You are on page 1of 37

MISUSE OF INFORMATION TECHNOLOGY

MISUSE OF INFORMATION TECHNOLOGY

A Project Report On MISUSE OF INFORMATION TECHNOLOGY


In

Partial Fulfilments of the


Requirements for the Degree of

Post Graduate Program In Management

Submitted By:

STRIKER Group
Ajay Kalyan Rajeev Kumar Sumit Kumar Baranwal Under the supervision of Prof. Pranav Gosalia

MISUSE OF INFORMATION TECHNOLOGY

PREFACE
As a part of the course curriculum, the First Semester students are required to prepare a group project report. The objective behind preparing this group project report is to relate management subject taught in the classroom to their practical application. The preparation of this report is based on the facts and findings noted during the preparation of this report, information received from written and published documents and from internet. The scope of the project report is found out the impact of information technology on children and as well as the society. In spite of our best efforts, there may be some errors or omissions and commissions, which may please be excused.

MISUSE OF INFORMATION TECHNOLOGY

ACKNOWLEDGEMENT
We are grateful to those who made me climb easier and still enthusiastic, being careful indeed I hereby record our sincere gratitude to Pranav Gosalia, Faculty of ICFAI Business School, Ahmadabad, who guided us during the upcoming and development stages of the concept. I am also thankful to Dr. Manoj Bhatia, Director, ICFAI Business School, Ahmadabad, for maintaining a nice environment in our college to include professional scientific temper in student of our college.

MISUSE OF INFORMATION TECHNOLOGY

INTRODUCTION ________________________________ 6
EFFECT OF TELEVISION__________________________ 10 EFFECT OF VIDEO GAMES _______________________ 11 EFFECT OF MOBILE ON CHILDREN _________________ 13

INTERNET ___________________________________ 16
The Negative Impact of Using the Internet _________ 16 Negative Impact of Internet on Children ___________ 19 EFFECTS ON CHILDREN DUE TO ONLINE UNCENSORED MATERIALS__________________ 23

PORNOGRAPHY _____________________________ 24

MISUSE OF INFORMATION TECHNOLOGY

PROTECTING CHILDREN FROM ONLINE PRONOGRAPHY ____________________________________________ 25 Legal Regulations _____________________________ 25

CYBER CRIME _______________________________ 27 SOCIETY AND CHILDREN AFFECTED BY TECHNOLOGY _______________________________ 28


IMPORTANCE OF TECHNOLOGY IN HOSPITAL _______ 30 MISUSESE OF TECHNOLOGY IN HOSPITAL __________ 31

TYPES OF IMPACTS ON ENVIRONMENT _ 32


Environmental Impact of Technology Waste ________ 35

RECYCLING __________________________________ 37

MISUSE OF INFORMATION TECHNOLOGY

INTRODUCTION
Recent years have seen a complete revolution in how information is gathered, archived and used in both business and government around the world. Throughout much of the world, the workplace has been transformed from one based on paper documents, fraught with errors and delays, to one based on information technology (IT). While IT can bring vast improvements in accuracy and timeliness, IT, by itself, does not change the basic problems of personnel competence or administrative inertia. While information technology can be used to great advantage even in isolation, its real strength lies in the ability to interconnect different systems for the purpose of sharing and exchanging information. At the present time there are no ministries within the Government that exchange information online or in real time. Most successful large application deployments consists of two independent components: the programs, servers and workstations forming the core information technology component that implements the intended system functions, and an enabling communications component that ties the various pieces of the application together. The information technology component consists of the hardware and software, coupled with an overriding requirement for appropriate education and relevant experience. It is really this soft component that ultimately determines the degree of success of a particular application. In many cases, IT applications are introduced to modernize operations and administrative procedures. That is, they automate current procedures in accordance with existing polices

MISUSE OF INFORMATION TECHNOLOGY


without having to redesign the underlying concepts. In other cases, the fundamental concepts must first be re-engineered before the use of information technology will succeed. The other corollary aspect of applying information technology is the communications environment that ties together the application in space. It ensures that information is delivered efficiently so that it is available where and when it is needed. The communication side of IT also encompasses a huge and separate education and training component. Local communication must be designed to support the intended IT applications while wide area communication facilities are normally acquired through carriers or other suppliers. The challenge is to decide the specific nature of access that is needed, and the performance levels required of the communication facilities. Others will provide these as end-to-end services. Information & Communication Technology (ICT) is universally acknowledged as an important catalyst for social transformation and national progress. However, disparities in the levels of ICT readiness and use could translate into disparities in level of productivities and hence could influence a countrys rate of economic growth. Understanding and leveraging ICT is therefore critical for countries striving for continued social and economic progress. India shows enormous geographic and demographic disparity in ICT use. India has one of the largest ICT workforces in the world. One can find intense ICT use in technology clusters such as Bangalore and Gurgaon or amongst the upper middle brackets of incomes. The other side of the story is that large parts of the country lack even telephone connectivity.

MISUSE OF INFORMATION TECHNOLOGY

Children & Information technology


THE EFFECTS OF INFORMATION TECHNOLOGY ON OUR CHILDREN
9

MISUSE OF INFORMATION TECHNOLOGY

EFFECT OF INFORMATION TECHNOLOGY ON CHILDREN


EFFECT OF TELEVISION
Television can influence our children in many ways. These ways can be both positive and negative. Our children these days watch on average 25 hours per week or 3 hours a day.

