Term 4 - online systems

The Internet
The Internet is one of the most important changes that has happened to the way we live and work in the last fifteen years.
It began life in a small American laboratory; its inventors could never have foreseen how it would develop over time.
The Internet now spans the world, connecting billions of people in their everyday lives.

How the internet has changed lives 

The internet has played an important role in peoples lives like with Facebook, online gaming, email and searches.

Social Effects
Information Communication Technology is constantly changing and advancing as scientists and engineers create new technologies for us to use and enjoy.

For example in the last 50 years these technologies have become commonplace
 
Personal Computers
Mobile Phones
The Internet
Medical scanners
Satellites
Lasers
CD and DVD
Television
Car electronics
Credit cards
And so on. Imagine what our society was like back in the 1950s compared to today


The advent of social networking sites like Facebook and Myspace (among others) has made it far easier for us to stay in touch with the people we met in kindergarden and to stay up to date on the events happening in the lives of people you would have lost touch with otherwise. According to an article on HealthGuidance.org, "in the case of sites such as Facebook and others then, you're actually more in contact with people than you would be otherwise and in fact need never lose contact with anyone ever again."
Social media has effected my life in a positive way because I had a friend in grade one  he moved to Sydney but now with Facebook I can keep in touch with him.



Computer Misuse Act


Hacking has been around almost as long as the Internet; some people just love to try and break into a computer system. Prior to 1990, there was no legislation in place to tackle the problems caused by hacking. Although everyone knew that it was wrong and should be against the law, there was nothing that anyone could do about it. As the problem grew, it became apparent that specific legislation was needed to enable hackers to be prosecuted under the law. So, in 1990, the Computer Misuse Act was passed. The Computer Misuse Act (1990) recognised three new offences:
  1. Unauthorised access to computer material
  2. Unauthorised access with intent to commit or facilitate a crime
  3. Unauthorised modification of computer material.
According to a recent post and paper by Bill Zeller, The New York Times was among four popular Websites that got hacked through CSRF vulnerability. This CSRF vulnerability was exploited to extract the email address of a user.  The attack can be used for identification (e.g., finding the email addresses of all users who visit an attacker's site) or for spam. This attack is particularly dangerous because of the large number of users who have NY Times' accounts and because the NY Times keeps users logged in for over a year. 

The computer misuse act plays a very important role in people’s lives. If this happened to them they can try to find the hackers and prosecute them.












Copyright Patent Act

You have spent three months working on your coursework. It is absolutely brilliant, even if you do say so yourself, you just know that it is worth that A* grade. How would you feel if you found out someone in your class had secretly copied your work when you went out of the room for five minutes and then handed it in as their own? I bet you would feel pretty miffed, to put it mildly.
How about that song that you spent last week writing? You are sure it is great chart material and is going to get you that break into the music industry. You record a demo of it and send it to a record company, but you don't hear anything from them. How does it make you feel when you see the latest boy band performing your song on Top of the Pops, and you haven't been paid a single penny for it?
It's not fair is it? That's why we need a law to protect the author of any original material from someone else taking it and claiming it as their work. 
There is such a law, it is called the 'Copyright, Designs and Patents Act' and it was passed in 1988

Young offenders of copyright laws are often sentenced to community service and education about copyright law. In 2005, an Arizona teenager was sentenced to "a fine of over $5,000, 200 hours of community service, a 3-month jail term (deferred), and requirements to stay away from file-sharing programs and to take a copyright law class at his school,"


Data Protection  Act
The Data Protection Act (1998) is a pretty important piece of legislation.
It affects you almost every day of your life and will continue to do so whilst you work and after you retire.It is the piece of legislation

In general, information disclosed by a patient to his or her doctor or therapist is regarded as confidential. However, in the NHS the information may be passed to someone else:


Computer Crimes

 Where there are ways to make money, there will be criminals just waiting to take advantage.
The growth of the Internet has provided criminals with a whole host of different methods to try to relieve you of your hard earned cash.Computer crime is defined as 'criminal activity directly related to the use of computers'. It could be done in order to: steal money, steal data or information ,steal someone's identity ,damage or disrupt someone's system for revenge ,cause general havoc for fun ,copy software / films / music to avoid paying for it. The spread of computers and networking revolutionized the business world and simplified life for many people. Unfortunately, computers also contributed to an increase in fraud, which results in severe financial losses for businesses and individuals alike. Estimates suggest that U.S. computer fraud in the late 1990s amounted to $10 billion per year in losses. Computer thieves are not content to steal small amounts of money at a time, either. The typical bank robber averages $6,100 a heist; electronic thieves average over $100,000 per incident.( Computer Fraud http://www.referenceforbusiness.com/encyclopedia/Clo-Con/Computer-Fraud.html#ixzz1eaP65Xh1)
Piracy 
Imagine that you have just created a fantastic new computer game ... you learned how to program, saw a gap in the market, developed your skills, then spent weeks and months creating it. You find a company to sell it for you. You are all set to make a fortune... then your 'friend' posts a copy on the internet and everyone downloads it.
All that work and effort will not be rewarded, why should anyone buy it, when it is freely available on the internet?
Or perhaps you are a talented music group just starting out... you write your songs, you make your first CD. Then someone buys a single CD and converts them to MP3 and posts them on the internet... no more sales!
This is the problem that software and music companies, large or small have to face. And so laws have been created to protect their efforts.
Making illegal copies of software is called 'Software Piracy'.


 Burning, buying or downloading pirated movies or television shows many appear harmless, but it costs the Australian film industry over $230m every year, putting Aussie jobs at risk as well the future of Australian films.

The film industry thanks those who support the real thing by enjoying film & TV shows legally at the cinema, DVD and on TV. See more at IPA Awareness

   Social Media

Social media includes the various online technology tools that enable people to communicate easily via the internet to share information and resources. Social media can include text, audio, video, images, podcasts, and other multimedia communications.

how social media has changed the way we communicate every day