1 / 11

The Misuse of Technology

The Misuse of Technology. Group: Kwan Yee Leng Goh Chee Kheng. What is Misuse of Technology?. Misuse of technology means that people using the technology with many techniques to harm other peoples and did unwholesome things .

abrial
Download Presentation

The Misuse of Technology

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The Misuse of Technology Group: Kwan Yee Leng GohCheeKheng

  2. What is Misuse of Technology? • Misuse of technology means that people using the technology with many techniques to harm other peoples and did unwholesome things. • Misuse of technology also includes the transferring or sharing the data to other persons.

  3. Example of Misuse of Technologies • Utilizing social networking site for wrong reasons. • Writing blogs to spread hatred. • Jeopardizing safety when texting while driving. • Using mobile phones to cheat on exams. • Turning on electronic gadgets on planes. • Spreading hoaxes via text messages and emails.

  4. Why do We Care? • Because it’s illegal and harmful to other peoples or get some benefits from the victims. • To protect the safety of life.

  5. Do You Know? The top 5 websites in Malaysia: • Google • Yahoo • Facebook • YouTube • Youporn

  6. Effects • Internet safety-Online auction fraud. • Personal safety-Online credit card fraud/ identity theft, Internet bank fraud, E-mail scam/ advanced fee fraud. • Internet predator- Corporate identity theft/ Domain hijacking/ phishing. • Cyber bullying. • Cyber stalking. • Pornography & child porn.

  7. So What Can We Do? • The government should filter the violate webpages like porno websites, illegal download websites, and etc. • Hold awareness campaign about the use of technology.

  8. The way to Monitoring Networked Computers • Use auditing to monitoring access to files. • Examine cached web files. • Filter web access by URL. • Filter web access by keywords. • Monitoring incoming and outgoing e-mail messages. • Monitor instant messages.

  9. Thank You

More Related