This much television can affect childrens ideas about body image and gender identity. Reading comprehension and child obesity are affected. Are we adding to the outrageous statistics of child obesity if we allow this to happen? What can we do to prevent this?

POSITIVE
Watching a carefully constructed educational TV show that is age appropriate helps school age children in pre-reading skills.

NAGATIVE
Todays children create an image of what they think their bodies should look like from what is on television. This contributes to teen girls being dissatisfied with their looks How Video games affect our kids Video games are just another form of media that affects our children today. It started out that video games were cute cartoon characters.

10

MISUSE OF INFORMATION TECHNOLOGY


With the technology evolving they have turned into very graphic games.

EFFECT OF VIDEO GAMES


POSITIVE
Video game playing introduces children to computer technology. Games can give practice in following directions. Some games provide practice in problem solving and logic. Games can provide practice in use of fine motor and spatial skills. Games can provide occasions for parent and child to play together. Players are introduced to information technology. Some games have therapeutic applications with patients. Games are entertaining and fun.

NAGATIVE
Over-dependence on video games could foster social isolation, as they are often played alone. Practicing violent acts may contribute more to aggressive behavior than passive television watching. Studies do find a relationship between violent television watching and behavior. Women are often portrayed as weaker characters that are helpless or sexually provocative. Game environments are often based on plots of violence, aggression and gender bias. Many games only offer an arena of weapons, killings, kicking, stabbing and shooting.

11

MISUSE OF INFORMATION TECHNOLOGY

WAYS TO MONITOR VIDEO GAME EFFECTS


Make sure you limit the time your children are playing video games. Make sure they are playing age appropriate games. Read the labels on the games from the advisory board. Keep an open relationship with your kids so you know what they are playing.

12

MISUSE OF INFORMATION TECHNOLOGY

EFFECT OF MOBILE ON CHILDREN


Mobile phone use 'raises children's risk of brain cancer fivefold'
Alarming new research from Sweden on the effects of radiation raises fears that today's youngsters face an epidemic of the disease in later life Children and teenagers are five times more likely to get brain cancer if they use mobile phones, startling new research indicates.

The study, experts say, raises fears that today's young people may suffer an "epidemic" of the disease in later life. At least nine out of 10 British 16-year-olds have their own handset, as do more than 40 per cent of primary schoolchildren. Yet investigating dangers to the young has been omitted from a massive 3.1m British investigation of the risks of cancer from using mobile phones, launched this year, even though the official Mobile Telecommunications and Health Research (MTHR) Programmer which is conducting it admits that the issue is of the "highest priority". Despite recommendations of an official report that the use of mobiles by children should be "minimized", the Government has done almost nothing to discourage it. The European Parliament voted by 522 to 16 to urge ministers across Europe to bring in stricter limits for exposure to radiation from mobile and cordless phones, Wi-Fi and other devices, partly because children are especially vulnerable to them. They are more at risk because their brains and nervous systems are still developing and because since their heads are smaller and their skulls are thinner the radiation penetrates deeper into their brains.

Mobile phones tumours risk to young children


CHILDREN under the age of eight should not use mobile phones, parents were advised last night after an authoritative report linked heavy use to ear and brain tumours and concluded that the risks had been underestimated by most scientists.

13

MISUSE OF INFORMATION TECHNOLOGY


Professor Sir William Stewart, chairman of the National Radiological Protection Board (NRPB), said that evidence of potentially harmful effects had become more persuasive over the past five years.

The news prompted calls for phones to carry health warnings and panic in parts of the industry. One British manufacturer immediately suspended a model aimed at four to eight-yearolds. The number of mobiles in Britain has doubled to 50 million since the first governmentsponsored report in 2000. The number of children aged between five and nine using mobiles has increased fivefold in the same period. In his report, Mobile Phones and Health, Sir William said that four studies have caused concern. One ten-year study in Sweden suggests that heavy mobile users are more prone to nonmalignant tumours in the ear and brain while a Dutch study had suggested changes in cognitive function. A German study has hinted at an increase in cancer around base stations, while a project supported by the EU had shown evidence of cell damage from fields typical of those of mobile phones. All of these studies have yet to be replicated and are of varying quality but we cant dismiss them out of hand, Sir William said. If there was a health risk which remained unproven it would have a greater effect on the young than on older people, he added. For children aged between 8 and 14, parents had to make their own judgments about the risks and benefits. I cant believe that for three to eight year-olds they can be readily justified, he said. David Hart, general secretary of the National Association of Head teachers, called for a ban on mobiles in schools. Mobile phone companies reacted furiously, saying that the report fanned public concern without presenting new research. The youth market is highly lucrative because teenagers are more likely to use video downloads and other services. The World Health Organization is preparing to publish an international report, drawing on hundreds of studies conducted over a decade, which many hope will give a definitive judgment on mobile phone safety. The health effects of mobile phone radiation on children are very worrisome. All government reports and many scientific studies that are referred to in this article emphasize those children are

