pptx
Lesson2 - Coding with Minecraft - Events.pptxLesson2 - Coding with Minecraft - Events.pptx
Lesson2 - Coding with Minecraft - Events.pptx
 
Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spyware
 
Ethical hacking anti virus
Ethical hacking   anti virusEthical hacking   anti virus
Ethical hacking anti virus
 
Ethical hacking introduction to ethical hacking
Ethical hacking   introduction to ethical hackingEthical hacking   introduction to ethical hacking
Ethical hacking introduction to ethical hacking
 
S1 internet safety-chattingonline
S1 internet safety-chattingonlineS1 internet safety-chattingonline
S1 internet safety-chattingonline
 
S3 wireframe diagrams
S3 wireframe diagramsS3 wireframe diagrams
S3 wireframe diagrams
 
Sql
SqlSql
Sql
 
Alien database
Alien databaseAlien database
Alien database
 
Video Games and Copyright laws
Video Games and Copyright lawsVideo Games and Copyright laws
Video Games and Copyright laws
 
Games Design Document
Games Design DocumentGames Design Document
Games Design Document
 
Video game proposal
Video game proposalVideo game proposal
Video game proposal
 
Evaluation
EvaluationEvaluation
Evaluation
 
H evaluation
H evaluationH evaluation
H evaluation
 
H testing and debugging
H testing and debuggingH testing and debugging
H testing and debugging
 

Recently uploaded

Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 

Recently uploaded (20)

Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 

Social Impacts of Computing Science

  • 2. CENSORSHIP AND FREEDOM OF SPEECH • Internet censorship are measure that are in place that includes filtering internet sites based on their content. • If the content is illegal in that current to publicise or have possession of. • Firewalls are used to block certain sites. • Governments are taking steps to introduce a broad system that will block certain websites from all users in that country.
  • 3. CENSORSHIP AND FREEDOM OF SPEECH • Some people believe that censorship is a violation of people’s rights to freedom of speech. • In the UK laws against libel (written smearing of someone’s character) equally applies to internet content as it does with other media methods such as newspapers. • There has been a mass increase of internet surveillance by government officials to fight against terrorism and crime as well as protecting children. • The law does provide freedom of speech.
  • 4. PRIVACY AND ENCRYPTION • Advancements in technology more often we are seeing ways in which our privacy is threatened. • Companies often monitor websites that people have visited which can be used to create advertisement for that company. • Personal information is often freely available on social networking sites. • Bank details are often freely given to purchased good online. This can often be held by the company on their own online databases. • Browsing history, search queries and social networking profiles can be processed to gather confidential details about an individual. Data such as their politic and religious views, race, addresses, telephone numbers etc
  • 5. COOKIES • A cookie is a small program that stores data on a user’s computer about activities performed on websites. • For example they are used to store username and passwords that prevent you from having to enter them every time. • Amazon uses cookies to track what you browse and by so they can show you items that might interest you. • There is also negative impacts. For example thieves can acquire personal information through cookies. • Browsing habits saved on cookies can often be sold on. This can often lead to spam and phishing emails.
  • 6. ENCRYPTION • Encryption is used to make data such as online payments securely by scrambling the details for it to be sent. • This is then decoded at the other side. • It uses various mathematical transformations that cannot be decoded without the key.
  • 7. GLOBAL CITIZENSHIP • Up until a few hundred years ago majority of people had never travelled from their owns or even met people from other countries and cultures. • The invention of cars and planes opened the world up to many people. • The internet has also aided this and now many people communicate freely in online communities and are in theory becoming Global Citizens. • Global communication has led to an increased awareness and sharing of other cultures and attitudes.
  • 8. ONLINE COMMUNITIES • An online community is a virtual community that exists online. • Members will sign up to share resources and discuss issues about a common interest. • This communities can take form of forums, bulletin boards, social networking sites, chatrooms and now even YouTube.