Legal, social, economic and environmental impacts. (Social influences…
Legal, social, economic and environmental impacts.
There is however examples of computers being a benefit to the environment, using calculations to save time and energy.
And computer controlled heating systems accurately time things
The computer also needs to be disposed of in an enviromentally friendly way
The use of computers anywhere creates a carbon footprint for the rest of its life
Some of the developments has sparked new debate about the following topics:
Encryption, do people have the right to hide and encrypt data they deem fit?
Censorship and freedom of speech, governments have implemented legislation ranging from total control over what a citizen sees online to total freedom for people online.
The development of mobile devices no longer limits access to the web to a desk top PC.
This has created a loss of barriers so anyone anywhere can talk to anyone.
The growth of social media and gaming has created large online communities with a huge amount of users daily.
The ability to adapt as a company technologically is called "scalability"
That's why companies utilise the services of cloud companies so they can upgrade their system capabilities.
The computerisation of businesses can create large costs, including fees for training staff and buying equipment and maintaining it.
Advantages for companies
Companies also gain a massive competitive advantage if they computerise their business.
The development of the World Wibe Web has created a global market place were any company no matter how large can have an influence in it and recieve orders from anywhere in the world.
Make more informed decisions regarding future products based on market analysis.
target potential customers both within and with clients
Communicate faster, both within the company and with the clients
manufacture more while spending less
Computer hardware and software now influences every aspect of our lives in many ways, some positive and some negative.
Regulation of Investigatory Powers Act
Gives the governent, police and security service bodies the ability to intercept communications and things via the internet as well. To be able to investigate criminal activity.
The act utilises survelience techniques and undercover agents, it's also able to force owners of encrypted data to reveal it if need be.
Internet service providers also have to cooperate with the act and allow bodies to monitor suspects with through their internet providers.
RIPA, a human rights group, has criticised the act saying that it invades peoples right to privacy. But the government insists that the act is only utitlised when serious crime is at hand or national security is at risk
Deals with the abuse of telecommunications like phone lines, Wi-Fi hubs, phone networks and postal service.
The following things are ILLEGAL under the communications act:
Innappropriate use of public electronic communications network
This is broken by users of emails, social networks or mobile phones being offensive, obscene or threatening.
Possesion of software or hardware that can be used to dishonestly obtain communications services
This could include the use of software/hardware to access a protected network, tka econtrol of a radio frequency, block a television signal or produce clones of satellite TV cards.
Dishonestly getting electronic communication services
. LIke using a wi-fi connection without the owners permission or cloning a mobile SIM card so the orignal owner gets charged for your calls.
Copyright Designs and Patents Act
Infringements include: copying CDs, downloading films, installing software with the purchase of a licence.
Only the original owner of the work may start a court case.
Covers the illegal broadcasting, performing, copying, adapting, issuing, renting or lending of someone's work. The work may include literature, artwork, films and music.
Computer Misuse Act
Involves the dishonest abuse of computer systems such as
Unauthorised acts with intent to impair the operation of computer systems
This includes DDOS attacks, spreading viruses. Creating a virus isn't illegal but distributing it is.
Unauthorised access with intent to commit or facilitate commission of further offecnces
Further offences commited after hacking will still be charged
Unauthorised access to computer material
this includes hacking.