14

MISUSE OF INFORMATION TECHNOLOGY


more vulnerable than adults. In How Exposure to Mobile Phone Base-Station Signals Can Adversely Affect Humans, Dr Hyland explains why children are more vulnerable: A similar Spanish study found that people living in the close vicinity of a cell phone tower had the following health problems. Depression increased by up to 64-fold. Fatigue increased by up to 37-fold. Appetite Loss increased by up to 25-fold. Those health effects apply to adults; children can be expected to have even more severe health issues due to the increased absorption of the same radiation levels. The health impact of RF radiation needs more research. In my opinion, one of the reasons that this is not happing is the enormous economical value that is associated with mobile communication industry and the connectivity it provides. However, both brain cancer and leukemia have been associated with microwave radiation. Keeping this and the explosive growth of mobile phones in mind, one wonders what the connection is between RF radiation and these cancers. According to the US Natural Resources Defence Council:

15

MISUSE OF INFORMATION TECHNOLOGY

INTERNET
The Negative Impact of Using the Internet
Today, the internet is regarded as the largest information base and it has become an integral part of our lives. Not only can we access a vast amount of data on the internet but we can also use the internet as a channel of communication. Emails and instant messages have made online communication possible. Social networking websites and online discussion forums have proved being popular platforms of expression. However, there is a price to pay for this easy access to such vast amounts of information. There are a number of psychological implications, with the growing use of internet by children. Some of which include the following: 1. Limited Knowledge: With the growing use of internet for research purposes, there is now a decline in the number of books used for research. Also the information available on the internet is limited and mostly pertains to the developed nations; a result, the knowledge obtained is limited. Since information about developing nations such as Pakistan is scarce. 2. Isolation: Due to spending countless hours on the internet, children now spend a very limited time with family and actual friends. Therefore, there is a weakening of the family bond and also limited interaction with actual people. As a result, the children may miss out on real life interaction with different relatives results in distorted social skills & limited real life social network. 3. Feeling of Deprivation: Since most of the information available online is about the developed nations, the people in developing countries, feel that the developed nations are much better off and they have a feeling of deprivation. 4. Distorted Sense of Reality: Since the online games are completely cut off from reality, the children tend to confuse the real world from their game world. These results in a

16

MISUSE OF INFORMATION TECHNOLOGY


distorted sense of reality can result in Identity Confusion. Furthermore, online, a persons identity is concealed and therefore people act like themselves and have no inhibitions saying how they feel. As a result, racist, sexist people have made hate sites. And this is a growing problem. 5. Negative Impact of Uncensored Material: In todays day and age it is harder to keep a check on the websites, a child is visiting and therefore, a lot of children are now being exposed to obscene, sexual material online such as pornography. Also since the identity of an individual is concealed online, there are a number of sexual predators online, who take advantage of children.

6. Exposure to Violence: With the growing use of the internet by children, there is an increase in online games. These games are very violent and expose children to explicit content and violent situations thus desensitizing the children and making them more prone to inflicting self harm, as well as harm on others. 7. Addiction to the Internet: The children also have an unrealistic feeling of power and control, when using the internet and as a result, they become addicted to the internet. 8. Information Fatigue Syndrome: With the growing use of the internet, there is an excess of knowledge available online. As a result, there is too much information. Information Fatigue Syndrome is when an individual becomes highly stressed through trying to cope with the huge amounts of information. The symptoms of Information Fatigue Syndrome include paralysis of analytical capacity, a hyper-aroused psychological condition, and anxiety and self-doubt, leading to foolish decisions and flawed conclusions.

17

MISUSE OF INFORMATION TECHNOLOGY

GUIDELINES FOR PARENTS AND TEACHERS


Always supervise your child when he/she is using internet. If the child is younger than 10 years; sit with him while he is using internet. Set clear rules for internet use. For example: Personal information must never be disclosed, like age, name etc. Use pop up blockers for offensive materials. Encourage your children to inform you when someone is making them feel uncomfortable or threatening them online. Elders must act as good role models. Educate the children about online dangers. Continue to keep an open communication channel with the children so they can express themselves freely. Encourage them to discuss the information obtained online, with you. Create a list of internet cites that are safe. Have the internet connection in an open area where everybody can sit and see. Internet should not be used for personal messaging in institutions. Maintain a logbook in institutions. Teach children and make them aware of ethical online behavior.

18

MISUSE OF INFORMATION TECHNOLOGY


Online gambling should not be allowed. Any kind of monitory transactions should not be used by the child. Regularly check your computers to see which cites have been accessed by your child. Set a time limit for your children to use the internet.

Negative Impact of Internet on Children


Internet is now widely use everywhere and becomes the need of every individual. Internet is not only beneficial for each and every individual on personal level but it is also beneficial for country, business, and also for medical grounds. But as every coin have two sides Internet also had negative impact on us and on society as well. We are now days totally dependent on internet which is in turn making youth lazy as no one is ready to go out and do jobs or play. Children love to stay more on computers to play online games rather going out. Youth now love to shop online rather go to market for to shop or to do work. This is the main reason of health hazards now days as people are getting fat and more medical problems due to non-exercise of body. It is also increasing in number of students who are not ready to go to school, the main reason all lessons are available on internet. They love to just log into internet and learn while sitting in their bed with ease and comfort. Addiction to Internet also causing new generation to be in front of computer all night and day, which is making them to think that becoming social and to meet friends, is not important. In fall 2009, 79% of public schools in the United States had access to the Internet and 34% of children ages 5 to 17 had Internet access at home. Children ages 13 to 17 spent more time online than watching television--3.5 hours versus 3.1 hours per day, and used the Internet mostly for exploration (surfing and searching), followed by education (learning and homework), multimedia (music, video, etc.), communications (e-mail, chat, and instant messages), games, and e-commerce.

