Impact of Computer Technology on Society and Culture

Impact of Computer Technology on Society and Culture
Slide Note
Embed
Share

Role of computers and internet technology in modern society and culture, focusing on various aspects such as cybercrime, data theft, radicalization, propaganda, and challenges in prosecuting cybercrimes. The discussion also includes topics like online scams, privacy concerns, national security, and ethical dilemmas related to hacking activities.

  • Computer technology
  • Cybercrime
  • Data theft
  • Society
  • Culture

Uploaded on Mar 08, 2025 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. Understanding the Impacts of Computer Understanding the Impacts of Computer Technology on Modern Society and Culture Technology on Modern Society and Culture Jessica Chang 1

  2. Role of computers and internet technology in crime 1. 2. 3. Radicalization and propaganda Internet Scams On-line dating, 2 perspectives 2 perspectives: : the perspective of public policy 1. Whistle-blowing Snowden - How to balance information privacy and national security? 2. 3. 4. Canada s Cyber Security Strategy is it enough? Does hacking back encourage vigilantism? Could ordinary citizens decide on values shaping public life extreme left vs. alt-right 2

  3. As Targets: Data Theft DDoS (Distributed Denial of Service) attacks Crimes related to computer mediated technology As Instruments 1. Child Exploitation - Child pornography 2. Mass Marketing Fraud - Online Drug Stores, Investments, 3. Financial cybercrimes - Money Laundering, fraud 4. Open Source Intelligence 3

  4. Trivia Question: T or F - Proving the sexual assault of an adult rather than a child maybe more difficult. C Captain P Picard in culture lingo Discussion Question: What are some challenges in prosecuting cybercrimes? 4

  5. Phishing How a fraudster got $12 million out of a Canadian university Internet scams 5

  6. why the hack: https://www.ashleymadison.com Discussion Question: 1. Do you agree with the hack? 2. What is the moral thing to do if you figured out whodunnit ? Hacking Hacking Ashley Madison Ashley Madison 6

  7. 1. First Generation warfare AD 500- 1450 2. Second Generation warfare 1989 3. Third-generation warfare - the end of linear warfare on a tactical level A brief History of A brief History of warfare warfare 4. Fourth Generation warfare - "Post- modern" Cyber crime as a Cyber crime as a crime problem crime problem and a war problem and a war problem 7

  8. Radicalization and propaganda Radicalization and propaganda RWE groups Atalante (QC) Storm Alliance (QC) The Three Percent (III%) (AB, ON, +) Aryan Guard (AB) Northwest Territorial Imperative (BC, AB) Cultural Action Party of Canada (BC) Proud Boys (online) Incel (online) RWE groups 5 5th th Generation Generation Warfare Warfare 8

  9. Censoring Social Censoring Social network? network? Pros & Cons Pros & Cons La Meut 9

  10. Ethics & Legality Hacking back A new emergent industry computer insurance 10

  11. Ashley Madison Hacked! 37 Tsagourias, N. Cyber Attacks, Self-Defence and the Problem of Attribution. Journal of Conflict and Security Law 17, no. 2 (July 1, 2012): 229 44. Million Cheating Spouses Accounts At Risk Of Exposure! All Singapore Stuff - Real Singapore News. Accessed November 25, 2018. https://www.allsingaporestuff.com/article/ashley- madison-hacked-37-million-cheating-spouses-accounts- risk-exposure. References References Schmidle, Nicholas. The Digital Vigilantes Who Hack Back, April 30, 2018. https://www.newyorker.com/magazine/2018/05/07/the- digital-vigilantes-who-hack-back. Whitty, Monica T., and Tom Buchanan. The Online Romance Scam: A Serious Cybercrime. Cyberpsychology, Behavior, and Social Networking 15, no. 3 (March 2012): 181 83. 11

More Related Content