19

MISUSE OF INFORMATION TECHNOLOGY


The place children were most likely to use the Internet was in the home, rather than at a library or school: 20% of children ages 8 to 16 had a computer in their bedroom, of which 54% had Internet access.

It is also harmful because children can also get access to adult content which is available on internet easily. These type of content is not appropriate for the childrens of small ages as this can make them think differently from their age and can cause more problems. Now days, it is also seen that people especially children are getting involved into gambling and things. Addiction to internet is also causing problems in development of psychological level in children which means non development of reasoning, emotions, behavior, socialization and communication in children. The Internet has a double-edged sword characteristic for children: providing many opportunities for learning, while exposing children to potentially negative content. The Internet not only provides significant benefits for children, such as research access, socialization, entertainment, and a communication tool with families, but it also connotes negative aspects such as violence, pornography, hate sites, isolation, predators, and commercialism. The Web sites considered detrimental include those dedicated to negative content such as pornography, violent online games, online gambling, and so forth. For example, many children can easily access pornographic content on the Internet. More specifically, concerning children's Internet usage, found that parental attitude and guidance significantly influence children's judgment of quality Internet materials. Recognizing the importance of family context on children's Internet usage, the present study tries to examine the role of family context (parent-child communication, relationship, and activity) on children's exposure to Internet content and parents' control over children's Internet use.

In short, the research contributes to this area in the following three aspects: (a) Understanding children's actual Internet usage in terms of content, not by Web sites or general activities; (b) Examining the role of family environment on children's negative Internet exposure; and (c) Providing a theoretical framework to explain children's exposure to negative Internet content and parents' perceived control over their children's Internet usage.

20

MISUSE OF INFORMATION TECHNOLOGY

Family Cohesion/Intimacy
Family cohesion or intimacy is one of two basic dimensions of family relationships, along with power structure. It is defined as emotional connection among family members or emotional links between parents and children. Previous studies demonstrate the importance of family cohesion or intimacy in children's socialization and development. For example, found that high emotional cohesiveness or intimacy within a family significantly affects children's development of advanced moral judgment. In highly cohesive families, parents are the most influential source of moral authority and exert more control over their children's moral standards. This may be because a more cohesive and intimate relationship between parents and children makes it more likely that parents will have good communication with children, be more aware of children's attitudes and behaviors, and will thus perceive high control over children's behavior. More specifically, regarding children's media-related behaviors, extant literature reveals the positive role of family cohesion on children's media consumption patterns and parental control. Highly cohesive families tend to have high internal connectedness through high family communication and encourage more no media alternative family activities (e.g., leisure, outings, etc.). Which are positively associated with decreased television viewing and increased parental monitoring, supervision, and control over children's media?

21

MISUSE OF INFORMATION TECHNOLOGY


Applying this to children's Internet use, it can be postulated that more cohesive parents tend to have high family communication, be more aware of children's behaviors, exert much control over children's Internet use, and thus perceive higher control:

EFFECT ON CHILDRENS KNOWLEDGE AND SKILL


A new medium, like the Internet, usually requires a technical basis, namely "possession of knowledge or skill without which actual behavioral enactment is difficult or impossible. This technical skill and knowledge enhances a user's perceived control over the medium. Skill, a Web user's "capacity for action during the online navigation process," has been known to influence the Internet user's online experience or "flow'--"an optimal, intrinsically enjoyable cognitive state experienced during online navigation. It is believed that greater knowledge about, and skill at using, the Internet leads to greater perceived control during the Internet interaction. The role of skill and knowledge is also crucial in school-based children's education programs. The possession of good knowledge and skill in teaching content is essential for the success of every schoolteacher, especially for health-related and socially sensitive issues. For example, teachers lacking adequate knowledge of HIV/AIDS could not effectively explain the disease or comfortably discuss related issues with students such as safer sex, disease transmission, and symptoms. Despite the lack of studies on the role of parents' skill and knowledge on children's education, it can be assumed that parents with the necessary skill and knowledge concerning discussion topics might see themselves as competent in teaching their children about the topics, feel more comfortable discussing related issues, and perceive high control over children's related learning

22

MISUSE OF INFORMATION TECHNOLOGY


behaviors or adjustment. Similarly, in terms of parent-child interactions about and with the Internet, it can be assumed that parents with the necessary skill and knowledge concerning using the Internet may see themselves as competent in making judgments about, and exerting control over, their children's Internet usage (e.g., checking bookmarks and cache history, blocking inappropriate Internet content, etc.). Therefore, the following hypothesis is postulated: - Parents who have good skill and knowledge concerning the Internet have greater perceived control over their children's Internet usage. Perceived Parental Control and Children's Internet Usage

EFFECTS ON CHILDREN DUE TO ONLINE UNCENSORED MATERIALS


Uncensored Materials
The Internet has become a highly effective and profitable means of distributing sexually explicit material, as well as a sophisticated channel for compulsive sexual behavior, sex trafficking, and sex crimes. of children between ages 8 and 16 have viewed pornography on the Internet. cessed unintentionally when a child, often in the process of doing homework, used an innocuous word to search for information or pictures.

23

MISUSE OF INFORMATION TECHNOLOGY


developed a full maturity could pose negative impacts on adolescent development and could potentially manifest in their social interactions with peers, their sexual activity, and their emotional development. -risk factors include impulsivity, hostility to women, and promiscuity. In this group, very frequent use of pornography is associated with a much higher rate of sexual aggression

PORNOGRAPHY
Almost everyone who uses or studies the Internet can agree that online pornography is a problem. There are currently over 100,000 pornographic Web sites accessible for free and another 400,000 for-pay sites. Tens of thousands of these Web sites contain child pornography and other illegal imagery. the magnitude of online pornography appears only to be increasing in both the number of Web sites and the types of taboo material displayed. Most disturbingly, unlike pornographic magazines, movies, and adult book stores, online pornography is easily accessible to children. Without even searching it out, Pornographic material is present in pop-up ads, e-mails, bulletin boards, chat rooms, and can be accidentally found on mistyped or innocuously named Web addresses. Regulating pornography online is extremely difficult because the architecture of the Web is set up so that users can access information stored in computers all over the world and almost anyone

24

MISUSE OF INFORMATION TECHNOLOGY


can create a Web site without significant barriers Since the World Wide Web emerged in the early-1990s, pornography has become increasingly prevalent online. The online pornography industry generates an estimated $1billion in revenue and it is estimated that it will grow to between $5 and $7 billion by2007. The driving force behind this growth is the desire of many online pornographers to make a profit. According to Robert MacMillan, a technology reporter for the Washington Post, pornography was the first sector to post real profits online Pornographers reach a large audience with minimal costs to produce content and create Web sites. Even Yahoo has turned to selling hard-core pornography to bring in extra income. Besides the profit incentive, there are other reasons why pornography is proliferating online. The ease of creating a Web site allows anyone to be their own publisher. As such, more people are experimenting at producing their own Web sites. In the case of pornography, the anonymity of the Web further reduces the reservations of some pornographers to participate. This anonymity also serves to create an incentive to experiment with pornographic content. People feel freer to push the limits of pornographic content in a hope to capture a new market and create a niche. Consequently, online pornography is perhaps more obscene and illicit than traditional pornographic content found in magazines and movies.

PROTECTING CHILDREN FROM ONLINE PRONOGRAPHY

Legal Regulations
The United States has laws protecting minors (under 18 years of age) from pornographic books, films, magazines, and retail products in stores. In general, these laws work well at limiting the ability of children to view pornography. For example, children cannot buy any type of pornographic material, and are not allowed into movies rated NC-17 (No Children under 17) and adult book stores. These laws are easy to enforce since, historically, consumers of pornography must physically go to the store or movie and show proof of age.

25

MISUSE OF INFORMATION TECHNOLOGY

The C-Laws
Despite the difficulty in regulating the Internet, Congress has been relentless in its attempts. Over the past seven years, Congress passed three major laws regulating minors access to pornography on the Internet: the 1996 Communications Decency Act (CDA), the 1998 Children Online Protection Act (COPA), and the 2000 Childrens Internet Protection Act (CIPA). These three lawsoften referred to as the Claws all failed judicial review for abridging First Amendment free speech rights. The Supreme Court is currently deciding the fate of CIPA, which was previously declared unconstitutional by a district court.

Communications Decency Act: Regulating Indecent Internet Communications


The Communications Decency Act (CDA) was passed as part of the Telecommunication Act of 1996. The CDA criminalized the knowing transmission of obscene or indecent communications to children under than 18 years of age. The Act banned sending or displaying any message to children that depicts or describes, in terms patently offensive, as measured by contemporary community standards, sexual or excretory activities or organs. Under the CDA, online pornography providers had to take good faith, reasonable, effective and appropriate efforts to prevent children from accessing their Web sites, including requiring proof of age of all users prior to accessing the pornographic material.25 Violating the CDA, by engaging in speech considered indecent or patently offensive in a place where minors could view or hear it, could result in up to two years in jail and a fine of up to $250,000.

Children Online Protection Act: Regulating Commercial Pornographic Web Sites


In an attempt to reconcile the Supreme Courts criticism of the CDA, former Senator Dan Coats and Representative Michael Oxley sponsored the Children Online Protect Act (COPA) in 1998. Like the CDA, COPA prohibited the knowing transmission of material to minors considered harmful according to contemporary community standards. However, COPA applied only to material displayed on the World Wide Web for commercial purposes. COPA also required Web site providers to verify proof of age before granting users access to pornographic material. Providers could determine age through the use of a credit card, debit account, adult access code, or adult personal identification number, and could also accept digital certificates that verify age

26

MISUSE OF INFORMATION TECHNOLOGY

Childrens Internet Protection Act: Introducing Filters to Libraries


Congress enacted the Childrens Internet Protection (CIPA) in 2000. CIPA requires public libraries that receive federal assistance in the form of discount rates for educational purposes or Library Services and Technology grants to install a technology protection measure (i.e. filtering software) on all Internet-connected computers to protect against access by all persons to visual depictions that are obscene and harmful to minors. CIPA is much different than the CDA and COPA because it is not a criminal law and does not regulate Web site providers. Instead, CIPA focuses on censoring Internet users from pornography using filters

CYBER CRIME
Cyber crime is the latest and perhaps the most complicated problem in the cyber world. Cyber crime may be said to be those species, of which, genus is the conventional crime, and where either the computer is an object or subject of the conduct constituting crime Any criminal activity that uses a computer either as an instrumentality, target or a means for perpetuating further crimes comes within the ambit of cyber crime

27

MISUSE OF INFORMATION TECHNOLOGY

CYBER CRIMINALS:
The cyber criminals constitute of various groups/ category. This division may be justified on the basis of the object that they have in their mind. The following are the category of cyber criminals-

1. Children and adolescents between the age group of 6 18 years The simple reason for this type of delinquent behaviour pattern in children is seen mostly due to the inquisitiveness to know and explore the things. Other cognate reason may be to prove them to be outstanding amongst other children in their group. Further the reasons may be psychological even. E.g. the Bal Bharati (Delhi) case was the outcome of harassment of the delinquent by his friends.

2. Organised hackersThese kinds of hackers are mostly organised together to fulfil certain objective. The reason may be to fulfil their political bias, fundamentalism, etc. The Pakistanis are said to be one of the best quality hackers in the world. They mainly target the Indian government sites with the purpose to fulfil their political objectives. Further the NASA as well as the Microsoft sites is always under attack by the hackers.

3. Discontented employeesThis group include those people who have been either sacked by their employer or are dissatisfied with their employer. To avenge they normally hack the system of their employee.

4. Professional hackers / crackers Their work is motivated by the colour of money. These kinds of hackers are mostly employed to hack the site of the rivals and get credible, reliable and valuable information. Further they are van employed to crack the system of the employer basically as a measure to make it safer by detecting the loopholes.

SOCIETY AND CHILDREN AFFECTED BY TECHNOLOGY

28

MISUSE OF INFORMATION TECHNOLOGY

SAVE GIRLS JEEVAN KO BADHANA HAIN TOH NAARI KO BAACHANA HAIN

YATRA NARESHTU POOJANTE RAMANTE TATRA DEVTA

29

MISUSE OF INFORMATION TECHNOLOGY

IMPORTANCE OF TECHNOLOGY IN HOSPITAL


Most women are aware of the importance of regular medical care during pregnancy and you should plan to register with a reliable obstetrician as soon as you find out that you are pregnant. The ensuing pre-natal care will then simply be an extension of your pre-pregnancy care. Today doctors have 'medicalized' pregnancy to such an extent that what is otherwise a normal event has been converted to one that needs rigorous and frequent medical assistance. Every mother naturally wants a normal baby, and technology can be very useful in reassuring her that all is well. One particularly disturbing trend stems from the fact that many obstetricians nowadays overuse medical technology. Common tests that are misused include blood tests for TORCH (Toxoplasmosis, Rubella, Cytomegalovirus; Herpes) infections; ultrasound scans.

30

MISUSE OF INFORMATION TECHNOLOGY

MISUSESE OF TECHNOLOGY IN HOSPITAL


Another area of misuse relates to the tests available for screening the baby for a possible birth defect. Many doctors routinely subject their patients to a 'triple test' during the pregnancy to screen for birth defects. While this is an easy test to carry out unfortunately, it has still not been standardized for Indian women. Such a drawback leads to a large number of tests yielding abnormal results. The second tier of tests can be expensive and risky as well, because some of them can cause the mother to miscarry. The foetal monitoring procedure has also been overused over the past few years. While this procedure was initially designed to serve as a tool to monitor the well-being of the foetal and to help reduce the need for medical intervention. Today it is often used to justify an LSCS (Caesarean section) in order to forcibly take out a baby 'in foetal distress'! A much simpler alternative would be to opt for 'kick counts', a procedure in which the mother simply keeps track of how often her baby moves in a given time period - a baby which moves actively is sure to be healthy! Antenatal classes conducted by medical or paramedical professionals can be very helpful. Here, you not only to learn a lot about pregnancy and childbirth, but also you get an opportunity to interact with other women in various stages of their pregnancy. The friendships developed during this period can be very supportive and helpful!

31

MISUSE OF INFORMATION TECHNOLOGY

TYPES OF IMPACTS ON ENVIRONMENT


ENTA focuses on characterizing potential impacts associated with outcome categories, or endpoints. The outcome categories are:

Human Health Impacts, Local Natural Environment Impacts, Social and Cultural Impacts, Global Impacts, and Resource Sustainability.

The performance of each technology option is evaluated using these broad categories. Each outcome category aggregates a large amount of information associated with the environmental consequences of a technology. This approach provides a useful way to combine impacts so that different technological options can be compared against common criteria. However, it must be acknowledged that specific impacts of a technology intervention may not receive appropriately detailed or balanced attention in such an approach While there are various schemes that attempt to assign relative weights to individual impacts, thus allowing them to be subsequently aggregated in a rational way, their somewhat complex and arbitrary nature make them inappropriate for use in ENTA. A description of each of the outcome categories, or endpoints, is provided below.

1. Impacts involving human health and safety


This category focuses on the potential impacts of a technology on the health, safety and well being of the community and workers. Impacts may be associated with injury, discomfort or death. There are three main impact pathways that need to be considered in the assessment of human health and safety; Communicable Diseases - Vector borne diseases , sanitary hygiene diseases, risk associated with handing of infectious wastes; Injury - Risk of accidents from traffic, explosions, falls, heat stress, operation of machinery Exposure to hazardous chemicals - Inhalation (e.g. air pollution), dermal contact, ingestion of contaminated food and water (e.g. pesticide residue) of hazardous chemicals When assessing the effect of chemicals three principal questions should be asked: What is the toxicity or potential hazard associated with release?

32

MISUSE OF INFORMATION TECHNOLOGY


How much of this chemical is likely to be released either through normal operational practices? How many people will likely be affected by the hazard?

2. Impacts on the local natural environment


This category focuses on the effects a technology may have on organisms, their habitats, the life supporting capacity of natural ecosystems, and on biodiversity. Of particular concern is the loss of endangered and rare plant and animal species, and destruction of endangered and limited habitats. Three principal impact pathways should be considered when assessing impacts in this category: Habitat loss or alteration through land clearance (e.g. as a consequence of raw material demand or development of a site); Physical disruption of habitat; for example, the construction of pipelines that inhibit the migration of animals; and The chemical contamination of the environment through the release of wastes that have a direct toxic effect on flora and fauna

3. Global environmental impacts


This category is concerned with the impact of the technology at a global scale, typically as a cumulative impact. These impacts may or may not be associated with a significant effect on a given local ecosystem or community. Particular emphasis is placed on the release of substances that: Enhance global warming (i.e. greenhouse gases such as carbon dioxide, methane and nitrous oxides); and those that Deplete the stratospheric ozone layer The significance of gaseous emissions with global warming or ozone depleting potential varies with the chemical species, the amount released and the time frame over which the impacts are considered. Some technology interventions might also reduce the effectiveness of carbon sinks, such as through the clearing of treed areas or through soil degradation leading to the release of carbon into the atmosphere.

4. Impacts on scarce or non-renewable resources


This impact category relates to the effect that the technology has upon the continued existence and availability of valued and scare resources. There are two principal ways a technology can affect resource sustainability: By consuming a resource at a rate greater than it is replenished or greater than the rate at which it may be continually supplied over the lifetime of the technology; and By contaminating a resource that is either used by the technology operators or by other parties, but which has no direct link to the technology

33

MISUSE OF INFORMATION TECHNOLOGY


In general, three basic resource categories should be considered in the assessment: Living Resources: Consumption or destruction of flora and fauna resources such as crops, forests and fisheries; Non-living resources: Mineral and chemical resources such as the fossil fuels used in energy generation or the materials used in production, and also the consumption Land resources: The land required by the industrial site, wastes, and by supporting infrastructures and services which may reduce its potential for later use. To evaluate the significance of resource consumption it is necessary to consider the future demands for the resource and how the technology limits the potential for this resource to be used in the future. A technology that uses recyclable materials and recycles wastes will generally have a lower impact than a process that does not.

5. Social impacts
This category is related to the effects of a technology on a community's values, social services and social cohesion. These impacts are in addition to those related to human health, safety and well being. There are many ways in which a technology may affect the social structure and well being of a community, but the ENTA process will normally focus on three principal concerns: Cultural resources and values: Attention is directed towards the effects a technology may have on sites or areas that have significant cultural, religious, historical, science or the potentially detrimental effect that emissions may have on a resource When evaluating potential consequences, consideration should also be given to visual, aesthetic and nuisance impacts. Social disruption to the community: Included here are impacts that may be associated with significant consequences for the social and economic structure of the community. Important issues that might need to be considered include the effect new workers may have on the community, and the relocation of people as a result of a technology intervention. Equity issues: It is unlikely that impacts associated with a technology will be equally distributed through the community. Particular attention should be paid to the potential effects of a technology development on indigenous people, the poor, children and women. Since many of these concerns will also be related to the heath impacts and resource demands associated with the technology, it is appropriate for this impact category to be the last to be examined.

34

MISUSE OF INFORMATION TECHNOLOGY

Environmental Impact of Technology Waste


When many people think of technology, they immediately think of either: Rooms full of giant computers with flashing lights and dials, or their own computer, Cell phone, PDA (Personal Digital Assistants), or Other electronic device. Technology has literally taken over everyday life. Every day we are surrounded by these marvels. Since the PC (Personal Computer) revolution went in full swing in the 1980s, millions of computers have been made. Millions of additional technological devices have been made to accompany these PCs. From PDAs, cell phones, monitors, printers, keyboards, mice, speakers, there have been tons of products sold over the past 20 years. According to Moores law , in effect that at our rate of technological development and advances in the semiconductor industry the complexity of integrated circuits doubles every 18 months (Moores Law). To put this in easy to understand terminology, that means computers will constantly be getting faster and more powerful. That inherently means current computers will quickly become outdated. What few home computer users or even corporate IT professionals think about when they purchase technology is what should be done with their old technology. What is the most cost effective and environmentally friendly way of disposing all this waste? Will there need to be laws governing how this is done? Has the last 20 years of ignorant disposal methods already harmed our environment? All of these questions are on the minds of environmentalists involved with the issue, and some lawmakers, but not in the minds of those poised to make a difference, the consumers who buy the products, use the products, and ultimately decide how they will be disposed. This issue has gotten such little attention its very possible if not likely many dont even know its a problem. To truly understand this topic, it is important to understand just a little bit of what is inside an average computer, and what is so harmful about these useful tools that we should be so worried about? At a computers very core is electronic circuitry, mainly comprised of a larger board (Motherboard), several smaller expansion boards (PCI Cards, RAM, video cards, etc.), and various other parts, including disk drives, chips, and fans. Much of the circuitry on computers is commonly done with lead solder. While each soldered joint is very tiny, as a whole computer, with thousands of resisters, capacitors, and chips, it can turn into a larger amount than one would

35

MISUSE OF INFORMATION TECHNOLOGY


think. Holding all this together can be as much as 8lbs of Aluminum. This serves as the frame for the computers case. Surrounding all that can be as much as 14lbs of plastic. The worst part of any computer is the display. There are two different types of displays, a CRT (Cathode Ray Tube,) which is identifiable by its larger size in particular depth, and its similarities to a TV, and LCD (Liquid Crystal Display) which is commonly used on flat screen displays, and laptops, because it can be only a few centimeters thick. A CRT can contain 4lbs of lead to shield radiation. An alternative to lead would be gold, but that would be too expensive, according to David Thompson of Panasonic (Cole, 1). This display itself contains mercury among other harmful chemicals. LCDs, which are becoming more popular among new computers, dont have the lead, because they dont emit radiation, but still have the mercury to make them work. To be fair to computer manufacturers, one should note that a computer today is more environmentally friendly than a computer from a decade ago. They are often smaller, meaning less aluminum and plastic is used. Machine soldering is also more precise, meaning less solder is used, and LCDs are becoming an affordable alternative. Most computers today also consume less power thanks to the Energy Star Programs push to get computers to support low powered mode (US Dept. of Energy). Some computers also use recycled materials, in particular plastic, and lead-free solder. Since this paper was first drafted, Intel announced that it would begin eliminating approximately 95 percent of the lead used in its processors and chipsets starting later this year. (Intel). This is significant as lead is a very harmful substance found in all computers, and Intels chipsets are found in most home computers. Improvements to the environmental impact of technology have been made. Motherboard manufacturer VIA just recently announced a lead-free motherboard, claiming to be the worlds first (Over lockers Club). Lead is a very toxic metal. It has been widely thought to be linked to cognitive development problems in children (Health Canada). Its already been removed from many products from pencils to paint, in hopes of keeping it from the human body. We no longer use lead pipes, instead use copper, so that it doesnt contaminate our water supply. A very famous theory on the fall of the Roman Empire links it to lead poisoning. Lead can be very dangerous. And a large sum could enter the groundwater from old computer monitors. All this toxic and space consuming waste is ending up in landfills around the US, and sometimes overseas. Computers are toxic boxes that potentially can pollute groundwater supplies and harm wildlife in addition to humans. Is there a solution to this crisis? The problem is 500 million computers will be obsolete by 2007, two in every household, according to Jim Pucket, a network organizer for Basel Action Network (Heyamoto, 1) this is the fastest growing portion of the municipal solid-waste stream according to the EPA. Thats literally tons of technology being disposed of. If the average computer contains 8lbs of aluminum, thats as much as 4 billion (4,000,000,000) lbs of aluminum that could possibly be recycled and kept out of landfills. But where does it go? According to the National Safety Council, only 11% of the 315 million computers retired by April 04 will be taken to a recycling facility (Gaither, 1). The vast majority of the rest will end

36

MISUSE OF INFORMATION TECHNOLOGY


up in landfills in the US, or overseas, except in California, where it is now illegal to dump old monitors and TVs in landfills. You can be fined $25,000 and be given jail time if caught breaking this new law in California. Massachusetts has a similar law. In California there is also an upfront fee on CRTs for their recycling, it bars exporting e-waste, and requires that manufacturers phase out harmful chemicals. It is based in part on a similar European law passed recently. According to Gartner Inc, 24 bills are currently in the works (Toxic Legacy, 19).

RECYCLING
Recycling is the ultimate end to a computer. But there are many other cost effective ways to reduce the amount of technology waste. Computers themselves can be reused. Just because its not good enough for one task, doesnt mean its useless. It can be reassigned a new task for which its capable. 1. The first option is to sell the outdated computer. There are several PC Manufacturers that will buy back your old computer and give you credit on a new computer purchase. The company then recycles the computer, rather than just throw it out. HP has a trade-in website setup already with information targeting corporate customers. You can also sell a computer on EBay, or an ad in the paper or on various websites devoted to used computer sales. Just because it isnt powerful enough for one persons use, doesnt mean it cant be useful to someone else. A programmer, graphic artist, or engineer needs a state of the art computer, but a casual home would find their obsolete systems to be more than adequate for their needs. 2. Another option is to donate the computer. Just because a computer isnt powerful enough for its first owner, doesnt mean someone else cant use it. It may also be a tax deduction if donated to a charity or a school. There are also several organizations that from time to time accept donated computers for use by low income families. A quick search online can help find if a local organization is conducting such a campaign. 3. Yet another option is to upgrade. Most computers made recently can be relatively easy to upgrade. A new Hard Drive can be purchased and installed by a local computer store, or by the customer for a nominal fee to provide more storage. RAM for more memory, or a new CD/DVDRW drive can also be purchased for a smaller price than a new computer. For most people, it would enhance the life of their computer, and save them money. Extra PCI slots allow for expansion with USB 2.0, Fire wire, and a new sound card. You can also upgrade the video card for a better gaming experience.

37

You might also like